Bülent Yener

Orcid: 0000-0003-3989-6097

According to our database1, Bülent Yener authored at least 119 papers between 1992 and 2024.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2015, "For contributions to network design optimization and security".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Exploiting the Data Gap: Utilizing Non-ignorable Missingness to Manipulate Model Learning.
CoRR, 2024

C2P-GCN: Cell-to-Patch Graph Convolutional Network for Colorectal Cancer Grading.
CoRR, 2024

Prediction of Tuberculosis From Lung Tissue Images of Diversity Outbred Mice Using Jump Knowledge Based Cell Graph Neural Network.
IEEE Access, 2024

2023
Improving Neural Ranking Models with Traditional IR Methods.
CoRR, 2023

A Cross-Domain Evaluation of Approaches for Causal Knowledge Extraction.
CoRR, 2023

Word Sense Induction with Knowledge Distillation from BERT.
CoRR, 2023

Deception by Omission: Using Adversarial Missingness to Poison Causal Structure Learning.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

2022
Missing Value Knockoffs.
CoRR, 2022

An Adversarial Perspective on Accuracy, Robustness, Fairness, and Privacy: Multilateral-Tradeoffs in Trustworthy ML.
IEEE Access, 2022

SPOCK @ Causal News Corpus 2022: Cause-Effect-Signal Span Detection Using Span-Based and Sequence Tagging Models.
Proceedings of the 5th Workshop on Challenges and Applications of Automated Extraction of Socio-political Events from Text, 2022

Anti-Malware Sandbox Games.
Proceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems, 2022

2021
Output Randomization: A Novel Defense for both White-box and Black-box Adversarial Models.
CoRR, 2021

2020
Patient-Specific Seizure Prediction Using Single Seizure Electroencephalography Recording.
CoRR, 2020

A survey on practical adversarial examples for malware classifiers.
CoRR, 2020

Image-driven discriminative and generative machine learning algorithms for establishing microstructure-processing relationships.
CoRR, 2020

Towards Obfuscated Malware Detection for Low Powered IoT Devices.
Proceedings of the 19th IEEE International Conference on Machine Learning and Applications, 2020

Adaptive Sketching for Fast and Convergent Canonical Polyadic Decomposition.
Proceedings of the 37th International Conference on Machine Learning, 2020

2019
Cybersecurity in the Era of Data Science: Examining New Adversarial Models.
IEEE Secur. Priv., 2019

An image-driven machine learning approach to kinetic modeling of a discontinuous precipitation reaction.
CoRR, 2019

Deep density ratio estimation for change point detection.
CoRR, 2019

Thwarting finite difference adversarial attacks with output randomization.
CoRR, 2019

Short Paper: Creating Adversarial Malware Examples using Code Insertion.
CoRR, 2019

Quantifying error contributions of computational steps, algorithms and hyperparameter choices in image classification pipelines.
CoRR, 2019

Quantifying contribution and propagation of error from computational steps, algorithms and hyperparameter choices in image classification pipelines.
CoRR, 2019

Generation & Evaluation of Adversarial Examples for Malware Obfuscation.
Proceedings of the 18th IEEE International Conference On Machine Learning And Applications, 2019

2018
Focal Onset Seizure Prediction Using Convolutional Networks.
IEEE Trans. Biomed. Eng., 2018

Learning filter widths of spectral decompositions with wavelets.
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018

Accelerating a Distributed CPD Algorithm for Large Dense, Skewed Tensors.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Environmental Authentication in Malware.
IACR Cryptol. ePrint Arch., 2017

Cell-graphs: image-driven modeling of structure-function relationship.
Commun. ACM, 2017

A computational study on convolutional feature combination strategies for grade classification in colon cancer using fluorescence microscopy data.
Proceedings of the Medical Imaging 2017: Digital Pathology, 2017

2016
On the Security of Key Extraction From Measuring Physical Quantities.
IEEE Trans. Inf. Forensics Secur., 2016

Prediction of Growth Factor-Dependent Cleft Formation During Branching Morphogenesis Using A Dynamic Graph-Based Growth Model.
IEEE ACM Trans. Comput. Biol. Bioinform., 2016

From Image to Translation: Processing the Endangered Nyushu Script.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2016

Antikernel: A Decentralized Secure Hardware-Software Operating System Architecture.
IACR Cryptol. ePrint Arch., 2016

AVLeak: Fingerprinting Antivirus Emulators through Black-Box Testing.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016

A Formal Framework for Environmentally Sensitive Malware.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

Model coupling for predicting a developmental patterning process.
Proceedings of the Medical Imaging 2016: Digital Pathology, San Diego, California, United States, 27 February, 2016

A machine learning approach to quantifying noise in medical images.
Proceedings of the Medical Imaging 2016: Digital Pathology, San Diego, California, United States, 27 February, 2016

Adapting to data sparsity for efficient parallel PARAFAC tensor decomposition in Hadoop.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

2015
Seizure Prediction by Graph Mining, Transfer Learning, and Transformation Learning.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2015

Context-aware Entity Morph Decoding.
Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing of the Asian Federation of Natural Language Processing, 2015

2014
Graph-theoretic analysis of epileptic seizures on scalp EEG recordings.
Proceedings of the 5th ACM Conference on Bioinformatics, 2014

Be Appropriate and Funny: Automatic Entity Morph Encoding.
Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics, 2014

2013
Cell-Based Multi-Parametric Model of Cleft Progression during Submandibular Salivary Gland Branching Morphogenesis.
PLoS Comput. Biol., 2013

Global Changes in the Connectome in Autism Spectrum Disorders.
Proceedings of the Computational Diffusion MRI and Brain Connectivity, 2013

Biologically-driven cell-graphs for breast tissue grading.
Proceedings of the 10th IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2013

2012
Effective graph classification based on topological and label attributes.
Stat. Anal. Data Min., 2012

Follicular lymphoma grading using cell-graphs and multi-scale feature analysis.
Proceedings of the Medical Imaging 2012: Computer-Aided Diagnosis, 2012

A novel dynamic graph-based computational model for predicting salivary gland branching morphogenesis.
Proceedings of the 2012 IEEE International Conference on Bioinformatics and Biomedicine, 2012

2011
Key Generation Using Physical Properties of Wireless Communication.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Quantitative metric profiles capture three-dimensional temporospatial architecture to discriminate cellular functional states.
BMC Medical Imaging, 2011

Preserving proximity relations and minimizing edge-crossings in high dimensional graph visualizations.
Proceedings of the IEEE Symposium on Large Data Analysis and Visualization, 2011

On passive inference attacks against physical-layer key extraction?
Proceedings of the Fourth European Workshop on System Security, 2011

Data-Driven Insights into Deletions of Mycobacterium tuberculosis Complex Chromosomal DR Region Using Spoligoforests.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2011

Visualization of tuberculosis patient and Mycobacterium tuberculosis complex genotype data via host-pathogen maps.
Proceedings of the 2011 IEEE International Conference on Bioinformatics and Biomedicine Workshops, 2011

Classification of breast cancer grades through quantitative characterization of ductal structure morphology in three-dimensional cultures.
Proceedings of the ACM International Conference on Bioinformatics, 2011

2010
ECM-aware cell-graph mining for bone tissue modeling and classification.
Data Min. Knowl. Discov., 2010

Cell-graph modeling of salivary gland morphology.
Proceedings of the 2010 IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2010

Examining the sublineage structure of Mycobacterium tuberculosis complex strains with multiple-biomarker tensors.
Proceedings of the 2010 IEEE International Conference on Bioinformatics and Biomedicine, 2010

2009
Minimum delay routing for wireless networks with STDMA.
Wirel. Networks, 2009

Unsupervised Multiway Data Analysis: A Literature Survey.
IEEE Trans. Knowl. Data Eng., 2009

On anonymity in an electronic society: A survey of anonymous communication systems.
ACM Comput. Surv., 2009

Privacy-Preserving Information Markets for Computing Statistical Data.
Proceedings of the Financial Cryptography and Data Security, 2009

2008
Contention-free MAC protocols for asynchronous wireless sensor networks.
Distributed Comput., 2008

Multiway modeling and analysis in stem cell systems biology.
BMC Syst. Biol., 2008

Spatially Limited Contention for Multi-Hop Wireless Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Analysis of Load-Balanced Switch with Finite Buffers.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
Joint problem of power optimal connectivity and coverage in wireless sensor networks.
Wirel. Networks, 2007

Combinatorial design of key distribution mechanisms for wireless sensor networks.
IEEE/ACM Trans. Netw., 2007

Decentralized Detector Generation in Cooperative Intrusion Detection Systems.
Proceedings of the Stabilization, 2007

Modeling and detection of complex attacks.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Multiway analysis of epilepsy tensors.
Proceedings of the Proceedings 15th International Conference on Intelligent Systems for Molecular Biology (ISMB) & 6th European Conference on Computational Biology (ECCB), 2007

A Combinatorial Approach to Measuring Anonymity.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Robust key generation from signal envelopes in wireless networks.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Collective Sampling and Analysis of High Order Tensors for Chatroom Communications.
Proceedings of the Intelligence and Security Informatics, 2006

Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2006

A Secure Programming Paradigm for Network Virtualization.
Proceedings of the 3rd International Conference on Broadband Communications, 2006

2005
Learning the Topological Properties of Brain Tumors.
IEEE ACM Trans. Comput. Biol. Bioinform., 2005

Graph Theoretic and Spectral Analysis of Enron Email Data.
Comput. Math. Organ. Theory, 2005

Modeling and Multiway Analysis of Chatroom Tensors.
Proceedings of the Intelligence and Security Informatics, 2005

Augmented cell-graphs for automated cancer diagnosis.
Proceedings of the ECCB/JBI'05 Proceedings, Fourth European Conference on Computational Biology/Sixth Meeting of the Spanish Bioinformatics Network (Jornadas de BioInformática), Palacio de Congresos, Madrid, Spain, September 28, 2005

2004
Time synchronization in sensor networks: a survey.
IEEE Netw., 2004

Foreword - ACM MONET Special Issue on Discrete Algorithms and Methods for Mobile Computing and Communications.
Mob. Networks Appl., 2004

Computing the unmeasured: an algebraic approach to Internet mapping.
IEEE J. Sel. Areas Commun., 2004

Contention-Free MAC Protocols for Wireless Sensor Networks.
Proceedings of the Distributed Computing, 18th International Conference, 2004

The cell graphs of cancer.
Proceedings of the Proceedings Twelfth International Conference on Intelligent Systems for Molecular Biology/Third European Conference on Computational Biology 2004, 2004

Studying E-Mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information.
Proceedings of the Intelligence and Security Informatics, 2004

A Tool for Internet Chatroom Surveillance.
Proceedings of the Intelligence and Security Informatics, 2004

2003
Combinatorial design of multi-ring networks with combined routing and flow control.
Comput. Networks, 2003

2002
Algorithms for provisioning virtual private networks in the hose model.
IEEE/ACM Trans. Netw., 2002

Restoration Algorithms for Virtual Private Networks in the Hose Model.
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002

On-line Admission Control and Packet Scheduling with Interleaving.
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002

2001
A Virtual Topology Based Routing Protocol for Multihop Dynamic Wireless Networks.
Wirel. Networks, 2001

Smart box architecture: a hybrid solution for IP QoS provisioning.
Comput. Networks, 2001

Optimal information dispersal for probabilistic latency targets.
Comput. Networks, 2001

Provisioning a virtual private network: a network design problem for multicommodity flow.
Proceedings of the Proceedings on 33rd Annual ACM Symposium on Theory of Computing, 2001

2000
The multicast packing problem.
IEEE/ACM Trans. Netw., 2000

Adaptive group multicast with time-driven priority.
IEEE/ACM Trans. Netw., 2000

Light Weight Security for Parallel Access to Multiple Mirror Sites.
Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 2000

Smartbox Architecture.
Proceedings of the USENIX Special Workshop on Intelligence at the Network Edge, 2000

1999
Networking security [Guest Editorial].
IEEE Netw., 1999

Convergence routing on disjoint spanning trees.
Comput. Networks, 1999

Performance Trade-offs in Reliable Group Multicast Protocols.
Proceedings of the Proceedings IEEE INFOCOM '99, 1999

1998
Optimal Packing of Group Multi-Casting.
Proceedings of the Proceedings IEEE INFOCOM '98, The Conference on Computer Communications, Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies, Gateway to the 21st Century, San Francisco, CA, USA, March 29, 1998

A Novel Performance Analysis for the Copy Network in a Multicast ATM Switch.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998

1997
Combinatorial design of congestion-free networks.
IEEE/ACM Trans. Netw., 1997

Iterative approach to optimizing convergence routing priorities.
IEEE/ACM Trans. Netw., 1997

Concurrent Asynchronous Broadcast on the MetaNet.
IEEE Trans. Computers, 1997

Reliable Concurrent Multicast from Bursty Sources.
IEEE J. Sel. Areas Commun., 1997

Fault-Tolerant Convergence Routing.
J. Parallel Distributed Comput., 1997

Adaptive Real-Time Group Multicast.
Proceedings of the Proceedings IEEE INFOCOM '97, 1997

A New Hierarchical Routing Protocol for Dynamic Multihop Wireless Networks.
Proceedings of the Proceedings IEEE INFOCOM '97, 1997

1996
Virtual embeddings on regular topology networks.
Proceedings of the Eighth IEEE Symposium on Parallel and Distributed Processing, 1996

1995
Flow Trees: A Lower Bound Computation Tool with Applications to Rearrangeable Multihop Lightwave Network Optimization.
J. High Speed Networks, 1995

Topological Design of Loss-Free Switch-Based LANs.
Proceedings of the Proceedings IEEE INFOCOM '95, 1995

1994
A Study of Upper and Lower Bounds for Minimum Congestion Routing in Lightwave Networks.
Proceedings of the Proceedings IEEE INFOCOM '94, 1994

1993
Configuration and performance issues in the MetaNet design.
Proceedings of the 18th Conference on Local Computer Networks, 1993

1992
Simultaneous Strong Separations of Probabilistic and Unambiguous Complexity Classes.
Math. Syst. Theory, 1992


  Loading...