Utku Gülen

Orcid: 0000-0003-3135-8817

According to our database1, Utku Gülen authored at least 20 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Merging Threat Modeling with Threat Hunting for Dynamic Cybersecurity Defense.
IEEE Internet Things Mag., November, 2024

Intent-Based Security for Functional Safety in Cyber-Physical Systems.
IEEE Trans. Emerg. Top. Comput., 2024

FASIL: A challenge-based framework for secure and privacy-preserving federated learning.
IACR Cryptol. ePrint Arch., 2024

Detecting IP DDoS Attacks Using 3GPP Radio Protocols.
IEEE Access, 2024

Threat Modeling of AI-as-a-Service Framework.
Proceedings of the 20th International Conference on Wireless and Mobile Computing, 2024

2023
A security-friendly privacy-preserving solution for federated learning.
Comput. Commun., July, 2023

Side-Channel Resistant 2048-Bit RSA Implementation for Wireless Sensor Networks and Internet of Things.
IEEE Access, 2023

OAI-Based Software Defined Radio Implementation.
Proceedings of the 31st Signal Processing and Communications Applications Conference, 2023

Network Digital Twins: A Threat Analysis.
Proceedings of the IEEE International Conference on Communications, 2023

Toward Privacy-Preserving Localization and Mapping in eXtended Reality: A Privacy Threat Model.
Proceedings of the 2023 Joint European Conference on Networks and Communications & 6G Summit, 2023

2022
FFT enabled ECC for WSN nodes without hardware multiplier support.
Turkish J. Electr. Eng. Comput. Sci., January, 2022

Public-key cryptography on constrained embedded devices (Kısıtlı kaynaklı gömülü cihazlar üzerinde açık anahtarlı şifreleme)
PhD thesis, 2022

A Security-Friendly Privacy Solution for Federated Learning.
Proceedings of the Short Paper Proceedings of the First International Workshop on Artificial Intelligence in Beyond 5G and 6G Wireless Networks (AI6G 2022) co-located with IEEE World Congress on Computational Intelligence (WCCI2022), 2022

On the security of 6G use cases: Threat Analysis of 'All-Senses Meeting'.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

2021
A Network-Based Positioning Method to Locate False Base Stations.
IEEE Access, 2021

SoK: Investigation of Security and Functional Safety in Industrial IoT.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

2020
Elliptic Curve Cryptography for Wireless Sensor Networks Using the Number Theoretic Transform.
Sensors, 2020

2019
Implementing RSA for Wireless Sensor Nodes.
Sensors, 2019

2016
Elliptic-curve cryptography for wireless sensor network nodes without hardware multiplier support.
Secur. Commun. Networks, 2016

2014
Elliptic Curve Cryptography on Constrained Microcontrollers Using Frequency Domain Arithmetic.
Proceedings of the Computational Science and Its Applications - ICCSA 2014 - 14th International Conference, Guimarães, Portugal, June 30, 2014


  Loading...