default search action
Mehmet Emre Gursoy
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Mehmet Emre Gürsoy:
Longitudinal attacks against iterative data collection with local differential privacy. Turkish J. Electr. Eng. Comput. Sci. 32(1): 198-218 (2024) - [j14]Ekin Tire, Mehmet Emre Gursoy:
Answering Spatial Density Queries Under Local Differential Privacy. IEEE Internet Things J. 11(10): 17419-17436 (2024) - [j13]Seyedpayam Seyedkazemi, Mehmet Emre Gursoy, Yücel Saygin:
LuxTrack: Activity Inference Attacks via Smartphone Ambient Light Sensors and Countermeasures. IEEE Internet Things J. 11(17): 28734-28751 (2024) - [i15]Berkay Kemal Balioglu, Alireza Khodaie, Ameer Taweel, Mehmet Emre Gursoy:
Grid-Based Decompositions for Spatial Data under Local Differential Privacy. CoRR abs/2407.21624 (2024) - 2023
- [j12]Emre Yigitoglu, Mehmet Emre Gursoy, Ling Liu:
Utility-Aware and Privacy-Preserving Mobile Query Services. IEEE Trans. Serv. Comput. 16(2): 1458-1472 (2023) - [c29]Ece Alptekin, Mehmet Emre Gursoy:
Building Quadtrees for Spatial Data Under Local Differential Privacy. DBSec 2023: 22-39 - [c28]Efehan Guner, Mehmet Emre Gursoy:
Learning Markov Chain Models from Sequential Data Under Local Differential Privacy. ESORICS (2) 2023: 359-379 - [c27]Zeynep Sila Kaya, Mehmet Emre Gursoy:
On the Effectiveness of Re-Identification Attacks and Local Differential Privacy-Based Solutions for Smart Meter Data. SECRYPT 2023: 111-122 - [c26]Asli Atabek, Egehan Eralp, Mehmet Emre Gursoy:
Trust, Privacy and Security Aspects of Bias and Fairness in Machine Learning. TPS-ISA 2023: 111-121 - 2022
- [j11]Bulut Boru, Mehmet Emre Gursoy:
Forecasting Daily COVID-19 Case Counts Using Aggregate Mobility Statistics. Data 7(11): 166 (2022) - [j10]Mehmet Emre Gursoy, Ling Liu, Ka Ho Chow, Stacey Truex, Wenqi Wei:
An Adversarial Approach to Protocol Analysis and Selection in Local Differential Privacy. IEEE Trans. Inf. Forensics Secur. 17: 1785-1799 (2022) - [c25]Berke Ataseven, Alireza Madani, Beren Semiz, Mehmet Emre Gursoy:
Physical Activity Recognition using Deep Transfer Learning with Convolutional Neural Networks. DASC/PiCom/CBDCom/CyberSciTech 2022: 1-6 - [c24]Pinar Erbil, Mehmet Emre Gursoy:
Detection and Mitigation of Targeted Data Poisoning Attacks in Federated Learning. DASC/PiCom/CBDCom/CyberSciTech 2022: 1-8 - [c23]Atakan Kara, Nursena Köprücü, Mehmet Emre Gursoy:
Beta Poisoning Attacks Against Machine Learning Models: Extensions, Limitations and Defenses. TPS-ISA 2022: 178-187 - [c22]Pinar Erbil, Mehmet Emre Gursoy:
Defending Against Targeted Poisoning Attacks in Federated Learning. TPS-ISA 2022: 198-207 - 2021
- [j9]Mehmet Emre Gursoy, Acar Tamersoy, Stacey Truex, Wenqi Wei, Ling Liu:
Secure and Utility-Aware Data Collection with Condensed Local Differential Privacy. IEEE Trans. Dependable Secur. Comput. 18(5): 2365-2378 (2021) - [j8]Stacey Truex, Ling Liu, Mehmet Emre Gursoy, Lei Yu, Wenqi Wei:
Demystifying Membership Inference Attacks in Machine Learning as a Service. IEEE Trans. Serv. Comput. 14(6): 2073-2089 (2021) - [c21]Beren Semiz, Mehmet Emre Gursoy, Md. Mobashir Hasan Shandhi, Lara Orlandic, Vincent John Mooney, Omer T. Inan:
Automatic Subject Identification Using Scale-Based Ballistocardiogram Signals. MobiHealth 2021: 281-292 - [c20]Stacey Truex, Ling Liu, Mehmet Emre Gursoy, Wenqi Wei, Ka Ho Chow:
The TSC-PFed Architecture for Privacy-Preserving FL. TPS-ISA 2021: 207-216 - 2020
- [j7]Ali Inan, Mehmet Emre Gursoy, Yücel Saygin:
