no code implementations • 4 Feb 2021 • Enes Erdin, Suat Mercan, Kemal Akkaya
After discussing several emerging attacks on user/business privacy in these payment channel networks, we qualitatively evaluate them based on a number of privacy metrics that relate to our case.
Cryptography and Security
no code implementations • 4 Feb 2021 • Suat Mercan, Ahmet Kurt, Enes Erdin, Kemal Akkaya
The successful amalgamation of cryptocurrency and consumer Internet of Things (IoT) devices can pave the way for novel applications in machine-to-machine economy.
Cryptography and Security
2 code implementations • 26 Aug 2020 • Andrew Quijano, Kemal Akkaya
GPS signals, the main origin of navigation, are not functional in indoor environments.
Cryptography and Security
no code implementations • 30 Apr 2020 • Suat Mercan, Mumin Cebe, Ege Tekiner, Kemal Akkaya, Melissa Chang, Selcuk Uluagac
IoT devices have been adopted widely in the last decade which enabled collection of various data from different environments.
no code implementations • 24 Dec 2019 • Mohamed Baza, Andrew Salazar, Mohamed Mahmoud, Mohamed Abdallah, Kemal Akkaya
In this paper, we tackle this problem by sharing the models instead of the original sensitive data by using the mimic learning approach.
no code implementations • 7 Dec 2019 • Abhaykumar Kumbhar, Hamidullah Binol, Simran Singh, Ismail Guvenc, Kemal Akkaya
Our simulation results show the heuristic algorithms outperform the brute-force technique and achieve better peak values of coverage probability and 5pSE.
1 code implementation • 13 Dec 2018 • Muhammad A. Hakim, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya
Specifically, we introduce U-PoT: a novel honeypot framework for capturing attacks on IoT devices that use Universal Plug and Play (UPnP) protocol.
Cryptography and Security
no code implementations • 22 Nov 2018 • Umit Karabiyik, Kemal Akkaya
Therefore, there is a great interest and need for understanding digital forensics applications in WSN and IoT realms.
Cryptography and Security