Skip to main content

Showing 1–29 of 29 results for author: Catak, F O

  1. arXiv:2407.08831  [pdf, other

    cs.CR cs.AI

    Neural Networks Meet Elliptic Curve Cryptography: A Novel Approach to Secure Communication

    Authors: Mina Cecilie Wøien, Ferhat Ozgur Catak, Murat Kuzlu, Umit Cali

    Abstract: In recent years, neural networks have been used to implement symmetric cryptographic functions for secure communications. Extending this domain, the proposed approach explores the application of asymmetric cryptography within a neural network framework to safeguard the exchange between two communicating entities, i.e., Alice and Bob, from an adversarial eavesdropper, i.e., Eve. It employs a set of… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

    Comments: 8 pages

  2. arXiv:2406.19712  [pdf, other

    cs.AI cs.CL

    Uncertainty Quantification in Large Language Models Through Convex Hull Analysis

    Authors: Ferhat Ozgur Catak, Murat Kuzlu

    Abstract: Uncertainty quantification approaches have been more critical in large language models (LLMs), particularly high-risk applications requiring reliable outputs. However, traditional methods for uncertainty quantification, such as probabilistic models and ensemble techniques, face challenges when applied to the complex and high-dimensional nature of LLM-generated outputs. This study proposes a novel… ▽ More

    Submitted 28 June, 2024; originally announced June 2024.

    Comments: 17 pages

  3. arXiv:2305.02741  [pdf, other

    cs.CR

    Uncertainty Aware Deep Learning Model for Secure and Trustworthy Channel Estimation in 5G Networks

    Authors: Ferhat Ozgur Catak, Umit Cali, Murat Kuzlu, Salih Sarp

    Abstract: With the rise of intelligent applications, such as self-driving cars and augmented reality, the security and reliability of wireless communication systems have become increasingly crucial. One of the most critical components of ensuring a high-quality experience is channel estimation, which is fundamental for efficient transmission and interference management in wireless networks. However, using d… ▽ More

    Submitted 4 May, 2023; originally announced May 2023.

    Comments: 7 pages

  4. arXiv:2304.09591  [pdf, other

    cs.CR

    5G-SRNG: 5G Spectrogram-based Random Number Generation for Devices with Low Entropy Sources

    Authors: Ferhat Ozgur Catak, Evren Catak, Ogerta Elezaj

    Abstract: Random number generation (RNG) is a crucial element in security protocols, and its performance and reliability are critical for the safety and integrity of digital systems. This is especially true in 5G networks with many devices with low entropy sources. This paper proposes 5G-SRNG, an end-to-end random number generation solution for devices with low entropy sources in 5G networks. Compared to tr… ▽ More

    Submitted 19 April, 2023; originally announced April 2023.

    Comments: 6 Pages

  5. arXiv:2212.02182  [pdf, other

    cs.LG eess.SP

    Anomaly Detection in Power Markets and Systems

    Authors: Ugur Halden, Umit Cali, Ferhat Ozgur Catak, Salvatore D'Arco, Francisco Bilendo

    Abstract: The widespread use of information and communication technology (ICT) over the course of the last decades has been a primary catalyst behind the digitalization of power systems. Meanwhile, as the utilization rate of the Internet of Things (IoT) continues to rise along with recent advancements in ICT, the need for secure and computationally efficient monitoring of critical infrastructures like the e… ▽ More

    Submitted 5 December, 2022; originally announced December 2022.

    Comments: Submitted to IEEE PES GM Conference and we wish to make it available before the conference

  6. arXiv:2211.12851  [pdf

    cs.NI cs.AI cs.CR

    A Streamlit-based Artificial Intelligence Trust Platform for Next-Generation Wireless Networks

    Authors: M. Kuzlu, F. O. Catak, S. Sarp, U. Cali, O Gueler

    Abstract: With the rapid development and integration of artificial intelligence (AI) methods in next-generation networks (NextG), AI algorithms have provided significant advantages for NextG in terms of frequency spectrum usage, bandwidth, latency, and security. A key feature of NextG is the integration of AI, i.e., self-learning architecture based on self-supervised algorithms, to improve the performance o… ▽ More

    Submitted 25 October, 2022; originally announced November 2022.

