Zum Hauptinhalt springen

Showing 1–13 of 13 results for author: Ozmen, O

Searching in archive cs. Search in all archives.
.
  1. arXiv:2208.01674  [pdf

    eess.IV cs.CV cs.LG

    Diagnosis of Paratuberculosis in Histopathological Images Based on Explainable Artificial Intelligence and Deep Learning

    Authors: Tuncay Yiğit, Nilgün Şengöz, Özlem Özmen, Jude Hemanth, Ali Hakan Işık

    Abstract: Artificial intelligence holds great promise in medical imaging, especially histopathological imaging. However, artificial intelligence algorithms cannot fully explain the thought processes during decision-making. This situation has brought the problem of explainability, i.e., the black box problem, of artificial intelligence applications to the agenda: an algorithm simply responds without stating… ▽ More

    Submitted 2 August, 2022; originally announced August 2022.

    Comments: 7 pages

    MSC Class: 68T07 ACM Class: I.4.0

    Journal ref: Traitement du Signal, Vol. 39, No. 3, pp. 863-869, 2022

  2. Importance of Preprocessing in Histopathology Image Classification Using Deep Convolutional Neural Network

    Authors: Nilgun Sengoz, Tuncay Yigit, Ozlem Ozmen, Ali Hakan Isik

    Abstract: The aim of this study is to propose an alternative and hybrid solution method for diagnosing the disease from histopathology images taken from animals with paratuberculosis and intact intestine. In detail, the hybrid method is based on using both image processing and deep learning for better results. Reliable disease detection from histo-pathology images is known as an open problem in medical imag… ▽ More

    Submitted 24 January, 2022; originally announced January 2022.

    Comments: 6 Pages

    MSC Class: 68T01 (Primary); 68T45 (Secondary) ACM Class: I.4.0; I.4.3

  3. arXiv:2105.00645  [pdf, other

    cs.CR

    On the Safety Implications of Misordered Events and Commands in IoT Systems

    Authors: Furkan Goksel, Muslum Ozgur Ozmen, Michael Reeves, Basavesh Shivakumar, Z. Berkay Celik

    Abstract: IoT devices, equipped with embedded actuators and sensors, provide custom automation in the form of IoT apps. IoT apps subscribe to events and upon receipt, transmit actuation commands which trigger a set of actuators. Events and actuation commands follow paths in the IoT ecosystem such as sensor-to-edge, edge-to-cloud, and cloud-to-actuator, with different network and processing delays between th… ▽ More

    Submitted 3 May, 2021; originally announced May 2021.

  4. arXiv:2103.09345  [pdf, other

    cs.CR

    Compatible Certificateless and Identity-Based Cryptosystems for Heterogeneous IoT

    Authors: Rouzbeh Behnia, Attila A. Yavuz, Muslum Ozgur Ozmen, Tsz Hon Yuen

    Abstract: Certificates ensure the authenticity of users' public keys, however their overhead (e.g., certificate chains) might be too costly for some IoT systems like aerial drones. Certificate-free cryptosystems, like identity-based and certificateless systems, lift the burden of certificates and could be a suitable alternative for such IoTs. However, despite their merits, there is a research gap in achievi… ▽ More

    Submitted 16 March, 2021; originally announced March 2021.

    Journal ref: In International Conference on Information Security (pp. 39-58). Springer, Cham (2020)

  5. Discovering IoT Physical Channel Vulnerabilities

    Authors: Muslum Ozgur Ozmen, Xuansong Li, Andrew Chu, Z. Berkay Celik, Bardh Hoxha, Xiangyu Zhang

    Abstract: Smart homes contain diverse sensors and actuators controlled by IoT apps that provide custom automation. Prior works showed that an adversary could exploit physical interaction vulnerabilities among apps and put the users and environment at risk, e.g., to break into a house, an adversary turns on the heater to trigger an app that opens windows when the temperature exceeds a threshold. Currently, t… ▽ More

    Submitted 7 September, 2022; v1 submitted 2 February, 2021; originally announced February 2021.

    Comments: Published in ACM CCS 2022

  6. arXiv:2009.01188  [pdf, other

    cs.SI cs.CL

    A Stance Data Set on Polarized Conversations on Twitter about the Efficacy of Hydroxychloroquine as a Treatment for COVID-19

    Authors: Ece Çiğdem Mutlu, Toktam A. Oghaz, Jasser Jasser, Ege Tütüncüler, Amirarsalan Rajabi, Aida Tayebi, Ozlem Ozmen, Ivan Garibay

    Abstract: At the time of this study, the SARS-CoV-2 virus that caused the COVID-19 pandemic has spread significantly across the world. Considering the uncertainty about policies, health risks, financial difficulties, etc. the online media, specially the Twitter platform, is experiencing a high volume of activity related to this pandemic. Among the hot topics, the polarized debates about unconfirmed medicine… ▽ More

    Submitted 5 September, 2020; v1 submitted 19 August, 2020; originally announced September 2020.

