Ferhat Karakoç
YOU?
Author Swipe
View article: Security, Privacy, and Resilience Controls for the 6G End-to-End System Developed in Hexa-X-II
Security, Privacy, and Resilience Controls for the 6G End-to-End System Developed in Hexa-X-II Open
not available
View article: FASIL: A Challenge-Based Framework for Secure and Privacy-Preserving Federated Learning
FASIL: A Challenge-Based Framework for Secure and Privacy-Preserving Federated Learning Open
Enhancing privacy in federal learning (FL) without considering robustness can create an open door for attacks such as poisoning attacks on the FL process. Thus, addressing both the privacy and security aspects simultaneously becomes vital.…
View article: An Evaluation of Demographic, Clinical, Endoscopic and Pathological Findings in Children Who Underwent Colonoscopic Polypectomy: A Pediatric Gastroenterology Clinic Experience
An Evaluation of Demographic, Clinical, Endoscopic and Pathological Findings in Children Who Underwent Colonoscopic Polypectomy: A Pediatric Gastroenterology Clinic Experience Open
Objective: Gastrointestinal polyps form as a result of epithelial or submucosal tissues growing and protruding towards the intestinal lumen. These are seen at a rate of 2% in childhood. The aim of this study was to evaluate the demographic…
View article: A Survey On Security and Privacy Aspects and Solutions for Federated Learning in Mobile Communication Networks
A Survey On Security and Privacy Aspects and Solutions for Federated Learning in Mobile Communication Networks Open
In this study, we delve into cutting-edge solutions for security-centric, privacy-enhanced federated learning, a rapidly evolving area of research that bridges the gap between data privacy and collaborative machine learning. Our analysis o…
View article: A Survey and Guideline on Privacy Enhancing Technologies for Collaborative Machine Learning
A Survey and Guideline on Privacy Enhancing Technologies for Collaborative Machine Learning Open
As machine learning and artificial intelligence (ML/AI) are becoming more popular and advanced, there is a wish to turn sensitive data into valuable information via ML/AI techniques revealing only data that is allowed by concerned parties …
View article: Secure Aggregation Against Malicious Users
Secure Aggregation Against Malicious Users Open
International audience
View article: A Network-Based Positioning Method to Locate False Base Stations
A Network-Based Positioning Method to Locate False Base Stations Open
In recent years False Base Stations (FBSs) have received increased attention. A False Base Station can perform active or passive attacks against mobile devices or user equipment (UE) to steal private information, such as International Mobi…