Brennan, S., & Rabinovich, M.(2018).Improving Communication Through Overlay Detours: Pipe Dream or Actionable Insight?.Int. Conf. on Distributed Computing Systems, IEEE.
Liu, D., Li, Y., Xiao, X., Xie, Y., & Zhang, Y.(2018).Flood risk perception of rural households in western mountainous regions of Henan province, China.International Journal of Disaster Risk Reduction,27, 155-160.
Sar\iy\ild\iz, Mert B\"ulent, Cinbi\cs, Ramazan G\"okberk, & Ayday, E.(2018).Key Protected Classification for GAN Attack Resilient Collaborative Learning..
Turchyn, S., & Ray, S.(2018).Gesture Annotation with a Visual Search Engine for Multimodal Communication Research.Proceedings of the Thirtieth Conference on Innovative Applications of Artificial Intelligence (IAAI-18).
Cao, J., Astorga, A., Srisakaokul, S., Wu, Z., Liu, X., Xiao, X., & Xie, T.(2018).Visualizing Path Exploration to Assist Problem Diagnosis for Structural Test Generation..
Ayday, E., Jiang, X., & Malin, B.(2018).GenoPri'16: International Workshop on Genome Privacy and Security.IEEE/ACM Transactions on Computational Biology and Bioinformatics,15(5),1403--1404.
Zhang, Y., Fan, Y., Hou, S., Liu, J., Ye, F., & Bourlai, T.(2018).iDetector: Automate Underground Forum Analysis Based on Heterogeneous Information Network.IEEE.
De Andrade, Mariza, Daw, E., Kraja, A., Fisher, V., Wang, L., Van Ditzhuijzen, N., Li, J., Romanescu, R., Veenstra, J., Sun, R., Weng, H., & Zhou, W.(2018).The challenge of detecting genotype-by-methylation interaction: GAW20.BMC GENETICS,19
Deznabi, I., Mobayen, M., Jafari, N., Tastan, O., & Ayday, E.(2018).An inference attack on genomic data using kinship, complex correlations, and phenotype information.IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB),15(4),1333--1343.
G\"ursoy, Gamze, Harmanci, A., Tang, H., Ayday, E., & Brenner, S.(2018).When Biology Gets Personal: Hidden Challenges of Privacy and Ethics in Biological Big Data.World Scientific.
Kale, G., Ayday, E., & Tastan, O.(2018).A utility maximizing and privacy preserving approach for protecting kinship in genomic databases.Bioinformatics,34(2),181--189.