    Comments: 11 pages, 3 figures

  7. arXiv:2005.09198  [pdf, ps, other

    cs.LG cs.AI cs.CL stat.ML

    Quantifying the Uncertainty of Precision Estimates for Rule based Text Classifiers

    Authors: James Nutaro, Ozgur Ozmen

    Abstract: Rule based classifiers that use the presence and absence of key sub-strings to make classification decisions have a natural mechanism for quantifying the uncertainty of their precision. For a binary classifier, the key insight is to treat partitions of the sub-string set induced by the documents as Bernoulli random variables. The mean value of each random variable is an estimate of the classifier'… ▽ More

    Submitted 18 May, 2020; originally announced May 2020.

  8. arXiv:1907.03911  [pdf, other

    cs.CR

    Ultra Lightweight Multiple-time Digital Signature for the Internet of Things Devices

    Authors: Attila A. Yavuz, Muslum Ozgur Ozmen

    Abstract: Digital signatures are basic cryptographic tools to provide authentication and integrity in the emerging ubiquitous systems in which resource-constrained devices are expected to operate securely and efficiently. However, existing digital signatures might not be fully practical for such resource-constrained devices (e.g., medical implants) that have energy limitations. Some other computationally ef… ▽ More

    Submitted 8 July, 2019; originally announced July 2019.

    Comments: Published in IEEE Transactions on Services Computing (IEEE TSC)

  9. arXiv:1904.06829  [pdf, other

    cs.CR cs.CY

    IoD-Crypt: A Lightweight Cryptographic Framework for Internet of Drones

    Authors: Muslum Ozgur Ozmen, Rouzbeh Behnia, Attila A. Yavuz

    Abstract: Internet of Drones (IoD) is expected to play a central role in many civilian and military applications, that require sensitive and mission-critical information to be processed. It is therefore vital to ensure the security and privacy of IoD. However, unlike traditional networks, IoD has a broader attack surface and is highly energy-constrained, which hinder the direct adoption of standard cryptogr… ▽ More

    Submitted 14 April, 2019; originally announced April 2019.

  10. Dronecrypt - An Efficient Cryptographic Framework for Small Aerial Drones

    Authors: Muslum Ozgur Ozmen, Attila A. Yavuz

    Abstract: Aerial drones are becoming an integral part of application domains including but not limited to, military operations, package delivery, construction, monitoring and search/rescue operations. It is critical to ensure the cyber security of networked aerial drone systems in these applications. Standard cryptographic services can be deployed to provide basic security services; however, they have been… ▽ More

    Submitted 28 March, 2019; originally announced March 2019.

    Comments: Published in IEEE Milcom 2018

  11. arXiv:1903.07786  [pdf, other

    cs.CR

    Energy-Aware Digital Signatures for Embedded Medical Devices

    Authors: Muslum Ozgur Ozmen, Attila A. Yavuz, Rouzbeh Behnia

    Abstract: Authentication is vital for the Internet of Things (IoT) applications involving sensitive data (e.g., medical and financial systems). Digital signatures offer scalable authentication with non-repudiation and public verifiability, which are necessary for auditing and dispute resolution in such IoT applications. However, digital signatures have been shown to be highly costly for low-end IoT devices,… ▽ More

    Submitted 18 March, 2019; originally announced March 2019.

    Comments: Original Publication in IEEE CNS 2019

  12. arXiv:1903.02142  [pdf, other

    cs.CR

    ARIS: Authentication for Real-Time IoT Systems

    Authors: Rouzbeh Behnia, Muslum Ozgur Ozmen, Attila A. Yavuz

    Abstract: Efficient authentication is vital for IoT applications with stringent minimum-delay requirements (e.g., energy delivery systems). This requirement becomes even more crucial when the IoT devices are battery-powered, like small aerial drones, and the efficiency of authentication directly translates to more operation time. Although some fast authentication techniques have been proposed, some of them… ▽ More

    Submitted 8 April, 2020; v1 submitted 5 March, 2019; originally announced March 2019.

  13. arXiv:1604.06121  [pdf, other

    q-bio.PE cs.MA

    Evaluation of Zika Vector Control Strategies Using Agent-Based Modeling

    Authors: Chathika Gunaratne, Mustafa Ilhan Akbas, Ivan Garibay, Ozlem Ozmen

    Abstract: Aedes Aegypti is the vector of several deadly diseases, including Zika. Effective and sustainable vector control measures must be deployed to keep A. aegypti numbers under control. The distribution of A. Aegypti is subject to spatial and climatic constraints. Using agent-based modeling, we model the population dynamics of A. aegypti subjected to the spatial and climatic constraints of a neighborho… ▽ More

    Submitted 4 August, 2016; v1 submitted 20 April, 2016; originally announced April 2016.

    Comments: 14 pages, 6 figures, 1 table, conference