


default search action
Z. Berkay Celik
Person information
- affiliation: Purdue University, West Lafayette, IN, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j13]Mohammed Asiri
, Arjun Arunasalam
, Neetesh Saxena
, Z. Berkay Celik
:
Frontline responders: Rethinking indicators of compromise for industrial control system security. Comput. Secur. 154: 104421 (2025)
[j12]Arjun Arunasalam
, Z. Berkay Celik
:
Characterizing E-Commerce Harm by Investigating Online Communities: A Case Study With Abusive Dropshipping. IEEE Secur. Priv. 23(3): 10-19 (2025)
[j11]Muslum Ozgur Ozmen, Mehmet Oguz Sakaoglu, Jackson Bizjak, Jianliang Wu, Antonio Bianchi, Dave (Jing) Tian, Z. Berkay Celik:
Why Am I Seeing Double? An Investigation of Device Management Flaws in Voice Assistant Platforms. Proc. Priv. Enhancing Technol. 2025(2): 719-733 (2025)
[c67]Chandrika Mukherjee
, Arjun Arunasalam
, Habiba Farrukh
, Reham Mohamed Aburas
, Z. Berkay Celik
:
Towards Secure User Interaction in WebXR. HumanSys@SenSys 2025: 76-79
[c66]Arjun Arunasalam, Jason Tong, Habiba Farrukh, Muslum Ozgur Ozmen, Koustuv Saha, Z. Berkay Celik:
Deceptive Sound Therapy on Online Platforms: Do Mental Wellbeing Tracks Conform to User Expectations? ICWSM 2025: 107-121
[c65]Chandrika Mukherjee
, Reham Mohamed Aburas
, Arjun Arunasalam
, Habiba Farrukh
, Z. Berkay Celik
:
Demo: UI Based Attacks in WebXR. MobiSys 2025: 639-640
[c64]Derin Cayir, Reham Mohamed Aburas, Riccardo Lazzeretti, Marco Angelini, Abbas Acar, Mauro Conti, Z. Berkay Celik, A. Selcuk Uluagac:
Speak Up, I'm Listening: Extracting Speech from Zero-Permission VR Sensors. NDSS 2025
[c63]Zeyu Lei, Güliz Seray Tuncay, Beatrice Carissa Williem, Z. Berkay Celik, Antonio Bianchi:
ScopeVerif: Analyzing the Security of Android's Scoped Storage via Differential Analysis. NDSS 2025
[c62]Hanxiao Lu, Hongyu Cai, Yiming Liang, Antonio Bianchi, Z. Berkay Celik:
A Progressive Transformer for Unifying Binary Code Embedding and Knowledge Transfer. SANER 2025: 383-393
[c61]Raymond Muller, Ruoyu Song, Chenyi Wang
, Yuxia Zhan, Jean-Philippe Monteuuis, Yanmao Man, Ming Li, Ryan M. Gerdes, Jonathan Petit, Z. Berkay Celik:
Investigating Physical Latency Attacks Against Camera-Based Perception. SP 2025: 4588-4605
[c60]Chandrika Mukherjee, Reham Mohamed, Arjun Arunasalam, Habiba Farrukh, Z. Berkay Celik:
Shadowed Realities: An Investigation of UI Attacks in WebXR. USENIX Security Symposium 2025: 1549-1568
[c59]Doguhan Yeke, Kartik Anand Pant, Muslum Ozgur Ozmen, Hyungsub Kim, James M. Goppert, Inseok Hwang, Antonio Bianchi, Z. Berkay Celik:
Automated Discovery of Semantic Attacks in Multi-Robot Navigation Systems. USENIX Security Symposium 2025: 3959-3978
[c58]Chenyi Wang, Raymond Muller, Ruoyu Song, Jean-Philippe Monteuuis, Jonathan Petit, Yanmao Man, Ryan M. Gerdes, Z. Berkay Celik, Ming Li:
From Threat to Trust: Exploiting Attention Mechanisms for Attacks and Defenses in Cooperative Perception. USENIX Security Symposium 2025: 7387-7406
[c57]Zhaozhou Tang, Khaled Serag, Saman A. Zonouz, Z. Berkay Celik, Dongyan Xu, Raheem Beyah:
WIP: Intrusion Detection and Localization for CAN by Extracting Propagation Delay Features from Message Intervals. VehicleSec 2025: 19-26
[e2]Z. Berkay Celik, Ning Zhang, Sara Rampazzi, Aiping Xiong:
3rd USENIX Symposium on Vehicle Security and Privacy, VehicleSec 2025, Seattle, WA, USA, August 11-12, 2025. USENIX Association 2025 [contents]
[i35]Muhammad Ibrahim, Güliz Seray Tuncay, Z. Berkay Celik, Aravind Machiry, Antonio Bianchi:
LM-Scout: Analyzing the Security of Language Model Integration in Android Apps. CoRR abs/2505.08204 (2025)
[i34]Muqi Zou, Hongyu Cai, Hongwei Wu, Zion Leonahenahe Basque, Arslan Khan, Z. Berkay Celik, Dave Tian, Antonio Bianchi, Ruoyu Wang, Dongyan Xu:
D-LiFT: Improving LLM-based Decompiler Backend via Code Quality-driven Fine-tuning. CoRR abs/2506.10125 (2025)
[i33]Chenyi Wang, Ruoyu Song, Raymond Muller, Jean-Philippe Monteuuis, Z. Berkay Celik, Jonathan Petit, Ryan M. Gerdes, Ming Li:
CP-FREEZER: Latency Attacks against Vehicular Cooperative Perception. CoRR abs/2508.01062 (2025)
[i32]Seonghun Son, Chandrika Mukherjee, Reham Mohamed Aburas, Berk Gülmezoglu, Z. Berkay Celik:
Side-channel Inference of User Activities in AR/VR Using GPU Profiling. CoRR abs/2509.10703 (2025)
[i31]Ahaan Dabholkar, Atul Sharma, Z. Berkay Celik, Saurabh Bagchi:
MAUI: Reconstructing Private Client Data in Federated Transfer Learning. CoRR abs/2509.11451 (2025)
[i30]Khaled Serag, Zhaozhou Tang, Sungwoo Kim, Vireshwar Kumar, Dave Tian, Saman A. Zonouz, Raheem Beyah, Dongyan Xu, Z. Berkay Celik:
SoK: Kicking CAN Down the Road. Systematizing CAN Security Knowledge. CoRR abs/2510.02960 (2025)
[i29]Arjun Arunasalam, Madison Pickering, Z. Berkay Celik, Blase Ur:
Implicit Values Embedded in How Humans and LLMs Complete Subjective Everyday Tasks. CoRR abs/2510.03384 (2025)
[i28]Edoardo Allegrini, Ananth Shreekumar, Z. Berkay Celik:
Formalizing the Safety, Security, and Functional Properties of Agentic AI Systems. CoRR abs/2510.14133 (2025)
[i27]Devin Ersoy, Brandon Lee, Ananth Shreekumar, Arjun Arunasalam, Muhammad Ibrahim, Antonio Bianchi, Z. Berkay Celik:
Investigating the Impact of Dark Patterns on LLM-Based Web Agents. CoRR abs/2510.18113 (2025)
[i26]Katherine Zhang, Arjun Arunasalam, Pubali Datta, Z. Berkay Celik:
International Students and Scams: At Risk Abroad. CoRR abs/2510.18715 (2025)
[i25]Mohammad Atif Quamar, Mohammad Areeb, Nishant Sharma, Ananth Shreekumar, Jonathan Rosenthal, Muslum Ozgur Ozmen, Mikhail Kuznetsov, Z. Berkay Celik:
Adaptive Blockwise Search: Inference-Time Alignment for Large Language Models. CoRR abs/2510.23334 (2025)- 2024
[j10]Muslum Ozgur Ozmen, Habiba Farrukh, Z. Berkay Celik:
Physical Side-Channel Attacks against Intermittent Devices. Proc. Priv. Enhancing Technol. 2024(3): 461-476 (2024)
[c56]Chenyi Wang, Yanmao Man, Raymond Muller, Ming Li, Z. Berkay Celik, Ryan M. Gerdes, Jonathan Petit:
Physical ID-Transfer Attacks against Multi-Object Tracking via Adversarial Trajectory. ACSAC 2024: 957-973
[c55]Zhaozhou Tang
, Khaled Serag
, Saman A. Zonouz
, Z. Berkay Celik
, Dongyan Xu
, Raheem Beyah
:
ERACAN: Defending Against an Emerging CAN Threat Model. CCS 2024: 1894-1908
[c54]Arjun Arunasalam
, Jason Tong
, Habiba Farrukh
, Muslum Ozgur Ozmen
, Koustuv Saha
, Z. Berkay Celik
:
Expectation Conformance in Online Sound Therapy: Designing Tools for Users of Mental Wellbeing Applications. CSCW Companion 2024: 539-544
[c53]Upinder Kaur, Z. Berkay Celik, Richard M. Voyles:
RoboGuardZ: A Scalable Zero-Shot Framework for Detecting Zero-Day Malware in Robots. IROS 2024: 12450-12456
[c52]Upinder Kaur, Z. Berkay Celik, Richard M. Voyles:
RoboCop: A Robust Zero-Day Cyber-Physical Attack Detection Framework for Robots. IROS 2024: 12457-12463
[c51]Arjun Arunasalam, Andrew Chu, Muslum Ozgur Ozmen, Habiba Farrukh, Z. Berkay Celik:
The Dark Side of E-Commerce: Dropshipping Abuse as a Business Model. NDSS 2024
[c50]Hyungsub Kim, Rwitam Bandyopadhyay, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Yongdae Kim, Dongyan Xu:
A Systematic Study of Physical Sensor Attack Hardness. SP 2024: 2328-2347
[c49]Doguhan Yeke, Muhammad Ibrahim, Güliz Seray Tuncay
, Habiba Farrukh, Abdullah Imran, Antonio Bianchi, Z. Berkay Celik:
Wear's my Data? Understanding the Cross-Device Runtime Permission Model in Wearables. SP 2024: 2404-2421
[c48]Reham Mohamed, Arjun Arunasalam, Habiba Farrukh, Jason Tong, Antonio Bianchi, Z. Berkay Celik:
ATTention Please! An Investigation of the App Tracking Transparency Permission. USENIX Security Symposium 2024
[c47]Syed Ghazanfar Abbas, Muslum Ozgur Ozmen, Abdulellah Alsaheel, Arslan Khan, Z. Berkay Celik, Dongyan Xu:
SAIN: Improving ICS Attack Detection Sensitivity via State-Aware Invariants. USENIX Security Symposium 2024
[c46]Arjun Arunasalam, Habiba Farrukh, Eliz Tekcan, Z. Berkay Celik:
Understanding the Security and Privacy Implications of Online Toxic Content on Refugees. USENIX Security Symposium 2024
[c45]Raymond Muller, Yanmao Man, Ming Li, Ryan M. Gerdes, Jonathan Petit, Z. Berkay Celik:
VOGUES: Validation of Object Guise using Estimated Components. USENIX Security Symposium 2024
[i24]Claire Le Goues, Sebastian G. Elbaum, David J. Anthony, Z. Berkay Celik, Mauricio Castillo-Effen, Nikolaus Correll, Pooyan Jamshidi, Morgan Quigley, Trenton Tabor, Qi Zhu:
Software Engineering for Robotics: Future Research Directions; Report from the 2023 Workshop on Software Engineering for Robotics. CoRR abs/2401.12317 (2024)
[i23]Hongyu Cai, Arjun Arunasalam, Leo Y. Lin, Antonio Bianchi, Z. Berkay Celik:
Rethinking How to Evaluate Language Model Jailbreak. CoRR abs/2404.06407 (2024)
[i22]Ruoyu Song, Muslum Ozgur Ozmen, Hyungsub Kim, Antonio Bianchi, Z. Berkay Celik:
Enhancing LLM-based Autonomous Driving Agents to Mitigate Perception Attacks. CoRR abs/2409.14488 (2024)
[i21]Hanxiao Lu, Hongyu Cai, Yiming Liang, Antonio Bianchi, Z. Berkay Celik:
A Progressive Transformer for Unifying Binary Code Embedding and Knowledge Transfer. CoRR abs/2412.11177 (2024)- 2023
[j9]Reham Mohamed, Habiba Farrukh, Yidong Lu, He Wang, Z. Berkay Celik:
iSTELAN: Disclosing Sensitive User Information by Mobile Magnetometer from Finger Touches. Proc. Priv. Enhancing Technol. 2023(2): 79-96 (2023)
[c44]Yufan Chen
, Arjun Arunasalam
, Z. Berkay Celik
:
Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions. ACSAC 2023: 366-378
[c43]Muslum Ozgur Ozmen, Ruoyu Song, Habiba Farrukh, Z. Berkay Celik:
Evasion Attacks and Defenses on Smart Home Physical Event Verification. NDSS 2023
[c42]Habiba Farrukh, Muslum Ozgur Ozmen, Faik Kerem Örs
, Z. Berkay Celik:
One Key to Rule Them All: Secure Group Pairing for Heterogeneous IoT Devices. SP 2023: 3026-3042