Sensitivity Analysis for Non-Interactive Differential Privacy: Bounds and Efficient Algorithms. IEEE Trans. Dependable Secur. Comput. 17(1): 194-207 (2020) - [j6]Emre Kaplan, Mehmet Emre Gursoy, Mehmet Ercan Nergiz, Yücel Saygin:
Known Sample Attacks on Relation Preserving Data Transformations. IEEE Trans. Dependable Secur. Comput. 17(2): 443-450 (2020) - [c19]Ka Ho Chow, Ling Liu, Mehmet Emre Gursoy, Stacey Truex, Wenqi Wei, Yanzhao Wu:
Understanding Object Detection Through an Adversarial Lens. ESORICS (2) 2020: 460-481 - [c18]Vale Tolpegin, Stacey Truex, Mehmet Emre Gursoy, Ling Liu:
Data Poisoning Attacks Against Federated Learning Systems. ESORICS (1) 2020: 480-501 - [c17]Wenqi Wei, Ling Liu, Margaret Loper, Ka Ho Chow, Mehmet Emre Gursoy, Stacey Truex, Yanzhao Wu:
A Framework for Evaluating Client Privacy Leakages in Federated Learning. ESORICS (1) 2020: 545-566 - [c16]Stacey Truex, Ling Liu, Ka Ho Chow, Mehmet Emre Gursoy, Wenqi Wei:
LDP-Fed: federated learning with local differential privacy. EdgeSys@EuroSys 2020: 61-66 - [c15]Wenqi Wei, Ling Liu, Margaret Loper, Ka Ho Chow, Mehmet Emre Gursoy, Stacey Truex, Yanzhao Wu:
Cross-Layer Strategic Ensemble Defense Against Adversarial Examples. ICNC 2020: 456-460 - [c14]Mehmet Emre Gursoy, Vivekanand Rajasekar, Ling Liu:
Utility-Optimized Synthesis of Differentially Private Location Traces. TPS-ISA 2020: 30-39 - [c13]Wenqi Wei, Ling Liu, Margaret Loper, Ka Ho Chow, Mehmet Emre Gursoy, Stacey Truex, Yanzhao Wu:
Adversarial Deception in Deep Learning: Analysis and Mitigation. TPS-ISA 2020: 236-245 - [c12]Ka Ho Chow, Ling Liu, Margaret Loper, Juhyun Bae, Mehmet Emre Gursoy, Stacey Truex, Wenqi Wei, Yanzhao Wu:
Adversarial Objectness Gradient Attacks in Real-time Object Detection Systems. TPS-ISA 2020: 263-272 - [i14]Ka Ho Chow, Ling Liu, Mehmet Emre Gursoy, Stacey Truex, Wenqi Wei, Yanzhao Wu:
TOG: Targeted Adversarial Objectness Gradient Attacks on Real-time Object Detection Systems. CoRR abs/2004.04320 (2020) - [i13]Wenqi Wei, Ling Liu, Margaret Loper, Ka Ho Chow, Mehmet Emre Gursoy, Stacey Truex, Yanzhao Wu:
A Framework for Evaluating Gradient Leakage Attacks in Federated Learning. CoRR abs/2004.10397 (2020) - [i12]Stacey Truex, Ling Liu, Ka Ho Chow, Mehmet Emre Gursoy, Wenqi Wei:
LDP-Fed: Federated Learning with Local Differential Privacy. CoRR abs/2006.03637 (2020) - [i11]Ka Ho Chow, Ling Liu, Mehmet Emre Gursoy, Stacey Truex, Wenqi Wei, Yanzhao Wu:
Understanding Object Detection Through An Adversarial Lens. CoRR abs/2007.05828 (2020) - [i10]Vale Tolpegin, Stacey Truex, Mehmet Emre Gursoy, Ling Liu:
Data Poisoning Attacks Against Federated Learning Systems. CoRR abs/2007.08432 (2020) - [i9]Mehmet Emre Gursoy, Vivekanand Rajasekar, Ling Liu:
Utility-Optimized Synthesis of Differentially Private Location Traces. CoRR abs/2009.06505 (2020)
2010 – 2019
- 2019
- [j5]Mehmet Emre Gursoy, Ling Liu, Stacey Truex, Lei Yu:
Differentially Private and Utility Preserving Publication of Trajectory Data. IEEE Trans. Mob. Comput. 18(10): 2315-2329 (2019) - [c11]Vikram Krishnamurthy, Kusha Nezafati, Juhyun Bae, Mehmet Emre Gursoy, Mian Zhong, Vikrant Singh:
Classification of Driving Behavior Events Utilizing Kinematic Classification and Machine Learning for Down Sampled Time Series Data. IEEE BigData 2019: 3789-3796 - [c10]Lei Yu, Qi Zhang, Donna Dillenberger, Ling Liu, Calton Pu, Ka Ho Chow, Mehmet Emre Gursoy, Stacey Truex, Hong Min, Arun Iyengar, Gong Su:
GRAHIES: Multi-Scale Graph Representation Learning with Latent Hierarchical Structure. CogMI 2019: 8-15 - [c9]Ling Liu, Wenqi Wei, Ka Ho Chow, Margaret Loper, Mehmet Emre Gursoy, Stacey Truex, Yanzhao Wu:
