Остановите войну!
for scientists:
default search action
Sedat Akleylek
- > Home > Persons > Sedat Akleylek
Publications
- 2024
- [j53]Duong Dinh Tran, Kazuhiro Ogata, Santiago Escobar, Sedat Akleylek, Ayoub Otmani:
Formal Analysis of Post-Quantum Hybrid Key Exchange SSH Transport Layer Protocol. IEEE Access 12: 1672-1687 (2024) - [j52]Hami Satilmis, Sedat Akleylek, Zaliha Yüce Tok:
A Systematic Literature Review on Host-Based Intrusion Detection Systems. IEEE Access 12: 27237-27266 (2024) - 2023
- [j42]Durmus Özkan Sahin, Oguz Emre Kural, Sedat Akleylek, Erdal Kiliç:
A novel Android malware detection system: adaption of filter-based feature selection methods. J. Ambient Intell. Humaniz. Comput. 14(2): 1243-1257 (2023) - [j41]Durmus Özkan Sahin, Oguz Emre Kural, Sedat Akleylek, Erdal Kiliç:
A novel permission-based Android malware detection system using feature selection based on linear regression. Neural Comput. Appl. 35(7): 4903-4918 (2023) - [j38]Víctor García, Santiago Escobar, Kazuhiro Ogata, Sedat Akleylek, Ayoub Otmani:
Modelling and verification of post-quantum key encapsulation mechanisms using Maude. PeerJ Comput. Sci. 9: e1547 (2023) - 2022
- [j33]Durmus Özkan Sahin, Sedat Akleylek, Erdal Kiliç:
LinRegDroid: Detection of Android Malware Using Multiple Linear Regression Models-Based Classifiers. IEEE Access 10: 14246-14259 (2022) - [j32]Engin Karacan, Aykut Karakaya, Sedat Akleylek:
Quantum Secure Communication Between Service Provider and Sim. IEEE Access 10: 69135-69146 (2022) - [j26]Aykut Karakaya, Ahmet Ulu, Sedat Akleylek:
GOALALERT: A novel real-time technical team alert approach using machine learning on an IoT-based system in sports. Microprocess. Microsystems 93: 104606 (2022) - [c17]Duong Dinh Tran, Kazuhiro Ogata, Santiago Escobar, Sedat Akleylek, Ayoub Otmani:
Formal specification and model checking of lattice-based key encapsulation mechanisms in Maude. FAVPQC@ICFEM 2022: 16-31 - [c16]Duong Dinh Tran, Kazuhiro Ogata, Santiago Escobar, Sedat Akleylek, Ayoub Otmani:
Formal specification and model checking of Saber lattice-based key encapsulation mechanism in Maude. SEKE 2022: 382-387 - [e3]Sedat Akleylek, Santiago Escobar, Kazuhiro Ogata, Ayoub Otmani:
Proceedings of the International Workshop on Formal Analysis and Verification of Post-Quantum Cryptographic Protocols co-located with the 23rd International Conference on Formal Engineering Methods (ICFEM 2022), Madrid, Spain, October 24, 2022. CEUR Workshop Proceedings 3280, CEUR-WS.org 2022 [contents] - 2021
- [j24]Durmus Özkan Sahin, Sedat Akleylek, Erdal Kiliç:
On the Effect of k Values and Distance Metrics in KNN Algorithm for Android Malware Detection. Adv. Data Sci. Adapt. Anal. 13(3&4): 2141001:1-2141001:20 (2021) - [j21]Durmus Özkan Sahin, Oguz Emre Kural, Sedat Akleylek, Erdal Kiliç:
Permission-based Android malware analysis by using dimension reduction with PCA and LDA. J. Inf. Secur. Appl. 63: 102995 (2021) - [j20]Roumaissa Mahdjoubi, Pierre-Louis Cayrel, Sedat Akleylek, Kenza Guenda:
A Novel Niederreiter-like cryptosystem based on the (u|u + υ)-construction codes. RAIRO Theor. Informatics Appl. 55: 1-16 (2021) - [j19]Aykut Karakaya, Sedat Akleylek:
A novel IoT-based health and tactical analysis model with fog computing. PeerJ Comput. Sci. 7: e342 (2021) - [c13]Engin Karacan, Sedat Akleylek, Aykut Karakaya:
PQ-FLAT: A New Quantum-Resistant And Lightweight Authentication Approach for M2M Devices. ISDFS 2021: 1-5 - 2020
- [c11]Zýnnet Duygu Akþehýr, Erdal Kiliç, Sedat Akleylek, Mesut Döngül, Burak Coskun:
Stocks Prices Prediction with Long Short-term Memory. IoTBDS 2020: 221-226 - [c10]Durmus Özkan Sahin, Oguz Emre Kural, Sedat Akleylek, Erdal Kiliç:
Comparison of Regression Methods in Permission Based Android Malware Detection. SIU 2020: 1-4 - [c9]Hami Satilmis, Sedat Akleylek:
Efficient Implementations of Gauss-Based Sieving Algorithms. SIU 2020: 1-4 - 2017
- [j10]Erdem Alkim, Sedat Akleylek, Erdal Kiliç:
A Modified Parallel Learning Vector Quantization Algorithm for Real-Time Hardware Applications. J. Circuits Syst. Comput. 26(10): 1750156:1-1750156:14 (2017) - 2016
- [j8]Sedat Akleylek, Erdem Alkim, Zaliha Yüce Tok:
Sparse polynomial multiplication for lattice-based cryptography with small complexity. J. Supercomput. 72(2): 438-450 (2016) - [c6]Sedat Akleylek, Nina Bindel, Johannes Buchmann, Juliane Krämer, Giorgia Azzurra Marson:
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation. AFRICACRYPT 2016: 44-60 - [i1]Sedat Akleylek, Nina Bindel, Johannes Buchmann, Juliane Krämer, Giorgia Azzurra Marson:
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation. IACR Cryptol. ePrint Arch. 2016: 30 (2016) - 2015
- [c5]Sedat Akleylek, Özgür Dagdelen, Zaliha Yüce Tok:
On the Efficiency of Polynomial Multiplication for Lattice-Based Cryptography on GPUs Using CUDA. BalkanCryptSec 2015: 155-168 - [c4]Sedat Akleylek, Ferruh Özbudak:
Multiplication in a Galois ring. IWSDA 2015: 28-32 - 2014
- [j6]Sedat Akleylek, Zaliha Yüce Tok:
Efficient interleaved Montgomery modular multiplication for lattice-based cryptography. IEICE Electron. Express 11(22): 20140960 (2014) - [j5]Sedat Akleylek, Ferruh Özbudak, Canan Özel:
On the arithmetic operations over finite fields of characteristic three with low complexity. J. Comput. Appl. Math. 259: 546-554 (2014) - [c3]Sedat Akleylek, Zaliha Yüce Tok:
Efficient arithmetic for lattice-based cryptography on GPU using the CUDA platform. SIU 2014: 854-857 - 2013
- [j4]Ferruh Özbudak, Sedat Akleylek, Murat Cenk:
A New Representation of Elements of Binary Fields with Subquadratic Space Complexity Multiplication of Polynomials. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(10): 2016-2024 (2013) - [j3]Sedat Akleylek, Murat Cenk, Ferruh Özbudak:
On the generalisation of special moduli for faster interleaved montgomery modular multiplication. IET Inf. Secur. 7(3): 165-171 (2013) - 2012
- [j2]Sedat Akleylek, Ferruh Özbudak:
Modified Redundant Representation for Designing Arithmetic Circuits with Small Complexity. IEEE Trans. Computers 61(3): 427-432 (2012) - [j1]Sedat Akleylek, Murat Cenk, Ferruh Özbudak:
On the Polynomial Multiplication in Chebyshev Form. IEEE Trans. Computers 61(4): 584-587 (2012) - 2010
- [c2]Sedat Akleylek, Murat Cenk, Ferruh Özbudak:
Polynomial Multiplication over Binary Fields Using Charlier Polynomial Representation with Low Space Complexity. INDOCRYPT 2010: 227-237 - [c1]Sedat Akleylek, Murat Cenk, Ferruh Özbudak:
Faster Montgomery Modular Multiplication without Pre-computational Phase For Some Classes of Finite Fields. ISCIS 2010: 405-408
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint