Search

Your search keyword '"Kantarcioglu AS"' showing total 169 results

Search Constraints

Start Over You searched for: Author "Kantarcioglu AS" Remove constraint Author: "Kantarcioglu AS" Topic computer Remove constraint Topic: computer
169 results on '"Kantarcioglu AS"'

Search Results

1. Exploring the Effect of Randomness on Transferability of Adversarial Samples Against Deep Neural Networks

2. A Game Theoretic Perspective on Adversarial Machine Learning and Related Cybersecurity Applications

3. GraphBoot: Quantifying Uncertainty in Node Feature Learning on Large Networks

4. Trailblazing the Artificial Intelligence for Cybersecurity Discipline

5. Robust Transparency Against Model Inversion Attacks

6. Data Science on Blockchains

7. Alphacore

8. AI for Security and Security for AI

9. Investigation of a differential cryptanalysis inspired approach for Trojan AI detection

11. Secure IoT Data Analytics in Cloud via Intel SGX

12. Leveraging blockchain for immutable logging and querying across multiple sites

13. Efficacy of defending deep neural networks against adversarial attacks with randomization

15. Deployment-quality and Accessible Solutions for Cryptography Code Development

16. Attacking Machine Learning Models for Social Good

17. BlockFLA: Accountable Federated Learning via Hybrid Blockchain Architecture

18. PREDICT

20. Bitcoin risk modeling with blockchain graphs

21. Secure logical schema and decomposition algorithm for proactive context dependent attribute based inference control

22. Security and Privacy in Cyber-Physical Systems: A Survey of Surveys

23. Secure Real-Time Heterogeneous IoT Data Management System

24. Securing Big Data in the Age of AI

25. CryptoGuard

26. Poster

27. A Hybrid Blockchain Architecture for Privacy-Enabled and Accountable Auctions

28. Securing Big Data

29. Research Challenges at the Intersection of Big Data, Security and Privacy

30. Adversarial Active Learning in the Presence of Weak and Malicious Oracles

31. Determining the Impact of Missing Values on Blocking in Record Linkage

32. Attacklets: Modeling High Dimensionality in Real World Cyberattacks

33. Adjudicating Violations in Data Sharing Agreements Using Smart Contracts

34. Integrating Cyber Security and Data Science for Social Media: A Position Paper

35. Sensitive Task Assignments in Crowdsourcing Markets with Colluding Workers

36. Data Mining with Algorithmic Transparency

37. Security Analytics: Essential Data Analytics Knowledge for Cybersecurity Professionals and Students

38. A privacy preserving protocol for tracking participants in phase I clinical trials

39. Building a Dossier on the Cheap

40. SGX-BigMatrix

41. From Myths to Norms: Demystifying Data Mining Models with Instance-Based Transparency

42. Security and privacy trade-offs in CPS by leveraging inherent differential privacy

43. A Cyber-Provenance Infrastructure for Sensor-Based Data-Intensive Applications

44. Hacking social network data mining

45. Controlling the signal: Practical privacy protection of genomic data sharing through Beacon services

46. Towards a Framework for Developing Cyber Privacy Metrics: A Vision Paper

47. Security vs. privacy: How integrity attacks can be masked by the noise of differential privacy

48. Securing Data Analytics on SGX with Randomization

49. Privacy and Security Challenges in GIS

50. Gaussian Mixture Models for Classification and Hypothesis Tests Under Differential Privacy

Catalog

Books, media, physical & digital resources