default search action
Hidayet Aksu
Person information
- affiliation: Florida International University, Miami, FL, USA
- affiliation (former): Bilkent Universitesi, Ankara, Turkey
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Hidayet Aksu, Badih Ghazi, Pritish Kamath, Ravi Kumar, Pasin Manurangsi, Adam Sealfon, Avinash V. Varadarajan:
Summary Reports Optimization in the Privacy Sandbox Attribution Reporting API. Proc. Priv. Enhancing Technol. 2024(4): 605-621 (2024) - 2023
- [i18]Hidayet Aksu, Badih Ghazi, Pritish Kamath, Ravi Kumar, Pasin Manurangsi, Adam Sealfon, Avinash V. Varadarajan:
Summary Reports Optimization in the Privacy Sandbox Attribution Reporting API. CoRR abs/2311.13586 (2023) - 2022
- [j16]Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Hidayet Aksu, Patrick D. McDaniel, Engin Kirda, A. Selcuk Uluagac:
Who's Controlling My Device? Multi-User Multi-Device-Aware Access Control System for Shared Smart Home Environment. ACM Trans. Internet Things 3(4): 27:1-27:39 (2022) - 2021
- [j15]Amit Kumar Sikder, Giuseppe Petracca, Hidayet Aksu, Trent Jaeger, A. Selcuk Uluagac:
A Survey on Sensor-Based Threats and Attacks to Smart Devices and Applications. IEEE Commun. Surv. Tutorials 23(2): 1125-1159 (2021) - [j14]Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac:
CPS Device-Class Identification via Behavioral Fingerprinting: From Theory to Practice. IEEE Trans. Inf. Forensics Secur. 16: 2413-2428 (2021) - [j13]Abbas Acar, Shoukat Ali, Koray Karabina, Cengiz Kaygusuz, Hidayet Aksu, Kemal Akkaya, Arif Selcuk Uluagac:
A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA. ACM Trans. Priv. Secur. 24(4): 24:1-24:28 (2021) - [j12]Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya:
A Usable and Robust Continuous Authentication Framework Using Wearables. IEEE Trans. Mob. Comput. 20(6): 2140-2153 (2021) - [j11]Hidayet Aksu, A. Selcuk Uluagac, Elizabeth S. Bentley:
Identification of Wearable Devices with Bluetooth. IEEE Trans. Sustain. Comput. 6(2): 221-230 (2021) - 2020
- [j10]Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac:
A System-level Behavioral Detection Framework for Compromised CPS Devices: Smart-Grid Case. ACM Trans. Cyber Phys. Syst. 4(2): 16:1-16:28 (2020) - [j9]Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac:
A Context-Aware Framework for Detecting Sensor-Based Threats on Smart Devices. IEEE Trans. Mob. Comput. 19(2): 245-261 (2020) - [c19]Leonardo Babun, Hidayet Aksu, Lucas Ryan, Kemal Akkaya, Elizabeth S. Bentley, A. Selcuk Uluagac:
Z-IoT: Passive Device-class Fingerprinting of ZigBee and Z-Wave IoT Devices. ICC 2020: 1-7 - [c18]Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick D. McDaniel, Engin Kirda, A. Selcuk Uluagac:
Kratos: multi-user multi-device-aware access control system for the smart home. WISEC 2020: 1-12 - [c17]Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, A. Selcuk Uluagac:
Peek-a-boo: i see your smart home activities, even encrypted! WISEC 2020: 207-218
2010 – 2019
- 2019
- [j8]Hidayet Aksu, Ibrahim Korpeoglu, Özgür Ulusoy:
An Analysis of Social Networks Based on Tera-Scale Telecommunication Datasets. IEEE Trans. Emerg. Top. Comput. 7(2): 349-360 (2019) - [c16]Amit Kumar Sikder, Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac:
Aegis: a context-aware security framework for smart home systems. ACSAC 2019: 28-41 - [c15]Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Ryan Sheatsley, Patrick D. McDaniel, A. Selcuk Uluagac:
Curie: Policy-based Secure Data Exchange. CODASPY 2019: 121-132 - [i17]Amit Kumar Sikder, Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac:
