PinnedFerhat Ozgur CatakinTowards Data Science6G and Artificial Intelligence With Security Problems6G solutions with Adversarial Machine Learning Attacks: Millimeter Wave Beam Prediction Use-CaseMar 11, 2021Mar 11, 2021
Ferhat Ozgur CatakUnderstanding Adversarial Attacks in Artificial Intelligence: Insights from “Trustworthy AI: From…In the rapidly evolving landscape of Artificial Intelligence (AI), ensuring the security and robustness of AI systems is of paramount…Aug 7Aug 7
Ferhat Ozgur CatakUnderstanding Reliability in AI: A Dive into Uncertainty QuantificationFor more in-depth discussions and practical examples, check out our book, “Trustworthy AI: From Theory to Practice”.Aug 7Aug 7
Ferhat Ozgur CatakTrustworthy AI: Navigating the Ethical FrontierMy book about Trustworthy AI (Amazon)Feb 18Feb 18
Ferhat Ozgur CatakAI Based 6G Applications’ Security Mitigations: Defensive Distillation and Adversarial RetrainingFeb 20, 2022Feb 20, 2022
Ferhat Ozgur CatakinTowards Data ScienceDeep LSTM based Malware AnalysisDeep learning based Sequential model for malware analysis using Windows Exe API CallsJul 24, 2020Jul 24, 2020
Ferhat Ozgur CatakinTowards Data ScienceAdversarial Machine Learning Mitigation: *Adversarial Learning*There are several attacks against deep learning models in the literature, including fast-gradient sign method (FGSM), basic iterative…Jul 17, 20201Jul 17, 20201
Ferhat Ozgur CatakThe New Area to Protect Cyber Security: Artificial IntelligenceIntroductionJun 14, 2020Jun 14, 2020
Ferhat Ozgur CatakWindows Malware Dataset with PE API CallsOur public malware dataset generated by Cuckoo Sandbox based on Windows OS API calls analysis for cybersecurity researchers for malware…Jun 14, 2020Jun 14, 2020