What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Seyit Camtepe
Google Scholar
ORCID:
0000-0001-6353-8359
36
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/compsec
Genetic programming for enhanced detection of Advanced Persistent Threats through feature construction.
Abdullah Al Mamun
Harith Al-Sahaf
Ian Welch
Seyit Camtepe
2025
journals/istr
ConceptUML: Multiphase unsupervised threat detection via latent concept learning, Hidden Markov Models and topic modelling.
Khanh Luong
Arash Mahboubi
Geoff Jarrad
Seyit Camtepe
Michael Bewong
Mohammed Bahutair
Hamed Aboutorab
Hang Thanh Bui
2025
conf/acisp
Ransomware Encryption Detection: Adaptive File System Analysis Against Evasive Encryption Tactics.
Arash Mahboubi
Hamed Aboutorab
Seyit Camtepe
Hang Thanh Bui
Khanh Luong
Keyvan Ansari
Shenlu Wang
Bazara I. A. Barry
2025
conf/ndss
Provably Unlearnable Data Examples.
Derui Wang
Minhui Xue
Bo Li
Seyit Camtepe
Liming Zhu
2025
conf/asiaccs
Towards Usability of Data with Privacy: A Unified Framework for Privacy-Preserving Data Sharing with High Utility.
M. A. P. Chamikara
Seung Ick Jang
Ian J. Oppermann
Dongxi Liu
Musotto Roberto
Sushmita Ruj
Arindam Pal
Meisam Mohammady
Seyit Camtepe
Sylvia Young
Chris Dorrian
Nasir David
2025
conf/esorics
FuncVul: An Effective Function Level Vulnerability Detection Model Using LLM and Code Chunk.
Sajal Halder
Muhammad Ejaz Ahmed
Seyit Camtepe
2025
conf/uss
CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius Maximization.
Derui Wang
Kristen Moore
Diksha Goel
Minjune Kim
Gang Li
Yang Li
Robin Doss
Minhui Xue
Bo Li
Seyit Camtepe
Liming Zhu
2025
conf/uss
AudioMarkNet: Audio Watermarking for Deepfake Speech Detection.
Wei Zong
Yang-Wai Chow
Willy Susilo
Joonsang Baek
Seyit Camtepe
2024
journals/istr
Shared file protection against unauthorised encryption using a Buffer-Based Signature Verification Method.
Arash Mahboubi
Seyit Camtepe
Keyvan Ansari
Marcin Pawlowski
Pawel Morawiecki
Hamed Aboutorab
Josef Pieprzyk
Jaroslaw Duda
2024
journals/tifs
To Act or Not to Act: An Adversarial Game for Securing Vehicle Platoons.
Guoxin Sun
Tansu Alpcan
Benjamin I. P. Rubinstein
Seyit Camtepe
2024
conf/uss
EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection.
Shigang Liu
Di Cao
Junae Kim
Tamas Abraham
Paul Montague
Seyit Camtepe
Jun Zhang
Yang Xiang
2024
conf/esorics
Bayesian Learned Models Can Detect Adversarial Malware for Free.
Bao Gia Doan
Dang Quang Nguyen
Paul Montague
Tamas Abraham
Olivier Y. de Vel
Seyit Camtepe
Salil S. Kanhere
Ehsan Abbasnejad
Damith C. Ranasinghe
2024
conf/esorics
Optimizing Cyber Defense in Dynamic Active Directories Through Reinforcement Learning.
Diksha Goel
Kristen Moore
Mingyu Guo
Derui Wang
Minjune Kim
Seyit Camtepe
2024
conf/dsn
MTD in Plain Sight: Hiding Network Behavior in Moving Target Defenses.
Tina Moghaddam
Guowei Yang
Chandra Thapa
Seyit Camtepe
Dan Dongseong Kim
2024
conf/dsn
Intrusion Detection Systems Using Quantum-Inspired Density Matrix Encodings.
Larry Huynh
Jin B. Hong
Ajmal Mian
Hajime Suzuki
Seyit Camtepe
2024
conf/iwsec
File System Shield (FSS): A Pass-Through Strategy Against Unwanted Encryption in Network File Systems.
Arash Mahboubi
Seyit Camtepe
Keyvan Ansari
Marcin Piotr Pawlowski
Pawel Morawiecki
Jaroslaw Duda
Josef Pieprzyk
2024
conf/acsac
On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World.
Bao Gia Doan
Dang Quang Nguyen
Callum Lindquist
Paul Montague
Tamas Abraham
Olivier Y. de Vel
Seyit Camtepe
Salil S. Kanhere
Ehsan Abbasnejad
Damith C. Ranasinghe
2023
conf/sp
PublicCheck: Public Integrity Verification for Services of Run-time Deep Models.
Shuo Wang
Sharif Abuadbba
Sidharth Agarwal
Kristen Moore
Ruoxi Sun
Minhui Xue
Surya Nepal
Seyit Camtepe
Salil S. Kanhere
2023
conf/esorics
SplITS: Split Input-to-State Mapping for Effective Firmware Fuzzing.
Guy Farrelly
Paul Quirk
Salil S. Kanhere
Seyit Camtepe
Damith C. Ranasinghe
2023
conf/esorics
Acumen: Analysing the Impact of Organisational Change on Users' Access Entitlements.
Selasi Kwashie
Wei Kang
Sandeep Santhosh Kumar
Geoff Jarrad
Seyit Camtepe
Surya Nepal
2023
conf/asiaccs
POSTER: Toward Intelligent Cyber Attacks for Moving Target Defense Techniques in Software-Defined Networking.
Tina Moghaddam
Guowei Yang
Chandra Thapa
Seyit Camtepe
Dan Dongseong Kim
2023
conf/ndss
DOITRUST: Dissecting On-chain Compromised Internet Domains via Graph Learning.
Shuo Wang
Mahathir Almashor
Alsharif Abuadbba
Ruoxi Sun
Minhui Xue
Calvin Wang
Raj Gaire
Surya Nepal
Seyit Camtepe
2022
journals/compsec
A few-shot meta-learning based siamese neural network using entropy features for ransomware classification.
Jinting Zhu
Julian Jang-Jaccard
Amardeep Singh
Ian Welch
Harith Al-Sahaf
Seyit Camtepe
2022
conf/ccs
Demo - MaLFraDA: A Machine Learning Framework with Data Airlock.
Chandra Thapa
Seyit Camtepe
Raj Gaire
Surya Nepal
Seung Ick Jang
2022
conf/esorics
Local Differential Privacy for Federated Learning.
Mahawaga Arachchige Pathum Chamikara
Dongxi Liu
Seyit Camtepe
Surya Nepal
Marthie Grobler
Peter Bertók
Ibrahim Khalil
2022
conf/esorics
No-Label User-Level Membership Inference for ASR Model Auditing.
Yuantian Miao
Chao Chen
Lei Pan
Shigang Liu
Seyit Camtepe
Jun Zhang
Yang Xiang
2022
conf/acsac
Transformer-Based Language Models for Software Vulnerability Detection.
Chandra Thapa
Seung Ick Jang
Muhammad Ejaz Ahmed
Seyit Camtepe
Josef Pieprzyk
Surya Nepal
2021
journals/tifs
Compcrypt-Lightweight ANS-Based Compression and Encryption.
Seyit Camtepe
Jarek Duda
Arash Mahboubi
Pawel Morawiecki
Surya Nepal
Marcin Pawlowski
Josef Pieprzyk
2021
conf/esorics
Peeler: Profiling Kernel-Level Events to Detect Ransomware.
Muhammad Ejaz Ahmed
Hyoungshick Kim
Seyit Camtepe
Surya Nepal
2021
conf/asiaccs
P2DPI: Practical and Privacy-Preserving Deep Packet Inspection.
Jongkil Kim
Seyit Camtepe
Joonsang Baek
Willy Susilo
Josef Pieprzyk
Surya Nepal
2020
journals/compsec
Privacy Preserving Face Recognition Utilizing Differential Privacy.
Mahawaga Arachchige Pathum Chamikara
Peter Bertók
Ibrahim Khalil
Dongxi Liu
Seyit Camtepe
2020
journals/tifs
An Efficient Authentication Scheme for Intra-Vehicular Controller Area Network.
Basker Palaniswamy
Seyit Camtepe
Ernest Foo
Josef Pieprzyk
2020
conf/esorics
An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation.
Nazatul Haque Sultan
Vijay Varadharajan
Seyit Camtepe
Surya Nepal
2019
journals/tifs
Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog.
