Skip to main content

Showing 1–6 of 6 results for author: Savas, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.16683  [pdf, other

    cs.LG stat.ML

    MCMC for Bayesian estimation of Differential Privacy from Membership Inference Attacks

    Authors: Ceren Yildirim, Kamer Kaya, Sinan Yildirim, Erkay Savas

    Abstract: We propose a new framework for Bayesian estimation of differential privacy, incorporating evidence from multiple membership inference attacks (MIA). Bayesian estimation is carried out via a Markov chain Monte Carlo (MCMC) algorithm, named MCMC-DP-Est, which provides an estimate of the full posterior distribution of the privacy parameter (e.g., instead of just credible intervals). Critically, the p… ▽ More

    Submitted 23 April, 2025; originally announced April 2025.

    Comments: Code available: https://github.com/cerenyildirim/MCMC_for_Bayesian_estimation

  2. Measure theoretic results for approximation by neural networks with limited weights

    Authors: Vugar Ismailov, Ekrem Savas

    Abstract: In this paper, we study approximation properties of single hidden layer neural networks with weights varying on finitely many directions and thresholds from an open interval. We obtain a necessary and at the same time sufficient measure theoretic condition for density of such networks in the space of continuous functions. Further, we prove a density result for neural networks with a specifically c… ▽ More

    Submitted 4 April, 2023; originally announced April 2023.

    Comments: 12 pages

    MSC Class: 41A30; 41A63; 92B20

    Journal ref: Numer. Funct. Anal. Optim. 38 (2017), no. 7, 819--830

  3. arXiv:2303.12940  [pdf, other

    cs.CR cs.CV cs.DC cs.IT

    Cryptocurrency wallets: assessment and security

    Authors: Ehsan Nowroozi, Seyedsadra Seyedshoari, Yassine Mekdad, Erkay Savas, Mauro Conti

    Abstract: Digital wallet as a software program or a digital device allows users to conduct various transactions. Hot and cold digital wallets are considered as two types of this wallet. Digital wallets need an online connection fall into the first group, whereas digital wallets can operate without internet connection belong to the second group. Prior to buying a digital wallet, it is important to define for… ▽ More

    Submitted 6 March, 2023; originally announced March 2023.

  4. arXiv:2209.12195  [pdf, other

    cs.CR cs.AI cs.LG cs.NI

    Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks

    Authors: Ehsan Nowroozi, Mohammadreza Mohammadi, Erkay Savas, Mauro Conti, Yassine Mekdad

    Abstract: In the past few years, Convolutional Neural Networks (CNN) have demonstrated promising performance in various real-world cybersecurity applications, such as network and multimedia security. However, the underlying fragility of CNN structures poses major security problems, making them inappropriate for use in security-oriented applications including such computer networks. Protecting these architec… ▽ More

    Submitted 17 April, 2023; v1 submitted 25 September, 2022; originally announced September 2022.

  5. arXiv:2110.11446  [pdf, other

    cs.CR cs.LG q-bio.GN

    ML with HE: Privacy Preserving Machine Learning Inferences for Genome Studies

    Authors: Ş. S. Mağara, C. Yıldırım, F. Yaman, B. Dilekoğlu, F. R. Tutaş, E. Öztürk, K. Kaya, Ö. Taştan, E. Savaş

    Abstract: Preserving the privacy and security of big data in the context of cloud computing, while maintaining a certain level of efficiency of its processing remains to be a subject, open for improvement. One of the most popular applications epitomizing said concerns is found to be useful in genome analysis. This work proposes a secure multi-label tumor classification method using homomorphic encryption, w… ▽ More

    Submitted 1 February, 2022; v1 submitted 21 October, 2021; originally announced October 2021.

  6. THRIVE: Threshold Homomorphic encryption based secure and privacy preserving bIometric VErification system

    Authors: Cagatay Karabat, Mehmet Sabir Kiraz, Hakan Erdogan, Erkay Savas

    Abstract: In this paper, we propose a new biometric verification and template protection system which we call the THRIVE system. The system includes novel enrollment and authentication protocols based on threshold homomorphic cryptosystem where the private key is shared between a user and the verifier. In the THRIVE system, only encrypted binary biometric templates are stored in the database and verificatio… ▽ More

    Submitted 29 September, 2014; originally announced September 2014.