default search action
Baris Coskun
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c25]Xian Wu, Wenbo Guo, Jia Yan, Baris Coskun, Xinyu Xing:
From Grim Reality to Practical Solution: Malware Classification in Real-World Noise. SP 2023: 2602-2619 - 2022
- [c24]Bhavna Soman, Ali Torkamani, Michael J. Morais, Jeffrey Bickford, Baris Coskun:
Firenze: Model Evaluation Using Weak Signals. CAMLIS 2022: 30-51 - [i3]Bhavna Soman, Ali Torkamani, Michael J. Morais, Jeffrey Bickford, Baris Coskun:
Firenze: Model Evaluation Using Weak Signals. CoRR abs/2207.00827 (2022) - 2021
- [c23]Baris Coskun, Burkay Genç:
Estimating Instrumentation Data Acquired During Flight Test of a Helicopter using Predictor Models. EUROCON 2021: 164-169 - 2020
- [j4]Emin Onur Karakaslar, Baris Coskun, Hassiba Outilaft, Izzie-Jacques Namer, A. Ercüment Çiçek:
Predicting Carbon Spectrum in Heteronuclear Single Quantum Coherence Spectroscopy for Online Feedback During Surgery. IEEE ACM Trans. Comput. Biol. Bioinform. 17(2): 719-725 (2020) - [c22]Edo Liberty, Zohar S. Karnin, Bing Xiang, Laurence Rouesnel, Baris Coskun, Ramesh Nallapati, Julio Delgado, Amir Sadoughi, Yury Astashonok, Piali Das, Can Balioglu, Saswata Chakravarty, Madhav Jha, Philip Gautier, David Arpin, Tim Januschowski, Valentin Flunkert, Yuyang Wang, Jan Gasthaus, Lorenzo Stella, Syama Sundar Rangapuram, David Salinas, Sebastian Schelter, Alex Smola:
Elastic Machine Learning Algorithms in Amazon SageMaker. SIGMOD Conference 2020: 731-737
2010 – 2019
- 2019
- [c21]Mohammad Ruhul Amin, Pranav Garg, Baris Coskun:
CADENCE: Conditional Anomaly Detection for Events Using Noise-Contrastive Estimation. AISec@CCS 2019: 71-82 - [c20]Hassan Halawa, Konstantin Beznosov, Baris Coskun, Meizhu Liu, Matei Ripeanu:
Forecasting Suspicious Account Activity at Large-Scale Online Service Providers. Financial Cryptography 2019: 569-587 - 2018
- [i2]Hassan Halawa, Matei Ripeanu, Konstantin Beznosov, Baris Coskun, Meizhu Liu:
Forecasting Suspicious Account Activity at Large-Scale Online Service Providers. CoRR abs/1801.08629 (2018) - 2017
- [j3]Baris Coskun:
(Un)wisdom of Crowds: Accurately Spotting Malicious IP Clusters Using Not-So-Accurate IP Blacklists. IEEE Trans. Inf. Forensics Secur. 12(6): 1406-1417 (2017) - [c19]Hassan Halawa, Matei Ripeanu, Konstantin Beznosov, Baris Coskun, Meizhu Liu:
An Early Warning System for Suspicious Accounts. AISec@CCS 2017: 51-52 - [c18]Shuchu Han, Yifan Hu, Steven Skiena, Baris Coskun, Meizhu Liu, Hong Qin, Jaime Perez:
Generating Look-alike Names For Security Challenges. AISec@CCS 2017: 57-67 - [c17]Junting Ye, Shuchu Han, Yifan Hu, Baris Coskun, Meizhu Liu, Hong Qin, Steven Skiena:
Nationality Classification Using Name Embeddings. CIKM 2017: 1897-1906 - [i1]Junting Ye, Shuchu Han, Yifan Hu, Baris Coskun, Meizhu Liu, Hong Qin, Steven Skiena:
Nationality Classification Using Name Embeddings. CoRR abs/1708.07903 (2017) - 2016
- [c16]Hassan Halawa, Konstantin Beznosov, Yazan Boshmaf, Baris Coskun, Matei Ripeanu, Elizeu Santos-Neto:
Harvesting the low-hanging fruits: defending against automated large-scale cyber-intrusions by focusing on the vulnerable population. NSPW 2016: 11-22 - 2013
- [c15]Nathaniel Boggs, Wei Wang, Suhas Mathur, Baris Coskun, Carol Pincock:
Discovery of emergent malicious campaigns in cellular networks. ACSAC 2013: 29-38 - [c14]Liyun Li, Suhas Mathur, Baris Coskun:
Gangs of the internet: Towards automatic discovery of peer-to-peer communities. CNS 2013: 64-72 - [c13]Suhas Mathur, Baris Coskun, Suhrid Balakrishnan:
Detecting hidden enemy lines in IP address space. NSPW 2013: 19-30 - 2012
- [c12]Baris Coskun, Paul Giura:
Mitigating SMS spam by online detection of repetitive near-duplicate messages. ICC 2012: 999-1004 - 2010
- [c11]Baris Coskun, Sven Dietrich, Nasir D. Memon:
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts. ACSAC 2010: 131-140 - [c10]Baris Coskun, Nasir D. Memon:
Tracking encrypted VoIP calls via robust hashing of network flows. ICASSP 2010: 1818-1821
2000 – 2009
- 2009
- [c9]Baris Coskun, Nasir D. Memon:
Online Sketching of Network Flows for Real-Time Stepping-Stone Detection. ACSAC 2009: 473-483 - [c8]Liyun Li, Umut Topkara, Baris Coskun, Nasir D. Memon:
CoCoST: A Computational Cost Efficient Classifier. ICDM 2009: 268-277 - 2008
- [c7]Baris Coskun, Cormac Herley:
Can "Something You Know" Be Saved?. ISC 2008: 421-440 - [c6]Baris Coskun, Mehmet Kivanç Mihçak:
Perceptual hash based blind geometric synchronization of images for watermarking. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 68191G - 2007
- [c5]Baris Coskun, Nasir D. Memon:
Efficient Detection of Delay-Constrained Relay Nodes. ACSAC 2007: 353-362 - [c4]Yagiz Sutcu, Baris Coskun, Husrev T. Sencar, Nasir D. Memon:
Tamper Detection Based on Regularity of Wavelet Transform Coefficients. ICIP (1) 2007: 397-400 - [c3]Dinei Florêncio, Cormac Herley, Baris Coskun:
Do Strong Web Passwords Accomplish Anything? HotSec 2007 - 2006
- [j2]Baris Coskun, Bülent Sankur, Nasir D. Memon:
Spatio-Temporal Transform Based Video Hashing. IEEE Trans. Multim. 8(6): 1190-1208 (2006) - [c2]Baris Coskun, Nasir D. Memon:
Confusion/Diffusion Capabilities of Some Robust Hash Functions. CISS 2006: 1188-1193 - 2004
- [j1]Özgür Ekici, Bülent Sankur, Baris Coskun, Umut Naci, Mahmut Akcay:
Comparative evaluation of semifragile watermarking algorithms. J. Electronic Imaging 13(1): 209-219 (2004) - [c1]Baris Coskun, Bülent Sankur:
Robust video hash extraction. EUSIPCO 2004: 2295-2298
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint