Skip to main content

Showing 1–12 of 12 results for author: Ozmen, M

.
  1. arXiv:2309.13543  [pdf, other

    cs.CL cs.LG

    Substituting Data Annotation with Balanced Updates and Collective Loss in Multi-label Text Classification

    Authors: Muberra Ozmen, Joseph Cotnareanu, Mark Coates

    Abstract: Multi-label text classification (MLTC) is the task of assigning multiple labels to a given text, and has a wide range of application domains. Most existing approaches require an enormous amount of annotated data to learn a classifier and/or a set of well-defined constraints on the label space structure, such as hierarchical relations which may be complicated to provide as the number of labels incr… ▽ More

    Submitted 24 September, 2023; originally announced September 2023.

    Comments: Proc. Conf. Lifelong Learning Agents (CoLLAs), 2023

  2. arXiv:2202.04844  [pdf, other

    cs.LG

    Multi-relation Message Passing for Multi-label Text Classification

    Authors: Muberra Ozmen, Hao Zhang, Pengyun Wang, Mark Coates

    Abstract: A well-known challenge associated with the multi-label classification problem is modelling dependencies between labels. Most attempts at modelling label dependencies focus on co-occurrences, ignoring the valuable information that can be extracted by detecting label subsets that rarely occur together. For example, consider customer product reviews; a product probably would not simultaneously be tag… ▽ More

    Submitted 10 February, 2022; originally announced February 2022.

  3. arXiv:2105.00645  [pdf, other

    cs.CR

    On the Safety Implications of Misordered Events and Commands in IoT Systems

    Authors: Furkan Goksel, Muslum Ozgur Ozmen, Michael Reeves, Basavesh Shivakumar, Z. Berkay Celik

    Abstract: IoT devices, equipped with embedded actuators and sensors, provide custom automation in the form of IoT apps. IoT apps subscribe to events and upon receipt, transmit actuation commands which trigger a set of actuators. Events and actuation commands follow paths in the IoT ecosystem such as sensor-to-edge, edge-to-cloud, and cloud-to-actuator, with different network and processing delays between th… ▽ More

    Submitted 3 May, 2021; originally announced May 2021.

  4. arXiv:2103.09345  [pdf, other

    cs.CR

    Compatible Certificateless and Identity-Based Cryptosystems for Heterogeneous IoT

    Authors: Rouzbeh Behnia, Attila A. Yavuz, Muslum Ozgur Ozmen, Tsz Hon Yuen

    Abstract: Certificates ensure the authenticity of users' public keys, however their overhead (e.g., certificate chains) might be too costly for some IoT systems like aerial drones. Certificate-free cryptosystems, like identity-based and certificateless systems, lift the burden of certificates and could be a suitable alternative for such IoTs. However, despite their merits, there is a research gap in achievi… ▽ More

    Submitted 16 March, 2021; originally announced March 2021.

    Journal ref: In International Conference on Information Security (pp. 39-58). Springer, Cham (2020)

  5. Discovering IoT Physical Channel Vulnerabilities

    Authors: Muslum Ozgur Ozmen, Xuansong Li, Andrew Chu, Z. Berkay Celik, Bardh Hoxha, Xiangyu Zhang

    Abstract: Smart homes contain diverse sensors and actuators controlled by IoT apps that provide custom automation. Prior works showed that an adversary could exploit physical interaction vulnerabilities among apps and put the users and environment at risk, e.g., to break into a house, an adversary turns on the heater to trigger an app that opens windows when the temperature exceeds a threshold. Currently, t… ▽ More

    Submitted 7 September, 2022; v1 submitted 2 February, 2021; originally announced February 2021.

    Comments: Published in ACM CCS 2022

  6. arXiv:1907.03911  [pdf, other

    cs.CR

    Ultra Lightweight Multiple-time Digital Signature for the Internet of Things Devices

    Authors: Attila A. Yavuz, Muslum Ozgur Ozmen

    Abstract: Digital signatures are basic cryptographic tools to provide authentication and integrity in the emerging ubiquitous systems in which resource-constrained devices are expected to operate securely and efficiently. However, existing digital signatures might not be fully practical for such resource-constrained devices (e.g., medical implants) that have energy limitations. Some other computationally ef… ▽ More

    Submitted 8 July, 2019; originally announced July 2019.

