no code implementations • 14 Jun 2024 • Bin Xiao, Burak Kantarci, Jiawen Kang, Dusit Niyato, Mohsen Guizani
Large language models (LLMs) have demonstrated remarkable capacities on various tasks, and integrating the capacities of LLMs into the Internet of Things (IoT) applications has drawn much research attention recently.
Ranked #4 on Semantic Parsing on WikiTableQuestions
no code implementations • 5 Mar 2024 • Ghazal Asemian, Mohammadreza Amini, Burak Kantarci, Melike Erol-Kantarci
Unlike the existing jamming detection algorithms that mostly rely on network parameters, we introduce a double-threshold deep learning jamming detector by focusing on the SSB.
no code implementations • 18 Jan 2024 • Jinxin Liu, Petar Djukic, Michel Kulhandjian, Burak Kantarci
We propose Deep Dict, a deep learning-based lossy time series compressor designed to achieve a high compression ratio while maintaining decompression error within a predefined range.
no code implementations • 3 Jan 2024 • Samhita Kuili, Kareem Dabbour, Irtiza Hasan, Andrea Herscovich, Burak Kantarci, Marcel Chenier, Melike Erol-Kantarci
Data privacy and protection through anonymization is a critical issue for network operators or data owners before it is forwarded for other possible use of data.
no code implementations • 11 Dec 2023 • Omer Melih Gul, Michel Kulhandjian, Burak Kantarci, Claude D'Amours, Azzedine Touazi, Cliff Ellement
This work uses a dataset that includes 5G, 4G, and WiFi samples, and it empowers a CDL+TDL-based augmentation technique in order to boost the learning performance of the DL model.
1 code implementation • 1 Dec 2023 • Bin Xiao, Murat Simsek, Burak Kantarci, Ala Abu Alkheir
However, existing detection-based models usually cannot perform as well as other types of solutions regarding cell-level TSR metrics, such as TEDS, and the underlying reasons limiting the performance of these models on the TSR task are also not well-explored.
no code implementations • 3 Sep 2023 • Jinxin Liu, Murat Simsek, Michele Nogueira, Burak Kantarci
Timely response of Network Intrusion Detection Systems (NIDS) is constrained by the flow generation process which requires accumulation of network packets.
no code implementations • 15 Jun 2023 • Zhiyan Chen, Murat Simsek, Burak Kantarci, Mehran Bagheri, Petar Djukic
Performance of XGBoost, which represents conventional ML, is evaluated.
1 code implementation • 30 May 2023 • Bin Xiao, Murat Simsek, Burak Kantarci, Ala Abu Alkheir
Table Detection (TD) is a fundamental task to enable visually rich document understanding, which requires the model to extract information without information loss.
no code implementations • 4 May 2023 • Bin Xiao, Murat Simsek, Burak Kantarci, Ala Abu Alkheir
Moreover, to enrich the data sources, we propose a new ICT-TD dataset using the PDF files of Information and Communication Technologies (ICT) commodities, a different domain containing unique samples that hardly appear in open datasets.
no code implementations • 21 Mar 2023 • Mohamed Amine Ferrag, Burak Kantarci, Lucas C. Cordeiro, Merouane Debbah, Kim-Kwang Raymond Choo
However, we need to also consider the potential of attacks targeting the underlying AI systems (e. g., adversaries seek to corrupt data on the IoT devices during local updates or corrupt the model updates); hence, in this article, we propose an anticipatory study for poisoning attacks in federated edge learning for digital twin 6G-enabled IoT environments.
no code implementations • 3 Nov 2022 • Bin Xiao, Yakup Akkaya, Murat Simsek, Burak Kantarci, Ala Abu Alkheir
Table Structure Recognition (TSR) aims to represent tables with complex structures in a machine-interpretable format so that the tabular data can be processed automatically.
no code implementations • 11 Aug 2022 • Bin Xiao, Murat Simsek, Burak Kantarci, Ala Abu Alkheir
To transform the tabular data in electronic documents into a machine-interpretable format and provide layout and semantic information for information extraction and interpretation, we define a Table Structure Recognition (TSR) task and a Table Cell Type Classification (CTC) task.
no code implementations • 9 Aug 2022 • Ahmed Omara, Burak Kantarci
With an inference attack, an adversary can collect real-time data from the communication between smart microgrids and a 5G gNodeB to train a surrogate (i. e., shadow) model of the targeted classifier at the edge.
no code implementations • 7 Apr 2022 • Zhiyan Chen, Jinxin Liu, Yu Shen, Murat Simsek, Burak Kantarci, Hussein T. Mouftah, Petar Djukic
Advanced persistent threat (APT) is prominent for cybercriminals to compromise networks, and it is crucial to long-term and harmful characteristics.
no code implementations • 8 Mar 2022 • Bin Xiao, Murat Simsek, Burak Kantarci, Ala Abu Alkheir
Table Structure Recognition (TSR) problem aims to recognize the structure of a table and transform the unstructured tables into a structured and machine-readable format so that the tabular data can be further analysed by the down-stream tasks, such as semantic modeling and information retrieval.
no code implementations • 17 Feb 2022 • Murat Simsek, Burak Kantarci, Azzedine Boukerche
After pre-clustered legitimate tasks are separated from the original dataset, the remaining dataset is used to train a Deep Neural Network (DeepNN) to reach the ultimate performance goal.
no code implementations • 16 Feb 2022 • Zhiyan Chen, Burak Kantarci
To this end, we propose a two-level cascading classifier that combines the GAN discriminator with a binary classifier to prevent adversarial fake tasks.
no code implementations • 6 Oct 2021 • Yakup Akkaya, Murat Simsek, Burak Kantarci, Shahzad Khan
Prior works have addressed this problem under table detection and table structure detection tasks.
no code implementations • 29 Aug 2021 • Jinxin Liu, Murat Simsek, Burak Kantarci, Melike Erol-Kantarci, Andrew Malton, Andrew Walenstein
The risk levels are associated with access control decisions recommended by a security policy.
no code implementations • 4 Jan 2021 • Zhiyan Chen, Murat Simsek, Burak Kantarci
Loss measurement considers the lost task values with respect to misclassification, where the final decision utilizes a risk-aware approach where the risk is formulated as a function of the utility loss.
no code implementations • 4 Jan 2021 • Nima Taherifard, Murat Simsek, Charles Lascelles, Burak Kantarci
Event characterization via vehicular sensors are utilized in safety and autonomous driving applications in vehicles.
no code implementations • 24 Jul 2020 • Safa Otoum, Burak Kantarci, Hussein Mouftah
Volunteer computing uses Internet-connected devices (laptops, PCs, smart devices, etc.