Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Ferhat, Karakoç"'
Autor:
Uğur Deveci, Yaşar Doğan, Abdullah Murat Kayaokay, Şükran Akgeyik, Ferhat Karakoç, Muhammed Ali Çınar
Publikováno v:
Journal of Pediatric Emergency and Intensive Care Medicine, Vol 11, Iss 1, Pp 15-20 (2024)
Introduction: Cases of swallowed safety pins are often observed in Turkey because of the tradition of pinning a blue eye bead on children to ward against evil. This study aimed to evaluate the diagnosis, endoscopic management, and long-term follow-up
Externí odkaz:
https://doaj.org/article/3c913cab819d49eba3de36d91e665ab1
Autor:
Ferhat Karakoç, Leyli Karaçay, Pinar Çomak De Cnudde, Utku Gülen, Ramin Fuladi, Elif Ustundag Soykan
Publikováno v:
Computer Communications. 207:27-35
Federated learning is a privacy-aware collaborative machine learning method where the clients collaborate on constructing a global model by performing local model training using their training data and sending the local model updates to the server. A
Publikováno v:
IEEE Transactions on Emerging Topics in Computing. :1-16
Publikováno v:
Cureus.
Background Microorganisms proliferating in the hospital setting cause infections with high morbidity and mortality rates. In intensive care units (ICUs), the rates of antibiotic resistance and microorganisms grown in cultures may vary by time period.
Autor:
Emrah Tomur, Leyli Karacay, Pinar Comak, Utku Gulen, Elif Ustundag Soykan, Mehmet Akif Ersoy, Ferhat Karakoç
Publikováno v:
CSR
There has been an increasing popularity of industrial usage of Internet of Things (IoT) technologies in parallel to advancements in connectivity and automation. Security vulnerabilities in industrial systems, which are considered less likely to be ex
Publikováno v:
SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies
SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, Jun 2021, Barcelona, Spain. pp.115-124, ⟨10.1145/3450569.3463572⟩
SACMAT
SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, Jun 2021, Barcelona, Spain. pp.115-124, ⟨10.1145/3450569.3463572⟩
SACMAT
International audience; Secure aggregation protocols allow anaggregator to compute the sum of multiple users' data in a privacy-preserving manner. Existing protocols assume that users from whom the data is collected, are fully trusted on the correctn
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4a045733e8eb73f0a919e202417917e5
https://hal.archives-ouvertes.fr/hal-03345683
https://hal.archives-ouvertes.fr/hal-03345683
Autor:
Pinar Comak, Mehmet Akif Ersoy, Ferhat Karakoç, Emrah Tomur, Elif Ustundag Soykan, Zeki Bilgin, Leyli Karacay
Industrial IoT (IIoT) era is evolving rapidly in parallel to the progress in Industry 4.0, which leads factories to increase the engagement with external parties through different communication infrastructures. This brings a larger attack surface and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b8972d503513f80dbab691de9cee4e9b
https://aperta.ulakbim.gov.tr/record/234786
https://aperta.ulakbim.gov.tr/record/234786
Autor:
Utku Gulen, Emrah Tomur, Elif Ustundag Soykan, Leyli Karacay, Ferhat Karakoç, Pinar Comak, Ayse Bilge Gunduz, Zeki Bilgin
Publikováno v:
IEEE Access, Vol 9, Pp 111368-111382 (2021)
In recent years False Base Stations (FBSs) have received increased attention. A False Base Station can perform active or passive attacks against mobile devices or user equipment (UE) to steal private information, such as International Mobile Subscrib
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::320832719874d1c09afeed94837a4f19
https://aperta.ulakbim.gov.tr/record/236750
https://aperta.ulakbim.gov.tr/record/236750
Autor:
Ferhat Karakoç, Alptekin Küpçü
Publikováno v:
Lecture Notes in Computer Science
Cryptology and Network Security ISBN: 9783030654108
CANS
Cryptology and Network Security ISBN: 9783030654108
CANS
In this paper, we propose a new private set intersection (PSI) protocol with bi-oblivious data transfer that computes the following functionality. The two parties (P1 and P2) input two sets of items (X and Y, respectively) and one of the parties (P2)
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::95944918ffd1f6277e357ddd8de6a07d
http://cdm21054.contentdm.oclc.org/cdm/ref/collection/IR/id/9248
http://cdm21054.contentdm.oclc.org/cdm/ref/collection/IR/id/9248
Publikováno v:
ARES
We propose a new secure equality testing (SET) protocol, namely SET-OT, for two-party setting by using a recently introduced Private Set Membership Protocol (PSM) based on Oblivious Transfer (OT) as a building block. We designed our equality test in