default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Likely matches
- Mehmet Kivanç Mihçak
aka: M. Kivanç Mihçak
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 58 matches
- 2016
- M. Kivanç Mihçak, Emrah Akyol, Tamer Basar, Cédric Langbort:
Scalar Quadratic-Gaussian Soft Watermarking Games. GameSec 2016: 215-234 - M. Kivanç Mihçak, Emrah Akyol, Tamer Basar, Cedric Langbort:
Scalar Quadratic-Gaussian Soft Watermarking Games. CoRR abs/1607.03273 (2016) - 2014
- Nikhil Krishnan, Dror Baron, Mehmet Kivanç Mihçak:
A parallel two-pass MDL context tree algorithm for universal source coding. ISIT 2014: 1862-1866 - Nikhil Krishnan, Dror Baron, Mehmet Kivanç Mihçak:
A Parallel Two-Pass MDL Context Tree Algorithm for Universal Source Coding. CoRR abs/1405.6322 (2014) - 2012
- Tayyar Güzel, Eser Ustunel, Hasan Basri Çelebi, Mehmet Kivanç Mihçak, Hakan Deliç:
Noise modeling and OFDM based receiver design in power-line communication. ISGT 2012: 1 - 2011
- Necmettin Caner Göv, Mehmet Kivanç Mihçak, Salih Ergün:
True Random Number Generation Via Sampling From Flat Band-Limited Gaussian Processes. IEEE Trans. Circuits Syst. I Regul. Pap. 58-I(5): 1044-1051 (2011) - Cagatay Karabat, Hakan Erdogan, Mehmet Kivanç Mihçak:
Information theoretic capacity analysis for biometric hashing methods. DSP 2011: 1-6 - Cagatay Karabat, Hakan Erdogan, Mehmet Kivanç Mihçak:
A face image hashing method based on optimal linear transform under colored Gaussian noise assumption. DSP 2011: 1-6 - 2010
- Sergül Aydöre, Mehmet Kivanç Mihçak, R. Koray Çiftçi, Ata Akin:
On Temporal Connectivity of PFC Via Gauss - Markov Modeling of fNIRS Signals. IEEE Trans. Biomed. Eng. 57(3): 761-768 (2010) - Ozgur Dalkilic, Ersen Ekrem, S. Eray Varlik, Mehmet Kivanç Mihçak:
A Detection Theoretic Approach to Digital Fingerprinting With Focused Receivers Under Uniform Linear Averaging Gaussian Attacks. IEEE Trans. Inf. Forensics Secur. 5(4): 658-669 (2010) - Kamil Senel, Mehmet Kivanç Mihçak, Vishal Monga:
A learning framework for robust hashing of face images. ICIP 2010: 197-200 - Sabih Güzelgöz, Hasan Basri Çelebi, Tayyar Güzel, Hüseyin Arslan, M. Kivanç Mihçak:
Time frequency analysis of noise generated by electrical loads in PLC. ICT 2010: 864-871 - 2009
- Ozgur Dalkilic, Ersen Ekrem, S. Eray Varlik, M. Kivanç Mihçak:
A detection theoretic approach to digital fingerprinting with focused receivers under uniform linear averaging Gaussian attacks. Allerton 2009: 1270-1277 - Onur Özyesil, M. Kivanç Mihçak, Yücel Altug:
On detection with partial information in the Gaussian setup. Allerton 2009: 1494-1501 - Yucel Altug, Suleyman Serdar Kozat, Mehmet Kivanç Mihçak:
An Information Theoretic Analysis of Single Transceiver Passive RFID Networks. CoRR abs/0901.0643 (2009) - Onur Özyesil, Mehmet Kivanç Mihçak, Yucel Altug:
On Detection With Partial Information In The Gaussian Setup. CoRR abs/0910.5261 (2009) - 2008
- Mehmet Kivanç Mihçak, Yucel Altug, N. Polat Ayerden:
On Minimax Optimal Linear Transforms for Detection with Side Information in Gaussian Setup. IEEE Commun. Lett. 12(3): 164-166 (2008) - Yucel Altug, N. Polat Ayerden, Mehmet Kivanç Mihçak, Emin Anarim:
A Note on the Periodicity and the Output Rate of Bit Search Type Generators. IEEE Trans. Inf. Theory 54(2): 666-679 (2008) - Neslihan Gerek, Mehmet Kivanç Mihçak:
Generalized Improved Spread Spectrum watermarking robust against translation attacks. ICASSP 2008: 1673-1676 - Tansu Alpcan, Sinan Kesici, Daniel Bicher, Mehmet Kivanç Mihçak, Christian Bauckhage, Seyit Ahmet Çamtepe:
A lightweight biometric signature scheme for user authentication over networks. SecureComm 2008: 33 - Baris Coskun, Mehmet Kivanç Mihçak:
Perceptual hash based blind geometric synchronization of images for watermarking. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 68191G - Yucel Altug, Mehmet Kivanç Mihçak:
Towards Exploring Fundamental Limits of System-Specific Cryptanalysis Within Limited Attack Classes: Application to ABSG. CoRR abs/0805.0268 (2008) - Yucel Altug, Mehmet Kivanç Mihçak, Onur Özyesil, Vishal Monga:
Reliable Communications with Asymmetric Codebooks: An Information Theoretic Analysis of Robust Signal Hashing. CoRR abs/0809.1910 (2008) - 2007
- Vishal Monga, Mehmet Kivanç Mihçak:
Robust and Secure Image Hashing via Non-Negative Matrix Factorizations. IEEE Trans. Inf. Forensics Secur. 2(3-1): 376-390 (2007) - Oztan Harmanci, Mehmet Kivanç Mihçak, A. Murat Tekalp:
Watermarking and Streaming Compressed Video. ICASSP (1) 2007: 833-836 - Yucel Altug, N. Polat Ayerden, Mehmet Kivanç Mihçak, Emin Anarim:
A Note on the Periodicity and the Output Rate of Bit Search Type Generators. CoRR abs/cs/0702092 (2007) - 2006
- Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Mehmet Kivanç Mihçak, Thierry Pun:
The edge process model and its application to information-hiding capacity analysis. IEEE Trans. Signal Process. 54(5): 1813-1825 (2006) - Vishal Monga, Mehmet Kivanç Mihçak:
Robust Image Hashing Via Non-Negative Matrix Factorizations. ICASSP (2) 2006: 225-228 - Oztan Harmanci, Vishal Monga, Mehmet Kivanç Mihçak:
Geometrically Invariant Image Watermarking via Robust Perceptual Hashes. ICIP 2006: 1397-1400 - 2005
- Mustafa Kesal, Mehmet Kivanç Mihçak, Ramarathnam Venkatesan:
An improved attack analysis on a public-key spread spectrum watermarking. Multim. Syst. 11(2): 133-142 (2005)
skipping 28 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-02 13:20 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint