Wiredja, D., Koyutürk, M., & Chance, M.(2017).The KSEA App: a web-based tool for kinase activity inference from quantitative phosphoproteomics.Bioinformatics.
Humbert, M., Ayday, E., Hubaux, J., & Telenti, A.(2017).Quantifying interdependent risks in genomic privacy.ACM Transactions on Privacy and Security (TOPS),20(1),3.
Tuna, G., Kogias, D., Gungor, V., Gezer, C., Ta\csk\in, Erhan, C., & Ayday, E.(2017).A survey on information security threats and solutions for Machine to Machine (M2M) communications.Journal of Parallel and Distributed Computing,109, 142--154.
Ayday, E., Tang, Q., & Yilmaz, A.(2017).Cryptographic solutions for credibility and liability issues of genomic data.IEEE Transactions on Dependable and Secure Computing,16(1),33--43.
Guo, G., Chen, L., Ye, F., & Jiang, Q.(2017).Cluster Validation Method for Determining the Number of Clusters in Categorical Sequences.IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS,28(12),2936-2948.
Shalev, R., Nakamura, D., Nishino, S., Rollins, A. M., Bezerra, H. M., Wilson, D. L., & Ray, S. L.(2017).Automated Volumetric Intravascular Plaque Classification Using Optical Coherence Tomography.AI Magazine,38(1).
Kale, G., Ayday, E., & Tastan, O.(2017).Supplementary Materials for A Utility Maximizing and Privacy Preserving Approach for Protecting Kinship in Genomic Databases..
Yang, W., Li, D., Lam, W., Xie, T., Wu, Z., & Xiao, X.(2017).Towards Privacy-Preserving Mobile Apps: A Balancing Act.Proceedings of the Symposium and Bootcamp on the Science of Security.
Wiredja, D., Ayati, M., Mazhar, S., Sangodkar, J., Maxwell, S., Schlatzer, D., Narla, G., Koyutürk, M., & Chance, M.(2017).Phosphoproteomics Profiling of Nonsmall Cell Lung Cancer Cells Treated with a Novel Phosphatase Activator.Proteomics.
Kale, G., Ayday, E., & Tastan, O.(2017).Supplementary Materials for A Utility Maximizing and Privacy Preserving Approach for Protecting Kinship in Genomic Databases..
Deznabi, I., Mobayen, M., Jafari, N., Tastan, O., & Ayday, E.(2017).An inference attack on genomic data using kinship, complex correlations, and phenotype information.IEEE/ACM transactions on computational biology and bioinformatics,15(4),1333--1343.
Hou, S., Chen, L., Ye, F., & Chen, L.(2017).Deep Analysis and Utilization of Malware's Social Relation Network for Its Detection.SPRINGER INTERNATIONAL PUBLISHING AG,10612, 31-42.
Halimi, A., & Ayday, E.(2017).Profile matching across unstructured online social networks: threats and countermeasures.arXiv preprint arXiv:1711.01815.