Publications by authors named "Ferhat Ozgur Catak"

Article Synopsis
  • * The paper highlights the benefits of FL, including enhanced data privacy, efficiency, and scalability, along with an overview of its principles, strategies, applications, and tools.
  • * The authors stress that FL can address privacy issues effectively, making it especially valuable for high-risk applications where data confidentiality is crucial.
View Article and Find Full Text PDF

Nowadays, Visible Light Communication (VLC) has gained much attention due to the significant advancements in Light Emitting Diode (LED) technology. However, the bandwidth of LEDs is one of the important concerns that limits the transmission rates in a VLC system. In order to eliminate this limitation, various types of equalization methods are employed.

View Article and Find Full Text PDF

The coronavirus disease (COVID-19) has continued to cause severe challenges during this unprecedented time, affecting every part of daily life in terms of health, economics, and social development. There is an increasing demand for chest X-ray (CXR) scans, as pneumonia is the primary and vital complication of COVID-19. CXR is widely used as a screening tool for lung-related diseases due to its simple and relatively inexpensive application.

View Article and Find Full Text PDF
Article Synopsis
  • Proper environmental sensing is crucial for the safety of autonomous vehicles, as errors can lead to dangerous misclassifications.
  • Adversarial attacks and uncertain data can degrade the performance of machine learning models used in autonomous driving, which can result in poor decision-making.
  • The proposed method enhances model robustness by incorporating uncertain adversarial test inputs during re-training, leading to over a 12% improvement in accuracy and a reduction in decision uncertainty.
View Article and Find Full Text PDF

Deep neural network (DNN) architectures are considered to be robust to random perturbations. Nevertheless, it was shown that they could be severely vulnerable to slight but carefully crafted perturbations of the input, termed as adversarial samples. In recent years, numerous studies have been conducted in this new area called ``Adversarial Machine Learning" to devise new adversarial attacks and to defend against these attacks with more robust DNN architectures.

View Article and Find Full Text PDF

Due to advancements in malware competencies, cyber-attacks have been broadly observed in the digital world. Cyber-attacks can hit an organization hard by causing several damages such as data breach, financial loss, and reputation loss. Some of the most prominent examples of ransomware attacks in history are WannaCry and Petya, which impacted companies' finances throughout the globe.

View Article and Find Full Text PDF

Malware development has seen diversity in terms of architecture and features. This advancement in the competencies of malware poses a severe threat and opens new research dimensions in malware detection. This study is focused on metamorphic malware, which is the most advanced member of the malware family.

View Article and Find Full Text PDF