    Comments: 4 pages, 2 figures

  7. arXiv:2209.13007  [pdf, other

    cs.NI cs.AI cs.CR

    Mitigating Attacks on Artificial Intelligence-based Spectrum Sensing for Cellular Network Signals

    Authors: Ferhat Ozgur Catak, Murat Kuzlu, Salih Sarp, Evren Catak, Umit Cali

    Abstract: Cellular networks (LTE, 5G, and beyond) are dramatically growing with high demand from consumers and more promising than the other wireless networks with advanced telecommunication technologies. The main goal of these networks is to connect billions of devices, systems, and users with high-speed data transmission, high cell capacity, and low latency, as well as to support a wide range of new appli… ▽ More

    Submitted 27 September, 2022; originally announced September 2022.

    Comments: IEEE GLOBECOM 2022 Publication

  8. arXiv:2209.12665  [pdf, other

    cs.LG cs.AI eess.SY

    Hybrid AI-based Anomaly Detection Model using Phasor Measurement Unit Data

    Authors: Yuval Abraham Regev, Henrik Vassdal, Ugur Halden, Ferhat Ozgur Catak, Umit Cali

    Abstract: Over the last few decades, extensive use of information and communication technologies has been the main driver of the digitalization of power systems. Proper and secure monitoring of the critical grid infrastructure became an integral part of the modern power system. Using phasor measurement units (PMUs) to surveil the power system is one of the technologies that have a promising future. Increase… ▽ More

    Submitted 21 September, 2022; originally announced September 2022.

  9. arXiv:2208.10279  [pdf, other

    cs.CR cs.LG

    Defensive Distillation based Adversarial Attacks Mitigation Method for Channel Estimation using Deep Learning Models in Next-Generation Wireless Networks

    Authors: Ferhat Ozgur Catak, Murat Kuzlu, Evren Catak, Umit Cali, Ozgur Guler

    Abstract: Future wireless networks (5G and beyond) are the vision of forthcoming cellular systems, connecting billions of devices and people together. In the last decades, cellular networks have been dramatically growth with advanced telecommunication technologies for high-speed data transmission, high cell capacity, and low latency. The main goal of those technologies is to support a wide range of new appl… ▽ More

    Submitted 12 August, 2022; originally announced August 2022.

    Comments: 13 Pages

  10. arXiv:2204.07752  [pdf, other

    cs.CR cs.LG

    Homomorphic Encryption and Federated Learning based Privacy-Preserving CNN Training: COVID-19 Detection Use-Case

    Authors: Febrianti Wibawa, Ferhat Ozgur Catak, Salih Sarp, Murat Kuzlu, Umit Cali

    Abstract: Medical data is often highly sensitive in terms of data privacy and security concerns. Federated learning, one type of machine learning techniques, has been started to use for the improvement of the privacy and security of medical data. In the federated learning, the training data is distributed across multiple machines, and the learning process is performed in a collaborative manner. There are se… ▽ More

    Submitted 16 April, 2022; originally announced April 2022.

    Comments: European Interdisciplinary Cybersecurity Conference (EICC) 2022 publication

  11. arXiv:2202.08185  [pdf, other

    cs.CR cs.AI cs.LG cs.NI

    The Adversarial Security Mitigations of mmWave Beamforming Prediction Models using Defensive Distillation and Adversarial Retraining

    Authors: Murat Kuzlu, Ferhat Ozgur Catak, Umit Cali, Evren Catak, Ozgur Guler

    Abstract: The design of a security scheme for beamforming prediction is critical for next-generation wireless networks (5G, 6G, and beyond). However, there is no consensus about protecting the beamforming prediction using deep learning algorithms in these networks. This paper presents the security vulnerabilities in deep learning for beamforming prediction using deep neural networks (DNNs) in 6G wireless ne… ▽ More

    Submitted 16 February, 2022; originally announced February 2022.

