Vulnerability prediction from source code using machine learning

Z Bilgin, MA Ersoy, EU Soykan, E Tomur… - IEEE …, 2020 - ieeexplore.ieee.org
As the role of information and communication technologies gradually increases in our lives,
software security becomes a major issue to provide protection against malicious attempts …

Differentially private deep learning for load forecasting on smart grid

EU Soykan, Z Bilgin, MA Ersoy… - 2019 IEEE Globecom …, 2019 - ieeexplore.ieee.org
Load forecasting is vital for a reliable and sustainable smart grid as it is used to predict the
demand and make price adjustment accordingly. Electric consumption data which is …

Privacy Preserving Demand Side Management Method via Multi-Agent Reinforcement Learning

F Zhang, Q Yang, D An - IEEE/CAA Journal of Automatica …, 2023 - ieeexplore.ieee.org
The smart grid utilizes the demand side management technology to motivate energy users
towards cutting demand during peak power consumption periods, which greatly improves …

User-centred privacy inference detection for smart home devices

AD Kounoudes, GM Kapitsaki… - 2021 IEEE SmartWorld …, 2021 - ieeexplore.ieee.org
In the smart home, vast amounts of data are being collected via various interconnected
devices. Although this assists in improving the quality of life at home, often the user is not …

Activity Recognition Protection for IoT Trigger-Action Platforms

M Aghvamipanah, M Amini, C Artho… - 2024 IEEE 9th …, 2024 - ieeexplore.ieee.org
Smart home devices collect and transmit user data to smart home Trigger Action Platforms
(TAPs) for processing and executing automation rules. However, this data can also be used …

Context-aware authentication with dynamic credentials using electricity consumption data

E Ustundag Soykan, L KaraÇay, Z Bilgin… - The Computer …, 2022 - academic.oup.com
Abstract Industrial IoT (IIoT) era is evolving rapidly in parallel to the progress in Industry 4.0,
which leads factories to increase the engagement with external parties through different …

VulnArmor: mitigating software vulnerabilities with code resolution and detection techniques

PV Sindhwad, P Ranka, S Muni, F Kazi - International Journal of …, 2024 - Springer
In today's swiftly evolving digital environment, the security and dependability of software
applications are crucial. In light of industries' increasing reliance on software, identifying and …

Stealthy Attack Detection for Privacy-preserving Real-time Pricing in Smart Grids

F Wu, X Wang, M Yang, H Zhang… - 2022 13th Asian …, 2022 - ieeexplore.ieee.org
Over the past decade, smart grids have been widely implemented. Real-time pricing can
better address demand-side management in smart grids. Real-time pricing requires …

[PDF][PDF] Use of IoT and Machine Learning for Efficient Power Management Through Smart Grid: A Review

R Singh, NS Gill - 2020 - researchgate.net
The rising demand for efficient power distribution and management has brought enormous
opportunities for researchers. It has resulted in moving from the traditional grid system to the …