Z. Berkay Celik
Z. Berkay Celik
Verified email at purdue.edu - Homepage
Cited by
Cited by
The limitations of deep learning in adversarial settings
N Papernot, P McDaniel, S Jha, M Fredrikson, ZB Celik, A Swami
2016 IEEE European symposium on security and privacy (EuroS&P), 372-387, 2016
Practical black-box attacks against machine learning
N Papernot, P McDaniel, I Goodfellow, S Jha, ZB Celik, A Swami
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
Practical black-box attacks against deep learning systems using adversarial examples
N Papernot, P McDaniel, I Goodfellow, S Jha, ZB Celik, A Swami
arXiv preprint arXiv:1602.02697 1 (2), 3, 2016
Sensitive Information Tracking in Commodity IoT
ZB Celik, L Babun, AK Sikder, H Aksu, G Tan, P McDaniel, AS Uluagac
27th {USENIX} Security Symposium ({USENIX} Security 18, 2018
Machine Learning in Adversarial Settings
P McDaniel, N Papernot, ZB Celik
IEEE Security & Privacy Magazine 14 (3), 2016
Soteria: Automated IoT Safety and Security Analysis
ZB Celik, P McDaniel, G Tan
2018 {USENIX} Annual Technical Conference ({USENIX} {ATC} 18), 2018
IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT
ZB Celik, G Tan, P McDaniel
Network and Distributed System Security Symposium (NDSS), 2019
Program analysis of commodity IoT applications for security and privacy: Challenges and opportunities
ZB Celik, E Fernandes, E Pauley, G Tan, P McDaniel
ACM Computing Surveys (CSUR) 52 (4), 1-30, 2019
Malware Traffic Detection using Tamper Resistant Features
ZB Celik, RJ Walls, P McDaniel, A Swami
Military Communications Conference, MILCOM, 2015
Salting public traces with attack traffic to test flow classifiers
ZB Celik, J Raghuram, G Kesidis, DJ Miller
In USENIX 4th CSET Workshop, 2011
Detection of fast-flux networks using various DNS feature sets
ZB Celik, S Oktug
IEEE Symposium on Computers and Communications (ISCC), 2013, 000868-000873, 2013
Patient-driven privacy control through generalized distillation
ZB Celik, D Lopez-Paz, P McDaniel
IEEE Symposium on Privacy-Aware Computing (PAC), 2017
Verifying internet of things safety and security in physical spaces
ZB Celik, P McDaniel, G Tan, L Babun, AS Uluagac
IEEE Security & Privacy 17 (5), 30-37, 2019
Detection under Privileged Information
ZB Celik, P McDaniel, R Izmailov, N Papernot, R Sheatsley, R Alvarez, ...
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
Achieving Secure and Differentially Private Computations in Multiparty Settings
A Acar, ZB Celik, H Aksu, AS Uluagac, P McDaniel
IEEE Symposium on Privacy-Aware Computing (PAC), 2017
Real-time analysis of privacy-(un) aware IoT applications
L Babun, ZB Celik, P McDaniel, AS Uluagac
Privacy Enhancing Technologies Symposium (PETS), 2021
Kratos: multi-user multi-device-aware access control system for the smart home
AK Sikder, L Babun, ZB Celik, A Acar, H Aksu, P McDaniel, E Kirda, ...
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020
Extending detection with privileged information via generalized distillation
ZB Celik, P McDaniel
2018 IEEE Security and Privacy Workshops (SPW), 83-88, 2018
Feature cultivation in privileged information-augmented detection
ZB Celik, P McDaniel, R Izmailov
Proceedings of the 3rd ACM on International Workshop on Security And Privacy …, 2017
Proof and Implementation of Algorithmic Realization of Learning Using Privileged Information (LUPI) Paradigm: SVM+
ZB Celik, R Izmailov, P McDaniel
Department of Computer Science and Engineering, Pennsylvania State …, 2015
The system can't perform the operation now. Try again later.
Articles 1–20