    Comments: 26 pages, under review

  12. arXiv:2202.07342  [pdf, other

    cs.LG cs.AI

    Unreasonable Effectiveness of Last Hidden Layer Activations for Adversarial Robustness

    Authors: Omer Faruk Tuna, Ferhat Ozgur Catak, M. Taner Eskil

    Abstract: In standard Deep Neural Network (DNN) based classifiers, the general convention is to omit the activation function in the last (output) layer and directly apply the softmax function on the logits to get the probability scores of each class. In this type of architectures, the loss value of the classifier against any output class is directly proportional to the difference between the final probabili… ▽ More

    Submitted 16 May, 2022; v1 submitted 15 February, 2022; originally announced February 2022.

    Comments: IEEE COMPSAC 2022 publication full version

  13. arXiv:2109.14334  [pdf, other

    cs.CR cs.AI

    Secure Multi-Party Computation based Privacy Preserving Data Analysis in Healthcare IoT Systems

    Authors: Kevser Şahinbaş, Ferhat Ozgur Catak

    Abstract: Recently, many innovations have been experienced in healthcare by rapidly growing Internet-of-Things (IoT) technology that provides significant developments and facilities in the health sector and improves daily human life. The IoT bridges people, information technology and speed up shopping. For these reasons, IoT technology has started to be used on a large scale. Thanks to the use of IoT techno… ▽ More

    Submitted 29 September, 2021; originally announced September 2021.

    Comments: 22 Pages

  14. arXiv:2107.04991  [pdf, other

    cs.CV cs.AI

    Prediction Surface Uncertainty Quantification in Object Detection Models for Autonomous Driving

    Authors: Ferhat Ozgur Catak, Tao Yue, Shaukat Ali

    Abstract: Object detection in autonomous cars is commonly based on camera images and Lidar inputs, which are often used to train prediction models such as deep artificial neural networks for decision making for object recognition, adjusting speed, etc. A mistake in such decision making can be damaging; thus, it is vital to measure the reliability of decisions made by such prediction models via uncertainty m… ▽ More

    Submitted 11 July, 2021; originally announced July 2021.

    Comments: Accepted in AITest 2021, The Third IEEE International Conference On Artificial Intelligence Testing

  15. arXiv:2105.03905  [pdf, other

    eess.SP cs.CR cs.LG

    Security Concerns on Machine Learning Solutions for 6G Networks in mmWave Beam Prediction

    Authors: Ferhat Ozgur Catak, Evren Catak, Murat Kuzlu, Umit Cali, Devrim Unal

    Abstract: 6G -- sixth generation -- is the latest cellular technology currently under development for wireless communication systems. In recent years, machine learning algorithms have been applied widely in various fields, such as healthcare, transportation, energy, autonomous car, and many more. Those algorithms have been also using in communication technologies to improve the system performance in terms o… ▽ More

    Submitted 23 July, 2021; v1 submitted 9 May, 2021; originally announced May 2021.

    Comments: 16 Pages, under review. arXiv admin note: substantial text overlap with arXiv:2103.07268

  16. arXiv:2103.07268  [pdf, other

    cs.LG cs.AI

    Adversarial Machine Learning Security Problems for 6G: mmWave Beam Prediction Use-Case

    Authors: Evren Catak, Ferhat Ozgur Catak, Arild Moldsvor

    Abstract: 6G is the next generation for the communication systems. In recent years, machine learning algorithms have been applied widely in various fields such as health, transportation, and the autonomous car. The predictive algorithms will be used in 6G problems. With the rapid developments of deep learning techniques, it is critical to take the security concern into account to apply the algorithms. While… ▽ More

    Submitted 12 March, 2021; originally announced March 2021.

    Comments: 7 pages

  17. arXiv:2102.04150  [pdf, other

    cs.LG cs.AI

    Exploiting epistemic uncertainty of the deep learning models to generate adversarial samples

    Authors: Omer Faruk Tuna, Ferhat Ozgur Catak, M. Taner Eskil

    Abstract: Deep neural network architectures are considered to be robust to random perturbations. Nevertheless, it was shown that they could be severely vulnerable to slight but carefully crafted perturbations of the input, termed as adversarial samples. In recent years, numerous studies have been conducted in this new area called "Adversarial Machine Learning" to devise new adversarial attacks and to defend… ▽ More

    Submitted 13 February, 2021; v1 submitted 8 February, 2021; originally announced February 2021.

    Comments: 18 pages

  18. arXiv:2101.07816  [pdf, other

    eess.SY cs.AI

    Internet of Predictable Things (IoPT) Framework to Increase Cyber-Physical System Resiliency

    Authors: Umit Cali, Murat Kuzlu, Vinayak Sharma, Manisa Pipattanasomporn, Ferhat Ozgur Catak

    Abstract: During the last two decades, distributed energy systems, especially renewable energy sources (RES), have become more economically viable with increasing market share and penetration levels on power systems. In addition to decarbonization and decentralization of energy systems, digitalization has also become very important. The use of artificial intelligence (AI), advanced optimization algorithms,… ▽ More

    Submitted 19 January, 2021; originally announced January 2021.

    Comments: 13 pages

  19. arXiv:2012.06390  [pdf, other

    cs.LG cs.AI

    Closeness and Uncertainty Aware Adversarial Examples Detection in Adversarial Machine Learning

    Authors: Omer Faruk Tuna, Ferhat Ozgur Catak, M. Taner Eskil

    Abstract: While state-of-the-art Deep Neural Network (DNN) models are considered to be robust to random perturbations, it was shown that these architectures are highly vulnerable to deliberately crafted perturbations, albeit being quasi-imperceptible. These vulnerabilities make it challenging to deploy DNN models in security-critical areas. In recent years, many research studies have been conducted to devel… ▽ More

    Submitted 2 June, 2021; v1 submitted 11 December, 2020; originally announced December 2020.

    Comments: 17 pages

  20. arXiv:2010.01862  [pdf, other

    cs.CR cs.AI

    Data Augmentation Based Malware Detection using Convolutional Neural Networks

    Authors: Ferhat Ozgur Catak, Javed Ahmed, Kevser Sahinbas, Zahid Hussain Khand

    Abstract: Recently, cyber-attacks have been extensively seen due to the everlasting increase of malware in the cyber world. These attacks cause irreversible damage not only to end-users but also to corporate computer systems. Ransomware attacks such as WannaCry and Petya specifically targets to make critical infrastructures such as airports and rendered operational processes inoperable. Hence, it has attrac… ▽ More

    Submitted 5 October, 2020; originally announced October 2020.

    Comments: 18 pages

  21. arXiv:1905.01999  [pdf, other

    cs.CR

    A Benchmark API Call Dataset for Windows PE Malware Classification

    Authors: Ferhat Ozgur Catak, Ahmet Faruk Yazı

    Abstract: The use of operating system API calls is a promising task in the detection of PE-type malware in the Windows operating system. This task is officially defined as running malware in an isolated sandbox environment, recording the API calls made with the Windows operating system and sequentially analyzing these calls. Here, we have analyzed 7107 different malicious software belonging to various famil… ▽ More

    Submitted 21 February, 2021; v1 submitted 6 May, 2019; originally announced May 2019.

    Comments: Updated version

  22. arXiv:1611.01907  [pdf, other

    cs.CR

    Privacy Preserving PageRank Algorithm By Using Secure Multi-Party Computation

    Authors: Ferhat Ozgur Catak

    Abstract: In this work, we study the problem of privacy preserving computation on PageRank algorithm. The idea is to enforce the secure multi party computation of the algorithm iteratively using homomorphic encryption based on Paillier scheme. In the proposed PageRank computation, a user encrypt its own graph data using asymmetric encryption method, sends the data set into different parties in a privacy-pre… ▽ More

    Submitted 7 November, 2016; originally announced November 2016.

    Comments: 8 Pages

  23. Secure Multi-Party Computation Based Privacy Preserving Extreme Learning Machine Algorithm Over Vertically Distributed Data

    Authors: Ferhat Özgür Çatak

    Abstract: Especially in the Big Data era, the usage of different classification methods is increasing day by day. The success of these classification methods depends on the effectiveness of learning methods. Extreme learning machine (ELM) classification algorithm is a relatively new learning method built on feed-forward neural-network. ELM classification algorithm is a simple and fast method that can create… ▽ More

    Submitted 9 February, 2016; originally announced February 2016.

