default search action
Furkan Alaca
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c9]Ahmed A. Harby, Eyad ElKhodary, Ronan Almeida, Drishti Sharma, Farhana H. Zulkernine, Furkan Alaca, Khalid Elgazzar, Amina Al-Marzouqi, Nabeel Al-Yateem, Syed Azizur Rahman:
Revolutionizing Healthcare Management: Architecture of a Web-based Medical Triage Service. COMPSAC 2024: 1887-1894 - [c8]Ian Pépin, Furkan Alaca, Farhana H. Zulkernine:
Privacy-Preserving Multi-Party Keyword-Based Classification of Unstructured Text Data. DCOSS-IoT 2024: 203-210 - [c7]Christopher Molloy, Furkan Alaca, Steven H. H. Ding:
Ch4os: Discretized Generative Adversarial Network for Functionality-Preserving Evasive Modification on Malware. ICANN (9) 2024: 461-475 - 2023
- [c6]Nafiz Sadman, Kazi Amit Hasan, Elyas Rashno, Furkan Alaca, Yuan Tian, Farhana H. Zulkernine:
Vulnerability of Open-Source Face Recognition Systems to Blackbox Attacks: A Case Study with InsightFace. SSCI 2023: 1164-1169 - [i3]Zhiwei Fu, Steven H. H. Ding, Furkan Alaca, Benjamin C. M. Fung, Philippe Charland:
Pluvio: Assembly Clone Search for Out-of-domain Architectures and Libraries through Transfer Learning and Conditional Variational Information Bottleneck. CoRR abs/2307.10631 (2023) - 2022
- [c5]Anthony Tam, Furkan Alaca, David Barrera:
If-This-Then-Allow-That (to Phone Home): A Trigger-Based Network Policy Enforcement Framework for Smart Homes. FPS 2022: 373-388 - 2021
- [j4]Furkan Alaca, Paul C. van Oorschot:
Comparative Analysis and Framework Evaluating Web Single Sign-on Systems. ACM Comput. Surv. 53(5): 112:1-112:34 (2021) - [j3]Furkan Alaca, AbdelRahman Abdou, Paul C. van Oorschot:
Comparative Analysis and Framework Evaluating Mimicry-Resistant and Invisible Web Authentication Schemes. IEEE Trans. Dependable Secur. Comput. 18(2): 534-549 (2021) - [c4]Larry Yueli Zhang, Andrew K. Petersen, Michael Liut, Bogdan Simion, Furkan Alaca:
A Multi-Course Report on the Experience of Unplanned Online Exams. SIGCSE 2021: 17-23
2010 – 2019
- 2018
- [i2]Furkan Alaca, Paul C. van Oorschot:
Comparative Analysis and Framework Evaluating Web Single Sign-On Systems. CoRR abs/1805.00094 (2018) - 2017
- [i1]Furkan Alaca, AbdelRahman Abdou, Paul C. van Oorschot:
Comparative Analysis and Framework Evaluating Mimicry-Resistant and Invisible Web Authentication Schemes. CoRR abs/1708.01706 (2017) - 2016
- [c3]Furkan Alaca, Paul C. van Oorschot:
Device fingerprinting for augmenting web authentication: classification and analysis of methods. ACSAC 2016: 289-301 - 2015
- [j2]Mohamed Alsharnouby, Furkan Alaca, Sonia Chiasson:
Why phishing still works: User strategies for combating phishing attacks. Int. J. Hum. Comput. Stud. 82: 69-82 (2015) - 2012
- [c2]Furkan Alaca, Akram Bin Sediq, Halim Yanikomeroglu:
A genetic algorithm based cell switch-off scheme for energy saving in dense cell deployments. GLOBECOM Workshops 2012: 63-68 - 2011
- [j1]Sebastian S. Szyszkowicz, Furkan Alaca, Halim Yanikomeroglu, John S. Thompson:
Aggregate Interference Distribution From Large Wireless Networks With Correlated Shadowing: An Analytical-Numerical-Simulation Approach. IEEE Trans. Veh. Technol. 60(6): 2752-2764 (2011) - 2010
- [c1]Sebastian S. Szyszkowicz, Furkan Alaca, Halim Yanikomeroglu, John S. Thompson:
Efficient Simulation using Shadowing Fields of Many Wireless Interferers with Correlated Shadowing. VTC Spring 2010: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-30 21:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint