Search Results for author: Burak Kantarci

Found 22 papers, 2 papers with code

DT-DDNN: A Physical Layer Security Attack Detector in 5G RF Domain for CAVs

no code implementations5 Mar 2024 Ghazal Asemian, Mohammadreza Amini, Burak Kantarci, Melike Erol-Kantarci

Unlike the existing jamming detection algorithms that mostly rely on network parameters, we introduce a double-threshold deep learning jamming detector by focusing on the SSB.

Deep Dict: Deep Learning-based Lossy Time Series Compressor for IoT Data

no code implementations18 Jan 2024 Jinxin Liu, Petar Djukic, Michel Kulhandjian, Burak Kantarci

We propose Deep Dict, a deep learning-based lossy time series compressor designed to achieve a high compression ratio while maintaining decompression error within a predefined range.

Time Series

Adversarial Machine Learning-Enabled Anonymization of OpenWiFi Data

no code implementations3 Jan 2024 Samhita Kuili, Kareem Dabbour, Irtiza Hasan, Andrea Herscovich, Burak Kantarci, Marcel Chenier, Melike Erol-Kantarci

Data privacy and protection through anonymization is a critical issue for network operators or data owners before it is forwarded for other possible use of data.

Clustering Generative Adversarial Network

On the Impact of CDL and TDL Augmentation for RF Fingerprinting under Impaired Channels

no code implementations11 Dec 2023 Omer Melih Gul, Michel Kulhandjian, Burak Kantarci, Claude D'Amours, Azzedine Touazi, Cliff Ellement

This work uses a dataset that includes 5G, 4G, and WiFi samples, and it empowers a CDL+TDL-based augmentation technique in order to boost the learning performance of the DL model.

Autonomous Vehicles

Rethinking Detection Based Table Structure Recognition for Visually Rich Document Images

1 code implementation1 Dec 2023 Bin Xiao, Murat Simsek, Burak Kantarci, Ala Abu Alkheir

However, existing detection-based models usually cannot perform as well as other types of solutions regarding cell-level TSR metrics, such as TEDS, and the underlying reasons limiting the performance of these models on the TSR task are also not well-explored.

Multidomain transformer-based deep learning for early detection of network intrusion

no code implementations3 Sep 2023 Jinxin Liu, Murat Simsek, Michele Nogueira, Burak Kantarci

Timely response of Network Intrusion Detection Systems (NIDS) is constrained by the flow generation process which requires accumulation of network packets.

Network Intrusion Detection Time Series

Table Detection for Visually Rich Document Images

1 code implementation30 May 2023 Bin Xiao, Murat Simsek, Burak Kantarci, Ala Abu Alkheir

Table Detection (TD) is a fundamental task to enable visually rich document understanding, which requires the model to extract information without information loss.

document understanding object-detection +2

Revisiting Table Detection Datasets for Visually Rich Documents

no code implementations4 May 2023 Bin Xiao, Murat Simsek, Burak Kantarci, Ala Abu Alkheir

Moreover, to enrich the data sources, we propose a new ICT-TD dataset using the PDF files of Information and Communication Technologies (ICT) commodities, a different domain containing unique samples that hardly appear in open datasets.

document understanding object-detection +2

Poisoning Attacks in Federated Edge Learning for Digital Twin 6G-enabled IoTs: An Anticipatory Study

no code implementations21 Mar 2023 Mohamed Amine Ferrag, Burak Kantarci, Lucas C. Cordeiro, Merouane Debbah, Kim-Kwang Raymond Choo

However, we need to also consider the potential of attacks targeting the underlying AI systems (e. g., adversaries seek to corrupt data on the IoT devices during local updates or corrupt the model updates); hence, in this article, we propose an anticipatory study for poisoning attacks in federated edge learning for digital twin 6G-enabled IoT environments.

Federated Learning Privacy Preserving

Efficient Information Sharing in ICT Supply Chain Social Network via Table Structure Recognition

no code implementations3 Nov 2022 Bin Xiao, Yakup Akkaya, Murat Simsek, Burak Kantarci, Ala Abu Alkheir

Table Structure Recognition (TSR) aims to represent tables with complex structures in a machine-interpretable format so that the tabular data can be processed automatically.

Management object-detection +1

Handling big tabular data of ICT supply chains: a multi-task, machine-interpretable approach

no code implementations11 Aug 2022 Bin Xiao, Murat Simsek, Burak Kantarci, Ala Abu Alkheir

To transform the tabular data in electronic documents into a machine-interpretable format and provide layout and semantic information for information extraction and interpretation, we define a Table Structure Recognition (TSR) task and a Table Cell Type Classification (CTC) task.

Attribute

Adversarial Machine Learning-Based Anticipation of Threats Against Vehicle-to-Microgrid Services

no code implementations9 Aug 2022 Ahmed Omara, Burak Kantarci

With an inference attack, an adversary can collect real-time data from the communication between smart microgrids and a 5G gNodeB to train a surrogate (i. e., shadow) model of the targeted classifier at the edge.

Inference Attack

Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats

no code implementations7 Apr 2022 Zhiyan Chen, Jinxin Liu, Yu Shen, Murat Simsek, Burak Kantarci, Hussein T. Mouftah, Petar Djukic

Advanced persistent threat (APT) is prominent for cybercriminals to compromise networks, and it is crucial to long-term and harmful characteristics.

Intrusion Detection

Table Structure Recognition with Conditional Attention

no code implementations8 Mar 2022 Bin Xiao, Murat Simsek, Burak Kantarci, Ala Abu Alkheir

Table Structure Recognition (TSR) problem aims to recognize the structure of a table and transform the unstructured tables into a structured and machine-readable format so that the tabular data can be further analysed by the down-stream tasks, such as semantic modeling and information retrieval.

Information Retrieval Retrieval

Collaborative Self Organizing Map with DeepNNs for Fake Task Prevention in Mobile Crowdsensing

no code implementations17 Feb 2022 Murat Simsek, Burak Kantarci, Azzedine Boukerche

After pre-clustered legitimate tasks are separated from the original dataset, the remaining dataset is used to train a Deep Neural Network (DeepNN) to reach the ultimate performance goal.

Data Poisoning

Generative Adversarial Network-Driven Detection of Adversarial Tasks in Mobile Crowdsensing

no code implementations16 Feb 2022 Zhiyan Chen, Burak Kantarci

To this end, we propose a two-level cascading classifier that combines the GAN discriminator with a binary classifier to prevent adversarial fake tasks.

Adversarial Attack Detection Generative Adversarial Network

On Cropped versus Uncropped Training Sets in Tabular Structure Detection

no code implementations6 Oct 2021 Yakup Akkaya, Murat Simsek, Burak Kantarci, Shahzad Khan

Prior works have addressed this problem under table detection and table structure detection tasks.

Table Detection

Risk-Aware Fine-Grained Access Control in Cyber-Physical Contexts

no code implementations29 Aug 2021 Jinxin Liu, Murat Simsek, Burak Kantarci, Melike Erol-Kantarci, Andrew Malton, Andrew Walenstein

The risk levels are associated with access control decisions recommended by a security policy.

Federated Learning-Based Risk-Aware Decision toMitigate Fake Task Impacts on CrowdsensingPlatforms

no code implementations4 Jan 2021 Zhiyan Chen, Murat Simsek, Burak Kantarci

Loss measurement considers the lost task values with respect to misclassification, where the final decision utilizes a risk-aware approach where the risk is formulated as a function of the utility loss.

Federated Learning

Cannot find the paper you are looking for? You can Submit a new open access paper.