default search action
Evren Çatak
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j8]Haolin Tang, Ferhat Özgür Çatak, Murat Kuzlu, Evren Çatak, Yanxiao Zhao:
Defending AI-Based Automatic Modulation Recognition Models Against Adversarial Attacks. IEEE Access 11: 76629-76637 (2023) - [j7]Murat Kuzlu, Ferhat Özgür Çatak, Umit Cali, Evren Çatak, Ozgur Guler:
Adversarial security mitigations of mmWave beamforming prediction models using defensive distillation and adversarial retraining. Int. J. Inf. Sec. 22(2): 319-332 (2023) - [c9]Ferhat Özgür Çatak, Evren Çatak, Ogerta Elezaj:
5G-SRNG: 5G Spectrogram-based Random Number Generation for Devices with Low Entropy Sources. COINS 2023: 1-6 - [i6]Ferhat Özgür Çatak, Evren Çatak, Ogerta Elezaj:
5G-SRNG: 5G Spectrogram-based Random Number Generation for Devices with Low Entropy Sources. CoRR abs/2304.09591 (2023) - 2022
- [j6]Ferhat Özgür Çatak, Murat Kuzlu, Evren Çatak, Umit Cali, Ozgur Guler:
Defensive Distillation-Based Adversarial Attack Mitigation Method for Channel Estimation Using Deep Learning Models in Next-Generation Wireless Networks. IEEE Access 10: 98191-98203 (2022) - [j5]Ferhat Özgür Çatak, Murat Kuzlu, Haolin Tang, Evren Çatak, Yanxiao Zhao:
Security Hardening of Intelligent Reflecting Surfaces Against Adversarial Machine Learning Attacks. IEEE Access 10: 100267-100275 (2022) - [j4]Ferhat Özgür Çatak, Murat Kuzlu, Evren Çatak, Umit Cali, Devrim Unal:
Security concerns on machine learning solutions for 6G networks in mmWave beam prediction. Phys. Commun. 52: 101626 (2022) - [c8]Ferhat Özgür Çatak, Murat Kuzlu, Salih Sarp, Evren Çatak, Umit Cali:
Mitigating Attacks on Artificial Intelligence-based Spectrum Sensing for Cellular Network Signals. GLOBECOM (Workshops) 2022: 1371-1376 - [i5]Murat Kuzlu, Ferhat Özgür Çatak, Umit Cali, Evren Çatak, Özgür Güler:
The Adversarial Security Mitigations of mmWave Beamforming Prediction Models using Defensive Distillation and Adversarial Retraining. CoRR abs/2202.08185 (2022) - [i4]Ferhat Özgür Çatak, Murat Kuzlu, Evren Çatak, Umit Cali, Ozgur Guler:
Defensive Distillation based Adversarial Attacks Mitigation Method for Channel Estimation using Deep Learning Models in Next-Generation Wireless Networks. CoRR abs/2208.10279 (2022) - [i3]Ferhat Özgür Çatak, Murat Kuzlu, Salih Sarp, Evren Çatak, Umit Cali:
Mitigating Attacks on Artificial Intelligence-based Spectrum Sensing for Cellular Network Signals. CoRR abs/2209.13007 (2022) - 2021
- [c7]Evren Çatak, Ferhat Özgür Çatak, Arild Moldsvor:
Adversarial Machine Learning Security Problems for 6G: mmWave Beam Prediction Use-Case. BlackSeaCom 2021: 1-6 - [i2]Evren Çatak, Ferhat Özgür Çatak, Arild Moldsvor:
Adversarial Machine Learning Security Problems for 6G: mmWave Beam Prediction Use-Case. CoRR abs/2103.07268 (2021) - [i1]Ferhat Özgür Çatak, Evren Çatak, Murat Kuzlu, Umit Cali:
Security Concerns on Machine Learning Solutions for 6G Networks in mmWave Beam Prediction. CoRR abs/2105.03905 (2021)
2010 – 2019
- 2019
- [j3]Evren Çatak, Ferdi Tekçe, Onur Dizdar, Lutfiye Durak-Ata:
Multi-user shared access in massive machine-type communication systems via superimposed waveforms. Phys. Commun. 37 (2019) - 2018
- [c6]Ferdi Tekçe, Evren Çatak, Umut Engin Ayten, Lutfiye Durak-Ata:
The effect of codebook design on the BER performance of MTC systems employing SCMA. SIU 2018: 1-4 - 2017
- [j2]Evren Çatak, Lutfiye Durak-Ata:
Adaptive filterbank-based multi-carrier waveform design for flexible data rates. Comput. Electr. Eng. 61: 184-194 (2017) - [c5]Evren Çatak, Lutfiye Durak-Ata:
An efficient transceiver design for superimposed waveforms with orthogonal polynomials. BlackSeaCom 2017: 1-5 - [c4]Evren Çatak, Lutfiye Durak-Ata:
Superimposed waveforms for users with high data rate at 5G wireless networks. SIU 2017: 1-4 - 2016
- [c3]Evren Çatak, Lutfiye Durak-Ata:
Filtered multitone system for users with different data rates at 5G wireless networks. SIU 2016: 741-744 - 2015
- [j1]Evren Çatak, Serhat Erküçük:
Practical Implementation of the Combinational Cooperative Detection Method. Wirel. Pers. Commun. 80(2): 723-738 (2015) - [c2]Evren Çatak, Lutfiye Durak-Ata, Haci Ali Mantar:
Enhanced physical layer security by OFDM signal transmission in fractional Fourier domains. SIU 2015: 1881-1884 - 2012
- [c1]Evren Çatak, Serhat Erküçük:
The effect of secondary user locations on the cooperative detection performance. SIU 2012: 1-4
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint