| Issue Date | Title | Author(s) |
241 | 5-Jul-2018 | Predicting Drug Activity by Image Encoded Gene Expression Profiles | Özgül, Ozan Fırat; Bardak, Batuhan ; Tan, Mehmet |
242 | 2022 | Predicting Election Results Via Social Media: a Case Study for 2018 Turkish Presidential Election | Bayrak, Cansin; Kutlu, Mucahid |
243 | Sep-2020 | Predicting the Number of Bidders in Public Procurement | Görgün, Mustafa Kaan; Kutlu, Mücahid ; Taş, Bedri Kamil Onur |
244 | 28-Dec-2015 | Prediction of Influenza Outbreaks by Integrating Wikipedia Article Access Logs and Google Flu Trend Data | Bardak, Batuhan ; Tan, Mehmet |
245 | 2021 | Prediction of Mortality and Length of Stay With Deep Learning | Bardak, B. ; Tan, V.M. |
246 | Jun-2014 | A Preliminary Examination Technique for Audio Evidence To Distinguish Speech From Non-Speech Using Objective Speech Quality Measures | Uzun, Erkam; Sencar, Hüsrev Taha |
247 | 2013 | Preserving Location Privacy for a Group of Users | Ashouri-Talouki, Maede; Baraani-Dastjerdi, Ahmad; Selçuk, Ali Aydın |
248 | 2022 | Privacy in Blockchain Systems | Osmanoglu, Murat; Selçuk, Ali Aydın |
249 | 2007 | Privacy-Aware Knowledge Discovery From Location Data | Atzori, M.; Bonchi, F.; Giannotti F.; Pedreschi, D.; Abul, O. |
250 | 2015 | Privacy-Guaranteeing Bidding in Smart Grid Demand Response Programs | Uludağ, Süleyman; Ballı, Muhammed Fatih; Selçuk, Ali Aydın ; Tavlı, Bülent |
251 | 2012 | Privacy-Preserving Sharing of Sensitive Semantic Locations Under Road-Network Constraints | Yiğitoğlu, E.; Damiani, M. L.; Abul, O. ; Silvestri, C. |
252 | 2022 | Proactive Metering of Mobile Internet User Experience | Abul, Osman ; Uzun, Mete |
253 | 2022 | Processor Security: Detecting Microarchitectural Attacks Via Count-Min Sketches | Arikan, Kerem; Palumbo, Alessandro; Cassano, Luca; Reviriego, Pedro; Pontarelli, Salvatore; Bianchi, Giuseppe; Ergin, Oğuz |
254 | 2010 | Prolonging Network Lifetime With Multi-Domain Cooperation Strategies in Wireless Sensor Networks | Bıçakcı, Kemal ; Tavlı, Bülent |
255 | 1-Jun-2015 | Punctured Interval Broadcast Encryption Scheme With Free Riders | Ak, Murat; Selçuk, Ali Aydın |
256 | 2009 | Pushing the Limits of One-Time Signatures | Bıçakcı, Kemal |
257 | 2021 | Quac-Trng: High Throughput True Random Number Generation Using Quadruple Row Activation in Commodity Dram Chips | Olgun, Ataberk; Patel, Minesh; Yağlıkçı, A. Giray; Luo, Haocong; Ergin, Oğuz ; Bostancı, F. Nisa; Vijaykumar, Nandita |
258 | 2017 | A Quantitative Cvss-Based Cyber Security Risk Assessment Methodology for It Systems | Aksu, M. Uğur; Dilek, M. Hadi; Tatli, E. Islam; Bıçakcı, Kemal ; Dirik, H. İbrahim; Demirezen, M. Umut; Aykir, Tayfun |
259 | 2023 | Re-Think Before You Share: a Comprehensive Study on Prioritizing Check-Worthy Claims | Kartal, Yavuz Selim; Kutlu, Mücahid |
260 | 2015 | Recent Advances in Counter Prnu Based Source Attribution and Beyond | Karakucuk, Ahmet; Dirik, Ahmet E.; Sencar, Hüsrev Taha ; Memon, Nasir D. |