02.3. Department of Computer Engineering

OrgUnit's Researchers publications
(Dept/Workgroup Publication)

Results 241-260 of 341 (Search time: 0.008 seconds).

Issue DateTitleAuthor(s)
2415-Jul-2018Predicting Drug Activity by Image Encoded Gene Expression ProfilesÖzgül, Ozan Fırat; Bardak, Batuhan ; Tan, Mehmet 
2422022Predicting Election Results Via Social Media: a Case Study for 2018 Turkish Presidential ElectionBayrak, Cansin; Kutlu, Mucahid 
243Sep-2020Predicting the Number of Bidders in Public ProcurementGörgün, Mustafa Kaan; Kutlu, Mücahid ; Taş, Bedri Kamil Onur 
24428-Dec-2015Prediction of Influenza Outbreaks by Integrating Wikipedia Article Access Logs and Google Flu Trend DataBardak, Batuhan ; Tan, Mehmet 
2452021Prediction of Mortality and Length of Stay With Deep LearningBardak, B. ; Tan, V.M.
246Jun-2014A Preliminary Examination Technique for Audio Evidence To Distinguish Speech From Non-Speech Using Objective Speech Quality MeasuresUzun, Erkam; Sencar, Hüsrev Taha 
2472013Preserving Location Privacy for a Group of UsersAshouri-Talouki, Maede; Baraani-Dastjerdi, Ahmad; Selçuk, Ali Aydın 
2482022Privacy in Blockchain SystemsOsmanoglu, Murat; Selçuk, Ali Aydın 
2492007Privacy-Aware Knowledge Discovery From Location DataAtzori, M.; Bonchi, F.; Giannotti F.; Pedreschi, D.; Abul, O. 
2502015Privacy-Guaranteeing Bidding in Smart Grid Demand Response ProgramsUludağ, Süleyman; Ballı, Muhammed Fatih; Selçuk, Ali Aydın ; Tavlı, Bülent 
2512012Privacy-Preserving Sharing of Sensitive Semantic Locations Under Road-Network ConstraintsYiğitoğlu, E.; Damiani, M. L.; Abul, O. ; Silvestri, C.
2522022Proactive Metering of Mobile Internet User ExperienceAbul, Osman ; Uzun, Mete
2532022Processor Security: Detecting Microarchitectural Attacks Via Count-Min SketchesArikan, Kerem; Palumbo, Alessandro; Cassano, Luca; Reviriego, Pedro; Pontarelli, Salvatore; Bianchi, Giuseppe; Ergin, Oğuz 
2542010Prolonging Network Lifetime With Multi-Domain Cooperation Strategies in Wireless Sensor NetworksBıçakcı, Kemal ; Tavlı, Bülent 
2551-Jun-2015Punctured Interval Broadcast Encryption Scheme With Free RidersAk, Murat; Selçuk, Ali Aydın 
2562009Pushing the Limits of One-Time SignaturesBıçakcı, Kemal 
2572021Quac-Trng: High Throughput True Random Number Generation Using Quadruple Row Activation in Commodity Dram ChipsOlgun, Ataberk; Patel, Minesh; Yağlıkçı, A. Giray; Luo, Haocong; Ergin, Oğuz ; Bostancı, F. Nisa; Vijaykumar, Nandita
2582017A Quantitative Cvss-Based Cyber Security Risk Assessment Methodology for It SystemsAksu, M. Uğur; Dilek, M. Hadi; Tatli, E. Islam; Bıçakcı, Kemal ; Dirik, H. İbrahim; Demirezen, M. Umut; Aykir, Tayfun
2592023Re-Think Before You Share: a Comprehensive Study on Prioritizing Check-Worthy ClaimsKartal, Yavuz Selim; Kutlu, Mücahid 
2602015Recent Advances in Counter Prnu Based Source Attribution and BeyondKarakucuk, Ahmet; Dirik, Ahmet E.; Sencar, Hüsrev Taha ; Memon, Nasir D.