| Issue Date | Title | Author(s) |
261 | 5-Jul-2018 | Predicting drug activity by image encoded gene expression profiles | Özgül, Ozan Fırat; Bardak, Batuhan ; Tan, Mehmet |
262 | 2022 | Predicting Election Results via Social Media: A Case Study for 2018 Turkish Presidential Election | Bayrak, Cansin; Kutlu, Mucahid |
263 | Sep-2020 | Predicting the number of bidders in public procurement | Görgün, Mustafa Kaan; Kutlu, Mücahid ; Taş, Bedri Kamil Onur |
264 | Oct-2016 | Prediction of anti-cancer drug response by kernelized multi-task learning | Tan, Mehmet |
265 | 28-Dec-2015 | Prediction of influenza outbreaks by integrating Wikipedia article access logs and Google flu trend data | Bardak, Batuhan ; Tan, Mehmet |
266 | Jun-2014 | A preliminary examination technique for audio evidence to distinguish speech from non-speech using objective speech quality measures | Uzun, Erkam; Sencar, Hüsrev Taha |
267 | 2013 | Preserving location privacy for a group of users | Ashouri-Talouki, Maede; Baraani-Dastjerdi, Ahmad; Selçuk, Ali Aydın |
268 | 2022 | Privacy in blockchain systems | Osmanoglu, Murat; Selçuk, Ali Aydın |
269 | 2007 | Privacy-aware knowledge discovery from location data | Atzori, M.; Bonchi, F.; Giannotti F.; Pedreschi, D.; Abul, O. |
270 | 2015 | Privacy-Guaranteeing Bidding in Smart Grid Demand Response Programs | Uludağ, Süleyman; Ballı, Muhammed Fatih; Selçuk, Ali Aydın ; Tavlı, Bülent |
271 | 2012 | Privacy-preserving sharing of sensitive semantic locations under road-network constraints | Yiğitoğlu, E.; Damiani, M. L.; Abul, O. ; Silvestri, C. |
272 | 2022 | Proactive Metering of Mobile Internet User Experience | Abul, Osman ; Uzun, Mete |
273 | 2022 | Processor Security: Detecting Microarchitectural Attacks via Count-Min Sketches | Arikan, Kerem; Palumbo, Alessandro; Cassano, Luca; Reviriego, Pedro; Pontarelli, Salvatore; Bianchi, Giuseppe; Ergin, Oğuz |
274 | 2010 | Prolonging network lifetime with multi-domain cooperation strategies in wireless sensor networks | Bıçakcı, Kemal ; Tavlı, Bülent |
275 | 1-Jun-2015 | Punctured interval broadcast encryption scheme with free riders | Ak, Murat; Selçuk, Ali Aydın |
276 | 2009 | Pushing the limits of one-time signatures | Bıçakcı, Kemal |
277 | 2021 | QUAC-TRNG: High Throughput True Random Number Generation Using Quadruple Row Activation in Commodity DRAM Chips | Olgun, Ataberk; Patel, Minesh; Yağlıkçı, A. Giray; Luo, Haocong; Ergin, Oğuz ; Bostancı, F. Nisa; Vijaykumar, Nandita |
278 | 2017 | A Quantitative CVSS-Based Cyber Security Risk Assessment Methodology For IT Systems | Aksu, M. Uğur; Dilek, M. Hadi; Tatli, E. Islam; Bıçakcı, Kemal ; Dirik, H. İbrahim; Demirezen, M. Umut; Aykir, Tayfun |
279 | 2023 | Re-Think Before You Share: A Comprehensive Study on Prioritizing Check-Worthy Claims | Kartal, Yavuz Selim; Kutlu, Mücahid |
280 | 2015 | Recent Advances in Counter PRNU Based Source Attribution and Beyond | Karakucuk, Ahmet; Dirik, Ahmet E.; Sencar, Hüsrev Taha ; Memon, Nasir D. |