Baris Coskun

Orcid: 0000-0001-6179-1481

According to our database1, Baris Coskun authored at least 29 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
From Grim Reality to Practical Solution: Malware Classification in Real-World Noise.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
Firenze: Model Evaluation Using Weak Signals.
Proceedings of the Conference on Applied Machine Learning in Information Security, 2022

2021
Estimating Instrumentation Data Acquired During Flight Test of a Helicopter using Predictor Models.
Proceedings of the 19th IEEE International Conference on Smart Technologies, 2021

2020
Predicting Carbon Spectrum in Heteronuclear Single Quantum Coherence Spectroscopy for Online Feedback During Surgery.
IEEE ACM Trans. Comput. Biol. Bioinform., 2020


2019
Forecasting Suspicious Account Activity at Large-Scale Online Service Providers.
Proceedings of the Financial Cryptography and Data Security, 2019

CADENCE: Conditional Anomaly Detection for Events Using Noise-Contrastive Estimation.
Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, 2019

2017
(Un)wisdom of Crowds: Accurately Spotting Malicious IP Clusters Using Not-So-Accurate IP Blacklists.
IEEE Trans. Inf. Forensics Secur., 2017

Nationality Classification Using Name Embeddings.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

Generating Look-alike Names For Security Challenges.
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, 2017

An Early Warning System for Suspicious Accounts.
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, 2017

2016
Harvesting the low-hanging fruits: defending against automated large-scale cyber-intrusions by focusing on the vulnerable population.
Proceedings of the 2016 New Security Paradigms Workshop, 2016

2013
Detecting hidden enemy lines in IP address space.
Proceedings of the New Security Paradigms Workshop, 2013

Gangs of the internet: Towards automatic discovery of peer-to-peer communities.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Discovery of emergent malicious campaigns in cellular networks.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Mitigating SMS spam by online detection of repetitive near-duplicate messages.
Proceedings of IEEE International Conference on Communications, 2012

2010
Tracking encrypted VoIP calls via robust hashing of network flows.
Proceedings of the IEEE International Conference on Acoustics, 2010

Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
CoCoST: A Computational Cost Efficient Classifier.
Proceedings of the ICDM 2009, 2009

Online Sketching of Network Flows for Real-Time Stepping-Stone Detection.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Perceptual hash based blind geometric synchronization of images for watermarking.
Proceedings of the Security, 2008

Can "Something You Know" Be Saved?.
Proceedings of the Information Security, 11th International Conference, 2008

2007
Do Strong Web Passwords Accomplish Anything?
Proceedings of the 2nd USENIX Workshop on Hot Topics in Security, 2007

Tamper Detection Based on Regularity of Wavelet Transform Coefficients.
Proceedings of the International Conference on Image Processing, 2007

Efficient Detection of Delay-Constrained Relay Nodes.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Spatio-Temporal Transform Based Video Hashing.
IEEE Trans. Multim., 2006

Confusion/Diffusion Capabilities of Some Robust Hash Functions.
Proceedings of the 40th Annual Conference on Information Sciences and Systems, 2006

2004
Comparative evaluation of semifragile watermarking algorithms.
J. Electronic Imaging, 2004

Robust video hash extraction.
Proceedings of the 2004 12th European Signal Processing Conference, 2004


  Loading...