Alert button
Picture for Ferhat Ozgur Catak

Ferhat Ozgur Catak

Alert button

Anomaly Detection in Power Markets and Systems

Add code
Bookmark button
Alert button
Dec 05, 2022
Ugur Halden, Umit Cali, Ferhat Ozgur Catak, Salvatore D'Arco, Francisco Bilendo

Figure 1 for Anomaly Detection in Power Markets and Systems
Viaarxiv icon

Mitigating Attacks on Artificial Intelligence-based Spectrum Sensing for Cellular Network Signals

Add code
Bookmark button
Alert button
Sep 27, 2022
Ferhat Ozgur Catak, Murat Kuzlu, Salih Sarp, Evren Catak, Umit Cali

Figure 1 for Mitigating Attacks on Artificial Intelligence-based Spectrum Sensing for Cellular Network Signals
Figure 2 for Mitigating Attacks on Artificial Intelligence-based Spectrum Sensing for Cellular Network Signals
Figure 3 for Mitigating Attacks on Artificial Intelligence-based Spectrum Sensing for Cellular Network Signals
Figure 4 for Mitigating Attacks on Artificial Intelligence-based Spectrum Sensing for Cellular Network Signals
Viaarxiv icon

Hybrid AI-based Anomaly Detection Model using Phasor Measurement Unit Data

Add code
Bookmark button
Alert button
Sep 21, 2022
Yuval Abraham Regev, Henrik Vassdal, Ugur Halden, Ferhat Ozgur Catak, Umit Cali

Figure 1 for Hybrid AI-based Anomaly Detection Model using Phasor Measurement Unit Data
Figure 2 for Hybrid AI-based Anomaly Detection Model using Phasor Measurement Unit Data
Figure 3 for Hybrid AI-based Anomaly Detection Model using Phasor Measurement Unit Data
Figure 4 for Hybrid AI-based Anomaly Detection Model using Phasor Measurement Unit Data
Viaarxiv icon

Defensive Distillation based Adversarial Attacks Mitigation Method for Channel Estimation using Deep Learning Models in Next-Generation Wireless Networks

Add code
Bookmark button
Alert button
Aug 12, 2022
Ferhat Ozgur Catak, Murat Kuzlu, Evren Catak, Umit Cali, Ozgur Guler

Figure 1 for Defensive Distillation based Adversarial Attacks Mitigation Method for Channel Estimation using Deep Learning Models in Next-Generation Wireless Networks
Figure 2 for Defensive Distillation based Adversarial Attacks Mitigation Method for Channel Estimation using Deep Learning Models in Next-Generation Wireless Networks
Figure 3 for Defensive Distillation based Adversarial Attacks Mitigation Method for Channel Estimation using Deep Learning Models in Next-Generation Wireless Networks
Figure 4 for Defensive Distillation based Adversarial Attacks Mitigation Method for Channel Estimation using Deep Learning Models in Next-Generation Wireless Networks
Viaarxiv icon

Homomorphic Encryption and Federated Learning based Privacy-Preserving CNN Training: COVID-19 Detection Use-Case

Add code
Bookmark button
Alert button
Apr 16, 2022
Febrianti Wibawa, Ferhat Ozgur Catak, Salih Sarp, Murat Kuzlu, Umit Cali

Figure 1 for Homomorphic Encryption and Federated Learning based Privacy-Preserving CNN Training: COVID-19 Detection Use-Case
Figure 2 for Homomorphic Encryption and Federated Learning based Privacy-Preserving CNN Training: COVID-19 Detection Use-Case
Figure 3 for Homomorphic Encryption and Federated Learning based Privacy-Preserving CNN Training: COVID-19 Detection Use-Case
Figure 4 for Homomorphic Encryption and Federated Learning based Privacy-Preserving CNN Training: COVID-19 Detection Use-Case
Viaarxiv icon

The Adversarial Security Mitigations of mmWave Beamforming Prediction Models using Defensive Distillation and Adversarial Retraining

Add code
Bookmark button
Alert button
Feb 16, 2022
Murat Kuzlu, Ferhat Ozgur Catak, Umit Cali, Evren Catak, Ozgur Guler

Figure 1 for The Adversarial Security Mitigations of mmWave Beamforming Prediction Models using Defensive Distillation and Adversarial Retraining
Figure 2 for The Adversarial Security Mitigations of mmWave Beamforming Prediction Models using Defensive Distillation and Adversarial Retraining
Figure 3 for The Adversarial Security Mitigations of mmWave Beamforming Prediction Models using Defensive Distillation and Adversarial Retraining
Figure 4 for The Adversarial Security Mitigations of mmWave Beamforming Prediction Models using Defensive Distillation and Adversarial Retraining
Viaarxiv icon

Unreasonable Effectiveness of Last Hidden Layer Activations

Add code
Bookmark button
Alert button
Feb 15, 2022
Omer Faruk Tuna, Ferhat Ozgur Catak, M. Taner Eskil

Figure 1 for Unreasonable Effectiveness of Last Hidden Layer Activations
Figure 2 for Unreasonable Effectiveness of Last Hidden Layer Activations
Figure 3 for Unreasonable Effectiveness of Last Hidden Layer Activations
Figure 4 for Unreasonable Effectiveness of Last Hidden Layer Activations
Viaarxiv icon

Secure Multi-Party Computation based Privacy Preserving Data Analysis in Healthcare IoT Systems

Add code
Bookmark button
Alert button
Sep 29, 2021
Kevser Şahinbaş, Ferhat Ozgur Catak

Figure 1 for Secure Multi-Party Computation based Privacy Preserving Data Analysis in Healthcare IoT Systems
Figure 2 for Secure Multi-Party Computation based Privacy Preserving Data Analysis in Healthcare IoT Systems
Figure 3 for Secure Multi-Party Computation based Privacy Preserving Data Analysis in Healthcare IoT Systems
Figure 4 for Secure Multi-Party Computation based Privacy Preserving Data Analysis in Healthcare IoT Systems
Viaarxiv icon

Prediction Surface Uncertainty Quantification in Object Detection Models for Autonomous Driving

Add code
Bookmark button
Alert button
Jul 11, 2021
Ferhat Ozgur Catak, Tao Yue, Shaukat Ali

Figure 1 for Prediction Surface Uncertainty Quantification in Object Detection Models for Autonomous Driving
Figure 2 for Prediction Surface Uncertainty Quantification in Object Detection Models for Autonomous Driving
Figure 3 for Prediction Surface Uncertainty Quantification in Object Detection Models for Autonomous Driving
Figure 4 for Prediction Surface Uncertainty Quantification in Object Detection Models for Autonomous Driving
Viaarxiv icon

Security Concerns on Machine Learning Solutions for 6G Networks in mmWave Beam Prediction

Add code
Bookmark button
Alert button
May 09, 2021
Ferhat Ozgur Catak, Evren Catak, Murat Kuzlu, Umit Cali

Figure 1 for Security Concerns on Machine Learning Solutions for 6G Networks in mmWave Beam Prediction
Figure 2 for Security Concerns on Machine Learning Solutions for 6G Networks in mmWave Beam Prediction
Figure 3 for Security Concerns on Machine Learning Solutions for 6G Networks in mmWave Beam Prediction
Figure 4 for Security Concerns on Machine Learning Solutions for 6G Networks in mmWave Beam Prediction
Viaarxiv icon