Aegis: A Context-aware Security Framework for Smart Home Systems. CoRR abs/1910.03750 (2019) - [i16]Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac:
A Context-aware Framework for Detecting Sensor-based Threats on Smart Devices. CoRR abs/1910.11138 (2019) - [i15]Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick D. McDaniel, Engin Kirda, A. Selcuk Uluagac:
Multi-User Multi-Device-Aware Access Control System for Smart Home. CoRR abs/1911.10186 (2019) - [i14]Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac:
A System-level Behavioral Detection Framework for Compromised CPS Devices: Smart-Grid Case. CoRR abs/1912.00533 (2019) - 2018
- [j7]Mumin Cebe, Enes Erdin, Kemal Akkaya, Hidayet Aksu, A. Selcuk Uluagac:
Block4Forensic: An Integrated Lightweight Blockchain Framework for Forensics Applications of Connected Vehicles. IEEE Commun. Mag. 56(10): 50-57 (2018) - [j6]Hidayet Aksu, Leonardo Babun, Mauro Conti, Gabriele Tolomei, A. Selcuk Uluagac:
Advertising in the IoT Era: Vision and Challenges. IEEE Commun. Mag. 56(11): 138-144 (2018) - [j5]Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Mauro Conti:
A Survey on Homomorphic Encryption Schemes: Theory and Implementation. ACM Comput. Surv. 51(4): 79:1-79:35 (2018) - [c14]Amit Kumar Sikder, Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya, Mauro Conti:
IoT-enabled smart lighting systems for smart cities. CCWC 2018: 639-645 - [c13]Cengiz Kaygusuz, Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac:
Detection of Compromised Smart Grid Devices with Machine Learning and Convolution Techniques. ICC 2018: 1-6 - [c12]Muhammad A. Hakim, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya:
U-PoT: A Honeypot Framework for UPnP-Based IoT Devices. IPCCC 2018: 1-8 - [c11]Halim Burak Yesilyurt, Hidayet Aksu, A. Selcuk Uluagac, Raheem A. Beyah:
SOTA: Secure Over-the-Air Programming of IoT Devices. MILCOM 2018: 1-8 - [c10]Enes Erdin, Hidayet Aksu, A. Selcuk Uluagac, Michael Vai, Kemal Akkaya:
OS Independent and Hardware-Assisted Insider Threat Detection and Prevention Framework. MILCOM 2018: 926-932 - [c9]Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya:
WACA: Wearable-Assisted Continuous Authentication. IEEE Symposium on Security and Privacy Workshops 2018: 264-269 - [c8]Z. Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick D. McDaniel, A. Selcuk Uluagac:
Sensitive Information Tracking in Commodity IoT. USENIX Security Symposium 2018: 1687-1704 - [i13]Mumin Cebe, Enes Erdin, Kemal Akkaya, Hidayet Aksu, A. Selcuk Uluagac:
Block4Forensic: An Integrated Lightweight Blockchain Framework for Forensics Applications of Connected Vehicles. CoRR abs/1802.00561 (2018) - [i12]Amit Kumar Sikder, Giuseppe Petracca, Hidayet Aksu, Trent Jaeger, A. Selcuk Uluagac:
A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications. CoRR abs/1802.02041 (2018) - [i11]Hidayet Aksu, Leonardo Babun, Mauro Conti, Gabriele Tolomei, A. Selcuk Uluagac:
Advertising in the IoT Era: Vision and Challenges. CoRR abs/1802.04102 (2018) - [i10]Z. Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick D. McDaniel, A. Selcuk Uluagac:
Sensitive Information Tracking in Commodity IoT. CoRR abs/1802.08307 (2018) - [i9]Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya:
WACA: Wearable-Assisted Continuous Authentication. CoRR abs/1802.10417 (2018) - [i8]Cengiz Kaygusuz, Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac:
Detection of Compromised Smart Grid Devices with Machine Learning and Convolution Techniques. CoRR abs/1804.05106 (2018) - [i7]Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, A. Selcuk Uluagac:
Peek-a-Boo: I see your smart home activities, even encrypted! CoRR abs/1808.02741 (2018) - [i6]Hidayet Aksu, A. Selcuk Uluagac, Elizabeth S. Bentley:
Identification of Wearable Devices with Bluetooth. CoRR abs/1809.10387 (2018) - [i5]Muhammad A. Hakim, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya:
U-PoT: A Honeypot Framework for UPnP-Based IoT Devices. CoRR abs/1812.05558 (2018) - 2017
- [j4]Juan Lopez, Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac:
A Survey on Function and System Call Hooking Approaches. J. Hardw. Syst. Secur. 1(2): 114-136 (2017) - [c7]Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac:
Identifying counterfeit smart grid devices: A lightweight system level framework. ICC 2017: 1-6 - [c6]Anurag Akkiraju, David Gabay, Halim Burak Yesilyurt, Hidayet Aksu, A. Selcuk Uluagac:
Cybergrenade: Automated Exploitation of Local Network Machines via Single Board Computers. MASS 2017: 580-584 - [c5]Abbas Acar, Z. Berkay Celik, Hidayet Aksu, A. Selcuk Uluagac, Patrick D. McDaniel:
Achieving Secure and Differentially Private Computations in Multiparty Settings. PAC 2017: 49-59 - [c4]Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac:
6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices. USENIX Security Symposium 2017: 397-414 - [i4]Z. Berkay Celik, Hidayet Aksu, Abbas Acar, Ryan Sheatsley, A. Selcuk Uluagac, Patrick D. McDaniel:
Curie: Policy-based Secure Data Exchange. CoRR abs/1702.08342 (2017) - [i3]Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Mauro Conti:
A Survey on Homomorphic Encryption Schemes: Theory and Implementation. CoRR abs/1704.03578 (2017) - [i2]Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac:
6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices. CoRR abs/1706.10220 (2017) - [i1]Abbas Acar, Z. Berkay Celik, Hidayet Aksu, A. Selcuk Uluagac, Patrick D. McDaniel:
Achieving Secure and Differentially Private Computations in Multiparty Settings. CoRR abs/1707.01871 (2017) - 2016
- [c3]Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac:
A framework for counterfeit smart grid device detection. CNS 2016: 382-383 - 2015
- [j3]Hidayet Aksu, Mustafa Canim, Yuan-Chi Chang, Ibrahim Korpeoglu, Özgür Ulusoy:
Efficient community identification and maintenance at multiple resolutions on distributed datastores. Data Knowl. Eng. 100: 133-147 (2015) - [c2]Hidayet Aksu, Mustafa Canim, Yuan-Chi Chang, Ibrahim Korpeoglu, Özgür Ulusoy:
Graph Aware Caching Policy for Distributed Graph Stores. IC2E 2015: 6-15 - 2014
- [b1]Hidayet Aksu:
Efficient analysis of large-scale social networks using big-data platforms (Büyük ölçekli sosyal ağların büyük veri platformu kullanarak etkin analizi). İhsan Doğramacı Bilkent University, Turkey, 2014 - [j2]Hidayet Aksu, Mustafa Canim, Yuan-Chi Chang, Ibrahim Korpeoglu, Özgür Ulusoy:
Distributed $k$ -Core View Materializationand Maintenance for Large Dynamic Graphs. IEEE Trans. Knowl. Data Eng. 26(10): 2439-2452 (2014) - 2013
- [c1]Hidayet Aksu, Mustafa Canim, Yuan-Chi Chang, Ibrahim Korpeoglu, Özgür Ulusoy:
Multi-resolution Social Network Community Identification and Maintenance on Big Data Platform. BigData Congress 2013: 102-109 - 2011
- [j1]Hidayet Aksu, Demet Aksoy, Ibrahim Korpeoglu:
A study of localization metrics: Evaluation of position errors in wireless sensor networks. Comput. Networks 55(15): 3562-3577 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint