Serdar Boztas

Orcid: 0000-0001-6724-4366

According to our database1, Serdar Boztas authored at least 51 papers between 1992 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A New Method to Compute Sequence Correlations Over Finite Fields.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., December, 2023

Self-Supervised RF Signal Representation Learning for NextG Signal Classification With Deep Learning.
IEEE Wirel. Commun. Lett., 2023

Designing Compact Repair Groups for Reed-Solomon Codes.
Proceedings of the IEEE International Symposium on Information Theory, 2023

2022
New Correlations of m-sequences over the finite field $\mathbb{F}_{4}$ compatible with a new bijection to $\mathbb{Z}_{4}$.
Proceedings of the 10th International Workshop on Signal Design and Its Applications in Communications, 2022

Practical Considerations in Repairing Reed-Solomon Codes.
Proceedings of the IEEE International Symposium on Information Theory, 2022

2019
On the Complexity of the 3XORSUM Problem.
Proceedings of the IEEE International Symposium on Information Theory, 2019

2018
Explicit Full Correlation Distribution of Sequence Families Using Plateaued Functions.
IEEE Trans. Inf. Theory, 2018

Generalized nonbinary sequences with perfect autocorrelation, flexible alphabets and new periods.
Cryptogr. Commun., 2018

2017
Insider Threat Detection Through Attributed Graph Clustering.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Classification of a sequence family using plateaued functions.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Randomness testing and comparison of classical and quantum bit generators.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Graph Based Framework for Malicious Insider Threat Detection.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

2016
Detecting Anomalous User Behavior Using an Extended Isolation Forest Algorithm: An Enterprise Case Study.
CoRR, 2016

2015
Web access patterns reveal insiders behavior.
Proceedings of the Seventh International Workshop on Signal Design and its Applications in Communications, 2015

Statistical dependencies in the Self-Shrinking Generator.
Proceedings of the Seventh International Workshop on Signal Design and its Applications in Communications, 2015

Correlation distribution of a new sequence family.
Proceedings of the IEEE International Symposium on Information Theory, 2015

A generalized construction for perfect autocorrelation sequences.
Proceedings of the IEEE International Symposium on Information Theory, 2015

2014
A New Weight Vector for a Tighter Levenshtein Bound on Aperiodic Correlation.
IEEE Trans. Inf. Theory, 2014

On Renyi Entropies and Their Applications to Guessing Attacks in Cryptography.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

A class of quaternary noncyclic Hadamard matrices.
Australas. J Comb., 2014

Community Detection in Bipartite Networks Using Random Walks.
Proceedings of the Complex Networks V, 2014

2013
Constructions of Optimal and Near-Optimal Quasi-Complementary Sequence Sets from Singer Difference Sets.
IEEE Wirel. Commun. Lett., 2013

On the Construction of Binary Sequence Families With Low Correlation and Large Sizes.
IEEE Trans. Inf. Theory, 2013

Influence Neighbourhoods in CiteSeer: A Case Study.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

Sequences, randomness and security.
Proceedings of the Sixth International Workshop on Signal Design and Its Applications in Communications, 2013

Quadratic weight vector for tighter aperiodic Levenshtein bound.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

2012
State cycles, initialization and the Trivium stream cipher.
Cryptogr. Commun., 2012

Low Probability of Intercept properties of some binary sequence families with good correlation properties.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Oblivious distributed guessing.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

2011
Protection of minutiae-based templates using biocryptographic constructs in the set difference metric.
Secur. Commun. Networks, 2011

On the relative abundance of nonbinary sequences with perfect autocorrelations.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

2010
Nonbinary sequences with perfect and nearly perfect autocorrelations.
Proceedings of the IEEE International Symposium on Information Theory, 2010

Pattern Recognition Techniques for the Classification of Malware Packers.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
Entropy of the Retina Template.
Proceedings of the Advances in Biometrics, Third International Conference, 2009

Testing Stream Ciphers by Finding the Longest Substring of a Given Density.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
On Partial Correlations of Various Z4 Sequence Families.
Proceedings of the Sequences and Their Applications, 2008

On Independence and Sensitivity of Statistical Randomness Tests.
Proceedings of the Sequences and Their Applications, 2008

Fast computation of Boolean influences.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Montgomery Residue Representation Fault-Tolerant Computation in GF(2k).
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
Fault-Tolerant Finite Field Computation in the Public Key Cryptosystems.
Proceedings of the Applied Algebra, 2007

2006
On Transmission Scheduling in Wireless Networks.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Traitor Tracing Against Powerful Attacks Using Combinatorial Designs.
Proceedings of the Applied Algebra, 2006

2005
Traitor tracing against powerful attacks.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

2003
Fair Noiseless Broadcast Source Coding.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

Randomized Traitor Tracing Algorithms for Broadcast Security.
Proceedings of the International Conference on Security and Management, 2003

2001
On the Aperiodic Correlation Function of Galois Ring m-Sequences.
Proceedings of the Applied Algebra, 2001

1999
New Lower Bounds on the Periodic Crosscorrelation of QAM Codes with Arbitrary Energy.
Proceedings of the Applied Algebra, 1999

1997
Comments on 'An inequality on guessing and its application to sequential decoding'.
IEEE Trans. Inf. Theory, 1997

1995
A Robust Multi-Priority Topology-Independent Transmission Schedule for Packet Radio Networks.
Inf. Process. Lett., 1995

1994
Binary sequences with Gold-like correlation but larger linear span.
IEEE Trans. Inf. Theory, 1994

1992
4-phase sequences with near-optimum correlation properties.
IEEE Trans. Inf. Theory, 1992


  Loading...