Search Results for author: Kemal Akkaya

Found 8 papers, 2 papers with code

An Evaluation of Cryptocurrency Payment Channel Networks and Their Privacy Implications

no code implementations4 Feb 2021 Enes Erdin, Suat Mercan, Kemal Akkaya

After discussing several emerging attacks on user/business privacy in these payment channel networks, we qualitatively evaluate them based on a number of privacy metrics that relate to our case.

Cryptography and Security

Cryptocurrency Solutions to Enable Micro-payments in Consumer IoT

no code implementations4 Feb 2021 Suat Mercan, Ahmet Kurt, Enes Erdin, Kemal Akkaya

The successful amalgamation of cryptocurrency and consumer Internet of Things (IoT) devices can pave the way for novel applications in machine-to-machine economy.

Cryptography and Security

Server-side Fingerprint-Based Indoor Localization Using Encrypted Sorting

2 code implementations26 Aug 2020 Andrew Quijano, Kemal Akkaya

GPS signals, the main origin of navigation, are not functional in indoor environments.

Cryptography and Security

A Cost-efficient IoT Forensics Framework with Blockchain

no code implementations30 Apr 2020 Suat Mercan, Mumin Cebe, Ege Tekiner, Kemal Akkaya, Melissa Chang, Selcuk Uluagac

IoT devices have been adopted widely in the last decade which enabled collection of various data from different environments.

On Sharing Models Instead of Data using Mimic learning for Smart Health Applications

no code implementations24 Dec 2019 Mohamed Baza, Andrew Salazar, Mohamed Mahmoud, Mohamed Abdallah, Kemal Akkaya

In this paper, we tackle this problem by sharing the models instead of the original sensitive data by using the mimic learning approach.

BIG-bench Machine Learning

Heuristic Approach for Jointly Optimizing FeICIC and UAV Locations in Multi-Tier LTE-Advanced Public Safety HetNet

no code implementations7 Dec 2019 Abhaykumar Kumbhar, Hamidullah Binol, Simran Singh, Ismail Guvenc, Kemal Akkaya

Our simulation results show the heuristic algorithms outperform the brute-force technique and achieve better peak values of coverage probability and 5pSE.

U-PoT: A Honeypot Framework for UPnP-Based IoT Devices

1 code implementation13 Dec 2018 Muhammad A. Hakim, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya

Specifically, we introduce U-PoT: a novel honeypot framework for capturing attacks on IoT devices that use Universal Plug and Play (UPnP) protocol.

Cryptography and Security

Digital Forensics for IoT and WSNs

no code implementations22 Nov 2018 Umit Karabiyik, Kemal Akkaya

Therefore, there is a great interest and need for understanding digital forensics applications in WSN and IoT realms.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.