Issue Date | Title | Author(s) |
Mar-2017 | 2D and 3D shape retrieval using skeleton filling rate | Şirin, Yahya; Demirci, Muhammed Fatih |
2015 | 3D Shape Recognition: Enhanced Skeletal Points | Şirin, Yahya; Demirci, Muhammed Fatih |
2013 | Adapting the Columns of Storage Components for Lower Static Energy Dissipation | Aykenar, Mehmet Burak; Özgür, Muhammet; Şimşek, Osman Seçkin; Ergin, Oğuz |
2012 | An adaptive smoothing method for sensor noise in augmented reality applications on smartphones | Özcan, R.; Orhan, F.; Demirci, Muhammed Fatih ; Abul, O. |
2017 | Age classification using an optimized CNN architecture | Aydoğdu, M. Fatih; Demirci, Muhammed Fatih |
2021 | Algorithmic Analysis of Priority-Based Bin Packing | Wojciechowski, P.; Subramani, K.; Velasquez, A.; Caskurlu, B. |
2020 | Analysis and Evaluation of Keystroke Dynamics as a Feature of Contextual Authentication | Bıçakcı, Kemal ; Salman, O.; Uzunay Y.; Tan, M. |
Oct-2018 | An Analysis DRDoS Amplifiers in Europe | Ercan, Emre Murat; Selçuk, Ali Aydın |
2021 | An Analysis of Ethereum Smart Contract Vulnerabilities | Usman T.A.; Selçuk, Ali Aydın ; Ozarslan S. |
Dec-2014 | Analysis of Seam-Carving-Based Anonymization of Images Against PRNU Noise Pattern-Based Source Attribution | Dirik, Ahmet Emir; Sencar, Hüsrev Taha ; Memon, Nasir |
2016 | Analysis of the Effect of Image Resolution on Automatic Face Gender and Age Classification | Cerit, Betül; Bölük, S. Arda; Demirci, Muhammed Fatih |
2020 | Annotator rationales for labeling tasks in crowdsourcing | Kutlu, Mücahid ; McDonnell, T.; Elsayed, T. C.; Lease, M. |
2014 | Anonymity in Multi-Instance Micro-Data Publication | Abul, Osman |
2010 | Anonymization of moving objects databases by clustering and perturbation | Abul, Osman ; Bonchi, Francesco; Nanni, Mirco |
2021 | Anonymous location sharing in urban area mobility | Abul, Osman ; Bitirgen, Ozan Berk |
15-Mar-2014 | Anonymous trace and revoke | Ak, Murat; Pehlivanoğlu, Serdar; Selçuk, Ali Aydın |
2016 | Anti-cancer Drug Activity Prediction by Ensemble Learning | Tolan, Ertan; Tan, Mehmet |
Sep-2020 | Are we secure from bots? Investigating vulnerabilities of botometer | Torusdağ, Buğra M.; Kutlu, Mücahid ; Selçuk, Ali Aydın |
Jul-2020 | ArTest: The First Test Collection for Arabic Web Search with Relevance Rationales | Hasanain, M.; Barkallah, Y.; Suwaileh, R.; Kutlu, Mücahid ; Elsayed, T. |
2008 | Assessment of composite motif discovery methods | Klepper, Kjetil; Sandve, Geir K.; Abul, Osman ; Johansen, Jostein; Drablos, Finn |
2013 | Audio codec identification from coded and transcoded audios | Hiçsönmez, Samet; Sencar, Hüsrev Taha ; Avcıbaş, İsmail |
2011 | Audio codec identification through payload sampling | Hiçsönmez S.; Sencar, Hüsrev Taha ; Avcıbaş I. |
2023 | Authentication-enabled attribute-based access control for smart homes | Burakgazi Bilgen, Melike; Abul, Osman ; Bıçakçı, Kemal |
2018 | Automated generation of attack graphs using NVD | Aksu, M. Uğur; Bıçakcı, Kemal ; Dilek, M. H.; Özbayoğlu, Ahmet Murat ; Tatlı, E. İ. |
Dec-2017 | Automated Image Matching and New Readings for Cyrus the Great's 547 BC Campaign in the Nabonidus Chronicle (BM 35382 = ABC 7) | Adalı, Selim Ferruh; Demirci, Muhammed Fatih ; Özbayoğlu, Ahmet Murat |
2021 | Automated Molecule Generation using Deep Q-Learning and Graph Neural Networks | Isik R.; Tan, Mehmet |
