Stebėti
Z. Berkay Celik
Z. Berkay Celik
Assistant Professor of Computer Science, Purdue University
Patvirtintas el. paštas purdue.edu - Pagrindinis puslapis
Pavadinimas
Cituota
Cituota
Metai
The limitations of deep learning in adversarial settings
N Papernot, P McDaniel, S Jha, M Fredrikson, ZB Celik, A Swami
2016 IEEE European symposium on security and privacy (EuroS&P), 372-387, 2016
52462016
Practical black-box attacks against machine learning
N Papernot, P McDaniel, I Goodfellow, S Jha, ZB Celik, A Swami
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
44952017
Practical black-box attacks against deep learning systems using adversarial examples
N Papernot, P McDaniel, I Goodfellow, S Jha, ZB Celik, A Swami
arXiv preprint arXiv:1602.02697 1 (2), 3, 2016
5192016
Soteria: Automated IoT Safety and Security Analysis
ZB Celik, P McDaniel, G Tan
2018 {USENIX} Annual Technical Conference ({USENIX} {ATC} 18), 2018
3412018
IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT
ZB Celik, G Tan, P McDaniel
Network and Distributed System Security Symposium (NDSS), 2019
3202019
Sensitive Information Tracking in Commodity IoT
ZB Celik, L Babun, AK Sikder, H Aksu, G Tan, P McDaniel, AS Uluagac
27th {USENIX} Security Symposium ({USENIX} Security 18, 2018
3032018
A survey on IoT platforms: Communication, security, and privacy perspectives
L Babun, K Denney, ZB Celik, P McDaniel, AS Uluagac
Computer Networks 192, 108040, 2021
2322021
ATLAS: A Sequence-based Learning Approach for Attack Investigation
A Alsaheel, Y Nan, S Ma, L Yu, G Walkup, ZB Celik, X Zhang, D Xu
USENIX Security Symposium, 2021
2192021
Machine Learning in Adversarial Settings
P McDaniel, N Papernot, ZB Celik
IEEE Security & Privacy Magazine 14 (3), 2016
1832016
Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities
ZB Celik, E Fernandes, E Pauley, G Tan, PD McDaniel
ACM Computing Surveys (CSUR), 2019
1762019
What Do You See? Evaluation of Explainable Artificial Intelligence (XAI) Interpretability through Neural Backdoors
YS Lin, WC Lee, ZB Celik
ACM SIGKDD Conference on Knowledge Discovery & Data Mining (KDD), 2021
1082021
Kratos: Multi-user multi-device-aware access control system for the smart home
AK Sikder, L Babun, ZB Celik, A Acar, H Aksu, P McDaniel, E Kirda, ...
Proceedings of the 13th ACM conference on security and privacy in wireless …, 2020
932020
Malware Traffic Detection using Tamper Resistant Features
ZB Celik, RJ Walls, P McDaniel, A Swami
Military Communications Conference, MILCOM, 2015
772015
PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles
H Kim, MO Ozmen, A Bianchi, ZB Celik, D Xu
Network and Distributed System Security Symposium (NDSS), 2021
652021
Real-time analysis of privacy-(un) aware IoT applications
L Babun, ZB Celik, P McDaniel, AS Uluagac
Privacy Enhancing Technologies Symposium (PETS), 2021
582021
Evading Voltage-Based Intrusion Detection on Automotive CAN
R Bhatia, V Kumar, K Serag, ZB Celik, M Payer, D Xu
Network and Distributed System Security Symposium (NDSS), 2021
552021
Salting public traces with attack traffic to test flow classifiers
ZB Celik, J Raghuram, G Kesidis, DJ Miller
In USENIX 4th CSET Workshop, 2011
442011
Discovering IoT physical channel vulnerabilities
MO Ozmen, X Li, A Chu, ZB Celik, B Hoxha, X Zhang
ACM SIGSAC Conference on Computer and Communications Security (CCS), 2022
42*2022
Can large language models provide security & privacy advice? measuring the ability of llms to refute misconceptions
Y Chen, A Arunasalam, ZB Celik
Proceedings of the 39th Annual Computer Security Applications Conference …, 2023
402023
Verifying internet of things safety and security in physical spaces
ZB Celik, P McDaniel, G Tan, L Babun, AS Uluagac
IEEE Security & Privacy 17 (5), 30-37, 2019
382019
Sistema negali atlikti operacijos. Bandykite vėliau dar kartą.
Straipsniai 1–20