Brennan, S., & Rabinovich, M.(2018).Improving Communication Through Overlay Detours: Pipe Dream or Actionable Insight?.Int. Conf. on Distributed Computing Systems, IEEE.
Liu, D., Li, Y., Xiao, X., Xie, Y., & Zhang, Y.(2018).Flood risk perception of rural households in western mountainous regions of Henan province, China.International Journal of Disaster Risk Reduction,27, 155-160.
Sar\iy\ild\iz, Mert B\"ulent, Cinbi\cs, Ramazan G\"okberk, & Ayday, E.(2018).Key Protected Classification for GAN Attack Resilient Collaborative Learning..
Turchyn, S., & Ray, S.(2018).Gesture Annotation with a Visual Search Engine for Multimodal Communication Research.Proceedings of the Thirtieth Conference on Innovative Applications of Artificial Intelligence (IAAI-18).
Cao, J., Astorga, A., Srisakaokul, S., Wu, Z., Liu, X., Xiao, X., & Xie, T.(2018).Visualizing Path Exploration to Assist Problem Diagnosis for Structural Test Generation..
Ayday, E., Jiang, X., & Malin, B.(2018).GenoPri'16: International Workshop on Genome Privacy and Security.IEEE/ACM Transactions on Computational Biology and Bioinformatics,15(5),1403--1404.
Zhang, Y., Fan, Y., Hou, S., Liu, J., Ye, F., & Bourlai, T.(2018).iDetector: Automate Underground Forum Analysis Based on Heterogeneous Information Network.IEEE.
Deznabi, I., Mobayen, M., Jafari, N., Tastan, O., & Ayday, E.(2018).An inference attack on genomic data using kinship, complex correlations, and phenotype information.IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB),15(4),1333--1343.
De Andrade, Mariza, Daw, E., Kraja, A., Fisher, V., Wang, L., Van Ditzhuijzen, N., Li, J., Romanescu, R., Veenstra, J., Sun, R., Weng, H., & Zhou, W.(2018).The challenge of detecting genotype-by-methylation interaction: GAW20.BMC GENETICS,19
G\"ursoy, Gamze, Harmanci, A., Tang, H., Ayday, E., & Brenner, S.(2018).When Biology Gets Personal: Hidden Challenges of Privacy and Ethics in Biological Big Data.World Scientific.
Kale, G., Ayday, E., & Tastan, O.(2018).A utility maximizing and privacy preserving approach for protecting kinship in genomic databases.Bioinformatics,34(2),181--189.