Skip to main content

Showing 1–19 of 19 results for author: Güngör, O

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.05413  [pdf, other

    cs.LG

    DPQ-HD: Post-Training Compression for Ultra-Low Power Hyperdimensional Computing

    Authors: Nilesh Prasad Pandey, Shriniwas Kulkarni, David Wang, Onat Gungor, Flavio Ponzina, Tajana Rosing

    Abstract: Hyperdimensional Computing (HDC) is emerging as a promising approach for edge AI, offering a balance between accuracy and efficiency. However, current HDC-based applications often rely on high-precision models and/or encoding matrices to achieve competitive performance, which imposes significant computational and memory demands, especially for ultra-low power devices. While recent efforts use tech… ▽ More

    Submitted 8 May, 2025; originally announced May 2025.

  2. arXiv:2504.13301  [pdf, other

    cs.CR

    DYNAMITE: Dynamic Defense Selection for Enhancing Machine Learning-based Intrusion Detection Against Adversarial Attacks

    Authors: Jing Chen, Onat Gungor, Zhengli Shang, Elvin Li, Tajana Rosing

    Abstract: The rapid proliferation of the Internet of Things (IoT) has introduced substantial security vulnerabilities, highlighting the need for robust Intrusion Detection Systems (IDS). Machine learning-based intrusion detection systems (ML-IDS) have significantly improved threat detection capabilities; however, they remain highly susceptible to adversarial attacks. While numerous defense mechanisms have b… ▽ More

    Submitted 17 April, 2025; originally announced April 2025.

    Comments: Accepted by the IEEE/ACM Workshop on the Internet of Safe Things (SafeThings 2025)

  3. arXiv:2503.07882  [pdf, other

    cs.LG cs.CR

    ReLATE: Resilient Learner Selection for Multivariate Time-Series Classification Against Adversarial Attacks

    Authors: Cagla Ipek Kocal, Onat Gungor, Aaron Tartz, Tajana Rosing, Baris Aksanli

    Abstract: Minimizing computational overhead in time-series classification, particularly in deep learning models, presents a significant challenge. This challenge is further compounded by adversarial attacks, emphasizing the need for resilient methods that ensure robust performance and efficient model selection. We introduce ReLATE, a framework that identifies robust learners based on dataset similarity, red… ▽ More

    Submitted 10 March, 2025; originally announced March 2025.

    Comments: Accepted by the AAAI-25 Workshop on Artificial Intelligence for Time Series Analysis (AI4TS)

  4. arXiv:2502.15901  [pdf, other

    cs.LG

    TS-OOD: Evaluating Time-Series Out-of-Distribution Detection and Prospective Directions for Progress

    Authors: Onat Gungor, Amanda Sofie Rios, Nilesh Ahuja, Tajana Rosing

    Abstract: Detecting out-of-distribution (OOD) data is a fundamental challenge in the deployment of machine learning models. From a security standpoint, this is particularly important because OOD test data can result in misleadingly confident yet erroneous predictions, which undermine the reliability of the deployed model. Although numerous models for OOD detection have been developed in computer vision and… ▽ More

    Submitted 21 February, 2025; originally announced February 2025.

    Comments: Accepted for an oral presentation at AAAI-25 AI4TS

  5. arXiv:2502.15285  [pdf, other

    cs.SD cs.AI cs.DC cs.NI eess.AS

    Offload Rethinking by Cloud Assistance for Efficient Environmental Sound Recognition on LPWANs

    Authors: Le Zhang, Quanling Zhao, Run Wang, Shirley Bian, Onat Gungor, Flavio Ponzina, Tajana Rosing

    Abstract: Learning-based environmental sound recognition has emerged as a crucial method for ultra-low-power environmental monitoring in biological research and city-scale sensing systems. These systems usually operate under limited resources and are often powered by harvested energy in remote areas. Recent efforts in on-device sound recognition suffer from low accuracy due to resource constraints, whereas… ▽ More

    Submitted 21 March, 2025; v1 submitted 21 February, 2025; originally announced February 2025.

    Comments: Accepted by The 23rd ACM Conference on Embedded Networked Sensor Systems (SenSys '25)

  6. arXiv:2502.14094  [pdf, other

    cs.CR cs.LG

    CND-IDS: Continual Novelty Detection for Intrusion Detection Systems

    Authors: Sean Fuhrman, Onat Gungor, Tajana Rosing

    Abstract: Intrusion detection systems (IDS) play a crucial role in IoT and network security by monitoring system data and alerting to suspicious activities. Machine learning (ML) has emerged as a promising solution for IDS, offering highly accurate intrusion detection. However, ML-IDS solutions often overlook two critical aspects needed to build reliable systems: continually changing data streams and a lack… ▽ More

    Submitted 19 February, 2025; originally announced February 2025.

    Comments: Accepted by the 62nd Design Automation Conference (DAC 2025)

  7. arXiv:2502.07119  [pdf, other

    cs.CR cs.LG

    SAFE: Self-Supervised Anomaly Detection Framework for Intrusion Detection

    Authors: Elvin Li, Zhengli Shang, Onat Gungor, Tajana Rosing

    Abstract: The proliferation of IoT devices has significantly increased network vulnerabilities, creating an urgent need for effective Intrusion Detection Systems (IDS). Machine Learning-based IDS (ML-IDS) offer advanced detection capabilities but rely on labeled attack data, which limits their ability to identify unknown threats. Self-Supervised Learning (SSL) presents a promising solution by using only nor… ▽ More

    Submitted 10 February, 2025; originally announced February 2025.

    Comments: Accepted by the AAAI-25 Workshop on Artificial Intelligence for Cyber Security (AICS)

  8. arXiv:2410.17152  [pdf, other

    cs.IR cs.CL

    Improving Pinterest Search Relevance Using Large Language Models

    Authors: Han Wang, Mukuntha Narayanan Sundararaman, Onur Gungor, Yu Xu, Krishna Kamath, Rakesh Chalasani, Kurchi Subhra Hazra, Jinfeng Rao

    Abstract: To improve relevance scoring on Pinterest Search, we integrate Large Language Models (LLMs) into our search relevance model, leveraging carefully designed text representations to predict the relevance of Pins effectively. Our approach uses search queries alongside content representations that include captions extracted from a generative visual language model. These are further enriched with link-b… ▽ More

    Submitted 22 October, 2024; originally announced October 2024.

    Comments: CIKM 2024 Workshop on Industrial Recommendation Systems

  9. arXiv:2409.08369  [pdf, other

    cs.DC cs.AI cs.ET cs.PF

    E-QUARTIC: Energy Efficient Edge Ensemble of Convolutional Neural Networks for Resource-Optimized Learning

    Authors: Le Zhang, Onat Gungor, Flavio Ponzina, Tajana Rosing

    Abstract: Ensemble learning is a meta-learning approach that combines the predictions of multiple learners, demonstrating improved accuracy and robustness. Nevertheless, ensembling models like Convolutional Neural Networks (CNNs) result in high memory and computing overhead, preventing their deployment in embedded systems. These devices are usually equipped with small batteries that provide power supply and… ▽ More

    Submitted 12 September, 2024; originally announced September 2024.

    Comments: Accepted by the 30th Asia and South Pacific Design Automation Conference (ASP-DAC 2025)

  10. arXiv:2401.14373  [pdf, other

    cs.CL cs.AI cs.LG

    TURNA: A Turkish Encoder-Decoder Language Model for Enhanced Understanding and Generation

    Authors: Gökçe Uludoğan, Zeynep Yirmibeşoğlu Balal, Furkan Akkurt, Melikşah Türker, Onur Güngör, Susan Üsküdarlı

    Abstract: The recent advances in natural language processing have predominantly favored well-resourced English-centric models, resulting in a significant gap with low-resource languages. In this work, we introduce the language model TURNA, which is developed for the low-resource language Turkish and is capable of both natural language understanding and generation tasks. TURNA is pretrained with an encoder-d… ▽ More

    Submitted 25 January, 2024; originally announced January 2024.

  11. arXiv:2301.09740  [pdf, other

    cs.CR cs.LG

    DODEM: DOuble DEfense Mechanism Against Adversarial Attacks Towards Secure Industrial Internet of Things Analytics

    Authors: Onat Gungor, Tajana Rosing, Baris Aksanli

    Abstract: Industrial Internet of Things (I-IoT) is a collaboration of devices, sensors, and networking equipment to monitor and collect data from industrial operations. Machine learning (ML) methods use this data to make high-level decisions with minimal human intervention. Data-driven predictive maintenance (PDM) is a crucial ML-based I-IoT application to find an optimal maintenance schedule for industrial… ▽ More

    Submitted 23 January, 2023; originally announced January 2023.

  12. arXiv:2207.11782  [pdf, other

    cs.CL

    Enhancements to the BOUN Treebank Reflecting the Agglutinative Nature of Turkish

    Authors: Büşra Marşan, Salih Furkan Akkurt, Muhammet Şen, Merve Gürbüz, Onur Güngör, Şaziye Betül Özateş, Suzan Üsküdarlı, Arzucan Özgür, Tunga Güngör, Balkız Öztürk

    Abstract: In this study, we aim to offer linguistically motivated solutions to resolve the issues of the lack of representation of null morphemes, highly productive derivational processes, and syncretic morphemes of Turkish in the BOUN Treebank without diverging from the Universal Dependencies framework. In order to tackle these issues, new annotation conventions were introduced by splitting certain lemma… ▽ More

    Submitted 24 July, 2022; originally announced July 2022.

