Ayday, E., Jiang, X., & Malin, B.(2018).GenoPri'16: International Workshop on Genome Privacy and Security.IEEE/ACM Transactions on Computational Biology and Bioinformatics.
Von Thenen, N., Ayday, E., & Cicek, A Ercument, E.(2018).Re-identification of individuals in genomic data-sharing beacons via allele inference.Bioinformatics,35(3),365--371.
Ye, F., Chen, L., Hou, S., Hardy, W., & Liu, X.(2018).DeepAM: a heterogeneous deep learning framework for intelligent malware detection.KNOWLEDGE AND INFORMATION SYSTEMS,54(2),265-285.
Ailijiang, A., Bayir, M., Altiparmak, N., Peixoto, D., Arora, V., Assent, I., Athanassoulis, M., Ayday, E., Babalou, S., Bahrami, M., & Others, M.(2018).Appreciation to distributed and parallel databases reviewers.Distrib Parallel Databases,36, 1--3.
Ye, F., Hou, S., Chen, L., Liu, X., Zhao, L., Xu, S., Wang, J., & Xiong, Q.(2018).ICSD: An Automatic System for Insecure Code Snippet Detection in Stack Overflow over Heterogeneous Information Network.ASSOC COMPUTING MACHINERY.
Zhang, Y., Fan, Y., Ye, F., Liu, X., & Winstanley, E.(2018).Utilizing Social Media to Combat Opioid Addiction Epidemic: Automatic Detection of Opioid Users from Twitter.32nd AAAI Conference on Artificial Intelligence Workshops.
Liu, D., Li, Y., Xiao, X., Xie, Y., & Zhang, Y.(2018).Flood risk perception of rural households in western mountainous regions of Henan province, China.International Journal of Disaster Risk Reduction,27, 155-160.
Sar\iy\ild\iz, Mert B\"ulent, Cinbi\cs, Ramazan G\"okberk, & Ayday, E.(2018).Key Protected Classification for GAN Attack Resilient Collaborative Learning..
Qiao, S., Yan, B., & Li, J.(2017).Ensemble learning for protein multiplex subcellular localization prediction based on weighted KNN with different features.Applied Intelligence.
Morrison, P., Pandita, R., Xiao, X., Chillarege, R., & Williams, L.(2017).Are vulnerabilities discovered and resolved like other defects?.Empirical Software Engineering.
Tuna, G., Kogias, D., Gungor, V., Gezer, C., Ta\csk\in, Erhan, C., & Ayday, E.(2017).A survey on information security threats and solutions for Machine to Machine (M2M) communications.Journal of Parallel and Distributed Computing,109, 142--154.
Maxwell, S., Chance, M., & Koyutürk, M.(2017).Linearity of network proximity measures: implications for set-based queries and significance testing.Bioinformatics,33(9),1354--1361.
Ayday, E., Tang, Q., & Yilmaz, A.(2017).Cryptographic solutions for credibility and liability issues of genomic data.IEEE Transactions on Dependable and Secure Computing.