Deep Neural Network Ensembles Against Deception: Ensemble Diversity, Accuracy and Robustness. MASS 2019: 274-282 - [c8]Lei Yu, Ling Liu, Calton Pu, Mehmet Emre Gursoy, Stacey Truex:
Differentially Private Model Publishing for Deep Learning. IEEE Symposium on Security and Privacy 2019: 332-349 - [c7]Stacey Truex, Ling Liu, Mehmet Emre Gursoy, Wenqi Wei, Lei Yu:
Effects of Differential Privacy and Data Skewness on Membership Inference Vulnerability. TPS-ISA 2019: 82-91 - [i8]Lei Yu, Ling Liu, Calton Pu, Mehmet Emre Gursoy, Stacey Truex:
Differentially Private Model Publishing for Deep Learning. CoRR abs/1904.02200 (2019) - [i7]Mehmet Emre Gursoy, Acar Tamersoy, Stacey Truex, Wenqi Wei, Ling Liu:
Secure and Utility-Aware Data Collection with Condensed Local Differential Privacy. CoRR abs/1905.06361 (2019) - [i6]Emre Yigitoglu, Mehmet Emre Gursoy, Ling Liu:
Utility-aware and privacy-preserving mobile query services. CoRR abs/1907.06778 (2019) - [i5]Ling Liu, Wenqi Wei, Ka Ho Chow, Margaret Loper, Mehmet Emre Gursoy, Stacey Truex, Yanzhao Wu:
Deep Neural Network Ensembles against Deception: Ensemble Diversity, Accuracy and Robustness. CoRR abs/1908.11091 (2019) - [i4]Wenqi Wei, Ling Liu, Margaret Loper, Ka Ho Chow, Mehmet Emre Gursoy, Stacey Truex, Yanzhao Wu:
Cross-Layer Strategic Ensemble Defense Against Adversarial Examples. CoRR abs/1910.01742 (2019) - [i3]Stacey Truex, Ling Liu, Mehmet Emre Gursoy, Wenqi Wei, Lei Yu:
Effects of Differential Privacy and Data Skewness on Membership Inference Vulnerability. CoRR abs/1911.09777 (2019) - 2018
- [j4]Emre Kaplan, Mehmet Emre Gursoy, Mehmet Ercan Nergiz, Yücel Saygin:
Location disclosure risks of releasing trajectory distances. Data Knowl. Eng. 113: 43-63 (2018) - [c6]Emre Yigitoglu, Mehmet Emre Gursoy, Ling Liu, Margaret Loper, Bhuvan Bamba, Kisung Lee:
PrivacyZone: A Novel Approach to Protecting Location Privacy of Mobile Users. IEEE BigData 2018: 1238-1247 - [c5]Mehmet Emre Gursoy, Ling Liu, Stacey Truex, Lei Yu, Wenqi Wei:
Utility-Aware Synthesis of Differentially Private and Attack-Resilient Location Traces. CCS 2018: 196-211 - [i2]Wenqi Wei, Ling Liu, Stacey Truex, Lei Yu, Mehmet Emre Gursoy:
Adversarial Examples in Deep Learning: Characterization and Divergence. CoRR abs/1807.00051 (2018) - [i1]Stacey Truex, Ling Liu, Mehmet Emre Gursoy, Lei Yu, Wenqi Wei:
Towards Demystifying Membership Inference Attacks. CoRR abs/1807.09173 (2018) - 2017
- [j3]Mehmet Emre Gursoy, Ali Inan, Mehmet Ercan Nergiz, Yücel Saygin:
Differentially private nearest neighbor classification. Data Min. Knowl. Discov. 31(5): 1544-1575 (2017) - [j2]Mehmet Emre Gursoy, Ali Inan, Mehmet Ercan Nergiz, Yücel Saygin:
Privacy-Preserving Learning Analytics: Challenges and Techniques. IEEE Trans. Learn. Technol. 10(1): 68-81 (2017) - [c4]Stacey Truex, Ling Liu, Mehmet Emre Gursoy, Lei Yu:
Privacy-Preserving Inductive Learning with Decision Trees. BigData Congress 2017: 57-64 - 2016
- [j1]Ismet Ozalp, Mehmet Emre Gursoy, Mehmet Ercan Nergiz, Yücel Saygin:
Privacy-Preserving Publishing of Hierarchical Data. ACM Trans. Priv. Secur. 19(3): 7:1-7:29 (2016) - [c3]Emir Esmerdag, Mehmet Emre Gursoy, Ali Inan, Yücel Saygin:
Explode: An Extensible Platform for Differentially Private Data Analysis. ICDM Workshops 2016: 1300-1303 - [c2]Ali Inan, Mehmet Emre Gursoy, Emir Esmerdag, Yücel Saygin:
Graph-based modelling of query sets for differential privacy. SSDBM 2016: 3:1-3:10 - 2015
- [c1]Mevlut Turker Garip, Mehmet Emre Gursoy, Peter L. Reiher, Mario Gerla:
Scalable reactive vehicle-to-vehicle congestion avoidance mechanism. CCNC 2015: 943-948
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint