default search action
Seyit Ahmet Çamtepe
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j52]Nazatul Haque Sultan, Vijay Varadharajan, Saurab Dulal, Seyit Camtepe, Surya Nepal:
NDN-RBE: An Accountable Privacy Aware Access Control Framework For NDN. Comput. J. 67(4): 1572-1589 (2024) - [j51]Hang Thanh Bui, Hamed Aboutorab, Arash Mahboubi, Yansong Gao, Nazatul Haque Sultan, Aufeef Chauhan, Mohammad Zavid Parvez, Michael Bewong, Rafiqul Islam, Zahidul Islam, Seyit Ahmet Çamtepe, Praveen Gauravaram, Dineshkumar Singh, Muhammad Ali Babar, Shihao Yan:
Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems. Comput. Secur. 140: 103754 (2024) - [j50]Saud Khan, Chandra Thapa, Salman Durrani, Seyit Camtepe:
Access-Based Lightweight Physical-Layer Authentication for the Internet of Things Devices. IEEE Internet Things J. 11(7): 11312-11326 (2024) - [j49]Arash Mahboubi, Seyit Camtepe, Keyvan Ansari, Marcin Pawlowski, Pawel Morawiecki, Hamed Aboutorab, Josef Pieprzyk, Jaroslaw Duda:
Shared file protection against unauthorised encryption using a Buffer-Based Signature Verification Method. J. Inf. Secur. Appl. 86: 103873 (2024) - [j48]Arash Mahboubi, Khanh Luong, Hamed Aboutorab, Hang Thanh Bui, Geoff Jarrad, Mohammed Bahutair, Seyit Camtepe, Ganna Pogrebna, Ejaz Ahmed, Bazara I. A. Barry, Hannah Gately:
Evolving techniques in cyber threat hunting: A systematic review. J. Netw. Comput. Appl. 232: 104004 (2024) - [j47]Guoxin Sun, Tansu Alpcan, Benjamin I. P. Rubinstein, Seyit Camtepe:
To Act or Not to Act: An Adversarial Game for Securing Vehicle Platoons. IEEE Trans. Inf. Forensics Secur. 19: 163-177 (2024) - [j46]Huihui Gong, Minjing Dong, Siqi Ma, Seyit Camtepe, Surya Nepal, Chang Xu:
Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization. IEEE Trans. Multim. 26: 5014-5025 (2024) - [c83]Wei Zong, Yang-Wai Chow, Willy Susilo, Joonsang Baek, Jongkil Kim, Seyit Camtepe:
IPRemover: A Generative Model Inversion Attack against Deep Neural Network Fingerprinting and Watermarking. AAAI 2024: 7837-7845 - [c82]Huihui Gong, Minjing Dong, Siqi Ma, Seyit Camtepe, Surya Nepal, Chang Xu:
Random Entangled Tokens for Adversarially Robust Vision Transformer. CVPR 2024: 24554-24563 - [c81]Larry Huynh, Jin B. Hong, Ajmal Mian, Hajime Suzuki, Seyit Camtepe:
Intrusion Detection Systems Using Quantum-Inspired Density Matrix Encodings. DSN-W 2024: 32-38 - [c80]Tina Moghaddam, Guowei Yang, Chandra Thapa, Seyit Camtepe, Dan Dongseong Kim:
MTD in Plain Sight: Hiding Network Behavior in Moving Target Defenses. DSN-S 2024: 50-52 - [c79]William Holland, Chandra Thapa, Wei Shao, Seyit Camtepe, Sarah Ali Siddiqui:
One-Shot Collaborative Data Distillation. ECAI 2024: 2597-2604 - [c78]Bao Gia Doan, Dang Quang Nguyen, Paul Montague, Tamas Abraham, Olivier Y. de Vel, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe:
Bayesian Learned Models Can Detect Adversarial Malware for Free. ESORICS (1) 2024: 45-65 - [c77]Diksha Goel, Kristen Moore, Mingyu Guo, Derui Wang, Minjune Kim, Seyit Camtepe:
Optimizing Cyber Defense in Dynamic Active Directories Through Reinforcement Learning. ESORICS (1) 2024: 332-352 - [c76]Arash Mahboubi, Seyit Camtepe, Keyvan Ansari, Marcin Piotr Pawlowski, Pawel Morawiecki, Jaroslaw Duda, Josef Pieprzyk:
File System Shield (FSS): A Pass-Through Strategy Against Unwanted Encryption in Network File Systems. IWSEC 2024: 213-233 - [c75]Shigang Liu, Di Cao, Junae Kim, Tamas Abraham, Paul Montague, Seyit Camtepe, Jun Zhang, Yang Xiang:
EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection. USENIX Security Symposium 2024 - [i70]Bao Gia Doan, Dang Quang Nguyen, Paul Montague, Tamas Abraham, Olivier Y. de Vel, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe:
Bayesian Learned Models Can Detect Adversarial Malware For Free. CoRR abs/2403.18309 (2024) - [i69]Derui Wang, Minhui Xue, Bo Li, Seyit Camtepe, Liming Zhu:
Provably Unlearnable Examples. CoRR abs/2405.03316 (2024) - [i68]Zehang Deng, Ruoxi Sun, Minhui Xue, Sheng Wen, Seyit Camtepe, Surya Nepal, Yang Xiang:
Leakage-Resilient and Carbon-Neutral Aggregation Featuring the Federated AI-enabled Critical Infrastructure. CoRR abs/2405.15258 (2024) - [i67]Wei Shao, Rongyi Zhu, Cai Yang, Chandra Thapa, Muhammad Ejaz Ahmed, Seyit Camtepe, Rui Zhang, Du Yong Kim, Hamid Menouar, Flora D. Salim:
ST-DPGAN: A Privacy-preserving Framework for Spatiotemporal Data Generation. CoRR abs/2406.03404 (2024) - [i66]Diksha Goel, Kristen Moore, Mingyu Guo, Derui Wang, Minjune Kim, Seyit Camtepe:
Optimizing Cyber Defense in Dynamic Active Directories through Reinforcement Learning. CoRR abs/2406.19596 (2024) - [i65]Shigang Liu, Di Cao, Junae Kim, Tamas Abraham, Paul Montague, Seyit Camtepe, Jun Zhang, Yang Xiang:
EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection. CoRR abs/2407.19216 (2024) - [i64]William Holland, Chandra Thapa, Sarah Ali Siddiqui, Wei Shao, Seyit Camtepe:
One-Shot Collaborative Data Distillation. CoRR abs/2408.02266 (2024) - [i63]Sarah Ali Siddiqui, Chandra Thapa, Rayne Holland, Wei Shao, Seyit Camtepe:
Elevating Software Trust: Unveiling and Quantifying the Risk Landscape. CoRR abs/2408.02876 (2024) - [i62]Tina Moghaddam, Guowei Yang, Chandra Thapa, Seyit Camtepe, Dan Dongseong Kim:
MTDSense: AI-Based Fingerprinting of Moving Target Defense Techniques in Software-Defined Networking. CoRR abs/2408.03758 (2024) - [i61]Bao Gia Doan, Dang Quang Nguyen, Callum Lindquist, Paul Montague, Tamas Abraham, Olivier De Vel, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe:
On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World. CoRR abs/2408.12122 (2024) - [i60]Wei Shao, Chandra Thapa, Rayne Holland, Sarah Ali Siddiqui, Seyit Camtepe:
Attacking Slicing Network via Side-channel Reinforcement Learning Attack. CoRR abs/2409.11258 (2024) - [i59]Hevish Cowlessur, Chandra Thapa, Tansu Alpcan, Seyit Camtepe:
A Hybrid Quantum Neural Network for Split Learning. CoRR abs/2409.16593 (2024) - 2023
- [j45]Hooman Alavizadeh, Julian Jang-Jaccard, Simon Yusuf Enoch, Harith Al-Sahaf, Ian Welch, Seyit Ahmet Çamtepe, Dan Dongseong Kim:
A Survey on Cyber Situation-awareness Systems: Framework, Techniques, and Insights. ACM Comput. Surv. 55(5): 107:1-107:37 (2023) - [j44]Josef Pieprzyk, Jarek Duda, Marcin Pawlowski, Seyit Camtepe, Arash Mahboubi, Pawel Morawiecki:
The Compression Optimality of Asymmetric Numeral Systems. Entropy 25(4): 672 (2023) - [j43]Jinting Zhu, Julian Jang-Jaccard, Amardeep Singh, Paul A. Watters, Seyit Camtepe:
Task-Aware Meta Learning-Based Siamese Neural Network for Classifying Control Flow Obfuscated Malware. Future Internet 15(6): 214 (2023) - [j42]Saud Khan, Salman Durrani, Muhammad Basit Shahab, Sarah J. Johnson, Seyit Camtepe:
Joint User and Data Detection in Grant-Free NOMA With Attention-Based BiLSTM Network. IEEE Open J. Commun. Soc. 4: 1499-1515 (2023) - [j41]Chandra Thapa, Jun Wen Tang, Alsharif Abuadbba, Yansong Gao, Seyit Camtepe, Surya Nepal, Mahathir Almashor, Yifeng Zheng:
Evaluation of Federated Learning in Phishing Email Detection. Sensors 23(9): 4346 (2023) - [j40]Nan Sun, Jun Zhang, Shang Gao, Leo Yu Zhang, Seyit Camtepe, Yang Xiang:
Cyber Information Retrieval Through Pragmatics Understanding and Visualization. IEEE Trans. Dependable Secur. Comput. 20(2): 1186-1199 (2023) - [c74]Bao Gia Doan, Shuiqiao Yang, Paul Montague, Olivier Y. de Vel, Tamas Abraham, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe:
Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness. AAAI 2023: 14783-14791 - [c73]Mahathir Almashor, M. Ejaz Ahmed, Benjamin Pick, Jason Xue, Sharif Abuadbba, Raj Gaire, Shuo Wang, Seyit Camtepe, Surya Nepal:
Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns. AINTEC 2023: 78-86 - [c72]Tina Moghaddam, Guowei Yang, Chandra Thapa, Seyit Camtepe, Dan Dongseong Kim:
POSTER: Toward Intelligent Cyber Attacks for Moving Target Defense Techniques in Software-Defined Networking. AsiaCCS 2023: 1022-1024 - [c71]Guoxin Sun, Tansu Alpcan, Seyit Camtepe, Andrew C. Cullen, Benjamin I. P. Rubinstein:
An Adversarial Strategic Game for Machine Learning as a Service using System Features. AAMAS 2023: 2508-2510 - [c70]Guy Farrelly, Paul Quirk, Salil S. Kanhere, Seyit Camtepe, Damith C. Ranasinghe:
SplITS: Split Input-to-State Mapping for Effective Firmware Fuzzing. ESORICS (4) 2023: 290-310 - [c69]Selasi Kwashie, Wei Kang, Sandeep Santhosh Kumar, Geoff Jarrad, Seyit Camtepe, Surya Nepal:
Acumen: Analysing the Impact of Organisational Change on Users' Access Entitlements. ESORICS (4) 2023: 410-430 - [c68]Saud Khan, Chandra Thapa, Salman Durrani, Seyit Camtepe:
Beyond Key-Based Authentication: A Novel Continuous Authentication Paradigm for IoTs. GLOBECOM (Workshops) 2023: 166-171 - [c67]Vy Vo, Van Nguyen, Trung Le, Quan Hung Tran, Gholamreza Haffari, Seyit Camtepe, Dinh Phung:
An Additive Instance-Wise Approach to Multi-class Model Interpretation. ICLR 2023 - [c66]Shuo Wang, Mahathir Almashor, Alsharif Abuadbba, Ruoxi Sun, Minhui Xue, Calvin Wang, Raj Gaire, Surya Nepal, Seyit Camtepe:
DOITRUST: Dissecting On-chain Compromised Internet Domains via Graph Learning. NDSS 2023 - [c65]Lu Yang, Seyit Camtepe, Yansong Gao, Vicky Liu, Dhammika Jayalath:
On the Use of Power Amplifier Nonlinearity Quotient to Improve Radio Frequency Fingerprint Identification in Time-Varying Channels. PIMRC 2023: 1-7 - [c64]Muhammad Nauman Khan, Asha Rao, Seyit Camtepe, Josef Pieprzyk:
Classical to Post-Quantum Secure ABE-IBE Proxy Re-Encryption Scheme. SECRYPT 2023: 85-98 - [c63]Ruoxi Sun, Minhui Xue, Gareth Tyson, Tian Dong, Shaofeng Li, Shuo Wang, Haojin Zhu, Seyit Camtepe, Surya Nepal:
Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors. ESEC/SIGSOFT FSE 2023: 1573-1585 - [c62]Shuo Wang, Sharif Abuadbba, Sidharth Agarwal, Kristen Moore, Ruoxi Sun, Minhui Xue, Surya Nepal, Seyit Camtepe, Salil S. Kanhere:
PublicCheck: Public Integrity Verification for Services of Run-time Deep Models. SP 2023: 1348-1365 - [c61]Ruoxi Sun, Minhui Xue, Gareth Tyson, Shuo Wang, Seyit Camtepe, Surya Nepal:
Not Seen, Not Heard in the Digital World! Measuring Privacy Practices in Children's Apps. WWW 2023: 2166-2177 - [d2]Ruoxi Sun, Minhui Xue, Gareth Tyson, Tian Dong, Shaofeng Li, Shuo Wang, Haojin Zhu, Seyit Camtepe, Surya Nepal:
An Explainability-Guided Testing Framework for Robustness of Malware Detectors. Version 1. Zenodo, 2023 [all versions] - [d1]Ruoxi Sun, Minhui Xue, Gareth Tyson, Tian Dong, Shaofeng Li, Shuo Wang, Haojin Zhu, Seyit Camtepe, Surya Nepal:
An Explainability-Guided Testing Framework for Robustness of Malware Detectors. Version 2. Zenodo, 2023 [all versions] - [i58]Bao Gia Doan, Shuiqiao Yang, Paul Montague, Olivier Y. de Vel, Tamas Abraham, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe:
Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness. CoRR abs/2301.12680 (2023) - [i57]Qun Li, Chandra Thapa, Lawrence Ong, Yifeng Zheng, Hua Ma, Seyit Ahmet Çamtepe, Anmin Fu, Yansong Gao:
Vertical Federated Learning: Taxonomies, Threats, and Prospects. CoRR abs/2302.01550 (2023) - [i56]Saud Khan, Chandra Thapa, Salman Durrani, Seyit Camtepe:
Access-based Lightweight Physical Layer Authentication for the Internet of Things Devices. CoRR abs/2303.00307 (2023) - [i55]Ruoxi Sun, Minhui Xue, Gareth Tyson, Shuo Wang, Seyit Camtepe, Surya Nepal:
Not Seen, Not Heard in the Digital World! Measuring Privacy Practices in Children's Apps. CoRR abs/2303.09008 (2023) - [i54]Yuanyuan Wei, Julian Jang-Jaccard, Fariza Sabrina, Wen Xu, Seyit Camtepe, Aeryn Dunmore:
Reconstruction-based LSTM-Autoencoder for Anomaly-based DDoS Attack Detection over Multivariate Time-Series Data. CoRR abs/2305.09475 (2023) - [i53]M. A. P. Chamikara, Seung Ick Jang, Ian J. Oppermann, Dongxi Liu, Musotto Roberto, Sushmita Ruj, Arindam Pal, Meisam Mohammady, Seyit Camtepe, Sylvia Young, Chris Dorrian, Nasir David:
OptimShare: A Unified Framework for Privacy Preserving Data Sharing - Towards the Practical Utility of Data with Privacy. CoRR abs/2306.03379 (2023) - [i52]Yuanyuan Wei, Julian Jang-Jaccard, Amardeep Singh, Fariza Sabrina, Seyit Camtepe:
Classification and Explanation of Distributed Denial-of-Service (DDoS) Attack Detection using Machine Learning and Shapley Additive Explanation (SHAP) Methods. CoRR abs/2306.17190 (2023) - [i51]Iqbal H. Sarker, Helge Janicke, Leandros Maglaras, Seyit Camtepe:
Data-Driven Intelligence can Revolutionize Today's Cybersecurity World: A Position Paper. CoRR abs/2308.05126 (2023) - [i50]Guy Farrelly, Paul Quirk, Salil S. Kanhere, Seyit Camtepe, Damith C. Ranasinghe:
SplITS: Split Input-to-State Mapping for Effective Firmware Fuzzing. CoRR abs/2308.07860 (2023) - [i49]Larry Huynh, Jin B. Hong, Ajmal Mian, Hajime Suzuki, Yanqiu Wu, Seyit Camtepe:
Quantum-Inspired Machine Learning: a Survey. CoRR abs/2308.11269 (2023) - [i48]Huihui Gong, Minjing Dong, Siqi Ma, Seyit Camtepe, Surya Nepal, Chang Xu:
Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization. CoRR abs/2309.09480 (2023) - [i47]Huihui Gong, Minjing Dong, Siqi Ma, Seyit Camtepe, Surya Nepal, Chang Xu:
Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks. CoRR abs/2309.16207 (2023) - [i46]Yanqiu Wu, Eromanga Adermann, Chandra Thapa, Seyit Camtepe, Hajime Suzuki, Muhammad Usman:
Radio Signal Classification by Adversarially Robust Quantum Machine Learning. CoRR abs/2312.07821 (2023) - 2022
- [j39]Joanne R. Dawson, George Hobbs, Yansong Gao, Seyit Camtepe, Josef Pieprzyk, Y. Feng, L. Tranfa, Sarah Bradbury, Weiwei Zhu, Di Li:
Physical publicly verifiable randomness from pulsars. Astron. Comput. 38: 100549 (2022) - [j38]Lu Yang, Yansong Gao, Junqing Zhang, Seyit Camtepe, Dhammika Jayalath:
A channel perceiving attack and the countermeasure on long-range IoT physical layer key generation. Comput. Commun. 191: 108-118 (2022) - [j37]Jinting Zhu, Julian Jang-Jaccard, Amardeep Singh, Ian Welch, Harith Al-Sahaf, Seyit Camtepe:
A few-shot meta-learning based siamese neural network using entropy features for ransomware classification. Comput. Secur. 117: 102691 (2022) - [j36]Xiaogang Zhu, Sheng Wen, Seyit Camtepe, Yang Xiang:
Fuzzing: A Survey for Roadmap. ACM Comput. Surv. 54(11s): 230:1-230:36 (2022) - [j35]Seyit Camtepe, Jarek Duda, Arash Mahboubi, Pawel Morawiecki, Surya Nepal, Marcin Pawlowski, Josef Pieprzyk:
ANS-based compression and encryption with 128-bit security. Int. J. Inf. Sec. 21(5): 1051-1067 (2022) - [j34]Yansong Gao, Minki Kim, Chandra Thapa, Alsharif Abuadbba, Zhi Zhang, Seyit Camtepe, Hyoungshick Kim, Surya Nepal:
Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things. IEEE Trans. Computers 71(10): 2538-2552 (2022) - [j33]Xiaogang Zhu, Xiaotao Feng, Xiaozhu Meng, Sheng Wen, Seyit Camtepe, Yang Xiang, Kui Ren:
CSI-Fuzz: Full-Speed Edge Tracing Using Coverage Sensitive Instrumentation. IEEE Trans. Dependable Secur. Comput. 19(2): 912-923 (2022) - [j32]Chaoran Li, Xiao Chen, Derui Wang, Sheng Wen, Muhammad Ejaz Ahmed, Seyit Camtepe, Yang Xiang:
Backdoor Attack on Machine Learning Based Android Malware Detectors. IEEE Trans. Dependable Secur. Comput. 19(5): 3357-3370 (2022) - [j31]Xiaogang Zhu, Sheng Wen, Alireza Jolfaei, Mohammad Sayad Haghighi, Seyit Camtepe, Yang Xiang:
Vulnerability Detection in SIoT Applications: A Fuzzing Method on their Binaries. IEEE Trans. Netw. Sci. Eng. 9(3): 970-979 (2022) - [c60]Chandra Thapa, Mahawaga Arachchige Pathum Chamikara, Seyit Camtepe, Lichao Sun:
SplitFed: When Federated Learning Meets Split Learning. AAAI 2022: 8485-8493 - [c59]Chandra Thapa, Seung Ick Jang, Muhammad Ejaz Ahmed, Seyit Camtepe, Josef Pieprzyk, Surya Nepal:
Transformer-Based Language Models for Software Vulnerability Detection. ACSAC 2022: 481-496 - [c58]Chandra Thapa, Seyit Camtepe, Raj Gaire, Surya Nepal, Seung Ick Jang:
Demo - MaLFraDA: A Machine Learning Framework with Data Airlock. CCS 2022: 3523-3525 - [c57]Mahawaga Arachchige Pathum Chamikara, Dongxi Liu, Seyit Camtepe, Surya Nepal, Marthie Grobler, Peter Bertók, Ibrahim Khalil:
Local Differential Privacy for Federated Learning. ESORICS (1) 2022: 195-216 - [c56]Yuantian Miao, Chao Chen, Lei Pan, Shigang Liu, Seyit Camtepe, Jun Zhang, Yang Xiang:
No-Label User-Level Membership Inference for ASR Model Auditing. ESORICS (2) 2022: 610-628 - [c55]Abdullah Al Mamun, Harith Al-Sahaf, Ian Welch, Seyit Camtepe:
Advanced Persistent Threat Detection: A Particle Swarm Optimization Approach. ITNAC 2022: 1-8 - [c54]Huihui Gong, Siqi Ma, Seyit Camtepe, Surya Nepal, Chang Xu:
Vulnerability Detection Using Deep Learning Based Function Classification. NSS 2022: 3-22 - [c53]Guoxin Sun, Tansu Alpcan, Benjamin I. P. Rubinstein, Seyit Camtepe:
Securing Cyber-Physical Systems: Physics-Enhanced Adversarial Learning for Autonomous Platoons. ECML/PKDD (3) 2022: 269-285 - [c52]Shuiqiao Yang, Bao Gia Doan, Paul Montague, Olivier Y. de Vel, Tamas Abraham, Seyit Camtepe, Damith C. Ranasinghe, Salil S. Kanhere:
Transferable Graph Backdoor Attack. RAID 2022: 321-332 - [c51]Chaoran Li, Xiao Chen, Ruoxi Sun, Minhui Xue, Sheng Wen, Muhammad Ejaz Ahmed, Seyit Camtepe, Yang Xiang:
Cross-language Android permission specification. ESEC/SIGSOFT FSE 2022: 772-783 - [c50]Mithun Vaidhyanathan, Weisheng Si, Bahman Javadi, Seyit Camtepe:
Towards Cooperative Games for Developing Secure Software in Agile SDLC. SNPD 2022: 61-68 - [i45]M. A. P. Chamikara, Dongxi Liu, Seyit Camtepe, Surya Nepal, Marthie Grobler, Peter Bertók, Ibrahim Khalil:
Local Differential Privacy for Federated Learning in Industrial Settings. CoRR abs/2202.06053 (2022) - [i44]Reena Zelenkova, Jack Swallow, M. A. P. Chamikara, Dongxi Liu, Mohan Baruwal Chhetri, Seyit Camtepe, Marthie Grobler, Mahathir Almashor:
Resurrecting Trust in Facial Recognition: Mitigating Backdoor Attacks in Face Recognition to Prevent Potential Privacy Breaches. CoRR abs/2202.10320 (2022) - [i43]Alsharif Abuadbba, Shuo Wang, Mahathir Almashor, Muhammad Ejaz Ahmed, Raj Gaire, Seyit Camtepe, Surya Nepal:
Towards Web Phishing Detection Limitations and Mitigation. CoRR abs/2204.00985 (2022) - [i42]Chandra Thapa, Seung Ick Jang, Muhammad Ejaz Ahmed, Seyit Camtepe, Josef Pieprzyk, Surya Nepal:
Transformer-Based Language Models for Software Vulnerability Detection: Performance, Model's Security and Platforms. CoRR abs/2204.03214 (2022) - [i41]Yuanyuan Wei, Julian Jang-Jaccard, Wen Xu, Fariza Sabrina, Seyit Camtepe, Mikael Boulic:
LSTM-Autoencoder based Anomaly Detection for Indoor Air Quality Time Series Data. CoRR abs/2204.06701 (2022) - [i40]Shuiqiao Yang, Bao Gia Doan, Paul Montague, Olivier Y. de Vel, Tamas Abraham, Seyit Camtepe, Damith C. Ranasinghe, Salil S. Kanhere:
Transferable Graph Backdoor Attack. CoRR abs/2207.00425 (2022) - [i39]Vy Vo, Van Nguyen, Trung Le, Quan Hung Tran, Gholamreza Haffari, Seyit Camtepe, Dinh Q. Phung:
An Additive Instance-Wise Approach to Multi-class Model Interpretation. CoRR abs/2207.03113 (2022) - [i38]Jinting Zhu, Julian Jang-Jaccard, Ian Welch, Harith Al-Sahaf, Seyit Camtepe:
A Ransomware Triage Approach using a Task Memory based on Meta-Transfer Learning Framework. CoRR abs/2207.10242 (2022) - [i37]Mahathir Almashor, M. Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Jason Xue, Raj Gaire, Shuo Wang, Seyit Camtepe, Surya Nepal:
Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns. CoRR abs/2208.12449 (2022) - [i36]Josef Pieprzyk, Jarek Duda, Marcin Piotr Pawlowski, Seyit Camtepe, Arash Mahboubi, Pawel Morawiecki:
Compression Optimality of Asymmetric Numeral Systems. CoRR abs/2209.02228 (2022) - [i35]Saud Khan, Salman Durrani, Muhammad Basit Shahab, Sarah J. Johnson, Seyit Camtepe:
Joint User and Data Detection in Grant-Free NOMA with Attention-based BiLSTM Network. CoRR abs/2209.06392 (2022) - [i34]Van Nguyen, Trung Le, Chakkrit Tantithamthavorn, John C. Grundy, Hung Nguyen, Seyit Camtepe, Paul Quirk, Dinh Q. Phung:
An Information-Theoretic and Contrastive Learning-based Approach for Identifying Code Statements Causing Software Vulnerability. CoRR abs/2209.10414 (2022) - [i33]Josef Pieprzyk, Marcin Pawlowski, Pawel Morawiecki, Arash Mahboubi, Jarek Duda, Seyit Camtepe:
Pseudorandom Bit Generation with Asymmetric Numeral Systems. IACR Cryptol. ePrint Arch. 2022: 5 (2022) - 2021
- [j30]Yuanyuan Wei, Julian Jang-Jaccard, Fariza Sabrina, Amardeep Singh, Wen Xu, Seyit Camtepe:
AE-MLP: A Hybrid Deep Learning Approach for DDoS Detection and Classification. IEEE Access 9: 146810-146821 (2021) - [j29]Chandra Thapa, Seyit Camtepe:
Precision health data: Requirements, challenges and existing techniques for data security and privacy. Comput. Biol. Medicine 129: 104130 (2021) - [j28]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe:
Privacy preserving distributed machine learning with federated learning. Comput. Commun. 171: 112-125 (2021) - [j27]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe:
PPaaS: Privacy Preservation as a Service. Comput. Commun. 173: 192-205 (2021) - [j26]Nour Moustafa, Marwa Keshk, Kim-Kwang Raymond Choo, Timothy M. Lynar, Seyit Camtepe, Monica T. Whitty:
DAD: A Distributed Anomaly Detection system using ensemble one-class statistical learning in edge networks. Future Gener. Comput. Syst. 118: 240-251 (2021) - [j25]Muhammad Nauman Khan, Asha Rao, Seyit Camtepe:
Lightweight Cryptographic Protocols for IoT-Constrained Devices: A Survey. IEEE Internet Things J. 8(6): 4132-4156 (2021) - [j24]Xiaogang Zhu, Sheng Wen, Alireza Jolfaei, Seyit Camtepe, Yang Xiang:
Synthesized Corpora to Evaluate Fuzzing for Green Internet of Things Programs. IEEE Trans. Green Commun. Netw. 5(3): 1041-1050 (2021) - [j23]Seyit Camtepe, Jarek Duda, Arash Mahboubi, Pawel Morawiecki, Surya Nepal, Marcin Pawlowski, Josef Pieprzyk:
Compcrypt-Lightweight ANS-Based Compression and Encryption. IEEE Trans. Inf. Forensics Secur. 16: 3859-3873 (2021) - [c49]Jongkil Kim, Seyit Camtepe, Joonsang Baek, Willy Susilo, Josef Pieprzyk, Surya Nepal:
P2DPI: Practical and Privacy-Preserving Deep Packet Inspection. AsiaCCS 2021: 135-146 - [c48]Guoxin Sun, Tansu Alpcan, Benjamin I. P. Rubinstein, Seyit Camtepe:
A Communication Security Game on Switched Systems for Autonomous Vehicle Platoons. CDC 2021: 2690-2695 - [c47]Muhammad Ejaz Ahmed, Hyoungshick Kim, Seyit Camtepe, Surya Nepal:
Peeler: Profiling Kernel-Level Events to Detect Ransomware. ESORICS (1) 2021: 240-260 - [c46]Nan Sun, Jun Zhang, Shang Gao, Leo Yu Zhang, Seyit Camtepe, Yang Xiang:
My Security: An interactive search engine for cybersecurity. HICSS 2021: 1-10 - [c45]Ruoxi Sun, Wei Wang, Minhui Xue, Gareth Tyson, Seyit Camtepe, Damith C. Ranasinghe:
An Empirical Assessment of Global COVID-19 Contact Tracing Applications. ICSE (Companion Volume) 2021: 173-174 - [c44]Ruoxi Sun, Wei Wang, Minhui Xue, Gareth Tyson, Seyit Camtepe, Damith C. Ranasinghe:
An Empirical Assessment of Global COVID-19 Contact Tracing Applications. ICSE 2021: 1085-1097 - [c43]Anahita Namvar, Chandra Thapa, Salil S. Kanhere, Seyit Camtepe:
Evaluating the Security of Machine Learning Based IoT Device Identification Systems Against Adversarial Examples. ICSOC 2021: 800-810 - [c42]Guoxin Sun, Tansu Alpcan, Benjamin I. P. Rubinstein, Seyit Camtepe:
Strategic Mitigation Against Wireless Attacks on Autonomous Platoons. ECML/PKDD (4) 2021: 69-84 - [c41]Chandra Thapa, Kallol Krishna Karmakar, Alberto Huertas Celdrán, Seyit Camtepe, Vijay Varadharajan, Surya Nepal:
FedDICE: A Ransomware Spread Detection in a Distributed Integrated Clinical Environment Using Federated Learning and SDN Based Mitigation. QSHINE 2021: 3-24 - [c40]Nazatul Haque Sultan, Vijay Varadharajan, Chandan Kumar Chaudhary, Seyit Camtepe, Surya Nepal:
A Secure Access and Accountability Framework for Provisioning Services in Named Data Networks. SRDS 2021: 164-175 - [i32]Tuan-Anh Bui, Trung Le, He Zhao, Paul Montague, Seyit Camtepe, Dinh Phung:
Understanding and Achieving Efficient Robustness with Adversarial Contrastive Learning. CoRR abs/2101.10027 (2021) - [i31]Muhammad Ejaz Ahmed, Hyoungshick Kim, Seyit Camtepe, Surya Nepal:
Peeler: Profiling Kernel-Level Events to Detect Ransomware. CoRR abs/2101.12434 (2021) - [i30]Yansong Gao, Minki Kim, Chandra Thapa, Sharif Abuadbba, Zhi Zhang, Seyit Ahmet Çamtepe, Hyoungshick Kim, Surya Nepal:
Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things. CoRR abs/2103.02762 (2021) - [i29]Chandra Thapa, Kallol Krishna Karmakar, Alberto Huertas Celdrán, Seyit Camtepe, Vijay Varadharajan, Surya Nepal:
FedDICE: A ransomware spread detection in a distributed integrated clinical environment using federated learning and SDN based mitigation. CoRR abs/2106.05434 (2021) - [i28]Hooman Alavizadeh, Julian Jang-Jaccard, Tansu Alpcan, Seyit Ahmet Çamtepe:
A Markov Game Model for AI-based Cyber Security Attack Mitigation. CoRR abs/2107.09258 (2021) - [i27]Mahathir Almashor, M. Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Raj Gaire, Seyit Camtepe, Surya Nepal:
Characterizing Malicious URL Campaigns. CoRR abs/2108.12726 (2021) - [i26]Praveen Joshi, Chandra Thapa, Seyit Camtepe, Mohammed Hasanuzzaman, Ted Scully, Haithem Afli:
Splitfed learning without client-side synchronization: Analyzing client-side split network portion size to overall performance. CoRR abs/2109.09246 (2021) - [i25]Guoxin Sun, Tansu Alpcan, Benjamin I. P. Rubinstein, Seyit Camtepe:
A Communication Security Game on Switched Systems for Autonomous Vehicle Platoons. CoRR abs/2109.14208 (2021) - [i24]Jinting Zhu, Julian Jang-Jaccard, Amardeep Singh, Paul A. Watters, Seyit Camtepe:
Task-Aware Meta Learning-based Siamese Neural Network for Classifying Obfuscated Malware. CoRR abs/2110.13409 (2021) - [i23]Hooman Alavizadeh, Julian Jang-Jaccard, Simon Yusuf Enoch, Harith Al-Sahaf, Ian Welch, Seyit Ahmet Çamtepe, Dong Seong Kim:
A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights. CoRR abs/2110.15747 (2021) - [i22]Chaoran Li, Xiao Chen, Ruoxi Sun, Jason Xue, Sheng Wen, Muhammad Ejaz Ahmed, Seyit Camtepe, Yang Xiang:
NatiDroid: Cross-Language Android Permission Specification. CoRR abs/2111.08217 (2021) - [i21]Jinting Zhu, Julian Jang-Jaccard, Amardeep Singh, Ian Welch, Harith Al-Sahaf, Seyit Camtepe:
