default search action
Ali Gökhan Yavuz
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 1999
- [b1]Ali Gökhan Yavuz:
Paralel kanal-PCI yerel yolu bağlantısının gerçeklenmesi ile ana bilgisayar sisteminin PCI uyumlu çevre birimlerinin kullanmasına yönelik bir sistem (Design and application of a new system for the interconnection of the parallel channel with the PCI local bus). Yıldız Technical University, Turkey, 1999
Journal Articles
- 2024
- [j13]Alper Egitmen, Ali Gökhan Yavuz, Sirma Yavuz:
TRConv: Multi-Platform Malware Classification via Target Regulated Convolutions. IEEE Access 12: 71492-71504 (2024) - 2022
- [j12]Yunus Emre Seyyar, Ali Gökhan Yavuz, Halil Murat Ünver:
An Attack Detection Framework Based on BERT and Deep Learning. IEEE Access 10: 68633-68644 (2022) - 2021
- [j11]Fuat Ögme, Ali Gökhan Yavuz, M. Amaç Güvensan, M. Elif Karsligil:
Temporal Transaction Scraping Assisted Point of Compromise Detection With Autoencoder Based Feature Engineering. IEEE Access 9: 109536-109547 (2021) - [j10]Ayse Bilge Gunduz, Berk Taskin, Ali Gökhan Yavuz, Mine Elif Karsligil:
A better way of extracting dominant colors using salient objects with semantic segmentation. Eng. Appl. Artif. Intell. 100: 104204 (2021) - 2020
- [j9]Baris Can, Ali Gökhan Yavuz, M. Elif Karsligil, M. Amaç Güvensan:
A Closer Look Into the Characteristics of Fraudulent Card Transactions. IEEE Access 8: 166095-166109 (2020) - [j8]Alper Egitmen, Irfan Bulut, R. Can Aygun, Ayse Bilge Gunduz, Omer Seyrekbasan, Ali Gökhan Yavuz:
Combat Mobile Evasive Malware via Skip-Gram-Based Malware Detection. Secur. Commun. Networks 2020: 6726147:1-6726147:10 (2020) - 2017
- [j7]M. Amaç Güvensan, A. Oguz Kansiz, N. Cihan Camgoz, H. Irem Türkmen, Ali Gökhan Yavuz, M. Elif Karsligil:
An Energy-Efficient Multi-Tier Architecture for Fall Detection on Smartphones. Sensors 17(7): 1487 (2017) - 2015
- [j6]Sinan Kaplan, Mehmet Amaç Güvensan, Ali Gökhan Yavuz, Yasin Karalurt:
Driver Behavior Analysis for Safe Driving: A Survey. IEEE Trans. Intell. Transp. Syst. 16(6): 3017-3032 (2015) - 2014
- [j5]Z. Cihan Taysi, Ali Gökhan Yavuz, M. Amaç Güvensan, M. Elif Karsligil:
In situ image processing capabilities of ARM-based micro-controllers. J. Real Time Image Process. 9(1): 111-125 (2014) - 2013
- [j4]M. Amaç Güvensan, Ali Gökhan Yavuz:
Hybrid movement strategy in self-orienting directional sensor networks. Ad Hoc Networks 11(3): 1075-1090 (2013) - [j3]Ziya Cihan Taysi, Ali Gökhan Yavuz:
ETSI compliant GeoNetworking protocol layer implementation for IVC simulations. Hum. centric Comput. Inf. Sci. 3: 4 (2013) - 2012
- [j2]Z. Cihan Taysi, Ali Gökhan Yavuz:
Routing Protocols for GeoNet: A Survey. IEEE Trans. Intell. Transp. Syst. 13(2): 939-954 (2012) - 2011
- [j1]M. Amaç Güvensan, Ali Gökhan Yavuz:
On coverage issues in directional sensor networks: A survey. Ad Hoc Networks 9(7): 1238-1255 (2011)
Conference and Workshop Papers
- 2022
- [c22]Yunus Emre Seyyar, Ali Gökhan Yavuz, Halil Murat Ünver:
Detection of Web Attacks Using the BERT Model. SIU 2022: 1-4 - 2021
- [c21]Ensar Bayhan, Ali Gökhan Yavuz, M. Amaç Güvensan, M. Elif Karsligil:
