Hidayet Aksu

Orcid: 0000-0003-0159-2522

Affiliations:
  • Florida International University, Miami, FL, USA
  • Bilkent Universitesi, Ankara, Turkey (former)


According to our database1, Hidayet Aksu authored at least 39 papers between 2011 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Summary Reports Optimization in the Privacy Sandbox Attribution Reporting API.
CoRR, 2023

2022
Who's Controlling My Device? Multi-User Multi-Device-Aware Access Control System for Shared Smart Home Environment.
ACM Trans. Internet Things, 2022

2021
Identification of Wearable Devices with Bluetooth.
IEEE Trans. Sustain. Comput., 2021

A Usable and Robust Continuous Authentication Framework Using Wearables.
IEEE Trans. Mob. Comput., 2021

A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA.
ACM Trans. Priv. Secur., 2021

CPS Device-Class Identification via Behavioral Fingerprinting: From Theory to Practice.
IEEE Trans. Inf. Forensics Secur., 2021

A Survey on Sensor-Based Threats and Attacks to Smart Devices and Applications.
IEEE Commun. Surv. Tutorials, 2021

2020
A Context-Aware Framework for Detecting Sensor-Based Threats on Smart Devices.
IEEE Trans. Mob. Comput., 2020

A System-level Behavioral Detection Framework for Compromised CPS Devices: Smart-Grid Case.
ACM Trans. Cyber Phys. Syst., 2020

Kratos: multi-user multi-device-aware access control system for the smart home.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

Peek-a-boo: i see your smart home activities, even encrypted!
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

Z-IoT: Passive Device-class Fingerprinting of ZigBee and Z-Wave IoT Devices.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
An Analysis of Social Networks Based on Tera-Scale Telecommunication Datasets.
IEEE Trans. Emerg. Top. Comput., 2019

Multi-User Multi-Device-Aware Access Control System for Smart Home.
CoRR, 2019

Curie: Policy-based Secure Data Exchange.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Aegis: a context-aware security framework for smart home systems.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
A Survey on Homomorphic Encryption Schemes: Theory and Implementation.
ACM Comput. Surv., 2018

A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications.
CoRR, 2018

Block4Forensic: An Integrated Lightweight Blockchain Framework for Forensics Applications of Connected Vehicles.
IEEE Commun. Mag., 2018

Advertising in the IoT Era: Vision and Challenges.
IEEE Commun. Mag., 2018

Sensitive Information Tracking in Commodity IoT.
Proceedings of the 27th USENIX Security Symposium, 2018

WACA: Wearable-Assisted Continuous Authentication.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

SOTA: Secure Over-the-Air Programming of IoT Devices.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

OS Independent and Hardware-Assisted Insider Threat Detection and Prevention Framework.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

U-PoT: A Honeypot Framework for UPnP-Based IoT Devices.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

Detection of Compromised Smart Grid Devices with Machine Learning and Convolution Techniques.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

IoT-enabled smart lighting systems for smart cities.
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018

2017
A Survey on Function and System Call Hooking Approaches.
J. Hardw. Syst. Secur., 2017

6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices.
Proceedings of the 26th USENIX Security Symposium, 2017

Achieving Secure and Differentially Private Computations in Multiparty Settings.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Cybergrenade: Automated Exploitation of Local Network Machines via Single Board Computers.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

Identifying counterfeit smart grid devices: A lightweight system level framework.
Proceedings of the IEEE International Conference on Communications, 2017

2016
A framework for counterfeit smart grid device detection.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
Efficient community identification and maintenance at multiple resolutions on distributed datastores.
Data Knowl. Eng., 2015

Graph Aware Caching Policy for Distributed Graph Stores.
Proceedings of the 2015 IEEE International Conference on Cloud Engineering, 2015

2014
Efficient analysis of large-scale social networks using big-data platforms (Büyük ölçekli sosyal ağların büyük veri platformu kullanarak etkin analizi)
PhD thesis, 2014

Distributed $k$ -Core View Materializationand Maintenance for Large Dynamic Graphs.
IEEE Trans. Knowl. Data Eng., 2014

2013
Multi-resolution Social Network Community Identification and Maintenance on Big Data Platform.
Proceedings of the IEEE International Congress on Big Data, 2013

2011
A study of localization metrics: Evaluation of position errors in wireless sensor networks.
Comput. Networks, 2011


  Loading...