Shalev, R., Nakamura, D., Nishino, S., Rollins, A. M., Bezerra, H. M., Wilson, D. L., & Ray, S. L.(2017).Automated Volumetric Intravascular Plaque Classification Using Optical Coherence Tomography.AI Magazine,38(1).
Kale, G., Ayday, E., & Tastan, O.(2017).Supplementary Materials for A Utility Maximizing and Privacy Preserving Approach for Protecting Kinship in Genomic Databases..
Yang, W., Li, D., Lam, W., Xie, T., Wu, Z., & Xiao, X.(2017).Towards Privacy-Preserving Mobile Apps: A Balancing Act.Proceedings of the Symposium and Bootcamp on the Science of Security.
Wiredja, D., Ayati, M., Mazhar, S., Sangodkar, J., Maxwell, S., Schlatzer, D., Narla, G., Koyutürk, M., & Chance, M.(2017).Phosphoproteomics Profiling of Nonsmall Cell Lung Cancer Cells Treated with a Novel Phosphatase Activator.Proteomics.
Kale, G., Ayday, E., & Tastan, O.(2017).Supplementary Materials for A Utility Maximizing and Privacy Preserving Approach for Protecting Kinship in Genomic Databases..
Deznabi, I., Mobayen, M., Jafari, N., Tastan, O., & Ayday, E.(2017).An inference attack on genomic data using kinship, complex correlations, and phenotype information.IEEE/ACM transactions on computational biology and bioinformatics,15(4),1333--1343.
Halimi, A., & Ayday, E.(2017).Profile matching across unstructured online social networks: threats and countermeasures.arXiv preprint arXiv:1711.01815.
Hou, S., Chen, L., Ye, F., & Chen, L.(2017).Deep Analysis and Utilization of Malware's Social Relation Network for Its Detection.SPRINGER INTERNATIONAL PUBLISHING AG,10612, 31-42.
Hou, S., Ye, F., Song, Y., & Abdulhayoglu, M.(2017).HinDroid: An Intelligent Android Malware Detection System Based on Structured Heterogeneous Information Network.ASSOC COMPUTING MACHINERY.
Fan, Y., Zhang, Y., Ye, F., Liu, X., & Zheng, W.(2017).Social Media for Opioid Addiction Epidemiology: Automatic Detection of Opioid Addicts from Twitter and Case Studies.ASSOC COMPUTING MACHINERY.
Morrison, P., Pandita, R., Xiao, X., Chillarege, R., & Williams, L.(2017).Are vulnerabilities discovered and resolved like other defects?.Empirical Software Engineering.
Tuna, G., Kogias, D., Gungor, V., Gezer, C., Ta\csk\in, Erhan, C., & Ayday, E.(2017).A survey on information security threats and solutions for Machine to Machine (M2M) communications.Journal of Parallel and Distributed Computing,109, 142--154.
Maxwell, S., Chance, M., & Koyutürk, M.(2017).Linearity of network proximity measures: implications for set-based queries and significance testing.Bioinformatics,33(9),1354--1361.