Alptekin Küpçü

Orcid: 0000-0003-2099-2206

Affiliations:
  • Koç University, Istanbul, Turkey


According to our database1, Alptekin Küpçü authored at least 81 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Byzantines Can Also Learn From History: Fall of Centered Clipping in Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024

CURE: Privacy-Preserving Split Learning Done Right.
CoRR, 2024

Aggressive or Imperceptible, or Both: Network Pruning Assisted Hybrid Byzantines in Federated Learning.
CoRR, 2024

Extractive Summarization Data Sets Generated with Measurable Analyses.
Proceedings of the 32nd Signal Processing and Communications Applications Conference, 2024

Gamu Blue: A Practical Tool for Game Theory Security Equilibria.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024

Fault Tolerant and Malicious Secure Federated Learning.
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024

SplitOut: Out-of-the-Box Training-Hijacking Detection in Split Learning via Outlier Detection.
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024

2023
FORTIS: Selfish Mining Mitigation by (FOR)geable (TI)me(S)tamps.
Distributed Ledger Technol. Res. Pract., December, 2023

An ECC processor for IoT using Edwards curves and DFT modular multiplication.
Clust. Comput., April, 2023

Enabling Two-Party Secure Computation on Set Intersection.
IACR Cryptol. ePrint Arch., 2023

Defense Mechanisms Against Training-Hijacking Attacks in Split Learning.
CoRR, 2023

2022
BlockSim-Net: a network-based blockchain simulator.
Turkish J. Electr. Eng. Comput. Sci., February, 2022

Tri-op redactable blockchains with block modification, removal, and insertion.
Turkish J. Electr. Eng. Comput. Sci., February, 2022

Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation.
ACM Trans. Priv. Secur., 2022

A Post-Quantum Four-Party Outsourced Authentication.
IACR Cryptol. ePrint Arch., 2022

2021
LightChain: Scalable DHT-Based Blockchain.
IEEE Trans. Parallel Distributed Syst., 2021

Interlaced: Fully decentralized churn stabilization for Skip Graph-based DHTs.
J. Parallel Distributed Comput., 2021

Smart Contracts for Incentivized Outsourcing of Computation.
IACR Cryptol. ePrint Arch., 2021

SplitGuard: Detecting and Mitigating Training-Hijacking Attacks in Split Learning.
IACR Cryptol. ePrint Arch., 2021

UnSplit: Data-Oblivious Model Inversion, Model Stealing, and Label Inference Attacks Against Split Learning.
IACR Cryptol. ePrint Arch., 2021

m-Stability: Threshold Security Meets Transferable Utility.
IACR Cryptol. ePrint Arch., 2021

Generic Dynamic Data Outsourcing Framework for Integrity Verification.
ACM Comput. Surv., 2021

AggFT: Low-Cost Fault-Tolerant Smart Meter Aggregation with Proven Termination and Privacy.
CoRR, 2021

Coin-Based Multi-party Fair Exchange.
Proceedings of the Applied Cryptography and Network Security, 2021

2020
Decentralized Utility- and Locality-Aware Replication for Heterogeneous DHT-Based P2P Cloud Storage Systems.
IEEE Trans. Parallel Distributed Syst., 2020

Privado: Privacy-preserving Group-based Advertising Using Multiple Independent Social Network Providers.
ACM Trans. Priv. Secur., 2020

Anonymous, Attribute Based, Decentralized, Secure, and Fair e-Donation.
Proc. Priv. Enhancing Technol., 2020

Linear Complexity Private Set Intersection for Secure Two-Party Protocols.
IACR Cryptol. ePrint Arch., 2020

Moderated Redactable Blockchains: A Definitional Framework with an Efficient Construct.
IACR Cryptol. ePrint Arch., 2020

FORTIS: FORgeable TImeStamps Thwart Selfish Mining.
IACR Cryptol. ePrint Arch., 2020

BlockSim-Net: A Network Based Blockchain Simulator.
CoRR, 2020

Improving PKI, BGP, and DNS Using Blockchain: A Systematic Review.
CoRR, 2020

Demo: Skip Graph Middleware Implementation.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020

A containerized proof-of-concept implementation of LightChain system.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020

SkipSim: Scalable Skip Graph Simulator.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020

2019
Understanding Game-Based Privacy Proofs for Energy Consumption Aggregation Protocols.
IEEE Trans. Smart Grid, 2019

LightChain: A DHT-based Blockchain for Resource Constrained Environments.
IACR Cryptol. ePrint Arch., 2019

Integrita: Protecting View-Consistency in Online Social Network with Federated Servers.
IACR Cryptol. ePrint Arch., 2019

Anonyma: Anonymous Invitation-Only Registration in Malicious Adversarial Model.
IACR Cryptol. ePrint Arch., 2019

Versatile ABS: Usage Limited, Revocable, Threshold Traceable, Authority Hiding, Decentralized Attribute Based Signatures.
IACR Cryptol. ePrint Arch., 2019

Verifiable dynamic searchable encryption.
Turkish J. Electr. Eng. Comput. Sci., 2019

User Perceptions of Security and Usability of Mobile-Based Single Password Authentication and Two-Factor Authentication.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2019

2018
Efficient Dynamic Searchable Encryption with Forward Privacy.
Proc. Priv. Enhancing Technol., 2018

Verifiable database outsourcing supporting join.
J. Netw. Comput. Appl., 2018

User Study on Single Password Authentication.
IACR Cryptol. ePrint Arch., 2018

Threshold Single Password Authentication.
IACR Cryptol. ePrint Arch., 2018

Distributed Single Password Protocol Framework.
IACR Cryptol. ePrint Arch., 2018

PPAD: Privacy Preserving Group-Based ADvertising in Online Social Networks.
IACR Cryptol. ePrint Arch., 2018

Decentralized and locality aware replication method for DHT-based P2P storage systems.
Future Gener. Comput. Syst., 2018

DogFish: Decentralized Optimistic Game-theoretic FIle SHaring.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
Incentivized Outsourced Computation Resistant to Malicious Contractors.
IEEE Trans. Dependable Secur. Comput., 2017

Dynamic Proofs of Retrievability Via Oblivious RAM.
J. Cryptol., 2017

Research issues for privacy and security of electronic health services.
Future Gener. Comput. Syst., 2017

Are You Really My Friend? Efficient and Secure Friend-Matching in Mobile Social Networks.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017

Inonymous: Anonymous Invitation-Based System.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

2016
FlexDPDP: Flexlist-Based Optimized Dynamic Provable Data Possession.
ACM Trans. Storage, 2016

A Generic Dynamic Provable Data Possession Framework.
IACR Cryptol. ePrint Arch., 2016

Awake: Decentralized and Availability Aware Replication for P2P Cloud Storage.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

LARAS: Locality aware replication algorithm for the Skip Graph.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

2015
Dynamic Provable Data Possession.
ACM Trans. Inf. Syst. Secur., 2015

Fast Optimistically Fair Cut-and-Choose 2PC.
IACR Cryptol. ePrint Arch., 2015

Generic Efficient Dynamic Proofs of Retrievability.
IACR Cryptol. ePrint Arch., 2015

Efficient Key Authentication Service for Secure End-to-end Communications.
IACR Cryptol. ePrint Arch., 2015

Database Outsourcing with Hierarchical Authenticated Data Structures.
IACR Cryptol. ePrint Arch., 2015

Official Arbitration with Secure Cloud Storage Application.
Comput. J., 2015

Security and Privacy of Distributed Online Social Networks.
Proceedings of the IEEE 35th International Conference on Distributed Computing Systems Workshops, 2015

Locality Aware Skip Graph.
Proceedings of the IEEE 35th International Conference on Distributed Computing Systems Workshops, 2015

2014
Efficiently Making Secure Two-Party Computation Fair.
IACR Cryptol. ePrint Arch., 2014

Analysis and Optimization on FlexDPDP: A Practical Solution for Dynamic Provable Data Possession.
Proceedings of the Intelligent Cloud Computing - First International Conference, 2014

2013
Distributing trusted third parties.
SIGACT News, 2013

Transparent, Distributed, and Replicated Dynamic Provable Data Possession.
IACR Cryptol. ePrint Arch., 2013

Incentivizing Outsourced Computation.
IACR Cryptol. ePrint Arch., 2013

Single password authentication.
Comput. Networks, 2013

Energy Efficiency in Secure and Dynamic Cloud Storage.
Proceedings of the Energy Efficiency in Large Scale Distributed Systems, 2013

2012
ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash.
IACR Cryptol. ePrint Arch., 2012

Official Arbitration and its Application to Secure Cloud Storage.
IACR Cryptol. ePrint Arch., 2012

Usable optimistic fair exchange.
Comput. Networks, 2012

2010
Efficient Cryptography for the Next Generation Secure Cloud.
PhD thesis, 2010

2009
Optimistic Fair Exchange with Multiple Arbiters.
IACR Cryptol. ePrint Arch., 2009

Brief announcement: impossibility results for optimistic fair exchange with multiple autonomous arbiters.
Proceedings of the 28th Annual ACM Symposium on Principles of Distributed Computing, 2009

2007
Making p2p accountable without losing privacy.
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007


  Loading...