    Comments: This is a peer reviewed article that has been presented in The International Conference on Agglutinative Language Technologies as a challenge of Natural Language Processing (ALTNLP) 2022

  13. arXiv:2203.08148  [pdf, other

    cs.CR cs.LG

    RES-HD: Resilient Intelligent Fault Diagnosis Against Adversarial Attacks Using Hyper-Dimensional Computing

    Authors: Onat Gungor, Tajana Rosing, Baris Aksanli

    Abstract: Industrial Internet of Things (I-IoT) enables fully automated production systems by continuously monitoring devices and analyzing collected data. Machine learning methods are commonly utilized for data analytics in such systems. Cyber-attacks are a grave threat to I-IoT as they can manipulate legitimate inputs, corrupting ML predictions and causing disruptions in the production systems. Hyper-dime… ▽ More

    Submitted 14 March, 2022; originally announced March 2022.

  14. arXiv:1807.06683  [pdf, other

    cs.CL

    Improving Named Entity Recognition by Jointly Learning to Disambiguate Morphological Tags

    Authors: Onur Güngör, Suzan Üsküdarlı, Tunga Güngör

    Abstract: Previous studies have shown that linguistic features of a word such as possession, genitive or other grammatical cases can be employed in word representations of a named entity recognition (NER) tagger to improve the performance for morphologically rich languages. However, these taggers require external morphological disambiguation (MD) tools to function which are hard to obtain or non-existent fo… ▽ More

    Submitted 17 July, 2018; originally announced July 2018.

    Comments: COLING 2018 (accepted)

    Journal ref: Proceedings of the 27th International Conference on Computational Linguistics (COLING 2018). pp. 2082-2092

  15. arXiv:1706.00506  [pdf, other

    cs.CL

    Morphological Embeddings for Named Entity Recognition in Morphologically Rich Languages

    Authors: Onur Gungor, Eray Yildiz, Suzan Uskudarli, Tunga Gungor

    Abstract: In this work, we present new state-of-the-art results of 93.59,% and 79.59,% for Turkish and Czech named entity recognition based on the model of (Lample et al., 2016). We contribute by proposing several schemes for representing the morphological analysis of a word in the context of named entity recognition. We show that a concatenation of this representation with the word and character embeddings… ▽ More

    Submitted 1 June, 2017; originally announced June 2017.

    Comments: Working draft

  16. arXiv:1610.10000  [pdf, other

    cs.IR cs.HC

    Numerical Facet Range Partition: Evaluation Metric and Methods

    Authors: Xueqing Liu, Chengxiang Zhai, Wei Han, Onur Gungor

    Abstract: Faceted navigation is a very useful component in today's search engines. It is especially useful when user has an exploratory information need or prefer certain attribute values than others. Existing work has tried to optimize faceted systems in many aspects, but little work has been done on optimizing numerical facet ranges (e.g., price ranges of product). In this paper, we introduce for the firs… ▽ More

    Submitted 27 February, 2017; v1 submitted 31 October, 2016; originally announced October 2016.

    Comments: accepted to WWW 2017 Industry Track

    ACM Class: H.3.3

  17. arXiv:1312.0060  [pdf, other

    cs.IT

    On the Secrecy Capacity of Block Fading Channels with a Hybrid Adversary

    Authors: Y. Ozan Basciftci, Onur Gungor, C. Emre Koksal, Fusun Ozguner

    Abstract: We consider a block fading wiretap channel, where a transmitter attempts to send messages securely to a receiver in the presence of a hybrid half-duplex adversary, which arbitrarily decides to either jam or eavesdrop the transmitter-to- receiver channel. We provide bounds to the secrecy capacity for various possibilities on receiver feedback and show special cases where the bounds are tight. We sh… ▽ More

    Submitted 29 November, 2013; originally announced December 2013.

  18. arXiv:1112.2793  [pdf, ps, other

    cs.IT

    Secret Key Generation Via Localization and Mobility

    Authors: Onur Gungor, Fangzhou Chen, C. Emre Koksal

    Abstract: We consider secret key generation from relative localization information of a pair of nodes in a mobile wireless network in the presence of a mobile eavesdropper. Our problem can be categorized under the source models of information theoretic secrecy, where the distance between the legitimate nodes acts as the observed common randomness. We characterize the theoretical limits on the achievable sec… ▽ More

    Submitted 20 May, 2014; v1 submitted 12 December, 2011; originally announced December 2011.

  19. arXiv:1112.2791  [pdf, ps, other

    cs.IT

    Secrecy Outage Capacity of Fading Channels

    Authors: Onur Gungor, Jian Tan, C. Emre Koksal, Hesham El Gamal, Ness B. Shroff

    Abstract: This paper considers point to point secure communication over flat fading channels under an outage constraint. More specifically, we extend the definition of outage capacity to account for the secrecy constraint and obtain sharp characterizations of the corresponding fundamental limits under two different assumptions on the transmitter CSI (Channel state information). First, we find the outage sec… ▽ More

    Submitted 12 December, 2011; originally announced December 2011.

    Comments: submitted to IEEE Transactions on Information Theory