Coskun, Baris
175  results:
Search for persons X
?
1

From Grim Reality to Practical Solution: Malware Classifica..:

, In: 2023 IEEE Symposium on Security and Privacy (SP),
Wu, Xian ; Guo, Wenbo ; Yan, Jia.. - p. 2602-2619 , 2023
 
?
2

Elastic Machine Learning Algorithms in Amazon SageMaker:

, In: Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data,
Liberty, Edo ; Karnin, Zohar ; Xiang, Bing... - p. 731-737 , 2020
 
?
3

Forecasting Suspicious Account Activity at Large-Scale Onli..:

, In: Financial Cryptography and Data Security; Lecture Notes in Computer Science,
 
?
4

CADENCE : Conditional Anomaly Detection for Events Using..:

, In: Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security,
 
?
5

Predicting Carbon Spectrum in Heteronuclear Single Quantum ..:

Karakaslar, Emin Onur ; Coskun, Baris ; Outilaft, Hassiba..
IEEE/ACM Transactions on Computational Biology and Bioinformatics.  , 2019
 
?
6

Nationality Classification Using Name Embeddings:

, In: Proceedings of the 2017 ACM on Conference on Information and Knowledge Management,
Ye, Junting ; Han, Shuchu ; Hu, Yifan... - p. 1897-1906 , 2017
 
?
7

Generating Look-alike Names For Security Challenges:

, In: Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security,
Han, Shuchu ; Hu, Yifan ; Skiena, Steven... - p. 57-67 , 2017
 
?
8

An Early Warning System for Suspicious Accounts:

, In: Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security,
 
?
9

Harvesting the low-hanging fruits : defending against au..:

, In: Proceedings of the 2016 New Security Paradigms Workshop,
 
?
10

Discovery of emergent malicious campaigns in cellular netwo..:

, In: Proceedings of the 29th Annual Computer Security Applications Conference,
Boggs, Nathaniel ; Wang, Wei ; Mathur, Suhas.. - p. 29-38 , 2013
 
?
11

Detecting hidden enemy lines in IP address space:

, In: Proceedings of the 2013 New Security Paradigms Workshop,
 
?
12

VPMN : virtual private mobile network towards mobility-a..:

, In: Proceedings of the second international workshop on Mobile cloud computing and services,
Baliga, Arati ; Chen, Xu ; Coskun, Baris... - p. 7-12 , 2011
 
?
13

Friends of an enemy : identifying local members of peer-..:

, In: Proceedings of the 26th Annual Computer Security Applications Conference,
Coskun, Baris ; Dietrich, Sven ; Memon, Nasir - p. 131-140 , 2010
 
1-15