Ayday, E., Jiang, X., & Malin, B.(2018).GenoPri'16: International Workshop on Genome Privacy and Security. IEEE/ACM Transactions on Computational Biology and Bioinformatics,(5), 1403--1404.
Ayday, E., Jiang, X., & Malin, B.(2018).GenoPri'16: International Workshop on Genome Privacy and Security. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 15(5), 1403--1404.
Liu, D., Li, Y., Xiao, X., Xie, Y., & Zhang, Y.(2018).Flood risk perception of rural households in western mountainous regions of Henan province, China. International Journal of Disaster Risk Reduction, 27(), 155-160.
Sar\iy\ild\iz, Mert B\"ulent, Cinbi\cs, Ramazan G\"okberk, & Ayday, E.(2018).Key Protected Classification for GAN Attack Resilient Collaborative Learning. ,().
Sar\iy\ild\iz, Mert B\"ulent, Cinbi\cs, Ramazan G\"okberk, & Ayday, E.(2018).Key Protected Classification for GAN Attack Resilient Collaborative Learning. ,().
Ozercan, H., Ileri, A., Ayday, E., & Alkan, C.(2018).Realizing the potential of blockchain technologies in genomics. Genome research, 28(9), 1255--1263.
Ye, F., Hou, S., Chen, L., Liu, X., Zhao, L., Xu, S., ... Xiong, Q.(2018).ICSD: An Automatic System for Insecure Code Snippet Detection in Stack Overflow over Heterogeneous Information Network. ASSOC COMPUTING MACHINERY,(), 542-552.
Von Thenen, N., Ayday, E., & Cicek, A Ercument(2018).Re-identification of individuals in genomic data-sharing beacons via allele inference. Bioinformatics, 35(3), 365--371.
Harmanci, A., Tang, H., Ayday, E., & Brenner, S.(2018).When Biology Gets Personal: Hidden Challenges of Privacy and Ethics in Biological Big Data. ,().
Zhang, Y., Fan, Y., Hou, S., Liu, J., Ye, F., & Bourlai, T.(2018).iDetector: Automate Underground Forum Analysis Based on Heterogeneous Information Network. IEEE,(), 1071-1078.
Morrison, P., Pandita, R., Xiao, X., Chillarege, R., & Williams, L.(2017).Are vulnerabilities discovered and resolved like other defects?. Empirical Software Engineering,(), 1--39.
Tuna, G., Kogias, D., Gungor, V., Gezer, C., Ta\csk\in, Erhan, & Ayday, E.(2017).A survey on information security threats and solutions for Machine to Machine (M2M) communications. Journal of Parallel and Distributed Computing, 109(), 142--154.
Deznabi, I., Mobayen, M., Jafari, N., Tastan, O., & Ayday, E.(2017).An inference attack on genomic data using kinship, complex correlations, and phenotype information. IEEE/ACM transactions on computational biology and bioinformatics, 15(4), 1333--1343.