Seyit Ahmet Çamtepe
Orcid: 0000-0001-6353-8359
According to our database1,
Seyit Ahmet Çamtepe
authored at least 177 papers
between 2004 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
On csauthors.net:
Bibliography
2025
Genetic programming for enhanced detection of Advanced Persistent Threats through feature construction.
Comput. Secur., 2025
2024
Access-Based Lightweight Physical-Layer Authentication for the Internet of Things Devices.
IEEE Internet Things J., April, 2024
IEEE Trans. Multim., 2024
IEEE Trans. Inf. Forensics Secur., 2024
J. Netw. Comput. Appl., 2024
Shared file protection against unauthorised encryption using a Buffer-Based Signature Verification Method.
J. Inf. Secur. Appl., 2024
On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World.
CoRR, 2024
MTDSense: AI-Based Fingerprinting of Moving Target Defense Techniques in Software-Defined Networking.
CoRR, 2024
CoRR, 2024
Leakage-Resilient and Carbon-Neutral Aggregation Featuring the Federated AI-enabled Critical Infrastructure.
CoRR, 2024
Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems.
Comput. Secur., 2024
Comput. J., 2024
Appl. Soft Comput., 2024
A Lightweight Detection of Sequential Patterns in File System Events During Ransomware Attacks.
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
File System Shield (FSS): A Pass-Through Strategy Against Unwanted Encryption in Network File Systems.
Proceedings of the Advances in Information and Computer Security, 2024
Optimizing Cyber Defense in Dynamic Active Directories Through Reinforcement Learning.
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
IPRemover: A Generative Model Inversion Attack against Deep Neural Network Fingerprinting and Watermarking.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Dataset, August, 2023
Dataset, August, 2023
Task-Aware Meta Learning-Based Siamese Neural Network for Classifying Control Flow Obfuscated Malware.
Future Internet, June, 2023
IEEE Trans. Dependable Secur. Comput., 2023
Joint User and Data Detection in Grant-Free NOMA With Attention-Based BiLSTM Network.
IEEE Open J. Commun. Soc., 2023
ACM Comput. Surv., 2023
CoRR, 2023
Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks.
CoRR, 2023
Data-Driven Intelligence can Revolutionize Today's Cybersecurity World: A Position Paper.
CoRR, 2023
Classification and Explanation of Distributed Denial-of-Service (DDoS) Attack Detection using Machine Learning and Shapley Additive Explanation (SHAP) Methods.
CoRR, 2023
OptimShare: A Unified Framework for Privacy Preserving Data Sharing - Towards the Practical Utility of Data with Privacy.
CoRR, 2023
Reconstruction-based LSTM-Autoencoder for Anomaly-based DDoS Attack Detection over Multivariate Time-Series Data.
CoRR, 2023
Not Seen, Not Heard in the Digital World! Measuring Privacy Practices in Children's Apps.
Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
Proceedings of the 20th International Conference on Security and Cryptography, 2023
On the Use of Power Amplifier Nonlinearity Quotient to Improve Radio Frequency Fingerprint Identification in Time-Varying Channels.
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the Eleventh International Conference on Learning Representations, 2023
Beyond Key-Based Authentication: A Novel Continuous Authentication Paradigm for IoTs.
Proceedings of the IEEE Globecom Workshops 2023, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
An Adversarial Strategic Game for Machine Learning as a Service using System Features.
Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, 2023
POSTER: Toward Intelligent Cyber Attacks for Moving Target Defense Techniques in Software-Defined Networking.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
Proceedings of the 18th Asian Internet Engineering Conference, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
IEEE Trans. Netw. Sci. Eng., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things.
IEEE Trans. Computers, 2022
IACR Cryptol. ePrint Arch., 2022
An Information-Theoretic and Contrastive Learning-based Approach for Identifying Code Statements Causing Software Vulnerability.
CoRR, 2022
A Ransomware Triage Approach using a Task Memory based on Meta-Transfer Learning Framework.
CoRR, 2022
CoRR, 2022
Transformer-Based Language Models for Software Vulnerability Detection: Performance, Model's Security and Platforms.
CoRR, 2022
Resurrecting Trust in Facial Recognition: Mitigating Backdoor Attacks in Face Recognition to Prevent Potential Privacy Breaches.
CoRR, 2022
A few-shot meta-learning based siamese neural network using entropy features for ransomware classification.
Comput. Secur., 2022
A channel perceiving attack and the countermeasure on long-range IoT physical layer key generation.
Comput. Commun., 2022
Proceedings of the 24th IEEE/ACIS International Conference on Software Engineering, 2022
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022
Proceedings of the 25th International Symposium on Research in Attacks, 2022
Securing Cyber-Physical Systems: Physics-Enhanced Adversarial Learning for Autonomous Platoons.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022
Proceedings of the Network and System Security - 16th International Conference, 2022
Proceedings of the 32nd International Telecommunication Networks and Applications Conference, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Green Commun. Netw., 2021
IEEE Internet Things J., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
DAD: A Distributed Anomaly Detection system using ensemble one-class statistical learning in edge networks.
Future Gener. Comput. Syst., 2021
CoRR, 2021
Task-Aware Meta Learning-based Siamese Neural Network for Classifying Obfuscated Malware.
CoRR, 2021
Splitfed learning without client-side synchronization: Analyzing client-side split network portion size to overall performance.
CoRR, 2021
Understanding and Achieving Efficient Robustness with Adversarial Contrastive Learning.
CoRR, 2021
Comput. Commun., 2021
Precision health data: Requirements, challenges and existing techniques for data security and privacy.
Comput. Biol. Medicine, 2021
IEEE Access, 2021
A Secure Access and Accountability Framework for Provisioning Services in Named Data Networks.
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021
FedDICE: A Ransomware Spread Detection in a Distributed Integrated Clinical Environment Using Federated Learning and SDN Based Mitigation.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track, 2021
Evaluating the Security of Machine Learning Based IoT Device Identification Systems Against Adversarial Examples.
Proceedings of the Service-Oriented Computing - 19th International Conference, 2021
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the 2021 60th IEEE Conference on Decision and Control (CDC), 2021
2020
A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems.
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Inf. Forensics Secur., 2020
Advancements of federated learning towards privacy preservation: from federated learning to split learning.
CoRR, 2020
FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning.
CoRR, 2020
CoRR, 2020
Comput. Secur., 2020
Stochastic Modeling of IoT Botnet Spread: A Short Survey on Mobile Malware Spread Modeling.
IEEE Access, 2020
End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020
Proceedings of the Network and System Security - 14th International Conference, 2020
Using Process Mining to Identify File System Metrics Impacted by Ransomware Execution.
Proceedings of the Mobile, Secure, and Programmable Networking, 2020
An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation.
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog.
IEEE Trans. Inf. Forensics Secur., 2019
An efficient and scalable privacy preserving algorithm for big data and data streams.
Comput. Secur., 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
Pervasive Mob. Comput., 2018
2017
IEEE Trans. Syst. Man Cybern. Syst., 2017
Efficient Route Update and Maintenance for Reliable Routing in Large-Scale Sensor Networks.
IEEE Trans. Ind. Informatics, 2017
A Study on Formal Methods to Generalize Heterogeneous Mobile Malware Propagation and Their Impacts.
IEEE Access, 2017
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
2016
A Deadline-Constrained 802.11 MAC Protocol With QoS Differentiation for Soft Real-Time Control.
IEEE Trans. Ind. Informatics, 2016
IEEE Trans. Ind. Informatics, 2016
J. Netw. Comput. Appl., 2016
ACM Comput. Surv., 2016
Comput. Secur., 2016
2015
Understanding data flow and security requirements in wireless Body Area Networks for healthcare.
Proceedings of the 17th International Conference on E-health Networking, 2015
2014
Security analysis of the non-aggressive challenge response of the DNP3 protocol using a CPN model.
Proceedings of the IEEE International Conference on Communications, 2014
2013
An efficient proactive route maintenance process for reliable data transmissions in sensor networks.
Proceedings of the 7th International Conference on Signal Processing and Communication Systems, 2013
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2012
Prax. Inf.verarb. Kommun., 2012
Proceedings of the 7th International Conference on Malicious and Unwanted Software, 2012
2011
Proceedings of the Mobile Networks and Management - Third International ICST Conference, 2011
Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications.
Proceedings of the 6th International Conference on Malicious and Unwanted Software, 2011
Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics.
Proceedings of the 2011 IEEE International Joint Conference on Biometrics, 2011
Proceedings of the 2011 workshop on Organic computing, 2011
From simulation to emulation - an integrated approach for network security evaluation.
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011
Proceedings of the DIM'11, Proceedings of the 2013 ACM Workshop on Digital Identity Management, Chicago, IL, USA, 2011
Multi-device Key Management Using Visual Side Channels in Pervasive Computing Environments.
Proceedings of the 2011 International Conference on Broadband, 2011
2010
Collaborative Intrusion Detection Framework: Characteristics, Adversarial Opportunities and Countermeasures.
Proceedings of the 2010 Workshop on Collaborative Methods for Security and Privacy, 2010
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010
A generic framework and runtime environment for development and evaluation of behavioral biometrics solutions.
Proceedings of the 10th International Conference on Intelligent Systems Design and Applications, 2010
2009
Proceedings of the Mobile Wireless Middleware, 2009
Proceedings of the 4th International Conference on Malicious and Unwanted Software, 2009
Proceedings of the 4th International Conference on Malicious and Unwanted Software, 2009
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of the 2009 International Symposium on Collaborative Technologies and Systems, 2009
2008
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
2007
Design and analysis of key management schemes for distributed wireless sensor networks.
PhD thesis, 2007
IEEE/ACM Trans. Netw., 2007
Proceedings of the Stabilization, 2007
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
2006
Proceedings of the Intelligence and Security Informatics, 2006
Proceedings of IEEE International Conference on Communications, 2006
2005
Proceedings of the Intelligence and Security Informatics, 2005
Detecting conversing groups of chatters: a model, algorithms, and tests.
Proceedings of the AC 2005, 2005
2004
Proceedings of the Intelligence and Security Informatics, 2004