A Few-Shot Meta-Learning based Siamese Neural Network using Entropy Features for Ransomware Classification. CoRR abs/2112.00668 (2021) - [i20]Hooman Alavizadeh, Julian Jang-Jaccard, Tansu Alpcan, Seyit Ahmet Çamtepe:
A Game-Theoretic Approach for AI-based Botnet Attack Defence. CoRR abs/2112.02223 (2021) - [i19]Seyit Camtepe, Jarek Duda, Arash Mahboubi, Pawel Morawiecki, Surya Nepal, Marcin Pawlowski, Josef Pieprzyk:
Compcrypt - Lightweight ANS-based Compression and Encryption. IACR Cryptol. ePrint Arch. 2021: 10 (2021) - [i18]Jongkil Kim, Seyit Camtepe, Joonsang Baek, Willy Susilo, Josef Pieprzyk, Surya Nepal:
P2DPI: Practical and Privacy-Preserving Deep Packet Inspection. IACR Cryptol. ePrint Arch. 2021: 789 (2021) - [i17]Seyit Camtepe, Jarek Duda, Arash Mahboubi, Pawel Morawiecki, Surya Nepal, Marcin Pawlowski, Josef Pieprzyk:
ANS-based Compression and Encryption with 128-bit Security. IACR Cryptol. ePrint Arch. 2021: 900 (2021) - 2020
- [j22]Arash Mahboubi, Seyit Camtepe, Keyvan Ansari:
Stochastic Modeling of IoT Botnet Spread: A Short Survey on Mobile Malware Spread Modeling. IEEE Access 8: 228818-228830 (2020) - [j21]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe:
Privacy Preserving Face Recognition Utilizing Differential Privacy. Comput. Secur. 97: 101951 (2020) - [j20]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe, Mohammed Atiquzzaman:
Local Differential Privacy for Deep Learning. IEEE Internet Things J. 7(7): 5827-5842 (2020) - [j19]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Dongxi Liu, Seyit Ahmet Çamtepe, Ibrahim Khalil:
Efficient privacy preservation of big data for accurate data mining. Inf. Sci. 527: 420-443 (2020) - [j18]Basker Palaniswamy, Seyit Camtepe, Ernest Foo, Josef Pieprzyk:
An Efficient Authentication Scheme for Intra-Vehicular Controller Area Network. IEEE Trans. Inf. Forensics Secur. 15: 3107-3122 (2020) - [j17]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe, Mohammed Atiquzzaman:
A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems. IEEE Trans. Ind. Informatics 16(9): 6092-6102 (2020) - [j16]Basker Palaniswamy, Seyit Camtepe, Ernest Foo, Leonie Simpson, Mir Ali Rezazadeh Baee, Josef Pieprzyk:
Continuous authentication for VANET. Veh. Commun. 25: 100255 (2020) - [c39]Sharif Abuadbba, Kyuyeon Kim, Minki Kim, Chandra Thapa, Seyit Ahmet Çamtepe, Yansong Gao, Hyoungshick Kim, Surya Nepal:
Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training? AsiaCCS 2020: 305-318 - [c38]Nazatul Haque Sultan, Vijay Varadharajan, Seyit Camtepe, Surya Nepal:
An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation. ESORICS (1) 2020: 569-590 - [c37]Arash Mahboubi, Keyvan Ansari, Seyit Camtepe:
Using Process Mining to Identify File System Metrics Impacted by Ransomware Execution. MSPN 2020: 57-71 - [c36]Nan Sun, Jun Zhang, Shang Gao, Leo Yu Zhang, Seyit Camtepe, Yang Xiang:
Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence. NSS 2020: 3-21 - [c35]Yansong Gao, Minki Kim, Sharif Abuadbba, Yeonjae Kim, Chandra Thapa, Kyuyeon Kim, Seyit Ahmet Çamtepe, Hyoungshick Kim, Surya Nepal:
End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things. SRDS 2020: 91-100 - [i16]Sharif Abuadbba, Kyuyeon Kim, Minki Kim, Chandra Thapa, Seyit Ahmet Çamtepe, Yansong Gao, Hyoungshick Kim, Surya Nepal:
Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training? CoRR abs/2003.12365 (2020) - [i15]Yansong Gao, Minki Kim, Sharif Abuadbba, Yeonjae Kim, Chandra Thapa, Kyuyeon Kim, Seyit Ahmet Çamtepe, Hyoungshick Kim, Surya Nepal:
End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things. CoRR abs/2003.13376 (2020) - [i14]Chandra Thapa, Mahawaga Arachchige Pathum Chamikara, Seyit Camtepe:
SplitFed: When Federated Learning Meets Split Learning. CoRR abs/2004.12088 (2020) - [i13]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe:
Privacy Preserving Distributed Machine Learning with Federated Learning. CoRR abs/2004.12108 (2020) - [i12]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe:
Privacy Preserving Face Recognition Utilizing Differential Privacy. CoRR abs/2005.10486 (2020) - [i11]Ruoxi Sun, Wei Wang, Minhui Xue, Gareth Tyson, Seyit Camtepe, Damith Ranasinghe:
Vetting Security and Privacy of Global COVID-19 Contact Tracing Applications. CoRR abs/2006.10933 (2020) - [i10]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe:
PPaaS: Privacy Preservation as a Service. CoRR abs/2007.02013 (2020) - [i9]Chandra Thapa, Jun Wen Tang, Sharif Abuadbba, Yansong Gao, Yifeng Zheng, Seyit Ahmet Çamtepe, Surya Nepal, Mahathir Almashor:
FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning. CoRR abs/2007.13300 (2020) - [i8]Chandra Thapa, Seyit Camtepe:
Precision Health Data: Requirements, Challenges and Existing Techniques for Data Security and Privacy. CoRR abs/2008.10733 (2020) - [i7]Xiaogang Zhu, Shigang Liu, Xian Li, Sheng Wen, Jun Zhang, Seyit Ahmet Çamtepe, Yang Xiang:
DeFuzz: Deep Learning Guided Directed Fuzzing. CoRR abs/2010.12149 (2020) - [i6]Chandra Thapa, Mahawaga Arachchige Pathum Chamikara, Seyit Ahmet Çamtepe:
Advancements of federated learning towards privacy preservation: from federated learning to split learning. CoRR abs/2011.14818 (2020)