2021 | Automatic Generation of H.264 Parameter Sets to Recover Video File Fragments | Altınışık, Enes; Sencar, Hüsrev Taha |
2017 | Automatic Image selection from Images with Similar Contents | Bardak, Batuhan ; Demirci, Muhammed Fatih |
2017 | Automatically determining whether a software change request will be approved | Mazan, Z.; Gerede, Çağdaş Evren |
Jun-2020 | A utility based approach for data stream anonymization | Sopaoğlu, Uğur; Abul, Osman |
Sep-2020 | BERT Modeli ile Türkçe Duygu Analizi | Açıkalın, Utku Umur; Bardak, Benan; Kutlu, Mücahid |
2016 | Biological Network Derivation by Positive Unlabeled Learning Algorithms | Pancaroglu, Doruk; Tan, Mehmet |
Aug-2014 | Bit Impact Factor: Towards making fair vulnerability comparison | Can, Serdar Zafer; Yalçın, Gülay; Ergin, Oğuz ; Sabri Ünsal, Osman; Cristal, Adrian |
2021 | BLEKeeper: Response Time Behavior Based Man-In-The-Middle Attack Detection | Yurdagül, Muhammed Ali; Sencar, Hüsrev Taha |
2021 | Breast cancer histopathology image classification using CNN | Karatayev M.; Khalyk S.; Adai S.; Lee M.-H.; Demirci, Muhammed Fatih |
Oct-2020 | Building Test Collections using Bandit Techniques: A Reproducibility Study | Altun, Bahadır; Kutlu, Mücahid |
Sep-2019 | Can Driving Patterns Predict Identity and Gender? | Abul, Osman ; Karatas, B. |
2022 | Can We Trust Undervolting in FPGA-Based Deep Learning Designs at Harsh Conditions? | Koc, Fahrettin; Salami, Behzad; Ergin, Oğuz ; Unsal, Osman; Kestelman, Adrian Cristal |
Apr-2014 | Capacity Allocation Games for Network-Coded Multicast Streaming | Anshelevich, Elliot; Çaşkurlu, Buğra ; Kar, Koushik; Zhang, Hang |
2015 | Carving Orphaned JPEG File Fragments | Uzun, Erkam; Sencar, Hüsrev Taha |
2016 | ChargeCache: Reducing DRAM Latency by Exploiting Row Access Locality | Hassan, Hasan; Pekhimenko, Gennady; Vijaykumar, Nandita; Seshadri, Vivek; Lee, Donghyuk; Ergin, Oğuz ; Mutlu, Onur |
2015 | charPattern: Rethinking Android Lock Pattern to Adapt to Remote Authentication | Bıçakcı, Kemal ; Satiev, Tashtanbek |
Sep-2020 | Chemical Induced Differential Gene Expression Prediction on LINCS Database | Işık, R.; Ekşioğlu, I.; Maral, B. C.; Bardak, B.; Tan, Mehmet |
2018 | Cifar-10 Image Classification with Convolutional Neural Networks For Embedded Systems | Çalık, Rasim Caner; Demirci, Muhammed Fatih |
2013 | Circle Filling Rate Descriptor for Object Recognition | Şirin, Yahya; Demirci, Muhammed Fatih |
2013 | Class Representative Computation Using Graph Embedding | Aydos, Fahri; Soran, Ahmet; Demirci, Muhammed Fatih |
2013 | Class Representative Computation using Graph Embedding and Clustering | Aydos, Fahri; Demirci, Muhammed Fatih |
2012 | Classification of audio codecs based on coding characteristics | Hiçsönmez S.; Sencar, Hüsrev Taha ; Avcibaş I. |
2012 | Classification of audios containing speech and music | Uzun, Erkam; Sencar, Hüsrev Taha |
Apr-2017 | Classification of nervous system withdrawn and approved drugs with ToxPrint features via machine learning strategies | Onay, Aytun; Onay, Melih; Abul, Osman |
2021 | Classification utility aware data stream anonymization | Sopaoğlu, Ugur; Abul, Osman |
2022 | The CLEF-2022 CheckThat! Lab on Fighting the COVID-19 Infodemic and Fake News Detection | Nakov, Preslav; Barron-Cedeno, Alberto; Martino, Giovanni Da San; Alam, Firoj; Struss, Julia Maria; Mandl, Thomas; Kutlu, Mücahid |
Dec-2015 | The Cloaked-Centroid protocol: location privacy protection for a group of users of location-based services | Ashouri-Talouki, Maede; Baraani-Dastjerdi, Ahmad; Selçuk, Ali Aydın |
Dec-2017 | A Closer Look at Pure-Text Human-Interaction Proofs | Kızılöz, Hakan Ezgi; Bıçakcı, Kemal |
2021 | Coğrafi Radar Dağıtım Optimizasyonu [Conference Object] | Abul, Osman ; Şavşatlı F. |
2014 | Communication / Computation Trade-offs in Wireless Sensor Networks: Comparing Network-Level and Node-Level Strategies | Yıldız, Hüseyin Uğur; Bıçakcı, Kemal ; Tavlı, Bülent |
2012 | Communication/computation tradeoffs for prolonging network lifetime in wireless sensor networks: The case of digital signatures | Bıçakcı, Kemal ; Bağcı, İbrahim Ethem; Tavlı, Bülent |
2017 | Comparison of Three Different CNN Architectures for Age Classification | Aydoğdu, Mehmet Fatih; Çelik, Vakkas; Demirci, Muhammed Fatih |
2010 | Complexity-Effective Rename Table Design for Rapid Speculation Recovery | Asilioğlu, Goerkem; Kaya, Emine Merve; Ergin, Oğuz |
2008 | Compo: composite motif discovery using discrete models | Sandve, Geir Kjetil; Abul, Osman ; Drablos, Finn |
2022 | Composable Cachelets: Protecting Enclaves from Cache Side-Channel Attacks | Townley, Daniel; Arikan, Kerem; Liu, Yu David; Ponomarev, Dmitry; Ergin, Oğuz |
2013 | The computational investigation of new inhibitors for aldose reductase | Onay, A.; Abul, Osman |
2019 | Constructing Test Collections using Multi-armed Bandits and Active Learning | Rahman, M. Mustafizur; Kutlu, Mücahid ; Lease, Matthew |
2010 | Content-based video copy detection - A survey | Lian, S.; Nikolaidis, N.; Sencar, Hüsrev Taha |
2021 | A Convolutional Deep Clustering Framework for Gene Expression Time Series | Özgül, Ozan Frat; Bardak, Batuhan ; Tan, Mehmet |
2019 | Correlation, prediction and ranking of evaluation metrics in information retrieval | Gupta, S.; Kutlu, Mücahid ; Khetan, V.; Lease, M. |
2013 | A Cost-Effective Decision Tree Based Approach to Steganalysis | Li, Liyun; Sencar, Hüsrev Taha ; Memon, Nasir |
25-Nov-2016 | A CRT-based verifiable secret sharing scheme secure against unbounded adversaries | Ersoy, Oğuzhan; Pedersen, Thomas Brochmann; Kaya, Kamer; Selçuk, Ali Aydın ; Anarim, Emin |
2023 | Deep Learning Based Social Bot Detection on Twitter | Arın, Efe; Kutlu, Mucahid |
2021 | Deep learning-based investment strategy: technical indicator clustering and residual blocks | Maratkhan, Anuar; İlyassov, Ibrakhim; Aitzhanov, Madiyar; Demirci, Muhammed Fatih ; Özbayoğlu, Ahmet Murat |
2021 | DeepGrep: A deep convolutional neural network for predicting gene-regulating effects of small molecules | Bardak B.; Tan, Mehmet |
2009 | Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks | Bıçakcı, Kemal ; Tavlı, Bülent |
2017 | Detecting Errors in Instructions with Bloom Filters | Atamaner, Mert; Ergin, Oğuz ; Ottavi, Marco; Reviriego, Pedro |
2023 | DEV-PIM: Dynamic Execution Validation with Processing-in-Memory | Bolata, Alperen; Tuğrul, Yahya Can; Çelik, Seyyid Hikmet; Sezer, Şakir; Ottavi, Marco; Ergin, Oğuz |
2013 | Digital image forensics: There is more to a picture than meets the eye | Sencar, Hüsrev Taha ; Memon, N. |
2016 | Dijital Kamera ve Lazer İşaretçi Kullanılarak Görüntü İşleme Yöntemiyle Yer Değiştirmenin Ölçülmesi | Mortaş, Cem; Demirci, Muhammed Fatih ; Gürbüz, S. Zübeyde; Eroğul, Osman |
2017 | Disease outbreak prediction by data integration and multi-task learning | Bardak, Batuhan ; Tan, Mehmet |
2016 | Distance Measure Functions with Enhanced Skeletal Points for 2D and 3D | Şirin, Yahya; Demirci, Muhammed Fatih |
2016 | Distinctive Interest Point Selection for Efficient Near-duplicate Image Retrieval | Yıldız, Burak; Demirci, Muhammed Fatih |
Oct-2020 | Distinguishing True and False Buy/Sell Triggers from Financial Technical Indicators | Tüfekçi, Zeynep; Abul, Osman |
Sep-2018 | Distributed Multi-Unit Privacy Assured Bidding (PAB) for Smart Grid Demand Response Programs | Balli, Muhammed Fatih; Uludağ, Süleyman; Selçuk, Ali Aydın ; Tavlı, Bülent |
2014 | Distributed RDFS Reasoning with MapReduce | Çetin, Yiğit; Abul, Osman |
2021 | Docker Görüntü Güvenliğine Yönelik Bir Yöntem Uygulaması | Sengul O.; Ozkilicaslan H.; Arda E.; Yavanoglu U.; Dogru I.A.; Selçuk, Ali Aydın |
2022 | DR-STRaNGe: End-to-End System Design for DRAM-based True Random Number Generators | Bostanci, F. Nisa; Olgun, Ataberk; Orosa, Lois; Yaglikci, A. Giray; Kim, Jeremie S.; Hassan, Hasan; Mutlu, Onur; Ergin, Oğuz |
Sep-2019 | Drug response prediction by ensemble learning and drug-induced gene expression signatures | Tan, Mehmet ; Özgül, Ozan Fırat; Bardak, Batuhan ; Ekşioğlu, Işıksu; Sabuncuoğlu, S. |
2014 | Drug sensitivity prediction for cancer cell lines based on pairwise kernels and miRNA profiles | Tan, Mehmet |
2010 | Dynamic Register File Partitioning in Superscalar Microprocessors for Energy Efficiency | Özsoy, Meltem; Koçberber, Y. Onur; Kayaalp, Mehmet; Ergin, Oğuz |
2006 | Early register deallocation mechanisms using checkpointed register files | Ergin, Oğuz ; Balkan, Deniz; Ponomarev, Dmitry; Ghose, Kanad |
2017 | Edge distance graph kernel and its application to small molecule classification | Tan, Mehmet |
2012 | Effective Enrichment of Gene Expression Data Sets | Şirin, Utku; Erdoğdu, Utku; Tan, Mehmet ; Polat, Faruk; Alhajj, Reda |
Jun-2016 | Effective gene expression data generation framework based on multi-model approach | Şirin, Utku; Erdoğdu, Utku; Polat, Faruk; Tan, Mehmet ; Alhajj, Reda |
2021 | Effectiveness analysis of public rule sets used in snort intrusion detection system | Gündoğdu, I.; Selçuk, Ali Aydın ; Özarslan, S. |
2013 | Effects of Handshake Hop Length of Unidirectional Links on the Lifetime of Wireless Sensor Networks | Batmaz, Anıl Ufuk; Tavlı, Bülent ; İncebacak, Davut; Bıçakcı, Kemal |
Jan-2015 | Effects of node mobility on energy balancing in wireless networks | Pala, Zeydin; Bıçakcı, Kemal ; Turk, Mustafa |
2009 | AN EFFICIENT AND ROBUST METHOD FOR DETECTING COPY-MOVE FORGERY | Bayram, Sevinç; Sencar, Hüsrev Taha ; Memon, Nasir |
2011 | Efficient many-to-many feature matching under the l(1) norm | Demirci, Muhammed Fatih ; Osmanlıoğlu, Yusuf; Shokoufandeh, Ali; Dickinson, Sven |
2016 | Efficient Near-duplicate Image Detection with Created Feature Subset | Yıldız, Burak; Demirci, Muhammed Fatih |
2012 | Efficient Sensor Fingerprint Matching Through Fingerprint Binarization | Bayram, Sevinç; Sencar, Hüsrev Taha ; Memon, Nasir |
2014 | Efficient Shape Recognition with Skeleton Filling Rate | Şirin, Yahya; Demirci, Muhammed Fatih |
2010 | Efficient shape retrieval under partial matching | Demirci, Muhammed Fatih |