    Comments: 22nd International Conference, ICONIP 2015

  24. arXiv:1602.02888  [pdf, ps, other

    cs.LG

    Robust Ensemble Classifier Combination Based on Noise Removal with One-Class SVM

    Authors: Ferhat Özgür Çatak

    Abstract: In machine learning area, as the number of labeled input samples becomes very large, it is very difficult to build a classification model because of input data set is not fit in a memory in training phase of the algorithm, therefore, it is necessary to utilize data partitioning to handle overall data set. Bagging and boosting based data partitioning methods have been broadly used in data mining an… ▽ More

    Submitted 9 February, 2016; originally announced February 2016.

    Comments: 22nd International Conference, ICONIP 2015

  25. Classification with Boosting of Extreme Learning Machine Over Arbitrarily Partitioned Data

    Authors: Ferhat Özgür Çatak

    Abstract: Machine learning based computational intelligence methods are widely used to analyze large scale data sets in this age of big data. Extracting useful predictive modeling from these types of data sets is a challenging problem due to their high complexity. Analyzing large amount of streaming data that can be leveraged to derive business value is another complex problem to solve. With high levels of… ▽ More

    Submitted 9 February, 2016; originally announced February 2016.

    Comments: Springer Soft Computing

  26. arXiv:1504.02975  [pdf, ps, other

    cs.LG

    Classification with Extreme Learning Machine and Ensemble Algorithms Over Randomly Partitioned Data

    Authors: Ferhat Özgür Çatak

    Abstract: In this age of Big Data, machine learning based data mining methods are extensively used to inspect large scale data sets. Deriving applicable predictive modeling from these type of data sets is a challenging obstacle because of their high complexity. Opportunity with high data availability levels, automated classification of data sets has become a critical and complicated function. In this paper,… ▽ More

    Submitted 12 April, 2015; originally announced April 2015.

    Comments: In Turkish, SIU

  27. arXiv:1410.2686  [pdf

    cs.LG cs.CL

    Polarization Measurement of High Dimensional Social Media Messages With Support Vector Machine Algorithm Using Mapreduce

    Authors: Ferhat Özgür Çatak

    Abstract: In this article, we propose a new Support Vector Machine (SVM) training algorithm based on distributed MapReduce technique. In literature, there are a lots of research that shows us SVM has highest generalization property among classification algorithms used in machine learning area. Also, SVM classifier model is not affected by correlations of the features. But SVM uses quadratic optimization tec… ▽ More

    Submitted 11 March, 2015; v1 submitted 10 October, 2014; originally announced October 2014.

    Comments: 12 pages, in Turkish

  28. arXiv:1312.4108  [pdf

    cs.LG cs.DC

    A MapReduce based distributed SVM algorithm for binary classification

    Authors: Ferhat Özgür Çatak, Mehmet Erdal Balaban

    Abstract: Although Support Vector Machine (SVM) algorithm has a high generalization property to classify for unseen examples after training phase and it has small loss value, the algorithm is not suitable for real-life classification and regression problems. SVMs cannot solve hundreds of thousands examples in training dataset. In previous studies on distributed machine learning algorithms, SVM is trained ov… ▽ More

    Submitted 15 December, 2013; originally announced December 2013.

    Comments: 19 Pages. arXiv admin note: text overlap with arXiv:1301.0082

  29. arXiv:1301.0082  [pdf, other

    cs.LG cs.DC

    CloudSVM : Training an SVM Classifier in Cloud Computing Systems

    Authors: F. Ozgur Catak, M. Erdal Balaban

    Abstract: In conventional method, distributed support vector machines (SVM) algorithms are trained over pre-configured intranet/internet environments to find out an optimal classifier. These methods are very complicated and costly for large datasets. Hence, we propose a method that is referred as the Cloud SVM training mechanism (CloudSVM) in a cloud computing environment with MapReduce technique for distri… ▽ More

    Submitted 1 January, 2013; originally announced January 2013.

    Comments: 13 pages