The Effect of Feature Selection on Credit Card Fraud Detection Success. SIU 2021: 1-4 - [c20]Ayse Bilge Gündüz, Ali Gökhan Yavuz:
Comparative Analysis of Word Vectoring Methods for Malware Detection. SIU 2021: 1-4 - 2020
- [c19]Fuat Ögme, M. Elif Karsligil, Ali Gökhan Yavuz, M. Amaç Güvensan:
Point of Compromise Detection with Unsupervised Learning. SIU 2020: 1-4 - 2018
- [c18]Ugur Cekmez, Zeki Erdem, Ali Gökhan Yavuz, Ozgur Koray Sahingoz, Ali Buldu:
Network anomaly detection with deep learning. SIU 2018: 1-4 - [c17]Burak Dusun, Irfan Bulut, R. Can Aygun, Ali Gökhan Yavuz:
Combat mobile malware via N-gram based deep learning. SIU 2018: 1-4 - 2017
- [c16]Irfan Bulut, Ali Gökhan Yavuz, R. Can Aygun:
Combat Mobile Evasive Malware via Deep Learning. CECC 2017: 77-88 - [c15]R. Can Aygun, Ali Gökhan Yavuz:
Network Anomaly Detection with Stochastically Improved Autoencoder Based Models. CSCloud 2017: 193-198 - [c14]Baris Yamansavascilar, M. Amaç Güvensan, Ali Gökhan Yavuz, M. Elif Karsligil:
Application identification via network traffic classification. ICNC 2017: 843-848 - [c13]R. Can Aygun, Ali Gökhan Yavuz:
A stochastic data discrimination based autoencoder approach for network anomaly detection. SIU 2017: 1-4 - [c12]Irfan Bulut, Ali Gökhan Yavuz:
Mobile malware detection using deep neural network. SIU 2017: 1-4 - [c11]M. Elif Karsligil, Ali Gökhan Yavuz, M. Amaç Güvensan, Khadija Hanifi, Hasan Bank:
Network intrusion detection using machine learning anomaly detection algorithms. SIU 2017: 1-4 - 2013
- [c10]Recep Ozturk, M. Amaç Güvensan, Ali Gökhan Yavuz:
simDSN: A Simulation Platform for the Sensing Coverage Problem in Directional Sensor Networks. DS-RT 2013: 41-46 - [c9]N. Cihan Camgoz, Z. Cihan Taysi, M. Amaç Güvensan, M. Elif Karsligil, Ali Gökhan Yavuz:
A fast and accurate motion detection algorithm for embedded systems. SIU 2013: 1-4 - [c8]Z. Cihan Taysi, M. Elif Karsligil, Ali Gökhan Yavuz, Resit Sahin, Taner Yilmaz, Hüseyin Demirel:
Machine learning based IP traffic classfication. SIU 2013: 1-4 - 2012
- [c7]N. Cihan Camgoz, Recep Ozturk, M. Amaç Güvensan, Z. Cihan Taysi, Ali Gökhan Yavuz:
Image processing capabilities of new generation arm cores for WMSNs. SIU 2012: 1-4 - [c6]M. Amaç Güvensan, Ali Gökhan Yavuz:
Motility-based coverage enhancement in directional sensor networks. SIU 2012: 1-4 - [c5]Z. Cihan Taysi, Ali Gökhan Yavuz:
ETSI complaint Geonetworking protocol layer implementation for NCTUNS. SIU 2012: 1-4 - 2011
- [c4]M. Amaç Güvensan, Ali Gökhan Yavuz:
A New Coverage Improvement Algorithm Based on Motility Capability of Directional Sensor Nodes. ADHOC-NOW 2011: 206-219 - [c3]M. Amaç Güvensan, Ali Gökhan Yavuz, Z. Cihan Taysi, M. Elif Karsligil, Esra Celik:
Image Processing Capabilities of ARM-based Micro-controllers for Visual Sensor Networks. EUC 2011: 243-248 - 2008
- [c2]Celalettin Kilinc, Ali Gökhan Yavuz:
Applying SRP on SIP Authentication. SECRYPT 2008: 227-231 - 2006
- [c1]M. Amaç Güvensan, Ali Gökhan Yavuz:
Protocol Independent Lightweight Secure Communication. SECRYPT 2006: 211-217
Coauthor Index
aka: Mehmet Amaç Güvensan
aka: Mine Elif Karsligil
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint