Seyit Ahmet Çamtepe

Orcid: 0000-0001-6353-8359

According to our database1, Seyit Ahmet Çamtepe authored at least 156 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Access-Based Lightweight Physical-Layer Authentication for the Internet of Things Devices.
IEEE Internet Things J., April, 2024

Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization.
IEEE Trans. Multim., 2024

To Act or Not to Act: An Adversarial Game for Securing Vehicle Platoons.
IEEE Trans. Inf. Forensics Secur., 2024

Bayesian Learned Models Can Detect Adversarial Malware For Free.
CoRR, 2024

IPRemover: A Generative Model Inversion Attack against Deep Neural Network Fingerprinting and Watermarking.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
An Explainability-Guided Testing Framework for Robustness of Malware Detectors.
Dataset, August, 2023

An Explainability-Guided Testing Framework for Robustness of Malware Detectors.
Dataset, August, 2023

Task-Aware Meta Learning-Based Siamese Neural Network for Classifying Control Flow Obfuscated Malware.
Future Internet, June, 2023

The Compression Optimality of Asymmetric Numeral Systems.
Entropy, April, 2023

Cyber Information Retrieval Through Pragmatics Understanding and Visualization.
IEEE Trans. Dependable Secur. Comput., 2023

Evaluation of Federated Learning in Phishing Email Detection.
Sensors, 2023

Joint User and Data Detection in Grant-Free NOMA With Attention-Based BiLSTM Network.
IEEE Open J. Commun. Soc., 2023

A Survey on Cyber Situation-awareness Systems: Framework, Techniques, and Insights.
ACM Comput. Surv., 2023

Radio Signal Classification by Adversarially Robust Quantum Machine Learning.
CoRR, 2023

Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks.
CoRR, 2023

Quantum-Inspired Machine Learning: a Survey.
CoRR, 2023

Data-Driven Intelligence can Revolutionize Today's Cybersecurity World: A Position Paper.
CoRR, 2023

Classification and Explanation of Distributed Denial-of-Service (DDoS) Attack Detection using Machine Learning and Shapley Additive Explanation (SHAP) Methods.
CoRR, 2023

OptimShare: A Unified Framework for Privacy Preserving Data Sharing - Towards the Practical Utility of Data with Privacy.
CoRR, 2023

Reconstruction-based LSTM-Autoencoder for Anomaly-based DDoS Attack Detection over Multivariate Time-Series Data.
CoRR, 2023

Vertical Federated Learning: Taxonomies, Threats, and Prospects.
CoRR, 2023

Not Seen, Not Heard in the Digital World! Measuring Privacy Practices in Children's Apps.
Proceedings of the ACM Web Conference 2023, 2023

PublicCheck: Public Integrity Verification for Services of Run-time Deep Models.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

Classical to Post-Quantum Secure ABE-IBE Proxy Re-Encryption Scheme.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

On the Use of Power Amplifier Nonlinearity Quotient to Improve Radio Frequency Fingerprint Identification in Time-Varying Channels.
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023

DOITRUST: Dissecting On-chain Compromised Internet Domains via Graph Learning.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

An Additive Instance-Wise Approach to Multi-class Model Interpretation.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

Beyond Key-Based Authentication: A Novel Continuous Authentication Paradigm for IoTs.
Proceedings of the IEEE Globecom Workshops 2023, 2023

Acumen: Analysing the Impact of Organisational Change on Users' Access Entitlements.
Proceedings of the Computer Security - ESORICS 2023, 2023

SplITS: Split Input-to-State Mapping for Effective Firmware Fuzzing.
Proceedings of the Computer Security - ESORICS 2023, 2023

An Adversarial Strategic Game for Machine Learning as a Service using System Features.
Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, 2023

POSTER: Toward Intelligent Cyber Attacks for Moving Target Defense Techniques in Software-Defined Networking.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns.
Proceedings of the 18th Asian Internet Engineering Conference, 2023

Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Fuzzing: A Survey for Roadmap.
ACM Comput. Surv., January, 2022

Vulnerability Detection in SIoT Applications: A Fuzzing Method on their Binaries.
IEEE Trans. Netw. Sci. Eng., 2022

CSI-Fuzz: Full-Speed Edge Tracing Using Coverage Sensitive Instrumentation.
IEEE Trans. Dependable Secur. Comput., 2022

Backdoor Attack on Machine Learning Based Android Malware Detectors.
IEEE Trans. Dependable Secur. Comput., 2022

Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things.
IEEE Trans. Computers, 2022

ANS-based compression and encryption with 128-bit security.
Int. J. Inf. Sec., 2022

Pseudorandom Bit Generation with Asymmetric Numeral Systems.
IACR Cryptol. ePrint Arch., 2022

An Information-Theoretic and Contrastive Learning-based Approach for Identifying Code Statements Causing Software Vulnerability.
CoRR, 2022

A Ransomware Triage Approach using a Task Memory based on Meta-Transfer Learning Framework.
CoRR, 2022

An Additive Instance-Wise Approach to Multi-class Model Interpretation.
CoRR, 2022

LSTM-Autoencoder based Anomaly Detection for Indoor Air Quality Time Series Data.
CoRR, 2022

Transformer-Based Language Models for Software Vulnerability Detection: Performance, Model's Security and Platforms.
CoRR, 2022

Towards Web Phishing Detection Limitations and Mitigation.
CoRR, 2022

Resurrecting Trust in Facial Recognition: Mitigating Backdoor Attacks in Face Recognition to Prevent Potential Privacy Breaches.
CoRR, 2022

Local Differential Privacy for Federated Learning in Industrial Settings.
CoRR, 2022

A few-shot meta-learning based siamese neural network using entropy features for ransomware classification.
Comput. Secur., 2022

A channel perceiving attack and the countermeasure on long-range IoT physical layer key generation.
Comput. Commun., 2022

Physical publicly verifiable randomness from pulsars.
Astron. Comput., 2022

Towards Cooperative Games for Developing Secure Software in Agile SDLC.
Proceedings of the 24th IEEE/ACIS International Conference on Software Engineering, 2022

Cross-language Android permission specification.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

Transferable Graph Backdoor Attack.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

Securing Cyber-Physical Systems: Physics-Enhanced Adversarial Learning for Autonomous Platoons.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022

Vulnerability Detection Using Deep Learning Based Function Classification.
Proceedings of the Network and System Security - 16th International Conference, 2022

Advanced Persistent Threat Detection: A Particle Swarm Optimization Approach.
Proceedings of the 32nd International Telecommunication Networks and Applications Conference, 2022

No-Label User-Level Membership Inference for ASR Model Auditing.
Proceedings of the Computer Security - ESORICS 2022, 2022

Local Differential Privacy for Federated Learning.
Proceedings of the Computer Security - ESORICS 2022, 2022

Demo - MaLFraDA: A Machine Learning Framework with Data Airlock.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Transformer-Based Language Models for Software Vulnerability Detection.
Proceedings of the Annual Computer Security Applications Conference, 2022

SplitFed: When Federated Learning Meets Split Learning.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Compcrypt-Lightweight ANS-Based Compression and Encryption.
IEEE Trans. Inf. Forensics Secur., 2021

Synthesized Corpora to Evaluate Fuzzing for Green Internet of Things Programs.
IEEE Trans. Green Commun. Netw., 2021

Lightweight Cryptographic Protocols for IoT-Constrained Devices: A Survey.
IEEE Internet Things J., 2021

P2DPI: Practical and Privacy-Preserving Deep Packet Inspection.
IACR Cryptol. ePrint Arch., 2021

DAD: A Distributed Anomaly Detection system using ensemble one-class statistical learning in edge networks.
Future Gener. Comput. Syst., 2021

A Game-Theoretic Approach for AI-based Botnet Attack Defence.
CoRR, 2021

NatiDroid: Cross-Language Android Permission Specification.
CoRR, 2021

A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights.
CoRR, 2021

Task-Aware Meta Learning-based Siamese Neural Network for Classifying Obfuscated Malware.
CoRR, 2021

Splitfed learning without client-side synchronization: Analyzing client-side split network portion size to overall performance.
CoRR, 2021

Characterizing Malicious URL Campaigns.
CoRR, 2021

A Markov Game Model for AI-based Cyber Security Attack Mitigation.
CoRR, 2021

Understanding and Achieving Efficient Robustness with Adversarial Contrastive Learning.
CoRR, 2021

PPaaS: Privacy Preservation as a Service.
Comput. Commun., 2021

Privacy preserving distributed machine learning with federated learning.
Comput. Commun., 2021

Precision health data: Requirements, challenges and existing techniques for data security and privacy.
Comput. Biol. Medicine, 2021

AE-MLP: A Hybrid Deep Learning Approach for DDoS Detection and Classification.
IEEE Access, 2021

A Secure Access and Accountability Framework for Provisioning Services in Named Data Networks.
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021

FedDICE: A Ransomware Spread Detection in a Distributed Integrated Clinical Environment Using Federated Learning and SDN Based Mitigation.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021

Strategic Mitigation Against Wireless Attacks on Autonomous Platoons.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track, 2021

Evaluating the Security of Machine Learning Based IoT Device Identification Systems Against Adversarial Examples.
Proceedings of the Service-Oriented Computing - 19th International Conference, 2021

An Empirical Assessment of Global COVID-19 Contact Tracing Applications.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2021

My Security: An interactive search engine for cybersecurity.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Peeler: Profiling Kernel-Level Events to Detect Ransomware.
Proceedings of the Computer Security - ESORICS 2021, 2021

A Communication Security Game on Switched Systems for Autonomous Vehicle Platoons.
Proceedings of the 2021 60th IEEE Conference on Decision and Control (CDC), 2021

2020
Continuous authentication for VANET.
Veh. Commun., 2020

A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems.
IEEE Trans. Ind. Informatics, 2020

An Efficient Authentication Scheme for Intra-Vehicular Controller Area Network.
IEEE Trans. Inf. Forensics Secur., 2020

Efficient privacy preservation of big data for accurate data mining.
Inf. Sci., 2020

Local Differential Privacy for Deep Learning.
IEEE Internet Things J., 2020

Advancements of federated learning towards privacy preservation: from federated learning to split learning.
CoRR, 2020

DeFuzz: Deep Learning Guided Directed Fuzzing.
CoRR, 2020

FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning.
CoRR, 2020

Vetting Security and Privacy of Global COVID-19 Contact Tracing Applications.
CoRR, 2020

SplitFed: When Federated Learning Meets Split Learning.
CoRR, 2020

Privacy Preserving Face Recognition Utilizing Differential Privacy.
Comput. Secur., 2020

Stochastic Modeling of IoT Botnet Spread: A Short Survey on Mobile Malware Spread Modeling.
IEEE Access, 2020

End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020

Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence.
Proceedings of the Network and System Security - 14th International Conference, 2020

Using Process Mining to Identify File System Metrics Impacted by Ransomware Execution.
Proceedings of the Mobile, Secure, and Programmable Networking, 2020

An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation.
Proceedings of the Computer Security - ESORICS 2020, 2020

Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training?
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog.
IEEE Trans. Inf. Forensics Secur., 2019

Local Differential Privacy for Deep Learning.
CoRR, 2019

An efficient and scalable privacy preserving algorithm for big data and data streams.
Comput. Secur., 2019

A Feature-Oriented Corpus for Understanding, Evaluating and Improving Fuzz Testing.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Efficient data perturbation for privacy preserving and accurate data stream mining.
Pervasive Mob. Comput., 2018

2017
Nash Equilibrium-Based Semantic Cache in Mobile Sensor Grid Database Systems.
IEEE Trans. Syst. Man Cybern. Syst., 2017

Efficient Route Update and Maintenance for Reliable Routing in Large-Scale Sensor Networks.
IEEE Trans. Ind. Informatics, 2017

A Study on Formal Methods to Generalize Heterogeneous Mobile Malware Propagation and Their Impacts.
IEEE Access, 2017

Reed Solomon Codes for the Reconciliation of Wireless PHY Layer Based Secret Keys.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

2016
A Deadline-Constrained 802.11 MAC Protocol With QoS Differentiation for Soft Real-Time Control.
IEEE Trans. Ind. Informatics, 2016

Securing DNP3 Broadcast Communications in SCADA Systems.
IEEE Trans. Ind. Informatics, 2016

Formal modelling and analysis of DNP3 secure authentication.
J. Netw. Comput. Appl., 2016

A Survey and Analysis of the GNSS Spoofing Threat and Countermeasures.
ACM Comput. Surv., 2016

Revocation and update of trust in autonomous delay tolerant networks.
Comput. Secur., 2016

2015
Understanding data flow and security requirements in wireless Body Area Networks for healthcare.
Proceedings of the 17th International Conference on E-health Networking, 2015

2014
Security analysis of the non-aggressive challenge response of the DNP3 protocol using a CPN model.
Proceedings of the IEEE International Conference on Communications, 2014

2013
An efficient proactive route maintenance process for reliable data transmissions in sensor networks.
Proceedings of the 7th International Conference on Signal Processing and Communication Systems, 2013

Complexity of Increasing the Secure Connectivity in Wireless Ad Hoc Networks.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
A Framework for Automated Identification of Attack Scenarios on IT Infrastructures.
Prax. Inf.verarb. Kommun., 2012

A trusted ecosystem for Android applications based on context-aware access control.
Proceedings of the 7th International Conference on Malicious and Unwanted Software, 2012

2011
User Facilitated Congestion and Attack Mitigation.
Proceedings of the Mobile Networks and Management - Third International ICST Conference, 2011

Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications.
Proceedings of the 6th International Conference on Malicious and Unwanted Software, 2011

Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics.
Proceedings of the 2011 IEEE International Joint Conference on Biometrics, 2011

Context-aware device self-configuration using self-organizing maps.
Proceedings of the 2011 workshop on Organic computing, 2011

From simulation to emulation - an integrated approach for network security evaluation.
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011

Framework for evaluating collaborative intrusion detection systems.
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011

Behavioral biometrics for persistent single sign-on.
Proceedings of the DIM'11, Proceedings of the 2013 ACM Workshop on Digital Identity Management, Chicago, IL, USA, 2011

Multi-device Key Management Using Visual Side Channels in Pervasive Computing Environments.
Proceedings of the 2011 International Conference on Broadband, 2011

2010
Application-level Simulation for Network Security.
Simul., 2010

Collaborative Intrusion Detection Framework: Characteristics, Adversarial Opportunities and Countermeasures.
Proceedings of the 2010 Workshop on Collaborative Methods for Security and Privacy, 2010

An Android Application Sandbox system for suspicious software detection.
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010

A generic framework and runtime environment for development and evaluation of behavioral biometrics solutions.
Proceedings of the 10th International Conference on Intelligent Systems Design and Applications, 2010

2009
Monitoring Smartphones for Anomaly Detection.
Mob. Networks Appl., 2009

Developing and Benchmarking Native Linux Applications on Android.
Proceedings of the Mobile Wireless Middleware, 2009

Smartphone malware evolution revisited: Android next target?
Proceedings of the 4th International Conference on Malicious and Unwanted Software, 2009

Detecting Symbian OS malware through static function call analysis.
Proceedings of the 4th International Conference on Malicious and Unwanted Software, 2009

Identity theft, computers and behavioral biometrics.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

Static Analysis of Executables for Collaborative Malware Detection on Android.
Proceedings of IEEE International Conference on Communications, 2009

Design and modeling of collaboration architecture for security.
Proceedings of the 2009 International Symposium on Collaborative Technologies and Systems, 2009

2008
A lightweight biometric signature scheme for user authentication over networks.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

2007
Design and analysis of key management schemes for distributed wireless sensor networks.
PhD thesis, 2007

Combinatorial design of key distribution mechanisms for wireless sensor networks.
IEEE/ACM Trans. Netw., 2007

Decentralized Detector Generation in Cooperative Intrusion Detection Systems.
Proceedings of the Stabilization, 2007

Modeling and detection of complex attacks.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

2006
Collective Sampling and Analysis of High Order Tensors for Chatroom Communications.
Proceedings of the Intelligence and Security Informatics, 2006

Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2006

2005
Modeling and Multiway Analysis of Chatroom Tensors.
Proceedings of the Intelligence and Security Informatics, 2005

Detecting conversing groups of chatters: a model, algorithms, and tests.
Proceedings of the AC 2005, 2005

2004
A Tool for Internet Chatroom Surveillance.
Proceedings of the Intelligence and Security Informatics, 2004


  Loading...