[c41]Habiba Farrukh, Reham Mohamed, Aniket Nare, Antonio Bianchi, Z. Berkay Celik:
LocIn: Inferring Semantic Location from Spatial Maps in Mixed Reality. USENIX Security Symposium 2023: 877-894
[c40]Ruoyu Song, Muslum Ozgur Ozmen, Hyungsub Kim, Raymond Muller, Z. Berkay Celik, Antonio Bianchi:
Discovering Adversarial Driving Maneuvers against Autonomous Vehicles. USENIX Security Symposium 2023: 2957-2974
[c39]Hyungsub Kim, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Dongyan Xu:
PatchVerif: Discovering Faulty Patches in Robotic Vehicles. USENIX Security Symposium 2023: 3011-3028
[c38]Khaled Serag, Rohit Bhatia, Akram Faqih, Muslum Ozgur Ozmen, Vireshwar Kumar, Z. Berkay Celik, Dongyan Xu:
ZBCAN: A Zero-Byte CAN Defense System. USENIX Security Symposium 2023: 6893-6910
[c37]Yanmao Man, Raymond Muller, Ming Li, Z. Berkay Celik, Ryan M. Gerdes:
That Person Moves Like A Car: Misclassification Attack Detection for Autonomous Systems Using Spatiotemporal Consistency. USENIX Security Symposium 2023: 6929-6946
[c36]Hyungsub Kim, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Dongyan Xu:
Demo: Discovering Faulty Patches in Robotic Vehicle Control Software. VehicleSec 2023
[c35]Raymond Muller, Yanmao Man, Z. Berkay Celik, Ming Li, Ryan M. Gerdes:
Demo: Physically Hijacking Object Trackers. VehicleSec 2023
[c34]Muslum Ozgur Ozmen, Habiba Farrukh, Hyungsub Kim, Antonio Bianchi, Z. Berkay Celik:
Short: Rethinking Secure Pairing in Drone Swarms. VehicleSec 2023
[e1]Qi Alfred Chen, Ziming Zhao, Z. Berkay Celik, Ryan M. Gerdes:
Inaugural International Symposium on Vehicle Security and Privacy, VehicleSec 2023, San Diego, CA, USA, February 27, 2023. Internet Society 2023, ISBN 1-891562-88-6 [contents]
[i20]Yufan Chen, Arjun Arunasalam, Z. Berkay Celik:
Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions. CoRR abs/2310.02431 (2023)- 2022
[j8]Michael Norris
, Z. Berkay Celik
, Prasanna Venkatesh Rengasamy
, Shulin Zhao
, Patrick Drew McDaniel
, Anand Sivasubramaniam
, Gang Tan
:
IoTRepair: Flexible Fault Handling in Diverse IoT Deployments. ACM Trans. Internet Things 3(3): 22:1-22:33 (2022)
[j7]Amit Kumar Sikder
, Leonardo Babun
, Z. Berkay Celik
, Hidayet Aksu
, Patrick D. McDaniel
, Engin Kirda
, A. Selcuk Uluagac
:
Who's Controlling My Device? Multi-User Multi-Device-Aware Access Control System for Shared Smart Home Environment. ACM Trans. Internet Things 3(4): 27:1-27:39 (2022)
[c33]Raymond Muller, Yanmao Man, Z. Berkay Celik, Ming Li, Ryan M. Gerdes:
Physical Hijacking Attacks against Object Trackers. CCS 2022: 2309-2322
[c32]Muslum Ozgur Ozmen, Xuansong Li
, Andrew Chu, Z. Berkay Celik, Bardh Hoxha, Xiangyu Zhang:
Discovering IoT Physical Channel Vulnerabilities. CCS 2022: 2415-2428
[c31]Upinder Kaur, Z. Berkay Celik, Richard M. Voyles:
Robust and Energy Efficient Malware Detection for Robotic Cyber-Physical Systems. ICCPS 2022: 314-315
[c30]Hyungsub Kim, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Dongyan Xu:
PGPatch: Policy-Guided Logic Bug Patching for Robotic Vehicles. SP 2022: 1826-1844
[c29]Abdullah Imran, Habiba Farrukh, Muhammad Ibrahim, Z. Berkay Celik, Antonio Bianchi:
SARA: Secure Android Remote Authorization. USENIX Security Symposium 2022: 1561-1578
