| Issue Date | Title | Author(s) |
201 | Aug-2016 | Leveraging Human Computation for Pure-Text Human Interaction Proofs | Bıçakcı, Kemal ; Kızılöz, Hakan Ezgi |
202 | 2011 | Lifetime Bounds of Wireless Sensor Networks Preserving Perfect Sink Unobservability | Bıçakcı, Kemal ; Bağcı, İbrahim Ethem; Tavlı, Bülent |
203 | 2022 | Location-Privacy Preserving Partial Nearby Friends Querying in Urban Areas | Abul, Osman |
204 | 2011 | Long Range Correlations Between Nucleotide Triplets | Vitale, D.; Kuruoğlu, E. E.; Abul, Osman |
205 | 2023 | A Machine Learning Approach for Dyslexia Detection Using Turkish Audio Records | Taş, Tuğberk; Bulbul, Muammed Abdullah; Haşimoğlu, Abas; Meral, Yavuz; Çalışkan, Yasin; Budağova, Günay; Kutlu, Mucahid |
206 | 2012 | Many-To Feature Matching in Object Recognition: a Review of Three Approaches | Shokoufandeh, A.; Keselman, Y.; Demirci, M. F. ; Macrini, D.; Dickinson, S. |
207 | 2008 | Many-To Matching in L(1) Norm | Demirci, Muhammed Fatih |
208 | 2009 | Many-To Matching Under the L 1 Norm | Demirci, Muhammed Fatih ; Osmanlıoğlu, Yusuf |
209 | 2011 | Maximizing Lifetime of Event-Unobservable Wireless Sensor Networks | Bıçakcı, Kemal ; Gültekin, Hakan ; Tavlı, Bülent ; Bağcı, İbrahim Ethem |
210 | Feb-2016 | Maximizing Wireless Sensor Network Lifetime by Communication/Computation Energy Optimization of Non-Repudiation Security Service: Node Level Versus Network Level Strategies | Yıldız, Hüseyin Uğur; Bıçakcı, Kemal ; Tavlı, Bülent ; Gültekin, Hakan ; İncebacak, Davut |
211 | 2013 | Methods for Identifying Traces of Compression in Audio | Hiçsönmez, Samet; Uzun, Erkam; Sencar, Hüsrev Taha |
212 | Apr-2020 | A Microprocessor Protection Architecture Against Hardware Trojans in Memories | Bolat, A.; Cassano, L.; Reviriego, P.; Ergin, Oğuz ; Ottavid, M. |
213 | 2019 | Mikroişlemcilerde Kullanıma Uygun Bir Tek Yön Kaydırmalı Yeniden Adlandırma Tablosu Devresi | Ergin, Oğuz |
214 | 2010 | Mitigation of Compromising Privacy by Transmission Range Control in Wireless Sensor Networks | Tavlı, Bülent ; Özçiloğlu, M. Mikail; Bıçakcı, Kemal |
215 | 2020 | Mitigation of H.264 and H.265 Video Compression for Reliable Prnu Estimation | Altınışık, Enes; Tasdemir, Kasım; Sencar, Hüsrev Taha |
216 | 2014 | Mobile Authentication Secure Against Man-In Attacks | Bıçakcı, Kemal ; Ünal, Devrim; Aşcıoğlu, Nadir; Adalıer, Oktay |
217 | 2009 | Modifying the Data-Holding Components of the Microprocessors for Energy Efficiency | Osmanlıoğlu, Yusuf; Hanay, Y. Sinan; Ergin, Oğuz |
218 | 2022 | Mors: an Approximate Fault Modelling Framework for Reduced-Voltage Srams | Yüksel, I.E.; Salami, B.; Ergin, Oğuz ; Ünsal, O.S.; Kestelman, A.C. |
219 | 2009 | Motifhider: a Knowledge Hiding Approach To Sequence Masking | Abul, Osman |
220 | 2011 | A Multi-Word Password Proposal (gridword) and Exploring Questions About Science in Security Research and Usable Security Evaluation | Bıçakcı, Kemal ; van Oorschot, Paul C. |