Portfolio item number 1
Short description of portfolio item number 1
Short description of portfolio item number 1
Short description of portfolio item number 2
Published in Journal 1, 2009
This paper is about the number 1. The number 2 is left for future work.
Recommended citation: Your Name, You. (2009). "Paper Title Number 1." Journal 1. 1(1).
Download Paper | Download Slides | Download Bibtex
Published in Journal 1, 2010
This paper is about the number 2. The number 3 is left for future work.
Recommended citation: Your Name, You. (2010). "Paper Title Number 2." Journal 1. 1(2).
Download Paper | Download Slides
Published in Turkish Autonomous Robots Conference, 2014
Turkish Autonomous Robots Conference, Ankara, Turkey, 2014.
Recommended citation: Ural, Ozgur (2014). Autonomous Cargo and Mail Delivery. Turkish Autonomous Robots Conference, Ankara, Turkey.
Download Paper
Published in Journal 1, 2015
This paper is about the number 3. The number 4 is left for future work.
Recommended citation: Your Name, You. (2015). "Paper Title Number 3." Journal 1. 1(3).
Download Paper | Download Slides
Published in , 2016
Published in Proceedings of the 7th International Conference on Information Systems Security and Privacy (ICISSP), 2021
Published in IEEE Access, 2023
IEEE Access, December 2023.
Recommended citation: Ural, O. and Yoshigoe, K. (2023). Survey on Blockchain-Enhanced Machine Learning. IEEE Access, 145331–145362. DOI: 10.1109/ACCESS.2023.3344669.
Download Paper
Published in GitHub Journal of Bugs, 2024
This paper is about fixing template issue #693.
Recommended citation: Your Name, You. (2024). "Paper Title Number 3." GitHub Journal of Bugs. 1(3).
Download Paper
Published in GitHub Journal of Bugs, 2024
This paper is about a famous math equation, \(E=mc^2\)
Recommended citation: Your Name, You. (2024). "Paper Title Number 3." GitHub Journal of Bugs. 1(3).
Download Paper
Published in IEEE Access, 2024
IEEE Access, November 2024.
Recommended citation: Ural, O. and Yoshigoe, K. (2024). Enhancing Security of Proof-of-Learning against Spoofing Attacks using Feature-Based Model Watermarking. IEEE Access. DOI: 10.1109/ACCESS.2024.3489776.
Download Paper
Published in IEEE Access, 2025
IEEE Access. Accepted, in press; DOI forthcoming.
Recommended citation: Ural, O. and Yoshigoe, K. (2025). Evaluation of Model Watermarking Techniques for Proof-of-Learning Security Against Spoofing Attacks. IEEE Access. Accepted, in press; DOI forthcoming.
Download Paper
Published in Doctoral Dissertation, 2025
Doctoral dissertation, Embry-Riddle Aeronautical University, Daytona Beach, Florida.
Recommended citation: Ural, O. (2025). Enhancing Proof-of-Learning Security Against Spoofing Attacks Using Model Watermarking. Doctoral dissertation, Embry-Riddle Aeronautical University.
Download Paper
Published:
This demonstration was about my paper titled “Secure Proxy on Cloud”.
Published:
This presentation was about my paper titled “Automatic Detection of Cyber Security Events from Turkish Twitter Stream and Newspaper Data” at the International Conference on Information Systems Security and Privacy (ICISSP).
Undergraduate course, University 1, Department, 2014
This is a description of a teaching experience. You can use markdown like any other post.
Workshop, University 1, Department, 2015
This is a description of a teaching experience. You can use markdown like any other post.