Z. Berkay Celik
Z. Berkay Celik
Verified email at purdue.edu - Homepage
Cited by
Cited by
The limitations of deep learning in adversarial settings
N Papernot, P McDaniel, S Jha, M Fredrikson, ZB Celik, A Swami
2016 IEEE European symposium on security and privacy (EuroS&P), 372-387, 2016
Practical black-box attacks against machine learning
N Papernot, P McDaniel, I Goodfellow, S Jha, ZB Celik, A Swami
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
Practical black-box attacks against deep learning systems using adversarial examples
N Papernot, P McDaniel, I Goodfellow, S Jha, ZB Celik, A Swami
arXiv preprint arXiv:1602.02697 1 (2), 3, 2016
Sensitive Information Tracking in Commodity IoT
ZB Celik, L Babun, AK Sikder, H Aksu, G Tan, P McDaniel, AS Uluagac
27th {USENIX} Security Symposium ({USENIX} Security 18, 2018
Soteria: Automated IoT Safety and Security Analysis
ZB Celik, P McDaniel, G Tan
2018 {USENIX} Annual Technical Conference ({USENIX} {ATC} 18), 2018
Machine Learning in Adversarial Settings
P McDaniel, N Papernot, ZB Celik
IEEE Security & Privacy Magazine 14 (3), 2016
IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT
ZB Celik, G Tan, P McDaniel
Network and Distributed System Security Symposium (NDSS), 2019
Program analysis of commodity IoT applications for security and privacy: Challenges and opportunities
ZB Celik, E Fernandes, E Pauley, G Tan, P McDaniel
ACM Computing Surveys (CSUR) 52 (4), 1-30, 2019
Malware Traffic Detection using Tamper Resistant Features
ZB Celik, RJ Walls, P McDaniel, A Swami
Military Communications Conference, MILCOM, 2015
Salting public traces with attack traffic to test flow classifiers
ZB Celik, J Raghuram, G Kesidis, DJ Miller
In USENIX 4th CSET Workshop, 2011
Detection of fast-flux networks using various DNS feature sets
ZB Celik, S Oktug
IEEE Symposium on Computers and Communications (ISCC), 2013, 000868-000873, 2013
Patient-driven privacy control through generalized distillation
ZB Celik, D Lopez-Paz, P McDaniel
IEEE Symposium on Privacy-Aware Computing (PAC), 2017
Verifying internet of things safety and security in physical spaces
ZB Celik, P McDaniel, G Tan, L Babun, AS Uluagac
IEEE Security & Privacy 17 (5), 30-37, 2019
Real-time analysis of privacy-(un) aware IoT applications
L Babun, ZB Celik, P McDaniel, AS Uluagac
Privacy Enhancing Technologies Symposium (PETS), 2021
Kratos: multi-user multi-device-aware access control system for the smart home
AK Sikder, L Babun, ZB Celik, A Acar, H Aksu, P McDaniel, E Kirda, ...
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020
Achieving Secure and Differentially Private Computations in Multiparty Settings
A Acar, ZB Celik, H Aksu, AS Uluagac, P McDaniel
IEEE Symposium on Privacy-Aware Computing (PAC), 2017
Detection under Privileged Information
ZB Celik, P McDaniel, R Izmailov, N Papernot, R Sheatsley, R Alvarez, ...
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
Extending detection with privileged information via generalized distillation
ZB Celik, P McDaniel
2018 IEEE Security and Privacy Workshops (SPW), 83-88, 2018
Feature cultivation in privileged information-augmented detection
ZB Celik, P McDaniel, R Izmailov
Proceedings of the 3rd ACM on International Workshop on Security And Privacy …, 2017
What do you see? evaluation of explainable artificial intelligence (XAI) interpretability through neural backdoors
YS Lin, WC Lee, ZB Celik
arXiv preprint arXiv:2009.10639, 2020
The system can't perform the operation now. Try again later.
Articles 1–20