Sar\iy\ild\iz, Mert B\"ulent, Cinbi\cs, Ramazan G\"okberk, & Ayday, E.(2018).Key Protected Classification for GAN Attack Resilient Collaborative Learning..
Ayday, E., Jiang, X., & Malin, B.(2018).GenoPri'16: International Workshop on Genome Privacy and Security.IEEE/ACM Transactions on Computational Biology and Bioinformatics,15(5),1403--1404.
Lingala, S., Jayne, D., & Ernst, F.(2018).Effect of Lubricant Additives on the Tribological Behavior of Aluminum Alloy Against Steel.International Journal of Materials Research.
Niu, W., Li, Z., Ernst, F., Ye, C., & Lillard, R.(2018).Stress--Corrosion Cracking of Surface-Engineered Alloys in Simulated Boiling-Water-Reactor Environment..
Deznabi, I., Mobayen, M., Jafari, N., Tastan, O., & Ayday, E.(2018).An inference attack on genomic data using kinship, complex correlations, and phenotype information.IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB),15(4),1333--1343.
G\"ursoy, Gamze, Harmanci, A., Tang, H., Ayday, E., & Brenner, S.(2018).When Biology Gets Personal: Hidden Challenges of Privacy and Ethics in Biological Big Data.World Scientific.
Verma, A., French, R. H., & Carter, J. W.(2017).Physics Informed Network Models: Data Science Approach to Metals Design.Integrating Materials and Manufacturing Innovation/Springer,6(4),279–287.
Gok, A., Ngendahimana, D., Fagerholm, C., French, R. H., Sun, J. H., & Bruckman, L. H.(2017).Predictive models of poly(ethyleneterephthalate) film degradation under multifactor accelerated weathering exposures.PLoS ONE,12(5).
Kale, G., Ayday, E., & Tastan, O.(2017).A utility maximizing and privacy preserving approach for protecting kinship in genomic databases.Bioinformatics,34(2),181--189.
Aydogan, E., Almirall, N., Odette, G., Maloy, S., Anderoglu, O., & Lewandowski, J. J.(2017).Stability of Nanosized Oxides in Ferrite under Extremely High Dose Self Ion Irradiations.Journal of Nuclear Materials,486, 86-95.
Humbert, M., Ayday, E., Hubaux, J., & Telenti, A.(2017).Quantifying interdependent risks in genomic privacy.ACM Transactions on Privacy and Security (TOPS),20(1),3.
Tuna, G., Kogias, D., Gungor, V., Gezer, C., Ta\csk\in, Erhan, C., & Ayday, E.(2017).A survey on information security threats and solutions for Machine to Machine (M2M) communications.Journal of Parallel and Distributed Computing,109, 142--154.
Ayday, E., Tang, Q., & Yilmaz, A.(2017).Cryptographic solutions for credibility and liability issues of genomic data.IEEE Transactions on Dependable and Secure Computing,16(1),33--43.
Burnett, T., Holroyd, N., Lewandowski, J. J., Ogurreck, M. J., Grau, V. J., Kelley, R. J., Pickering, E. J., Daly, M. J., Sherry, A. J., Pawar, S. J., Slater, T. J., & Withers, P. J.(2017).Degradation of metallic materials studied by correlative tomography.IOP Conference Series: Materials Science and Engineering,219
Kale, G., Ayday, E., & Tastan, O.(2017).Supplementary Materials for A Utility Maximizing and Privacy Preserving Approach for Protecting Kinship in Genomic Databases..