Cao, J., Astorga, A., Srisakaokul, S., Wu, Z., Liu, X., Xiao, X., & Xie, T.(2018).Visualizing Path Exploration to Assist Problem Diagnosis for Structural Test Generation..
Ayday, E., Jiang, X., & Malin, B.(2018).GenoPri'16: International Workshop on Genome Privacy and Security.IEEE/ACM Transactions on Computational Biology and Bioinformatics,15(5),1403--1404.
Ye, F., Chen, L., Hou, S., Hardy, W., & Liu, X.(2018).DeepAM: a heterogeneous deep learning framework for intelligent malware detection.KNOWLEDGE AND INFORMATION SYSTEMS,54(2),265-285.
Ye, F., Hou, S., Chen, L., Liu, X., Zhao, L., Xu, S., Wang, J., & Xiong, Q.(2018).ICSD: An Automatic System for Insecure Code Snippet Detection in Stack Overflow over Heterogeneous Information Network.ASSOC COMPUTING MACHINERY.
Zhang, Y., Fan, Y., Ye, F., Liu, X., & Winstanley, E.(2018).Utilizing Social Media to Combat Opioid Addiction Epidemic: Automatic Detection of Opioid Users from Twitter.32nd AAAI Conference on Artificial Intelligence Workshops.
Deznabi, I., Mobayen, M., Jafari, N., Tastan, O., & Ayday, E.(2018).An inference attack on genomic data using kinship, complex correlations, and phenotype information.IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB),15(4),1333--1343.
De Andrade, Mariza, Daw, E., Kraja, A., Fisher, V., Wang, L., Van Ditzhuijzen, N., Li, J., Romanescu, R., Veenstra, J., Sun, R., Weng, H., & Zhou, W.(2018).The challenge of detecting genotype-by-methylation interaction: GAW20.BMC GENETICS,19
G\"ursoy, Gamze, Harmanci, A., Tang, H., Ayday, E., & Brenner, S.(2018).When Biology Gets Personal: Hidden Challenges of Privacy and Ethics in Biological Big Data.World Scientific.
Kale, G., Ayday, E., & Tastan, O.(2018).A utility maximizing and privacy preserving approach for protecting kinship in genomic databases.Bioinformatics,34(2),181--189.
Sar\iy\ild\iz, Mert B\"ulent, Cinbi\cs, Ramazan G\"okberk, & Ayday, E.(2018).Key Protected Classification for GAN Attack Resilient Collaborative Learning..
Qiao, S., Yan, B., & Li, J.(2017).Ensemble learning for protein multiplex subcellular localization prediction based on weighted KNN with different features.Applied Intelligence.
Tuna, G., Kogias, D., Gungor, V., Gezer, C., Ta\csk\in, Erhan, C., & Ayday, E.(2017).A survey on information security threats and solutions for Machine to Machine (M2M) communications.Journal of Parallel and Distributed Computing,109, 142--154.
Ayday, E., Tang, Q., & Yilmaz, A.(2017).Cryptographic solutions for credibility and liability issues of genomic data.IEEE Transactions on Dependable and Secure Computing,16(1),33--43.