2010 – 2019
- 2019
- [j15]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Dongxi Liu, Seyit Ahmet Çamtepe, Ibrahim Khalil:
An efficient and scalable privacy preserving algorithm for big data and data streams. Comput. Secur. 87 (2019) - [j14]Nour Moustafa, Kim-Kwang Raymond Choo, Ibrahim Radwan, Seyit Camtepe:
Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog. IEEE Trans. Inf. Forensics Secur. 14(8): 1975-1987 (2019) - [c34]Jongkil Kim, Seyit Camtepe, Willy Susilo, Surya Nepal, Joonsang Baek:
Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing. AsiaCCS 2019: 55-66 - [c33]Xiaogang Zhu, Xiaotao Feng, Tengyun Jiao, Sheng Wen, Yang Xiang, Seyit Camtepe, Jingling Xue:
A Feature-Oriented Corpus for Understanding, Evaluating and Improving Fuzz Testing. AsiaCCS 2019: 658-663 - [i5]Xiaogang Zhu, Xiaotao Feng, Tengyun Jiao, Sheng Wen, Yang Xiang, Seyit Camtepe, Jingling Xue:
A Feature-Oriented Corpus for Understanding, Evaluating and Improving Fuzz Testing. CoRR abs/1905.01405 (2019) - [i4]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Dongxi Liu, Seyit Camtepe, Ibrahim Khalil:
Efficient privacy preservation of big data for accurate data mining. CoRR abs/1906.08149 (2019) - [i3]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Dongxi Liu, Seyit Camtepe, Ibrahim Khalil:
An Efficient and Scalable Privacy Preserving Algorithm for Big Data and Data Streams. CoRR abs/1907.13498 (2019) - [i2]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe:
Local Differential Privacy for Deep Learning. CoRR abs/1908.02997 (2019) - 2018
- [j13]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Dongxi Liu, Seyit Camtepe, Ibrahim Khalil:
Efficient data perturbation for privacy preserving and accurate data stream mining. Pervasive Mob. Comput. 48: 1-19 (2018) - [i1]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Dongxi Liu, Seyit Camtepe, Ibrahim Khalil:
Efficient Data Perturbation for Privacy Preserving and Accurate Data Stream Mining. CoRR abs/1806.06151 (2018) - 2017
- [j12]Arash Mahboubi, Seyit Camtepe, Hasmukh Morarji:
A Study on Formal Methods to Generalize Heterogeneous Mobile Malware Propagation and Their Impacts. IEEE Access 5: 27740-27756 (2017) - [j11]Lapas Pradittasnee, Seyit Camtepe, Yu-Chu Tian:
Efficient Route Update and Maintenance for Reliable Routing in Large-Scale Sensor Networks. IEEE Trans. Ind. Informatics 13(1): 144-156 (2017) - [j10]Qingfeng Fan, Karine Zeitouni, Naixue Xiong, Qiongli Wu, Seyit Camtepe, Yu-Chu Tian:
Nash Equilibrium-Based Semantic Cache in Mobile Sensor Grid Database Systems. IEEE Trans. Syst. Man Cybern. Syst. 47(9): 2550-2561 (2017) - [c32]Michelle Fernando, Dhammika Jayalath, Seyit Camtepe, Ernest Foo:
Reed Solomon Codes for the Reconciliation of Wireless PHY Layer Based Secret Keys. VTC Fall 2017: 1-6 - 2016
- [j9]Chris I. Djamaludin, Ernest Foo, Seyit Ahmet Çamtepe, Peter Corke:
Revocation and update of trust in autonomous delay tolerant networks. Comput. Secur. 60: 15-36 (2016) - [j8]Desmond Allan Schmidt, Kenneth Radke, Seyit Ahmet Çamtepe, Ernest Foo, Michal Ren:
A Survey and Analysis of the GNSS Spoofing Threat and Countermeasures. ACM Comput. Surv. 48(4): 64:1-64:36 (2016) - [j7]Raphael Amoah, Seyit Ahmet Çamtepe, Ernest Foo:
Formal modelling and analysis of DNP3 secure authentication. J. Netw. Comput. Appl. 59: 345-360 (2016) - [j6]Guosong Tian, Seyit Camtepe, Yu-Chu Tian:
A Deadline-Constrained 802.11 MAC Protocol With QoS Differentiation for Soft Real-Time Control. IEEE Trans. Ind. Informatics 12(2): 544-554 (2016) - [j5]Raphael Amoah, Seyit Ahmet Çamtepe, Ernest Foo:
Securing DNP3 Broadcast Communications in SCADA Systems. IEEE Trans. Ind. Informatics 12(4): 1474-1485 (2016) - 2015
- [c31]Ahmad Salehi S., Seyit Camtepe, Dhammika Jayalath:
Understanding data flow and security requirements in wireless Body Area Networks for healthcare. HealthCom 2015: 621-626 - 2014
- [c30]Raphael Amoah, Suriadi Suriadi, Seyit Ahmet Çamtepe, Ernest Foo:
Security analysis of the non-aggressive challenge response of the DNP3 protocol using a CPN model. ICC 2014: 827-833 - 2013
- [c29]Seyit Ahmet Çamtepe:
Complexity of Increasing the Secure Connectivity in Wireless Ad Hoc Networks. ACISP 2013: 363-378 - [c28]Lapas Pradittasnee, Yu-Chu Tian, Dhammika Jayalath, Seyit Camtepe:
An efficient proactive route maintenance process for reliable data transmissions in sensor networks. ICSPCS 2013: 1-10 - 2012
- [j4]Seyit Ahmet Çamtepe, Karsten Bsufka, Leonhard Hennig, Cihan Simsek, Sahin Albayrak:
A Framework for Automated Identification of Attack Scenarios on IT Infrastructures. Prax. Inf.verarb. Kommun. 35(1): 25-31 (2012) - [c27]Markus Herpich, Leonid Batyuk, Seyit Ahmet Çamtepe, Sahin Albayrak:
A trusted ecosystem for Android applications based on context-aware access control. MALWARE 2012: 73-78 - 2011
- [c26]Leonid Batyuk, Seyit Ahmet Çamtepe, Sahin Albayrak:
Multi-device Key Management Using Visual Side Channels in Pervasive Computing Environments. BWCCA 2011: 207-214 - [c25]Tarik Mustafic, Arik Messerman, Seyit Ahmet Çamtepe, Aubrey-Derrick Schmidt, Sahin Albayrak:
Behavioral biometrics for persistent single sign-on. Digital Identity Management 2011: 73-82 - [c24]Dennis Grunewald, Joël Chinnow, Rainer Bye, Seyit Ahmet Çamtepe, Sahin Albayrak:
