Issue Date | Title | Author(s) |
Mar-2017 | 2d and 3d Shape Retrieval Using Skeleton Filling Rate | Şirin, Yahya; Demirci, Muhammed Fatih |
2015 | 3d Shape Recognition: Enhanced Skeletal Points | Şirin, Yahya; Demirci, Muhammed Fatih |
2013 | Adapting the Columns of Storage Components for Lower Static Energy Dissipation | Aykenar, Mehmet Burak; Özgür, Muhammet; Şimşek, Osman Seçkin; Ergin, Oğuz |
2012 | An Adaptive Smoothing Method for Sensor Noise in Augmented Reality Applications on Smartphones | Özcan, R.; Orhan, F.; Demirci, Muhammed Fatih ; Abul, O. |
2017 | Age Classification Using an Optimized Cnn Architecture | Aydoğdu, M. Fatih; Demirci, Muhammed Fatih |
2020 | Analysis and Evaluation of Keystroke Dynamics as a Feature of Contextual Authentication | Bıçakcı, Kemal ; Salman, O.; Uzunay Y.; Tan, M. |
Oct-2018 | An Analysis Drdos Amplifiers in Europe | Ercan, Emre Murat; Selçuk, Ali Aydın |
2021 | An Analysis of Ethereum Smart Contract Vulnerabilities | Usman T.A.; Selçuk, Ali Aydın ; Ozarslan S. |
Dec-2014 | Analysis of Seam-Carving Anonymization of Images Against Prnu Noise Pattern-Based Source Attribution | Dirik, Ahmet Emir; Sencar, Hüsrev Taha ; Memon, Nasir |
2016 | Analysis of the Effect of Image Resolution on Automatic Face Gender and Age Classification | Cerit, Betül; Bölük, S. Arda; Demirci, Muhammed Fatih |
2020 | Annotator Rationales for Labeling Tasks in Crowdsourcing | Kutlu, Mücahid ; McDonnell, T.; Elsayed, T. C.; Lease, M. |
2014 | Anonymity in Multi-Instance Micro-Data Publication | Abul, Osman |
2010 | Anonymization of Moving Objects Databases by Clustering and Perturbation | Abul, Osman ; Bonchi, Francesco; Nanni, Mirco |
2021 | Anonymous Location Sharing in Urban Area Mobility | Abul, Osman ; Bitirgen, Ozan Berk |
15-Mar-2014 | Anonymous Trace and Revoke | Ak, Murat; Pehlivanoğlu, Serdar; Selçuk, Ali Aydın |
2023 | An Architectural Framework for the Allocation Resources in Emergency Management Systems | Yazar, U.T.; Akşit, M. |
Sep-2020 | Are We Secure From Bots? Investigating Vulnerabilities of Botometer | Torusdağ, Buğra M.; Kutlu, Mücahid ; Selçuk, Ali Aydın |
Jul-2020 | Artest: the First Test Collection for Arabic Web Search With Relevance Rationales | Hasanain, M.; Barkallah, Y.; Suwaileh, R.; Kutlu, Mücahid ; Elsayed, T. |
2008 | Assessment of Composite Motif Discovery Methods | Klepper, Kjetil; Sandve, Geir K.; Abul, Osman ; Johansen, Jostein; Drablos, Finn |
2013 | Audio Codec Identification From Coded and Transcoded Audios | Hiçsönmez, Samet; Sencar, Hüsrev Taha ; Avcıbaş, İsmail |
2011 | Audio Codec Identification Through Payload Sampling | Hiçsönmez S.; Sencar, Hüsrev Taha ; Avcıbaş I. |
2023 | Authentication-Enabled Attribute-Based Access Control for Smart Homes | Burakgazi Bilgen, Melike; Abul, Osman ; Bıçakçı, Kemal |
2018 | Automated Generation of Attack Graphs Using Nvd | Aksu, M. Uğur; Bıçakcı, Kemal ; Dilek, M. H.; Özbayoğlu, Ahmet Murat ; Tatlı, E. İ. |
Dec-2017 | Automated Image Matching and New Readings for Cyrus the Great's 547 Bc Campaign in the Nabonidus Chronicle (bm 35382 = Abc 7) | Adalı, Selim Ferruh; Demirci, Muhammed Fatih ; Özbayoğlu, Ahmet Murat |
2021 | Automatic Generation of H.264 Parameter Sets To Recover Video File Fragments | Altınışık, Enes; Sencar, Hüsrev Taha |
2017 | Automatic Image Selection From Images With Similar Contents | Bardak, Batuhan ; Demirci, Muhammed Fatih |
2017 | Automatically Determining Whether a Software Change Request Will Be Approved | Mazan, Z.; Gerede, Çağdaş Evren |
Jun-2020 | A utility based approach for data stream anonymization | Sopaoğlu, Uğur; Abul, Osman |
Sep-2020 | Bert Modeli ile Türkçe Duygu Analizi | Açıkalın, Utku Umur; Bardak, Benan; Kutlu, Mücahid |
Aug-2014 | Bit Impact Factor: Towards Making Fair Vulnerability Comparison | Can, Serdar Zafer; Yalçın, Gülay; Ergin, Oğuz ; Sabri Ünsal, Osman; Cristal, Adrian |
2021 | Blekeeper: Response Time Behavior Based Man-In Attack Detection | Yurdagül, Muhammed Ali; Sencar, Hüsrev Taha |
2023 | Blockchain-Based Privacy Preserving Linear Regression | Mutlu, Zeynep Delal; Kurt Peker, Yesem; Selçuk, Ali Aydın |
2023 | Blockchain-Based Privacy Preserving Linear Regression | Mutlu, Zeynep Delal; Kurt Peker, Yesem; Selçuk, Ali Aydın |
2021 | Breast Cancer Histopathology Image Classification Using Cnn | Karatayev M.; Khalyk S.; Adai S.; Lee M.-H.; Demirci, Muhammed Fatih |
Oct-2020 | Building Test Collections Using Bandit Techniques: a Reproducibility Study | Altun, Bahadır; Kutlu, Mücahid |
Sep-2019 | Can Driving Patterns Predict Identity and Gender? | Abul, Osman ; Karatas, B. |
2022 | Can We Trust Undervolting in Fpga-Based Deep Learning Designs at Harsh Conditions? | Koc, Fahrettin; Salami, Behzad; Ergin, Oğuz ; Unsal, Osman; Kestelman, Adrian Cristal |
2015 | Carving Orphaned Jpeg File Fragments | Uzun, Erkam; Sencar, Hüsrev Taha |
2023 | Catch Me If You Can: Deceiving Stance Detection and Geotagging Models To Protect Privacy of Individuals on Twitter | Dogan, Dilara; Altun, Bahadir; Zengin, Muhammed Said; Kutlu, Mücahid ; Elsayed, Tamer |
2016 | Chargecache: Reducing Dram Latency by Exploiting Row Access Locality | Hassan, Hasan; Pekhimenko, Gennady; Vijaykumar, Nandita; Seshadri, Vivek; Lee, Donghyuk; Ergin, Oğuz ; Mutlu, Onur |
2015 | Charpattern: Rethinking Android Lock Pattern To Adapt To Remote Authentication | Bıçakcı, Kemal ; Satiev, Tashtanbek |
Sep-2020 | Chemical Induced Differential Gene Expression Prediction on Lincs Database | Işık, R.; Ekşioğlu, I.; Maral, B. C.; Bardak, B. ; Tan, Mehmet |
2018 | Cifar-10 Image Classification With Convolutional Neural Networks for Embedded Systems | Çalık, Rasim Caner; Demirci, Muhammed Fatih |
2013 | Circle Filling Rate Descriptor for Object Recognition | Şirin, Yahya; Demirci, Muhammed Fatih |
2013 | Class Representative Computation Using Graph Embedding | Aydos, Fahri; Soran, Ahmet; Demirci, Muhammed Fatih |
2013 | Class Representative Computation Using Graph Embedding and Clustering | Aydos, Fahri; Demirci, Muhammed Fatih |
2012 | Classification of Audio Codecs Based on Coding Characteristics | Hiçsönmez S.; Sencar, Hüsrev Taha ; Avcibaş I. |
2012 | Classification of Audios Containing Speech and Music | Uzun, Erkam; Sencar, Hüsrev Taha |
Apr-2017 | Classification of Nervous System Withdrawn and Approved Drugs With Toxprint Features Via Machine Learning Strategies | Onay, Aytun; Onay, Melih; Abul, Osman |
2021 | Classification Utility Aware Data Stream Anonymization | Sopaoğlu, Ugur; Abul, Osman |
2022 | The Clef-2022 Checkthat! Lab on Fighting the Covid-19 Infodemic and Fake News Detection | Nakov, Preslav; Barron-Cedeno, Alberto; Martino, Giovanni Da San; Alam, Firoj; Struss, Julia Maria; Mandl, Thomas; Kutlu, Mücahid |
Dec-2015 | The Cloaked-Centroid Protocol: Location Privacy Protection for a Group of Users of Location-Based Services | Ashouri-Talouki, Maede; Baraani-Dastjerdi, Ahmad; Selçuk, Ali Aydın |
Dec-2017 | A Closer Look at Pure-Text Human-Interaction Proofs | Kızılöz, Hakan Ezgi; Bıçakcı, Kemal |
2021 | Coğrafi Radar Dağıtım Optimizasyonu [conference Object] | Abul, Osman ; Şavşatlı F. |
2014 | Communication / Computation Trade-Offs in Wireless Sensor Networks: Comparing Network-Level and Node-Level Strategies | Yıldız, Hüseyin Uğur; Bıçakcı, Kemal ; Tavlı, Bülent |
2012 | Communication/Computation Tradeoffs for Prolonging Network Lifetime in Wireless Sensor Networks: the Case of Digital Signatures | Bıçakcı, Kemal ; Bağcı, İbrahim Ethem; Tavlı, Bülent |
2017 | Comparison of Three Different Cnn Architectures for Age Classification | Aydoğdu, Mehmet Fatih; Çelik, Vakkas; Demirci, Muhammed Fatih |
2010 | Complexity-Effective Rename Table Design for Rapid Speculation Recovery | Asilioğlu, Goerkem; Kaya, Emine Merve; Ergin, Oğuz |
2008 | Compo: composite motif discovery using discrete models | Sandve, Geir Kjetil; Abul, Osman ; Drablos, Finn |
2022 | Composable Cachelets: Protecting Enclaves From Cache Side-Channel Attacks | Townley, Daniel; Arikan, Kerem; Liu, Yu David; Ponomarev, Dmitry; Ergin, Oğuz |
2013 | The Computational Investigation of New Inhibitors for Aldose Reductase | Onay, A.; Abul, Osman |
2019 | Constructing Test Collections Using Multi-Armed Bandits and Active Learning | Rahman, M. Mustafizur; Kutlu, Mücahid ; Lease, Matthew |
2010 | Content-Based Video Copy Detection - a Survey | Lian, S.; Nikolaidis, N.; Sencar, Hüsrev Taha |
2021 | A Convolutional Deep Clustering Framework for Gene Expression Time Series | Özgül, Ozan Frat; Bardak, Batuhan ; Tan, Mehmet |
2019 | Correlation, Prediction and Ranking of Evaluation Metrics in Information Retrieval | Gupta, S.; Kutlu, Mücahid ; Khetan, V.; Lease, M. |
2013 | A Cost-Effective Decision Tree Based Approach To Steganalysis | Li, Liyun; Sencar, Hüsrev Taha ; Memon, Nasir |
25-Nov-2016 | A Crt-Based Verifiable Secret Sharing Scheme Secure Against Unbounded Adversaries | Ersoy, Oğuzhan; Pedersen, Thomas Brochmann; Kaya, Kamer; Selçuk, Ali Aydın ; Anarim, Emin |
2022 | Dağıtık Ortamda Derece İlintileri Bazlı Gerçekçi Çizge Üretimi | Atas, Furkan; Akgün, Mehmet Burak |
2023 | Deep Learning Based Social Bot Detection on Twitter | Arın, Efe; Kutlu, Mucahid |
2021 | Deep Learning-Based Investment Strategy: Technical Indicator Clustering and Residual Blocks | Maratkhan, Anuar; İlyassov, Ibrakhim; Aitzhanov, Madiyar; Demirci, Muhammed Fatih ; Özbayoğlu, Ahmet Murat |
2009 | Denial-Of Attacks and Countermeasures in Ieee 802.11 Wireless Networks | Bıçakcı, Kemal ; Tavlı, Bülent |
2017 | Detecting Errors in Instructions With Bloom Filters | Atamaner, Mert; Ergin, Oğuz ; Ottavi, Marco; Reviriego, Pedro |
2023 | Dev-Pim: Dynamic Execution Validation With Processing-In | Bolata, Alperen; Tuğrul, Yahya Can; Çelik, Seyyid Hikmet; Sezer, Şakir; Ottavi, Marco; Ergin, Oğuz |
2013 | Digital Image Forensics: There Is More To a Picture Than Meets the Eye | Sencar, Hüsrev Taha ; Memon, N. |
2016 | Dijital Kamera ve Lazer İşaretçi Kullanılarak Görüntü İşleme Yöntemiyle Yer Değiştirmenin Ölçülmesi | Mortaş, Cem; Demirci, Muhammed Fatih ; Gürbüz, S. Zübeyde; Eroğul, Osman |
2017 | Disease Outbreak Prediction by Data Integration and Multi-Task Learning | Bardak, Batuhan ; Tan, Mehmet |
2016 | Distance Measure Functions With Enhanced Skeletal Points for 2d and 3d | Şirin, Yahya; Demirci, Muhammed Fatih |
2016 | Distinctive Interest Point Selection for Efficient Near-Duplicate Image Retrieval | Yıldız, Burak; Demirci, Muhammed Fatih |
Oct-2020 | Distinguishing True and False Buy/Sell Triggers From Financial Technical Indicators | Tüfekçi, Zeynep; Abul, Osman |
Sep-2018 | Distributed Multi-Unit Privacy Assured Bidding (pab) for Smart Grid Demand Response Programs | Balli, Muhammed Fatih; Uludağ, Süleyman; Selçuk, Ali Aydın ; Tavlı, Bülent |
2014 | Distributed Rdfs Reasoning With Mapreduce | Çetin, Yiğit; Abul, Osman |
2021 | Docker Görüntü Güvenliğine Yönelik Bir Yöntem Uygulaması | Sengul O.; Ozkilicaslan H.; Arda E.; Yavanoglu U.; Dogru I.A.; Selçuk, Ali Aydın |
2022 | Dr-Strange: End-To System Design for Dram-Based True Random Number Generators | Bostanci, F. Nisa; Olgun, Ataberk; Orosa, Lois; Yaglikci, A. Giray; Kim, Jeremie S.; Hassan, Hasan; Mutlu, Onur; Ergin, Oğuz |
Sep-2019 | Drug Response Prediction by Ensemble Learning and Drug-Induced Gene Expression Signatures | Tan, Mehmet ; Özgül, Ozan Fırat; Bardak, Batuhan ; Ekşioğlu, Işıksu; Sabuncuoğlu, S. |
2010 | Dynamic Register File Partitioning in Superscalar Microprocessors for Energy Efficiency | Özsoy, Meltem; Koçberber, Y. Onur; Kayaalp, Mehmet; Ergin, Oğuz |
2006 | Early Register Deallocation Mechanisms Using Checkpointed Register Files | Ergin, Oğuz ; Balkan, Deniz; Ponomarev, Dmitry; Ghose, Kanad |
2021 | Effectiveness Analysis of Public Rule Sets Used in Snort Intrusion Detection System | Gündoğdu, I.; Selçuk, Ali Aydın ; Özarslan, S. |
2013 | Effects of Handshake Hop Length of Unidirectional Links on the Lifetime of Wireless Sensor Networks | Batmaz, Anıl Ufuk; Tavlı, Bülent ; İncebacak, Davut; Bıçakcı, Kemal |
Jan-2015 | Effects of Node Mobility on Energy Balancing in Wireless Networks | Pala, Zeydin; Bıçakcı, Kemal ; Turk, Mustafa |
2009 | An Efficient and Robust Method for Detecting Copy-Move Forgery | Bayram, Sevinç; Sencar, Hüsrev Taha ; Memon, Nasir |
2011 | Efficient Many-To Feature Matching Under the L(1) Norm | Demirci, Muhammed Fatih ; Osmanlıoğlu, Yusuf; Shokoufandeh, Ali; Dickinson, Sven |
2016 | Efficient Near-Duplicate Image Detection With Created Feature Subset | Yıldız, Burak; Demirci, Muhammed Fatih |
2012 | Efficient Sensor Fingerprint Matching Through Fingerprint Binarization | Bayram, Sevinç; Sencar, Hüsrev Taha ; Memon, Nasir |
2014 | Efficient Shape Recognition With Skeleton Filling Rate | Şirin, Yahya; Demirci, Muhammed Fatih |
2010 | Efficient Shape Retrieval Under Partial Matching | Demirci, Muhammed Fatih |
2010 | Efficient Techniques for Sensor Fingerprint Matching in Large Image & Video Databases | Bayram, Sevinç; Sencar, Hüsrev Taha ; Memon, Nasir |
Sep-2020 | Efficient Test Collection Construction Via Active Learning | Rahman, M. M.; Kutlu, Mücahid ; Elsayed, T.; Lease, M. |
2006 | Empowering a Helper Cluster Through Data-Width Aware Instruction Selection Policies | Ünsal, O. S.; Ergin, Oğuz ; vera, X.; González, A. |
2016 | End-To Internet Speed Analysis of Mobile Networks With Mapreduce | Uzun, Mete; Abul, Osman |
2012 | Energy Cost of Mitigating Physical Attacks in Wireless Sensor Networks | İncebacak, Davut; Bıçakcı, Kemal ; Tavlı, Bülent |