Login / Signup
Furkan Alaca
ORCID
Publication Activity (10 Years)
Years Active: 2010-2024
Publications (10 Years): 11
Top Topics
Phishing Attacks
Comparative Analysis
Text Data
Face Recognition Systems
Top Venues
CoRR
FPS
DCOSS-IoT
SSCI
</>
Publications
</>
Ian Pépin
,
Furkan Alaca
,
Farhana H. Zulkernine
Privacy-Preserving Multi-Party Keyword-Based Classification of Unstructured Text Data.
DCOSS-IoT
(2024)
Zhiwei Fu
,
Steven H. H. Ding
,
Furkan Alaca
,
Benjamin C. M. Fung
,
Philippe Charland
Pluvio: Assembly Clone Search for Out-of-domain Architectures and Libraries through Transfer Learning and Conditional Variational Information Bottleneck.
CoRR
(2023)
Nafiz Sadman
,
Kazi Amit Hasan
,
Elyas Rashno
,
Furkan Alaca
,
Yuan Tian
,
Farhana H. Zulkernine
Vulnerability of Open-Source Face Recognition Systems to Blackbox Attacks: A Case Study with InsightFace.
SSCI
(2023)
Anthony Tam
,
Furkan Alaca
,
David Barrera
If-This-Then-Allow-That (to Phone Home): A Trigger-Based Network Policy Enforcement Framework for Smart Homes.
FPS
(2022)
Furkan Alaca
,
AbdelRahman Abdou
,
Paul C. van Oorschot
Comparative Analysis and Framework Evaluating Mimicry-Resistant and Invisible Web Authentication Schemes.
IEEE Trans. Dependable Secur. Comput.
18 (2) (2021)
Larry Yueli Zhang
,
Andrew K. Petersen
,
Michael Liut
,
Bogdan Simion
,
Furkan Alaca
A Multi-Course Report on the Experience of Unplanned Online Exams.
SIGCSE
(2021)
Furkan Alaca
,
Paul C. van Oorschot
Comparative Analysis and Framework Evaluating Web Single Sign-on Systems.
ACM Comput. Surv.
53 (5) (2020)
Furkan Alaca
,
Paul C. van Oorschot
Comparative Analysis and Framework Evaluating Web Single Sign-On Systems.
CoRR
(2018)
Furkan Alaca
,
AbdelRahman Abdou
,
Paul C. van Oorschot
Comparative Analysis and Framework Evaluating Mimicry-Resistant and Invisible Web Authentication Schemes.
CoRR
(2017)
Furkan Alaca
,
Paul C. van Oorschot
Device fingerprinting for augmenting web authentication: classification and analysis of methods.
ACSAC
(2016)
Mohamed Alsharnouby
,
Furkan Alaca
,
Sonia Chiasson
Why phishing still works: User strategies for combating phishing attacks.
Int. J. Hum. Comput. Stud.
82 (2015)
Furkan Alaca
,
Akram Bin Sediq
,
Halim Yanikomeroglu
A genetic algorithm based cell switch-off scheme for energy saving in dense cell deployments.
GLOBECOM Workshops
(2012)
Sebastian S. Szyszkowicz
,
Furkan Alaca
,
Halim Yanikomeroglu
,
John S. Thompson
Aggregate Interference Distribution From Large Wireless Networks With Correlated Shadowing: An Analytical-Numerical-Simulation Approach.
IEEE Trans. Veh. Technol.
60 (6) (2011)
Sebastian S. Szyszkowicz
,
Furkan Alaca
,
Halim Yanikomeroglu
,
John S. Thompson
Efficient Simulation using Shadowing Fields of Many Wireless Interferers with Correlated Shadowing.
VTC Spring
(2010)