Nour Moustafa
Kim-Kwang Raymond Choo
Ibrahim Radwan
Seyit Camtepe
2019
conf/ccs
A Feature-Oriented Corpus for Understanding, Evaluating and Improving Fuzz Testing.
Xiaogang Zhu
Xiaotao Feng
Tengyun Jiao
Sheng Wen
Yang Xiang
Seyit Camtepe
Jingling Xue
2019
conf/ccs
Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing.
Jongkil Kim
Seyit Camtepe
Willy Susilo
Surya Nepal
Joonsang Baek
Coauthors
Abdullah Al Mamun
(1)
Ajmal Mian
(1)
Alsharif Abuadbba
(1)
Amardeep Singh
(1)
Arash Mahboubi
(5)
Arindam Pal
(1)
Bao Gia Doan
(2)
Basker Palaniswamy
(1)
Bazara I. A. Barry
(1)
Benjamin I. P. Rubinstein
(1)
Bo Li
(2)
Callum Lindquist
(1)
Calvin Wang
(1)
Chandra Thapa
(4)
Chao Chen
(1)
Chris Dorrian
(1)
Damith C. Ranasinghe
(3)
Dan Dongseong Kim
(2)
Dang Quang Nguyen
(2)
Derui Wang
(3)
Di Cao
(1)
Diksha Goel
(2)
Dongxi Liu
(3)
Ehsan Abbasnejad
(2)
Ernest Foo
(1)
Gang Li
(1)
Geoff Jarrad
(2)
Guowei Yang
(2)
Guoxin Sun
(1)
Guy Farrelly
(1)
Hajime Suzuki
(1)
Hamed Aboutorab
(3)
Hang Thanh Bui
(2)
Harith Al-Sahaf
(2)
Hyoungshick Kim
(1)
Ian J. Oppermann
(1)
Ian Welch
(2)
Ibrahim Khalil
(2)
Ibrahim Radwan
(1)
Jarek Duda
(1)
Jaroslaw Duda
(2)
Jin B. Hong
(1)
Jingling Xue
(1)
Jinting Zhu
(1)
Jongkil Kim
(2)
Joonsang Baek
(3)
Josef Pieprzyk
(6)
Julian Jang-Jaccard
(1)
Jun Zhang
(2)
Junae Kim
(1)
Keyvan Ansari
(3)
Khanh Luong
(2)
Kim-Kwang Raymond Choo
(1)
Kristen Moore
(3)
Larry Huynh
(1)
Lei Pan
(1)
Liming Zhu
(2)
M. A. P. Chamikara
(1)
Mahathir Almashor
(1)
Mahawaga Arachchige Pathum Chamikara
(2)
Marcin Pawlowski
(2)
Marcin Piotr Pawlowski
(1)
Marthie Grobler
(1)
Meisam Mohammady
(1)
Michael Bewong
(1)
Mingyu Guo
(1)
Minhui Xue
(4)
Minjune Kim
(2)
Mohammed Bahutair
(1)
Muhammad Ejaz Ahmed
(3)
Musotto Roberto
(1)
Nasir David
(1)
Nazatul Haque Sultan
(1)
Nour Moustafa
(1)
Olivier Y. de Vel
(2)
Paul Montague
(3)
Paul Quirk
(1)
Pawel Morawiecki
(3)
Peter Bertók
(2)
Raj Gaire
(2)
Robin Doss
(1)
Ruoxi Sun
(2)
Sajal Halder
(1)
Salil S. Kanhere
(4)
Sandeep Santhosh Kumar
(1)
Selasi Kwashie
(1)
Seung Ick Jang
(3)
Seyit Camtepe
(36)
Sharif Abuadbba
(1)
Sheng Wen
(1)
Shenlu Wang
(1)
Shigang Liu
(2)
Shuo Wang
(2)
Sidharth Agarwal
(1)
Surya Nepal
(11)
Sushmita Ruj
(1)
Sylvia Young
(1)
Tamas Abraham
(3)
Tansu Alpcan
(1)
Tengyun Jiao
(1)
Tina Moghaddam
(2)
Vijay Varadharajan
(1)
Wei Kang
(1)
Wei Zong
(1)
Willy Susilo
(3)
Xiaogang Zhu
(1)
Xiaotao Feng
(1)
Yang Li
(1)
Yang Xiang
(3)
Yang-Wai Chow
(1)
Yuantian Miao
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to