Skip to main content

Showing 1–25 of 25 results for author: Kaya, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.00839  [pdf, other

    cs.CR cs.AI cs.LG cs.NI

    X-CBA: Explainability Aided CatBoosted Anomal-E for Intrusion Detection System

    Authors: Kiymet Kaya, Elif Ak, Sumeyye Bas, Berk Canberk, Sule Gunduz Oguducu

    Abstract: The effectiveness of Intrusion Detection Systems (IDS) is critical in an era where cyber threats are becoming increasingly complex. Machine learning (ML) and deep learning (DL) models provide an efficient and accurate solution for identifying attacks and anomalies in computer networks. However, using ML and DL models in IDS has led to a trust deficit due to their non-transparent decision-making. T… ▽ More

    Submitted 2 June, 2024; v1 submitted 1 February, 2024; originally announced February 2024.

  2. arXiv:2402.00831  [pdf, other

    cs.NI cs.AI cs.LG

    A YANG-aided Unified Strategy for Black Hole Detection for Backbone Networks

    Authors: Elif Ak, Kiymet Kaya, Eren Ozaltun, Sule Gunduz Oguducu, Berk Canberk

    Abstract: Despite the crucial importance of addressing Black Hole failures in Internet backbone networks, effective detection strategies in backbone networks are lacking. This is largely because previous research has been centered on Mobile Ad-hoc Networks (MANETs), which operate under entirely different dynamics, protocols, and topologies, making their findings not directly transferable to backbone network… ▽ More

    Submitted 1 February, 2024; originally announced February 2024.

  3. arXiv:2310.11812  [pdf, other

    cs.DS

    Open Problems in (Hyper)Graph Decomposition

    Authors: Deepak Ajwani, Rob H. Bisseling, Katrin Casel, Ümit V. Çatalyürek, Cédric Chevalier, Florian Chudigiewitsch, Marcelo Fonseca Faraj, Michael Fellows, Lars Gottesbüren, Tobias Heuer, George Karypis, Kamer Kaya, Jakub Lacki, Johannes Langguth, Xiaoye Sherry Li, Ruben Mayer, Johannes Meintrup, Yosuke Mizutani, François Pellegrini, Fabrizio Petrini, Frances Rosamond, Ilya Safro, Sebastian Schlag, Christian Schulz, Roohani Sharma , et al. (4 additional authors not shown)

    Abstract: Large networks are useful in a wide range of applications. Sometimes problem instances are composed of billions of entities. Decomposing and analyzing these structures helps us gain new insights about our surroundings. Even if the final application concerns a different problem (such as traversal, finding paths, trees, and flows), decomposing large graphs is often an important subproblem for comple… ▽ More

    Submitted 18 October, 2023; originally announced October 2023.

  4. arXiv:2304.07031  [pdf, other

    cs.CV cs.LG

    Spectral Transfer Guided Active Domain Adaptation For Thermal Imagery

    Authors: Berkcan Ustun, Ahmet Kagan Kaya, Ezgi Cakir Ayerden, Fazil Altinel

    Abstract: The exploitation of visible spectrum datasets has led deep networks to show remarkable success. However, real-world tasks include low-lighting conditions which arise performance bottlenecks for models trained on large-scale RGB image datasets. Thermal IR cameras are more robust against such conditions. Therefore, the usage of thermal imagery in real-world applications can be useful. Unsupervised d… ▽ More

    Submitted 14 April, 2023; originally announced April 2023.

    Comments: Accepted to CVPR 2023 Perception Beyond the Visible Spectrum (PBVS) workshop

  5. arXiv:2111.06780  [pdf, other

    cs.LG cs.AI

    AWD3: Dynamic Reduction of the Estimation Bias

    Authors: Dogan C. Cicek, Enes Duran, Baturay Saglam, Kagan Kaya, Furkan B. Mutlu, Suleyman S. Kozat

    Abstract: Value-based deep Reinforcement Learning (RL) algorithms suffer from the estimation bias primarily caused by function approximation and temporal difference (TD) learning. This problem induces faulty state-action value estimates and therefore harms the performance and robustness of the learning algorithms. Although several techniques were proposed to tackle, learning algorithms still suffer from thi… ▽ More

    Submitted 12 November, 2021; originally announced November 2021.

    Comments: Accepted at The 33rd IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2021)

  6. arXiv:2110.11446  [pdf, other

    cs.CR cs.LG q-bio.GN

    ML with HE: Privacy Preserving Machine Learning Inferences for Genome Studies

    Authors: Ş. S. Mağara, C. Yıldırım, F. Yaman, B. Dilekoğlu, F. R. Tutaş, E. Öztürk, K. Kaya, Ö. Taştan, E. Savaş

    Abstract: Preserving the privacy and security of big data in the context of cloud computing, while maintaining a certain level of efficiency of its processing remains to be a subject, open for improvement. One of the most popular applications epitomizing said concerns is found to be useful in genome analysis. This work proposes a secure multi-label tumor classification method using homomorphic encryption, w… ▽ More

    Submitted 1 February, 2022; v1 submitted 21 October, 2021; originally announced October 2021.

