Gamze Tillem
Gamze Tillem
Verified email at - Homepage
Cited by
Cited by
Privacy-preserving alpha algorithm for software analysis
G Tillem, Z Erkin, RL Lagendijk
37th WIC Symposium on Information Theory in the Benelux/6th WIC/IEEE SP …, 2016
Badass: Preserving privacy in behavioural advertising with applied secret sharing
LJ Helsloot, G Tillem, Z Erkin
International Conference on Provable Security, 397-405, 2018
AHEad: privacy-preserving online behavioural advertising using homomorphic encryption
LJ Helsloot, G Tillem, Z Erkin
2017 IEEE Workshop on Information Forensics and Security (WIFS), 1-6, 2017
Mining Encrypted Software Logs using Alpha Algorithm.
G Tillem, Z Erkin, RL Lagendijk
SECRYPT, 267-274, 2017
Hiding access patterns in range queries using private information retrieval and ORAM
G Tillem, ÖM Candan, E Savaş, K Kaya
International Conference on Financial Cryptography and Data Security, 253-270, 2016
SwaNN: Switching among Cryptographic Tools for Privacy-Preserving Neural Network Predictions
G Tillem, B Bozdemir, M Önen
SECRYPT 2020, 17th International Conference on Security and Cryptography, 2020
Privacy-preserving multi-party access control
M Sheikhalishahi, G Tillem, Z Erkin, N Zannone
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 1-13, 2019
Solving bin-packing problems under privacy preservation: Possibilities and trade-offs
R Hoogervorst, Y Zhang, G Tillem, Z Erkin, S Verwer
Information Sciences 500, 203-216, 2019
Mining sequential patterns from outsourced data via encryption switching
G Tillem, Z Erkin, RL Lagendijk
2018 16th Annual Conference on Privacy, Security and Trust (PST), 1-10, 2018
A new method for computational private information retrieval
G Tillem, E Savaş, K Kaya
The Computer Journal 60 (8), 1238-1250, 2017
Privacy concerns and protection measures in online behavioural advertising
LJ Helsloot, G Tillem, Z Erkin
2017 Symposium on Information Theory and Signal Processing in the Benelux …, 2017
DEA-based benchmarking models in supply chain management: an application-oriented literature review
G Ertek, N Akyurt, G Tillem
Istanbul Kemerburgaz University & Logistics Association (LODER) & Ideal …, 2012
Protecting the grid topology and user consumption patterns during state estimation in smart grids based on data obfuscation
L Nandakumar, G Tillem, Z Erkin, T Keviczky
Energy Informatics 2 (1), 1-23, 2019
Private data aggregation in decentralized networks
PK Setia, G Tillem, Z Erkin
2019 7th International Istanbul Smart Grids and Cities Congress and Fair …, 2019
How to Share and Own a Secret.
V Ermolaev, G Tillem
IACR Cryptol. ePrint Arch. 2021, 518, 2021
Preserving Confidentiality in Data Analytics-as-a-Service
G Tillem
Hiding query access patterns in range queries using private information retrieval and oblivious ram
G Tillem
Threshold Signatures using Secure Multiparty Computation
G Tillem, O Burundukov, I Team
Private Neural Network Predictions
G Tillem, B Bozdemir, M Önen
Privacy Preserving Neural Network Classification: A Hybrid Solution
G Tillem, B Bozdemir, M Onen, O Ermis
The system can't perform the operation now. Try again later.
Articles 1–20