Fan, Y., Zhang, Y., Ye, F., Liu, X., & Zheng, W.(2017).Social Media for Opioid Addiction Epidemiology: Automatic Detection of Opioid Addicts from Twitter and Case Studies. ASSOC COMPUTING MACHINERY,(), 1259-1267.
Topal, K., & Ozsoyoglu, T.(2017).Emotional classification and visualization of movies based on their IMDb reviews. Information Discovery and Delivery,(), 00-00.
Morrison, P., Pandita, R., Xiao, X., Chillarege, R., & Williams, L.(2017).Are vulnerabilities discovered and resolved like other defects?. Empirical Software Engineering,(), 1--39.
Tuna, G., Kogias, D., Gungor, V., Gezer, C., Ta\csk\in, Erhan, & Ayday, E.(2017).A survey on information security threats and solutions for Machine to Machine (M2M) communications. Journal of Parallel and Distributed Computing, 109(), 142--154.
Deznabi, I., Mobayen, M., Jafari, N., Tastan, O., & Ayday, E.(2017).An inference attack on genomic data using kinship, complex correlations, and phenotype information. IEEE/ACM transactions on computational biology and bioinformatics, 15(4), 1333--1343.
Yang, W., Li, D., Lam, W., Xie, T., Wu, Z., & Xiao, X.(2017).Towards Privacy-Preserving Mobile Apps: A Balancing Act. Proceedings of the Symposium and Bootcamp on the Science of Security,().
Tuna, G., Kogias, D., Gungor, V., Gezer, C., Ta\csk\in, Erhan, & Ayday, E.(2017).A survey on information security threats and solutions for Machine to Machine (M2M) communications. Journal of Parallel and Distributed Computing, 109(), 142--154.
Ayday, E., Tang, Q., & Yilmaz, A.(2017).Cryptographic solutions for credibility and liability issues of genomic data. IEEE Transactions on Dependable and Secure Computing, 16(1), 33--43.
Al-Qudah, Z., Alsarayreh, M., Jomhawy, I., & Rabinovich, M.(2016). Internet Path Stability: Exploring the Impact of MPLS Deployment. IEEE Globecom Conference,().
Triukose, S., & Rabinovich, M.(2016). Client-Centric Content Delivery Network. 4th IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb),(), 6.