  7. arXiv:2110.10049  [pdf, other

    cs.DC cs.LG

    Boosting Graph Embedding on a Single GPU

    Authors: Amro Alabsi Aljundi, Taha Atahan Akyıldız, Kamer Kaya

    Abstract: Graphs are ubiquitous, and they can model unique characteristics and complex relations of real-life systems. Although using machine learning (ML) on graphs is promising, their raw representation is not suitable for ML algorithms. Graph embedding represents each node of a graph as a d-dimensional vector which is more suitable for ML tasks. However, the embedding process is expensive, and CPU-based… ▽ More

    Submitted 19 October, 2021; originally announced October 2021.

    Comments: 12 pages, 11 tables, 6 figures, submitted for publication at Special Section on Parallel and Distributed Computing Techniques for AI, ML, and DL

  8. arXiv:2106.12189  [pdf, other

    cs.DS cs.DB

    A Bloom Filter Survey: Variants for Different Domain Applications

    Authors: Anes Abdennebi, Kamer Kaya

    Abstract: There is a plethora of data structures, algorithms, and frameworks dealing with major data-stream problems like estimating the frequency of items, answering set membership, association and multiplicity queries, and several other statistics that can be extracted from voluminous data streams. In this survey, we are focusing on exploring randomized data structures called Bloom Filters. This data stru… ▽ More

    Submitted 23 June, 2021; originally announced June 2021.

    MSC Class: ACM-class: E.1; E.2; A.1

  9. arXiv:2105.04023  [pdf, other

    cs.SI cs.DS

    Fast and Error-Adaptive Influence Maximization based on Count-Distinct Sketches

    Authors: Gokhan Gokturk, Kamer Kaya

    Abstract: Influence maximization (IM) is the problem of finding a seed vertex set that maximizes the expected number of vertices influenced under a given diffusion model. Due to the NP-Hardness of finding an optimal seed set, approximation algorithms are frequently used for IM. In this work, we describe a fast, error-adaptive approach that leverages Count-Distinct sketches and hash-based fused sampling. To… ▽ More

    Submitted 9 May, 2021; originally announced May 2021.

    Comments: 12 pages. Sent to IEEE Transactions on Knowledge and Data Engineering as a regular paper

  10. arXiv:2103.05394  [pdf, other

    cs.DS cs.DC

    Streaming Hypergraph Partitioning Algorithms on Limited Memory Environments

    Authors: Fatih Taşyaran, Berkay Demireller, Kamer Kaya, Bora Uçar

    Abstract: Many well-known, real-world problems involve dynamic data which describe the relationship among the entities. Hypergraphs are powerful combinatorial structures that are frequently used to model such data. For many of today's data-centric applications, this data is streaming; new items arrive continuously, and the data grows with time. With paradigms such as Internet of Things and Edge Computing, s… ▽ More

    Submitted 9 March, 2021; originally announced March 2021.

    Comments: 8 pages, 6 algorithms, 2 figures, 4 tables, submitted to HPCS'20

    MSC Class: 68W27; 68P05 ACM Class: E.1

  11. arXiv:2009.04925  [pdf, other

    cs.SI cs.LG

    Understanding Coarsening for Embedding Large-Scale Graphs

    Authors: Taha Atahan Akyildiz, Amro Alabsi Aljundi, Kamer Kaya

    Abstract: A significant portion of the data today, e.g, social networks, web connections, etc., can be modeled by graphs. A proper analysis of graphs with Machine Learning (ML) algorithms has the potential to yield far-reaching insights into many areas of research and industry. However, the irregular structure of graph data constitutes an obstacle for running ML tasks on graphs such as link prediction, node… ▽ More

    Submitted 10 September, 2020; originally announced September 2020.

    Comments: 10 pages, 6 figures, submitted to 2020 IEEE International Conference on Big Data

  12. GOSH: Embedding Big Graphs on Small Hardware

    Authors: Taha Atahan Akyildiz, Amro Alabsi Aljundi, Kamer Kaya

    Abstract: In graph embedding, the connectivity information of a graph is used to represent each vertex as a point in a d-dimensional space. Unlike the original, irregular structural information, such a representation can be used for a multitude of machine learning tasks. Although the process is extremely useful in practice, it is indeed expensive and unfortunately, the graphs are becoming larger and harder… ▽ More

    Submitted 31 August, 2020; v1 submitted 27 August, 2020; originally announced August 2020.

    Comments: 11 pages, 4 figures, published in ICPP 2020: The 49th International Conference on Parallel Processing - Edmonton, AB, Canada

  13. arXiv:2008.11454  [pdf, other

    cs.DS

    Vertex Ordering Algorithms for Graph Coloring Problem

    Authors: Arda Asik, Ibrahim Bugra Demir, Berker Demirel, Baris Batuhan Topal, Kamer Kaya

    Abstract: Graph coloring is a fundamental problem in combinatorics with many applications in practice. In this problem, the vertices in a given graph must be colored by using the least number of colors in such a way that a vertex has a different color than its neighbors. The problem, as well as its different variants, has been proven to be NP-Hard. Therefore, there are greedy algorithms in the literature ai… ▽ More

    Submitted 26 August, 2020; originally announced August 2020.

    Comments: in Turkish language

  14. arXiv:2008.03095  [pdf, other

    cs.DC cs.SI

    Boosting Parallel Influence-Maximization Kernels for Undirected Networks with Fusing and Vectorization

    Authors: Gokhan Gokturk, Kamer Kaya

    Abstract: Influence maximization (IM) is the problem of finding a seed vertex set which is expected to incur the maximum influence spread on a graph. It has various applications in practice such as devising an effective and efficient approach to disseminate information, news or ad within a social network. The problem is shown to be NP-hard and approximation algorithms with provable quality guarantees exist… ▽ More

    Submitted 7 August, 2020; originally announced August 2020.

    Comments: 12 pages, 6 figures. Submitted to IEEE Transactions on Parallel and Distributed Systems

  15. arXiv:1903.00729  [pdf, other

    cs.DS

    One Table to Count Them All: Parallel Frequency Estimation on Single-Board Computers

    Authors: Fatih Taşyaran, Kerem Yıldırır, Kamer Kaya, Mustafa Kemal Taş

    Abstract: Sketches are probabilistic data structures that can provide approximate results within mathematically proven error bounds while using orders of magnitude less memory than traditional approaches. They are tailored for streaming data analysis on architectures even with limited memory such as single-board computers that are widely exploited for IoT and edge computing. Since these devices offer multip… ▽ More

    Submitted 2 March, 2019; originally announced March 2019.

    Comments: 12 pages, 4 figures, 3 algorithms, 1 table, submitted to EuroPar'19

  16. arXiv:1701.02628  [pdf, other

    cs.DC cs.DS

    Greed is Good: Optimistic Algorithms for Bipartite-Graph Partial Coloring on Multicore Architectures

    Authors: Mustafa Kemal Taş, Kamer Kaya, Erik Saule

    Abstract: In parallel computing, a valid graph coloring yields a lock-free processing of the colored tasks, data points, etc., without expensive synchronization mechanisms. However, coloring is not free and the overhead can be significant. In particular, for the bipartite-graph partial coloring (BGPC) and distance-2 graph coloring (D2GC) problems, which have various use-cases within the scientific computing… ▽ More

    Submitted 10 January, 2017; originally announced January 2017.

    Comments: 11 pages

  17. On the Relationship of Inconsistent Software Clones and Faults: An Empirical Study

    Authors: Stefan Wagner, Asim Abdulkhaleq, Kamer Kaya, Alexander Paar

    Abstract: Background: Code cloning - copying and reusing pieces of source code - is a common phenomenon in software development in practice. There have been several empirical studies on the effects of cloning, but there are contradictory results regarding the connection of cloning and faults. Objective: Our aim is to clarify the relationship between code clones and faults. In particular, we focus on inconsi… ▽ More

    Submitted 23 November, 2016; originally announced November 2016.

    Comments: 11 pages, 0 figures

    Journal ref: Proc. 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER). IEEE, 2016

  18. arXiv:1605.07988  [pdf, ps, other

    cs.CR

    Multilevel Threshold Secret and Function Sharing based on the Chinese Remainder Theorem

    Authors: Oguzhan Ersoy, Kamer Kaya, Kerem Kaskaloglu

    Abstract: A recent work of Harn and Fuyou presents the first multilevel (disjunctive) threshold secret sharing scheme based on the Chinese Remainder Theorem. In this work, we first show that the proposed method is not secure and also fails to work with a certain natural setting of the threshold values on compartments. We then propose a secure scheme that works for all threshold settings. In this scheme, we… ▽ More

    Submitted 25 May, 2016; originally announced May 2016.

