Mehmet Emre Gursoy

Orcid: 0000-0002-7676-0167

According to our database1, Mehmet Emre Gursoy authored at least 46 papers between 2015 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Longitudinal attacks against iterative data collection with local differential privacy.
Turkish J. Electr. Eng. Comput. Sci., 2024

2023
Utility-Aware and Privacy-Preserving Mobile Query Services.
IEEE Trans. Serv. Comput., 2023

Trust, Privacy and Security Aspects of Bias and Fairness in Machine Learning.
Proceedings of the 5th IEEE International Conference on Trust, 2023

On the Effectiveness of Re-Identification Attacks and Local Differential Privacy-Based Solutions for Smart Meter Data.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Learning Markov Chain Models from Sequential Data Under Local Differential Privacy.
Proceedings of the Computer Security - ESORICS 2023, 2023

Building Quadtrees for Spatial Data Under Local Differential Privacy.
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023

2022
An Adversarial Approach to Protocol Analysis and Selection in Local Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2022

Forecasting Daily COVID-19 Case Counts Using Aggregate Mobility Statistics.
Data, 2022

Beta Poisoning Attacks Against Machine Learning Models: Extensions, Limitations and Defenses.
Proceedings of the 4th IEEE International Conference on Trust, 2022

Defending Against Targeted Poisoning Attacks in Federated Learning.
Proceedings of the 4th IEEE International Conference on Trust, 2022

Detection and Mitigation of Targeted Data Poisoning Attacks in Federated Learning.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022

Physical Activity Recognition using Deep Transfer Learning with Convolutional Neural Networks.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022

2021
Demystifying Membership Inference Attacks in Machine Learning as a Service.
IEEE Trans. Serv. Comput., 2021

Secure and Utility-Aware Data Collection with Condensed Local Differential Privacy.
IEEE Trans. Dependable Secur. Comput., 2021

The TSC-PFed Architecture for Privacy-Preserving FL.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

Automatic Subject Identification Using Scale-Based Ballistocardiogram Signals.
Proceedings of the Wireless Mobile Communication and Healthcare, 2021

2020
Known Sample Attacks on Relation Preserving Data Transformations.
IEEE Trans. Dependable Secur. Comput., 2020

Sensitivity Analysis for Non-Interactive Differential Privacy: Bounds and Efficient Algorithms.
IEEE Trans. Dependable Secur. Comput., 2020

A Framework for Evaluating Gradient Leakage Attacks in Federated Learning.
CoRR, 2020

TOG: Targeted Adversarial Objectness Gradient Attacks on Real-time Object Detection Systems.
CoRR, 2020

Adversarial Deception in Deep Learning: Analysis and Mitigation.
Proceedings of the Second IEEE International Conference on Trust, 2020

Utility-Optimized Synthesis of Differentially Private Location Traces.
Proceedings of the Second IEEE International Conference on Trust, 2020

Adversarial Objectness Gradient Attacks in Real-time Object Detection Systems.
Proceedings of the Second IEEE International Conference on Trust, 2020

Cross-Layer Strategic Ensemble Defense Against Adversarial Examples.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

LDP-Fed: federated learning with local differential privacy.
Proceedings of the 3rd International Workshop on Edge Systems, Analytics and Networking, 2020

A Framework for Evaluating Client Privacy Leakages in Federated Learning.
Proceedings of the Computer Security - ESORICS 2020, 2020

Data Poisoning Attacks Against Federated Learning Systems.
Proceedings of the Computer Security - ESORICS 2020, 2020

Understanding Object Detection Through an Adversarial Lens.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
Differentially Private and Utility Preserving Publication of Trajectory Data.
IEEE Trans. Mob. Comput., 2019

Effects of Differential Privacy and Data Skewness on Membership Inference Vulnerability.
Proceedings of the First IEEE International Conference on Trust, 2019

Differentially Private Model Publishing for Deep Learning.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Deep Neural Network Ensembles Against Deception: Ensemble Diversity, Accuracy and Robustness.
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2019

GRAHIES: Multi-Scale Graph Representation Learning with Latent Hierarchical Structure.
Proceedings of the 2019 IEEE First International Conference on Cognitive Machine Intelligence (CogMI), 2019

Classification of Driving Behavior Events Utilizing Kinematic Classification and Machine Learning for Down Sampled Time Series Data.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Location disclosure risks of releasing trajectory distances.
Data Knowl. Eng., 2018

Towards Demystifying Membership Inference Attacks.
CoRR, 2018

Adversarial Examples in Deep Learning: Characterization and Divergence.
CoRR, 2018

Utility-Aware Synthesis of Differentially Private and Attack-Resilient Location Traces.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

PrivacyZone: A Novel Approach to Protecting Location Privacy of Mobile Users.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Privacy-Preserving Learning Analytics: Challenges and Techniques.
IEEE Trans. Learn. Technol., 2017

Differentially private nearest neighbor classification.
Data Min. Knowl. Discov., 2017

Privacy-Preserving Inductive Learning with Decision Trees.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017

2016
Privacy-Preserving Publishing of Hierarchical Data.
ACM Trans. Priv. Secur., 2016

Graph-based modelling of query sets for differential privacy.
Proceedings of the 28th International Conference on Scientific and Statistical Database Management, 2016

Explode: An Extensible Platform for Differentially Private Data Analysis.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2016

2015
Scalable reactive vehicle-to-vehicle congestion avoidance mechanism.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015


  Loading...