    Comments: Published in IEEE Transactions on Services Computing (IEEE TSC)

  7. arXiv:1904.06829  [pdf, other

    cs.CR cs.CY

    IoD-Crypt: A Lightweight Cryptographic Framework for Internet of Drones

    Authors: Muslum Ozgur Ozmen, Rouzbeh Behnia, Attila A. Yavuz

    Abstract: Internet of Drones (IoD) is expected to play a central role in many civilian and military applications, that require sensitive and mission-critical information to be processed. It is therefore vital to ensure the security and privacy of IoD. However, unlike traditional networks, IoD has a broader attack surface and is highly energy-constrained, which hinder the direct adoption of standard cryptogr… ▽ More

    Submitted 14 April, 2019; originally announced April 2019.

  8. Dronecrypt - An Efficient Cryptographic Framework for Small Aerial Drones

    Authors: Muslum Ozgur Ozmen, Attila A. Yavuz

    Abstract: Aerial drones are becoming an integral part of application domains including but not limited to, military operations, package delivery, construction, monitoring and search/rescue operations. It is critical to ensure the cyber security of networked aerial drone systems in these applications. Standard cryptographic services can be deployed to provide basic security services; however, they have been… ▽ More

    Submitted 28 March, 2019; originally announced March 2019.

    Comments: Published in IEEE Milcom 2018

  9. arXiv:1903.07786  [pdf, other

    cs.CR

    Energy-Aware Digital Signatures for Embedded Medical Devices

    Authors: Muslum Ozgur Ozmen, Attila A. Yavuz, Rouzbeh Behnia

    Abstract: Authentication is vital for the Internet of Things (IoT) applications involving sensitive data (e.g., medical and financial systems). Digital signatures offer scalable authentication with non-repudiation and public verifiability, which are necessary for auditing and dispute resolution in such IoT applications. However, digital signatures have been shown to be highly costly for low-end IoT devices,… ▽ More

    Submitted 18 March, 2019; originally announced March 2019.

    Comments: Original Publication in IEEE CNS 2019

  10. arXiv:1903.02142  [pdf, other

    cs.CR

    ARIS: Authentication for Real-Time IoT Systems

    Authors: Rouzbeh Behnia, Muslum Ozgur Ozmen, Attila A. Yavuz

    Abstract: Efficient authentication is vital for IoT applications with stringent minimum-delay requirements (e.g., energy delivery systems). This requirement becomes even more crucial when the IoT devices are battery-powered, like small aerial drones, and the efficiency of authentication directly translates to more operation time. Although some fast authentication techniques have been proposed, some of them… ▽ More

    Submitted 8 April, 2020; v1 submitted 5 March, 2019; originally announced March 2019.

  11. arXiv:1704.01995  [pdf, ps, other

    cs.IT

    Secure Transmission of Delay-Sensitive Data over Wireless Fading Channels

    Authors: Mustafa Ozmen, M. Cenk Gursoy

    Abstract: In this paper, throughput and energy efficiency of secure wireless transmission of delay sensitive data generated by random sources is studied. A fading broadcast model in which the transmitter sends confidential and common messages to two receivers is considered. It is assumed that the common and confidential data, generated from Markovian sources, is stored in buffers prior to transmission, and… ▽ More

    Submitted 6 April, 2017; originally announced April 2017.

  12. arXiv:1509.04211  [pdf, ps, other

    cs.IT

    Wireless Throughput and Energy Efficiency with Random Arrivals and Statistical Queueing Constraints

    Authors: Mustafa Ozmen, M. Cenk Gursoy

    Abstract: Throughput and energy efficiency in fading channels are studied in the presence of randomly arriving data and statistical queueing constraints. In particular, Markovian arrival models including discrete-time Markov, Markov fluid, and Markov-modulated Poisson sources are considered. Employing the effective bandwidth of time-varying sources and effective capacity of time-varying wireless transmissio… ▽ More

    Submitted 14 September, 2015; originally announced September 2015.