  19. arXiv:1509.01698  [pdf, other

    stat.ML cs.LG

    HAMSI: A Parallel Incremental Optimization Algorithm Using Quadratic Approximations for Solving Partially Separable Problems

    Authors: Kamer Kaya, Figen Öztoprak, Ş. İlker Birbil, A. Taylan Cemgil, Umut Şimşekli, Nurdan Kuru, Hazal Koptagel, M. Kaan Öztürk

    Abstract: We propose HAMSI (Hessian Approximated Multiple Subsets Iteration), which is a provably convergent, second order incremental algorithm for solving large-scale partially separable optimization problems. The algorithm is based on a local quadratic approximation, and hence, allows incorporating curvature information to speed-up the convergence. HAMSI is inherently parallel and it scales nicely with t… ▽ More

    Submitted 4 August, 2017; v1 submitted 5 September, 2015; originally announced September 2015.

    Comments: The software is available at https://github.com/spartensor/hamsi-mf

  20. arXiv:1303.1379  [pdf, other

    cs.DC

    GPU accelerated maximum cardinality matching algorithms for bipartite graphs

    Authors: Mehmet Deveci, Kamer Kaya, Bora Ucar, Umit V. Catalyurek

    Abstract: We design, implement, and evaluate GPU-based algorithms for the maximum cardinality matching problem in bipartite graphs. Such algorithms have a variety of applications in computer science, scientific computing, bioinformatics, and other areas. To the best of our knowledge, ours is the first study which focuses on GPU implementation of the maximum cardinality matching algorithms. We compare the pr… ▽ More

    Submitted 6 March, 2013; originally announced March 2013.

    Comments: 14 pages, 5 figures

  21. arXiv:1303.0422  [pdf, other

    cs.DS

    Incremental Algorithms for Network Management and Analysis based on Closeness Centrality

    Authors: Ahmet Erdem Sariyuce, Kamer Kaya, Erik Saule, Umit V. Catalyurek

    Abstract: Analyzing networks requires complex algorithms to extract meaningful information. Centrality metrics have shown to be correlated with the importance and loads of the nodes in network traffic. Here, we are interested in the problem of centrality-based network management. The problem has many applications such as verifying the robustness of the networks and controlling or improving the entity dissem… ▽ More

    Submitted 2 March, 2013; originally announced March 2013.

  22. arXiv:1302.1078  [pdf, other

    cs.PF cs.AR

    Performance Evaluation of Sparse Matrix Multiplication Kernels on Intel Xeon Phi

    Authors: Erik Saule, Kamer Kaya, Umit V. Catalyurek

    Abstract: Intel Xeon Phi is a recently released high-performance coprocessor which features 61 cores each supporting 4 hardware threads with 512-bit wide SIMD registers achieving a peak theoretical performance of 1Tflop/s in double precision. Many scientific applications involve operations on large sparse matrices such as linear solvers, eigensolver, and graph mining algorithms. The core of most of these ap… ▽ More

    Submitted 5 February, 2013; originally announced February 2013.

  23. arXiv:1209.6007  [pdf, other

    cs.DS cs.SI physics.soc-ph

    Shattering and Compressing Networks for Centrality Analysis

    Authors: Ahmet Erdem Sarıyüce, Erik Saule, Kamer Kaya, Ümit V. Çatalyürek

    Abstract: Who is more important in a network? Who controls the flow between the nodes or whose contribution is significant for connections? Centrality metrics play an important role while answering these questions. The betweenness metric is useful for network analysis and implemented in various tools. Since it is one of the most computationally expensive kernels in graph mining, several techniques have been… ▽ More

    Submitted 26 September, 2012; originally announced September 2012.

  24. arXiv:1209.5809  [pdf, other

    cs.IR cs.DL cs.SI

    Diversifying Citation Recommendations

    Authors: Onur Küçüktunç, Erik Saule, Kamer Kaya, Ümit V. Çatalyürek

    Abstract: Literature search is arguably one of the most important phases of the academic and non-academic research. The increase in the number of published papers each year makes manual search inefficient and furthermore insufficient. Hence, automatized methods such as search engines have been of interest in the last thirty years. Unfortunately, these traditional engines use keyword-based approaches to solv… ▽ More

    Submitted 25 September, 2012; originally announced September 2012.

    Comments: 19 pages, manuscript under review

  25. arXiv:1205.1143  [pdf, other

    cs.IR cs.DL

    Recommendation on Academic Networks using Direction Aware Citation Analysis

    Authors: Onur Küçüktunç, Erik Saule, Kamer Kaya, Ümit V. Çatalyürek

    Abstract: The literature search has always been an important part of an academic research. It greatly helps to improve the quality of the research process and output, and increase the efficiency of the researchers in terms of their novel contribution to science. As the number of published papers increases every year, a manual search becomes more exhaustive even with the help of today's search engines since… ▽ More

    Submitted 5 May, 2012; originally announced May 2012.

    Comments: 10 pages, 8 figures, 3 tables