Brennan, S., & Rabinovich, M.(2018).Improving Communication Through Overlay Detours: Pipe Dream or Actionable Insight?.Int. Conf. on Distributed Computing Systems, IEEE.
Qiao, S., Koyutürk, M., & Ozsoyoglu, M.(2018).Querying of Disparate Association and Interaction Data in Biomedical Applications.Computational Biology and Bioinformatics, IEEE-ACM Transactions on,15(4),1052-1065.
Deznabi, I., Mobayen, M., Jafari, N., Tastan, O., & Ayday, E.(2018).An inference attack on genomic data using kinship, complex correlations, and phenotype information.IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB),15(4),1333--1343.
De Andrade, Mariza, Daw, E., Kraja, A., Fisher, V., Wang, L., Van Ditzhuijzen, N., Li, J., Romanescu, R., Veenstra, J., Sun, R., Weng, H., & Zhou, W.(2018).The challenge of detecting genotype-by-methylation interaction: GAW20.BMC GENETICS,19
G\"ursoy, Gamze, Harmanci, A., Tang, H., Ayday, E., & Brenner, S.(2018).When Biology Gets Personal: Hidden Challenges of Privacy and Ethics in Biological Big Data.World Scientific.
Kale, G., Ayday, E., & Tastan, O.(2018).A utility maximizing and privacy preserving approach for protecting kinship in genomic databases.Bioinformatics,34(2),181--189.
Sar\iy\ild\iz, Mert B\"ulent, Cinbi\cs, Ramazan G\"okberk, & Ayday, E.(2018).Key Protected Classification for GAN Attack Resilient Collaborative Learning..
Zhang, Y., Fan, Y., Ye, F., Zhao, L., Wang, J., Xiong, Q., & Shao, F.(2018).KADetector: Automatic Identification of Key Actors in Online Hack Forums Based on Structured Heterogeneous Information Network.IEEE.
Qiao, S., Yan, B., & Li, J.(2018).Ensemble learning for protein multiplex subcellular localization prediction based on weighted KNN with different features.APPLIED INTELLIGENCE,48(7),1813-1824.
Ayday, E., Jiang, X., & Malin, B.(2018).GenoPri'16: International Workshop on Genome Privacy and Security.IEEE/ACM Transactions on Computational Biology and Bioinformatics.
Von Thenen, N., Ayday, E., & Cicek, A Ercument, E.(2018).Re-identification of individuals in genomic data-sharing beacons via allele inference.Bioinformatics,35(3),365--371.
Ailijiang, A., Bayir, M., Altiparmak, N., Peixoto, D., Arora, V., Assent, I., Athanassoulis, M., Ayday, E., Babalou, S., Bahrami, M., & Others, M.(2018).Appreciation to distributed and parallel databases reviewers.Distrib Parallel Databases,36, 1--3.
Ye, F., Chen, L., Hou, S., Hardy, W., & Liu, X.(2018).DeepAM: a heterogeneous deep learning framework for intelligent malware detection.KNOWLEDGE AND INFORMATION SYSTEMS,54(2),265-285.
Ye, F., Hou, S., Chen, L., Liu, X., Zhao, L., Xu, S., Wang, J., & Xiong, Q.(2018).ICSD: An Automatic System for Insecure Code Snippet Detection in Stack Overflow over Heterogeneous Information Network.ASSOC COMPUTING MACHINERY.