[c28]Andrew Chu, Arjun Arunasalam, Muslum Ozgur Ozmen, Z. Berkay Celik:
Behind the Tube: Exploitative Monetization of Content on YouTube. USENIX Security Symposium 2022: 2171-2188- 2021
[j6]Leonardo Babun, Kyle Denney, Z. Berkay Celik, Patrick D. McDaniel, A. Selcuk Uluagac:
A survey on IoT platforms: Communication, security, and privacy perspectives. Comput. Networks 192: 108040 (2021)
[j5]Habiba Farrukh, Tinghan Yang, Hanwen Xu, Yuxuan Yin, He Wang, Z. Berkay Celik:
S3: Side-Channel Attack on Stylus Pencil through Sensors. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5(1): 8:1-8:25 (2021)
[j4]Leonardo Babun, Z. Berkay Celik, Patrick D. McDaniel, A. Selcuk Uluagac:
Real-time Analysis of Privacy-(un)aware IoT Applications. Proc. Priv. Enhancing Technol. 2021(1): 145-166 (2021)
[c27]Adrien Cosson, Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Patrick D. McDaniel, A. Selcuk Uluagac:
Sentinel: A Robust Intrusion Detection System for IoT Networks Using Kernel-Level System Information. IoTDI 2021: 53-66
[c26]Yi-Shan Lin, Wen-Chuan Lee, Z. Berkay Celik:
What Do You See?: Evaluation of Explainable Artificial Intelligence (XAI) Interpretability through Neural Backdoors. KDD 2021: 1027-1035
[c25]Rohit Bhatia, Vireshwar Kumar, Khaled Serag, Z. Berkay Celik, Mathias Payer, Dongyan Xu:
Evading Voltage-Based Intrusion Detection on Automotive CAN. NDSS 2021
[c24]Hyungsub Kim, Muslum Ozgur Ozmen, Antonio Bianchi, Z. Berkay Celik, Dongyan Xu:
PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles. NDSS 2021
[c23]Michael Reeves, Dave Jing Tian, Antonio Bianchi, Z. Berkay Celik:
Towards Improving Container Security by Preventing Runtime Escapes. SecDev 2021: 38-46
[c22]Furkan Göksel, Muslum Ozgur Ozmen, Michael Reeves, Basavesh Shivakumar, Z. Berkay Celik:
On the Safety Implications of Misordered Events and Commands in IoT Systems. SP (Workshops) 2021: 235-241
[c21]Abdulellah Alsaheel, Yuhong Nan, Shiqing Ma, Le Yu, Gregory Walkup, Z. Berkay Celik, Xiangyu Zhang, Dongyan Xu:
ATLAS: A Sequence-based Learning Approach for Attack Investigation. USENIX Security Symposium 2021: 3005-3022
[c20]Khaled Serag, Rohit Bhatia, Vireshwar Kumar, Z. Berkay Celik, Dongyan Xu:
Exposing New Vulnerabilities of Error Handling Mechanism in CAN. USENIX Security Symposium 2021: 4241-4258
[i19]Muslum Ozgur Ozmen, Xuansong Li, Andrew Chun-An Chu, Z. Berkay Celik, Bardh Hoxha, Xiangyu Zhang:
Discovering Physical Interaction Vulnerabilities in IoT Deployments. CoRR abs/2102.01812 (2021)
[i18]Habiba Farrukh, Tinghan Yang, Hanwen Xu, Yuxuan Yin, He Wang, Z. Berkay Celik:
S3: Side-Channel Attack on Stylus Pencil through Sensors. CoRR abs/2103.05840 (2021)
[i17]Furkan Göksel, Muslum Ozgur Ozmen, Michael Reeves, Basavesh Shivakumar, Z. Berkay Celik:
On the Safety Implications of Misordered Events and Commands in IoT Systems. CoRR abs/2105.00645 (2021)
[i16]Siddharth Divi, Habiba Farrukh, Z. Berkay Celik:
Unifying Distillation with Personalization in Federated Learning. CoRR abs/2105.15191 (2021)
[i15]Siddharth Divi, Yi-Shan Lin, Habiba Farrukh, Z. Berkay Celik:
New Metrics to Evaluate the Performance and Fairness of Personalized Federated Learning. CoRR abs/2107.13173 (2021)- 2020
[c19]Paul M. Berges, Basavesh Ammanaghatta Shivakumar, Timothy Graziano, Ryan M. Gerdes, Z. Berkay Celik:
On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities. CNS 2020: 1-6
[c18]Michael Norris, Z. Berkay Celik, Prasanna Venkatesh Rengasamy, Shulin Zhao, Patrick D. McDaniel, Anand Sivasubramaniam, Gang Tan
:
IoTRepair: Systematically Addressing Device Faults in Commodity IoT. IoTDI 2020: 142-148
[c17]Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick D. McDaniel, Engin Kirda, A. Selcuk Uluagac:
Kratos: multi-user multi-device-aware access control system for the smart home. WISEC 2020: 1-12
[i14]Michael Norris, Z. Berkay Celik, Patrick D. McDaniel, Gang Tan, Prasanna Venkatesh Rengasamy, Shulin Zhao, Anand Sivasubramaniam:
IoTRepair: Systematically Addressing Device Faults in Commodity IoT (Extended Paper). CoRR abs/2002.07641 (2020)
[i13]Paul M. Berges, Basavesh Ammanaghatta Shivakumar, Timothy Graziano, Ryan M. Gerdes, Z. Berkay Celik:
On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities. CoRR abs/2006.14679 (2020)
[i12]Yi-Shan Lin, Wen-Chuan Lee, Z. Berkay Celik:
What Do You See? Evaluation of Explainable Artificial Intelligence (XAI) Interpretability through Neural Backdoors. CoRR abs/2009.10639 (2020)
2010 – 2019
- 2019
[j3]Z. Berkay Celik
, Earlence Fernandes, Eric Pauley, Gang Tan
, Patrick D. McDaniel:
Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities. ACM Comput. Surv. 52(4): 74:1-74:30 (2019)
[j2]Z. Berkay Celik
, Patrick D. McDaniel
, Gang Tan
, Leonardo Babun
, A. Selcuk Uluagac
:
Verifying Internet of Things Safety and Security in Physical Spaces. IEEE Secur. Priv. 17(5): 30-37 (2019)
[c16]Z. Berkay Celik, Abbas Acar
, Hidayet Aksu, Ryan Sheatsley, Patrick D. McDaniel, A. Selcuk Uluagac
:
Curie: Policy-based Secure Data Exchange. CODASPY 2019: 121-132
[c15]Z. Berkay Celik, Gang Tan, Patrick D. McDaniel:
IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT. NDSS 2019
[i11]Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick D. McDaniel, Engin Kirda, A. Selcuk Uluagac:
Multi-User Multi-Device-Aware Access Control System for Smart Home. CoRR abs/1911.10186 (2019)
[i10]Leonardo Babun, Z. Berkay Celik, Patrick D. McDaniel, A. Selcuk Uluagac:
Real-time Analysis of Privacy-(un)aware IoT Applications. CoRR abs/1911.10461 (2019)- 2018
[c14]Z. Berkay Celik, Patrick D. McDaniel, Rauf Izmailov, Nicolas Papernot, Ryan Sheatsley, Raquel Alvarez, Ananthram Swami:
Detection under Privileged Information. AsiaCCS 2018: 199-206
[c13]Sayed M. Saghaian N. E., Tom La Porta, Trent Jaeger, Z. Berkay Celik, Patrick D. McDaniel:
Mission-Oriented Security Model, Incorporating Security Risk, Cost and Payout. SecureComm (2) 2018: 192-212
[c12]Z. Berkay Celik, Patrick D. McDaniel:
Extending Detection with Privileged Information via Generalized Distillation. IEEE Symposium on Security and Privacy Workshops 2018: 83-88
[c11]Z. Berkay Celik, Patrick D. McDaniel, Gang Tan:
Soteria: Automated IoT Safety and Security Analysis. USENIX ATC 2018: 147-158
[c10]Z. Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick D. McDaniel, A. Selcuk Uluagac:
Sensitive Information Tracking in Commodity IoT. USENIX Security Symposium 2018: 1687-1704
[i9]Z. Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick D. McDaniel, A. Selcuk Uluagac:
Sensitive Information Tracking in Commodity IoT. CoRR abs/1802.08307 (2018)
[i8]Z. Berkay Celik, Patrick D. McDaniel, Gang Tan:
Soteria: Automated IoT Safety and Security Analysis. CoRR abs/1805.08876 (2018)
[i7]Z. Berkay Celik, Earlence Fernandes, Eric Pauley, Gang Tan, Patrick D. McDaniel:
Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities. CoRR abs/1809.06962 (2018)- 2017
[c9]Nicolas Papernot, Patrick D. McDaniel, Ian J. Goodfellow, Somesh Jha, Z. Berkay Celik, Ananthram Swami:
Practical Black-Box Attacks against Machine Learning. AsiaCCS 2017: 506-519
[c8]Z. Berkay Celik, Patrick D. McDaniel, Rauf Izmailov
:
Feature Cultivation in Privileged Information-augmented Detection. IWSPA@CODASPY 2017: 73-80
[c7]Z. Berkay Celik, David Lopez-Paz, Patrick D. McDaniel:
Patient-Driven Privacy Control through Generalized Distillation. PAC 2017: 1-12
[c6]Abbas Acar
, Z. Berkay Celik, Hidayet Aksu, A. Selcuk Uluagac
, Patrick D. McDaniel:
Achieving Secure and Differentially Private Computations in Multiparty Settings. PAC 2017: 49-59
[i6]Z. Berkay Celik, Hidayet Aksu, Abbas Acar, Ryan Sheatsley, A. Selcuk Uluagac, Patrick D. McDaniel:
Curie: Policy-based Secure Data Exchange. CoRR abs/1702.08342 (2017)
[i5]Abbas Acar, Z. Berkay Celik, Hidayet Aksu, A. Selcuk Uluagac, Patrick D. McDaniel:
Achieving Secure and Differentially Private Computations in Multiparty Settings. CoRR abs/1707.01871 (2017)- 2016
[j1]Patrick D. McDaniel, Nicolas Papernot, Z. Berkay Celik:
Machine Learning in Adversarial Settings. IEEE Secur. Priv. 14(3): 68-72 (2016)
[c5]Nicolas Papernot, Patrick D. McDaniel, Somesh Jha, Matt Fredrikson
, Z. Berkay Celik, Ananthram Swami:
The Limitations of Deep Learning in Adversarial Settings. EuroS&P 2016: 372-387
[c4]Z. Berkay Celik, Nan Hu, Yun Li, Nicolas Papernot, Patrick D. McDaniel, Robert J. Walls, Jeff Rowe, Karl N. Levitt, Novella Bartolini
, Thomas F. La Porta, Ritu Chadha:
Mapping sample scenarios to operational models. MILCOM 2016: 7-12
[i4]Nicolas Papernot, Patrick D. McDaniel, Ian J. Goodfellow, Somesh Jha, Z. Berkay Celik, Ananthram Swami:
Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples. CoRR abs/1602.02697 (2016)
[i3]Z. Berkay Celik, Patrick D. McDaniel, Rauf Izmailov, Nicolas Papernot, Ananthram Swami:
Building Better Detection with Privileged Information. CoRR abs/1603.09638 (2016)
[i2]Z. Berkay Celik, David Lopez-Paz, Patrick D. McDaniel:
Patient-Driven Privacy Control through Generalized Distillation. CoRR abs/1611.08648 (2016)- 2015
[c3]Z. Berkay Celik, Robert J. Walls, Patrick D. McDaniel, Ananthram Swami:
Malware traffic detection using tamper resistant features. MILCOM 2015: 330-335
[i1]Nicolas Papernot, Patrick D. McDaniel, Somesh Jha, Matt Fredrikson
, Z. Berkay Celik, Ananthram Swami:
The Limitations of Deep Learning in Adversarial Settings. CoRR abs/1511.07528 (2015)- 2013
[c2]Z. Berkay Celik, Sema Oktug
:
Detection of Fast-Flux Networks using various DNS feature sets. ISCC 2013: 868-873- 2011
[c1]Z. Berkay Celik, Jayaram Raghuram, George Kesidis, David J. Miller:
Salting Public Traces with Attack Traffic to Test Flow Classifiers. CSET 2011
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-11-17 00:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







