Picture for Umit Cali

Umit Cali

Neural Networks Meet Elliptic Curve Cryptography: A Novel Approach to Secure Communication

Add code
Jul 11, 2024
Figure 1 for Neural Networks Meet Elliptic Curve Cryptography: A Novel Approach to Secure Communication
Figure 2 for Neural Networks Meet Elliptic Curve Cryptography: A Novel Approach to Secure Communication
Figure 3 for Neural Networks Meet Elliptic Curve Cryptography: A Novel Approach to Secure Communication
Figure 4 for Neural Networks Meet Elliptic Curve Cryptography: A Novel Approach to Secure Communication
Viaarxiv icon

Anomaly Detection in Power Markets and Systems

Add code
Dec 05, 2022
Viaarxiv icon

Mitigating Attacks on Artificial Intelligence-based Spectrum Sensing for Cellular Network Signals

Add code
Sep 27, 2022
Figure 1 for Mitigating Attacks on Artificial Intelligence-based Spectrum Sensing for Cellular Network Signals
Figure 2 for Mitigating Attacks on Artificial Intelligence-based Spectrum Sensing for Cellular Network Signals
Figure 3 for Mitigating Attacks on Artificial Intelligence-based Spectrum Sensing for Cellular Network Signals
Figure 4 for Mitigating Attacks on Artificial Intelligence-based Spectrum Sensing for Cellular Network Signals
Viaarxiv icon

Hybrid AI-based Anomaly Detection Model using Phasor Measurement Unit Data

Add code
Sep 21, 2022
Figure 1 for Hybrid AI-based Anomaly Detection Model using Phasor Measurement Unit Data
Figure 2 for Hybrid AI-based Anomaly Detection Model using Phasor Measurement Unit Data
Figure 3 for Hybrid AI-based Anomaly Detection Model using Phasor Measurement Unit Data
Figure 4 for Hybrid AI-based Anomaly Detection Model using Phasor Measurement Unit Data
Viaarxiv icon

Defensive Distillation based Adversarial Attacks Mitigation Method for Channel Estimation using Deep Learning Models in Next-Generation Wireless Networks

Add code
Aug 12, 2022
Figure 1 for Defensive Distillation based Adversarial Attacks Mitigation Method for Channel Estimation using Deep Learning Models in Next-Generation Wireless Networks
Figure 2 for Defensive Distillation based Adversarial Attacks Mitigation Method for Channel Estimation using Deep Learning Models in Next-Generation Wireless Networks
Figure 3 for Defensive Distillation based Adversarial Attacks Mitigation Method for Channel Estimation using Deep Learning Models in Next-Generation Wireless Networks
Figure 4 for Defensive Distillation based Adversarial Attacks Mitigation Method for Channel Estimation using Deep Learning Models in Next-Generation Wireless Networks
Viaarxiv icon

Homomorphic Encryption and Federated Learning based Privacy-Preserving CNN Training: COVID-19 Detection Use-Case

Add code
Apr 16, 2022
Figure 1 for Homomorphic Encryption and Federated Learning based Privacy-Preserving CNN Training: COVID-19 Detection Use-Case
Figure 2 for Homomorphic Encryption and Federated Learning based Privacy-Preserving CNN Training: COVID-19 Detection Use-Case
Figure 3 for Homomorphic Encryption and Federated Learning based Privacy-Preserving CNN Training: COVID-19 Detection Use-Case
Figure 4 for Homomorphic Encryption and Federated Learning based Privacy-Preserving CNN Training: COVID-19 Detection Use-Case
Viaarxiv icon

The Adversarial Security Mitigations of mmWave Beamforming Prediction Models using Defensive Distillation and Adversarial Retraining

Add code
Feb 16, 2022
Figure 1 for The Adversarial Security Mitigations of mmWave Beamforming Prediction Models using Defensive Distillation and Adversarial Retraining
Figure 2 for The Adversarial Security Mitigations of mmWave Beamforming Prediction Models using Defensive Distillation and Adversarial Retraining
Figure 3 for The Adversarial Security Mitigations of mmWave Beamforming Prediction Models using Defensive Distillation and Adversarial Retraining
Figure 4 for The Adversarial Security Mitigations of mmWave Beamforming Prediction Models using Defensive Distillation and Adversarial Retraining
Viaarxiv icon

Security Concerns on Machine Learning Solutions for 6G Networks in mmWave Beam Prediction

Add code
May 09, 2021
Figure 1 for Security Concerns on Machine Learning Solutions for 6G Networks in mmWave Beam Prediction
Figure 2 for Security Concerns on Machine Learning Solutions for 6G Networks in mmWave Beam Prediction
Figure 3 for Security Concerns on Machine Learning Solutions for 6G Networks in mmWave Beam Prediction
Figure 4 for Security Concerns on Machine Learning Solutions for 6G Networks in mmWave Beam Prediction
Viaarxiv icon

Probabilistic Solar Power Forecasting: Long Short-Term Memory Network vs Simpler Approaches

Add code
Jan 20, 2021
Figure 1 for Probabilistic Solar Power Forecasting: Long Short-Term Memory Network vs Simpler Approaches
Figure 2 for Probabilistic Solar Power Forecasting: Long Short-Term Memory Network vs Simpler Approaches
Viaarxiv icon

Internet of Predictable Things (IoPT) Framework to Increase Cyber-Physical System Resiliency

Add code
Jan 19, 2021
Figure 1 for Internet of Predictable Things (IoPT) Framework to Increase Cyber-Physical System Resiliency
Figure 2 for Internet of Predictable Things (IoPT) Framework to Increase Cyber-Physical System Resiliency
Figure 3 for Internet of Predictable Things (IoPT) Framework to Increase Cyber-Physical System Resiliency
Figure 4 for Internet of Predictable Things (IoPT) Framework to Increase Cyber-Physical System Resiliency
Viaarxiv icon