Picture for Ferhat Ozgur Catak

Ferhat Ozgur Catak

Neural Networks Meet Elliptic Curve Cryptography: A Novel Approach to Secure Communication

Add code
Jul 11, 2024
Figure 1 for Neural Networks Meet Elliptic Curve Cryptography: A Novel Approach to Secure Communication
Figure 2 for Neural Networks Meet Elliptic Curve Cryptography: A Novel Approach to Secure Communication
Figure 3 for Neural Networks Meet Elliptic Curve Cryptography: A Novel Approach to Secure Communication
Figure 4 for Neural Networks Meet Elliptic Curve Cryptography: A Novel Approach to Secure Communication
Viaarxiv icon

Uncertainty Quantification in Large Language Models Through Convex Hull Analysis

Add code
Jun 28, 2024
Viaarxiv icon

Anomaly Detection in Power Markets and Systems

Add code
Dec 05, 2022
Viaarxiv icon

Mitigating Attacks on Artificial Intelligence-based Spectrum Sensing for Cellular Network Signals

Add code
Sep 27, 2022
Figure 1 for Mitigating Attacks on Artificial Intelligence-based Spectrum Sensing for Cellular Network Signals
Figure 2 for Mitigating Attacks on Artificial Intelligence-based Spectrum Sensing for Cellular Network Signals
Figure 3 for Mitigating Attacks on Artificial Intelligence-based Spectrum Sensing for Cellular Network Signals
Figure 4 for Mitigating Attacks on Artificial Intelligence-based Spectrum Sensing for Cellular Network Signals
Viaarxiv icon

Hybrid AI-based Anomaly Detection Model using Phasor Measurement Unit Data

Add code
Sep 21, 2022
Figure 1 for Hybrid AI-based Anomaly Detection Model using Phasor Measurement Unit Data
Figure 2 for Hybrid AI-based Anomaly Detection Model using Phasor Measurement Unit Data
Figure 3 for Hybrid AI-based Anomaly Detection Model using Phasor Measurement Unit Data
Figure 4 for Hybrid AI-based Anomaly Detection Model using Phasor Measurement Unit Data
Viaarxiv icon

Defensive Distillation based Adversarial Attacks Mitigation Method for Channel Estimation using Deep Learning Models in Next-Generation Wireless Networks

Add code
Aug 12, 2022
Figure 1 for Defensive Distillation based Adversarial Attacks Mitigation Method for Channel Estimation using Deep Learning Models in Next-Generation Wireless Networks
Figure 2 for Defensive Distillation based Adversarial Attacks Mitigation Method for Channel Estimation using Deep Learning Models in Next-Generation Wireless Networks
Figure 3 for Defensive Distillation based Adversarial Attacks Mitigation Method for Channel Estimation using Deep Learning Models in Next-Generation Wireless Networks
Figure 4 for Defensive Distillation based Adversarial Attacks Mitigation Method for Channel Estimation using Deep Learning Models in Next-Generation Wireless Networks
Viaarxiv icon

Homomorphic Encryption and Federated Learning based Privacy-Preserving CNN Training: COVID-19 Detection Use-Case

Add code
Apr 16, 2022
Figure 1 for Homomorphic Encryption and Federated Learning based Privacy-Preserving CNN Training: COVID-19 Detection Use-Case
Figure 2 for Homomorphic Encryption and Federated Learning based Privacy-Preserving CNN Training: COVID-19 Detection Use-Case
Figure 3 for Homomorphic Encryption and Federated Learning based Privacy-Preserving CNN Training: COVID-19 Detection Use-Case
Figure 4 for Homomorphic Encryption and Federated Learning based Privacy-Preserving CNN Training: COVID-19 Detection Use-Case
Viaarxiv icon

The Adversarial Security Mitigations of mmWave Beamforming Prediction Models using Defensive Distillation and Adversarial Retraining

Add code
Feb 16, 2022
Figure 1 for The Adversarial Security Mitigations of mmWave Beamforming Prediction Models using Defensive Distillation and Adversarial Retraining
Figure 2 for The Adversarial Security Mitigations of mmWave Beamforming Prediction Models using Defensive Distillation and Adversarial Retraining
Figure 3 for The Adversarial Security Mitigations of mmWave Beamforming Prediction Models using Defensive Distillation and Adversarial Retraining
Figure 4 for The Adversarial Security Mitigations of mmWave Beamforming Prediction Models using Defensive Distillation and Adversarial Retraining
Viaarxiv icon

Unreasonable Effectiveness of Last Hidden Layer Activations

Add code
Feb 15, 2022
Figure 1 for Unreasonable Effectiveness of Last Hidden Layer Activations
Figure 2 for Unreasonable Effectiveness of Last Hidden Layer Activations
Figure 3 for Unreasonable Effectiveness of Last Hidden Layer Activations
Figure 4 for Unreasonable Effectiveness of Last Hidden Layer Activations
Viaarxiv icon

Secure Multi-Party Computation based Privacy Preserving Data Analysis in Healthcare IoT Systems

Add code
Sep 29, 2021
Figure 1 for Secure Multi-Party Computation based Privacy Preserving Data Analysis in Healthcare IoT Systems
Figure 2 for Secure Multi-Party Computation based Privacy Preserving Data Analysis in Healthcare IoT Systems
Figure 3 for Secure Multi-Party Computation based Privacy Preserving Data Analysis in Healthcare IoT Systems
Figure 4 for Secure Multi-Party Computation based Privacy Preserving Data Analysis in Healthcare IoT Systems
Viaarxiv icon