Framework for evaluating collaborative intrusion detection systems. GI-Jahrestagung 2011: 116 - [c23]Martin Möller, Rainer Bye, Karsten Bsufka, Seyit Ahmet Çamtepe, Sahin Albayrak:
From simulation to emulation - an integrated approach for network security evaluation. GI-Jahrestagung 2011: 117 - [c22]Leonid Batyuk, Christian Scheel, Seyit Ahmet Çamtepe, Sahin Albayrak:
Context-aware device self-configuration using self-organizing maps. OC@ICAC 2011: 13-22 - [c21]Arik Messerman, Tarik Mustafic, Seyit Ahmet Çamtepe, Sahin Albayrak:
Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics. IJCB 2011: 1-8 - [c20]Leonid Batyuk, Markus Herpich, Seyit Ahmet Çamtepe, Karsten Raddatz, Aubrey-Derrick Schmidt, Sahin Albayrak:
Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications. MALWARE 2011: 66-72 - [c19]Mürsel Yildiz, Ahmet Cihat Toker, Fikret Sivrikaya, Seyit Ahmet Çamtepe, Sahin Albayrak:
User Facilitated Congestion and Attack Mitigation. MONAMI 2011: 358-371 - 2010
- [j3]Stephan Schmidt, Rainer Bye, Joël Chinnow, Karsten Bsufka, Seyit Ahmet Çamtepe, Sahin Albayrak:
Application-level Simulation for Network Security. Simul. 86(5-6): 311-330 (2010) - [c18]Arik Messerman, Tarik Mustafic, Seyit Ahmet Çamtepe, Sahin Albayrak:
A generic framework and runtime environment for development and evaluation of behavioral biometrics solutions. ISDA 2010: 136-141 - [c17]Thomas Bläsing, Leonid Batyuk, Aubrey-Derrick Schmidt, Seyit Ahmet Çamtepe, Sahin Albayrak:
An Android Application Sandbox system for suspicious software detection. MALWARE 2010: 55-62 - [c16]Rainer Bye, Seyit Ahmet Çamtepe, Sahin Albayrak:
Collaborative Intrusion Detection Framework: Characteristics, Adversarial Opportunities and Countermeasures. CollSec 2010
2000 – 2009
- 2009
- [j2]Aubrey-Derrick Schmidt, Frank Peters, Florian Lamour, Christian Scheel, Seyit Ahmet Çamtepe, Sahin Albayrak:
Monitoring Smartphones for Anomaly Detection. Mob. Networks Appl. 14(1): 92-106 (2009) - [c15]Rainer Bye, Seyit Ahmet Çamtepe, Sahin Albayrak:
Design and modeling of collaboration architecture for security. CTS 2009: 330-341 - [c14]Aubrey-Derrick Schmidt, Rainer Bye, Hans-Gunther Schmidt, Jan Hendrik Clausen, Osman Kiraz, Kamer Ali Yüksel, Seyit Ahmet Çamtepe, Sahin Albayrak:
Static Analysis of Executables for Collaborative Malware Detection on Android. ICC 2009: 1-5 - [c13]Robert Moskovitch, Clint Feher, Arik Messerman, Niklas Kirschnick, Tarik Mustafic, Seyit Ahmet Çamtepe, Bernhard Löhlein, Ulrich Heister, Sebastian Möller, Lior Rokach, Yuval Elovici:
Identity theft, computers and behavioral biometrics. ISI 2009: 155-160 - [c12]Aubrey-Derrick Schmidt, Hans-Gunther Schmidt, Leonid Batyuk, Jan Hendrik Clausen, Seyit Ahmet Çamtepe, Sahin Albayrak, Can Yildizli:
Smartphone malware evolution revisited: Android next target? MALWARE 2009: 1-7 - [c11]Aubrey-Derrick Schmidt, Jan Hendrik Clausen, Seyit Ahmet Çamtepe, Sahin Albayrak:
Detecting Symbian OS malware through static function call analysis. MALWARE 2009: 15-22 - [c10]Leonid Batyuk, Aubrey-Derrick Schmidt, Hans-Gunther Schmidt, Seyit Ahmet Çamtepe, Sahin Albayrak:
Developing and Benchmarking Native Linux Applications on Android. MOBILWARE 2009: 381-392 - 2008
- [c9]Tansu Alpcan, Sinan Kesici, Daniel Bicher, Mehmet Kivanç Mihçak, Christian Bauckhage, Seyit Ahmet Çamtepe:
A lightweight biometric signature scheme for user authentication over networks. SecureComm 2008: 33 - 2007
- [b1]Seyit Ahmet Çamtepe:
Design and analysis of key management schemes for distributed wireless sensor networks. Rensselaer Polytechnic Institute, USA, 2007 - [j1]Seyit Ahmet Çamtepe, Bülent Yener:
Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Trans. Netw. 15(2): 346-358 (2007) - [c8]Seyit Ahmet Çamtepe, Bülent Yener:
Modeling and detection of complex attacks. SecureComm 2007: 234-243 - [c7]Rainer Bye, Katja Luther, Seyit Ahmet Çamtepe, Tansu Alpcan, Sahin Albayrak, Bülent Yener:
Decentralized Detector Generation in Cooperative Intrusion Detection Systems. SSS 2007: 37-51 - 2006
- [c6]Seyit Ahmet Çamtepe, Bülent Yener, Moti Yung:
Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks. ICC 2006: 2262-2267 - [c5]Evrim Acar, Seyit Ahmet Çamtepe, Bülent Yener:
Collective Sampling and Analysis of High Order Tensors for Chatroom Communications. ISI 2006: 213-224 - 2005
- [c4]Seyit Ahmet Çamtepe, Mark K. Goldberg, Malik Magdon-Ismail, Mukkai Krishn:
Detecting conversing groups of chatters: a model, algorithms, and tests. IADIS AC 2005: 89-96 - [c3]Evrim Acar, Seyit Ahmet Çamtepe, Mukkai S. Krishnamoorthy, Bülent Yener:
Modeling and Multiway Analysis of Chatroom Tensors. ISI 2005: 256-268 - 2004
- [c2]Seyit Ahmet Çamtepe, Bülent Yener:
Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks. ESORICS 2004: 293-308 - [c1]Seyit Ahmet Çamtepe, Mukkai S. Krishnamoorthy, Bülent Yener:
A Tool for Internet Chatroom Surveillance. ISI 2004: 252-265
Coauthor Index
aka: Sharif Abuadbba
aka: Muhammad Ejaz Ahmed
aka: M. A. P. Chamikara
aka: Julian Jang-Jaccard
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-28 20:12 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint