Z. Berkay Celik
Orcid: 0000-0001-7362-8905Affiliations:
- Purdue University, West Lafayette, IN, USA
According to our database1,
Z. Berkay Celik
authored at least 70 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proc. Priv. Enhancing Technol., 2024
CoRR, 2024
Software Engineering for Robotics: Future Research Directions; Report from the 2023 Workshop on Software Engineering for Robotics.
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Understanding the Security and Privacy Implications of Online Toxic Content on Refugees.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Wear's my Data? Understanding the Cross-Device Runtime Permission Model in Wearables.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Expectation Conformance in Online Sound Therapy: Designing Tools for Users of Mental Wellbeing Applications.
Proceedings of the Companion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
iSTELAN: Disclosing Sensitive User Information by Mobile Magnetometer from Finger Touches.
Proc. Priv. Enhancing Technol., April, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
That Person Moves Like A Car: Misclassification Attack Detection for Autonomous Systems Using Spatiotemporal Consistency.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions.
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
Who's Controlling My Device? Multi-User Multi-Device-Aware Access Control System for Shared Smart Home Environment.
ACM Trans. Internet Things, 2022
ACM Trans. Internet Things, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 13th ACM/IEEE International Conference on Cyber-Physical Systems, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Proc. Priv. Enhancing Technol., 2021
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021
New Metrics to Evaluate the Performance and Fairness of Personalized Federated Learning.
CoRR, 2021
Comput. Networks, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the IEEE Security and Privacy Workshops, 2021
Proceedings of the IEEE Secure Development Conference, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
What Do You See?: Evaluation of Explainable Artificial Intelligence (XAI) Interpretability through Neural Backdoors.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021
Sentinel: A Robust Intrusion Detection System for IoT Networks Using Kernel-Level System Information.
Proceedings of the IoTDI '21: International Conference on Internet-of-Things Design and Implementation, 2021
2020
IoTRepair: Systematically Addressing Device Faults in Commodity IoT (Extended Paper).
CoRR, 2020
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
Proceedings of the Fifth IEEE/ACM International Conference on Internet-of-Things Design and Implementation, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
2019
IEEE Secur. Priv., 2019
Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities.
ACM Comput. Surv., 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 USENIX Annual Technical Conference, 2018
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples.
CoRR, 2016
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
2013
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013
2011
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011