pith. machine review for the scientific record. sign in

Z. Berkay Celik

Identifiers

No identifiers captured yet.

Papers (12)

  1. Systematic Discovery of Semantic Attacks in Online Map Construction through Conditional Diffusion cs.CV · 2026 · author #6
  2. Stable GFlowNets with Probabilistic Guarantees cs.LG · 2026 · author #9
  3. Formalizing the Safety, Security, and Functional Properties of Agentic AI Systems cs.AI · 2025 · author #3
  4. Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities cs.CR · 2018 · author #1
  5. Soteria: Automated IoT Safety and Security Analysis cs.CR · 2018 · author #1
  6. Sensitive Information Tracking in Commodity IoT cs.CR · 2018 · author #1
  7. Achieving Secure and Differentially Private Computations in Multiparty Settings cs.CR · 2017 · author #2
  8. Curie: Policy-based Secure Data Exchange cs.CR · 2017 · author #1
  9. Patient-Driven Privacy Control through Generalized Distillation cs.CR · 2016 · author #1
  10. Detection under Privileged Information cs.CR · 2016 · author #1
  11. Practical Black-Box Attacks against Machine Learning cs.CR · 2016 · author #5
  12. The Limitations of Deep Learning in Adversarial Settings cs.CR · 2015 · author #5

Mentions

No mention provenance yet.

Frequent Coauthors