Sitemap
A list of all the posts and pages found on the site. For you robots out there, there is an XML version available for digesting as well.
Pages
About Me
About Me
Advanced Task and Packet Management in CPP
Published:
Adversarial examples for Proof of Learning
Published:
Awesome leading and managing
Published:
ChampionshipVisualizer
Published:
CS 595A TEAM 13 DATA
Published:
CS 595A TEAM 13
Published:
CSEC502 Network Security Term Project
Published:
Life long Learner
Published:
MA 540 TEAM3 DATA
Published:
MA 540 TEAM3
Published:
MS Thesis
Published:
One Time Pad
Published:
Ozzgural
Published:
Practical attacks against pol
Published:
Proof of Learning
Published:
SecurePoL with Watermarking
Published:
Seedlabs 2
Published:
SEEDlabs
Published:
Vigenere Cipher Attack
Published:
Posts
How to Recognize Advice That Actually Helps
Published:
Entrepreneurs, researchers, and engineers live in a torrent of guidance. Podcasts, newsletters, and mentors offer conflicting prescriptions, each delivered with confidence. Distinguishing signal from noise is therefore a crucial skill. The discipline of evidence‑based management argues that decisions should be grounded in the best available data rather than authority or habit (Pfeffer & Sutton, 2006). Applying this mindset to advice means scrutinizing both the source and the context before acting.
Slowing Down Time Through Novel Experiences
Published:
We often remark that years seem to fly by. Cognitive science suggests this feeling stems from how the brain encodes memories. When days look alike, the hippocampus compresses them into fewer distinct records, creating the impression that time has sped up\footnote{Avni-Babad, D., & Ritov, I. (2003). Routine and the perception of time. Journal of Experimental Psychology: General, 132(4), 543–553. https://doi.org/10.1037/0096-3445.132.4.543}. Conversely, a day rich with new experiences leaves more traces in neural storage, stretching our subjective timeline\footnote{Kurby, C.A., & Zacks, J.M. (2008). Segmentation in the perception and memory of events. Trends in Cognitive Sciences, 12(2), 72–79. https://doi.org/10.1016/j.tics.2007.11.004}.
The Real Test for Making Something People Want
Published:
Scaling conversations dominate startup culture, yet the first question any product must answer is painfully small: will even one person use it when given the chance? The only reliable way to find out is through direct observation. This principle is at the heart of evidence‑based design, a methodology grounded in human‑computer interaction research that emphasizes empirical feedback over speculation (Nielsen, 1993). Surveys and interviews hint at preferences, but behavior reveals intent. If your prototype cannot hold the attention of a single user, no amount of marketing will redeem it.
Why Startups Are Really About Curiosity
Published:
Founders often believe that success begins with a brilliant idea or a perfectly timed launch. Experience, however, shows that the most durable companies originate from a far less glamorous source: persistent curiosity. In innovation research, curiosity is not merely a personality trait but a mechanism for uncovering hidden structure in complex systems. Loewenstein’s review of the psychology of curiosity describes it as a response to information gaps that drive humans to seek missing data rather than settle for superficial explanations (Loewenstein, 1994). In a startup, those gaps manifest as unresolved annoyances—a workflow that feels clumsy, a user experience that wastes time, or a technology that seems inexplicably outdated. The founder who keeps tugging at these loose threads eventually reveals a problem worth solving.
The Myth of the Quick Fix
Published:
Every engineer knows the temptation of the “five-minute hack.” A bug appears, the schedule is tight, and a clever shortcut promises to save the day. Weeks later, the team is still wrestling with the fallout. The myth of the quick fix lies in its invisibility—short-term patches often masquerade as efficient solutions while secretly accruing interest that compounds over time.
Documentation as the First User Interface
Published:
Before a developer ever sees your landing page, they might encounter your README. For many technical products, documentation is the first user interface. It guides users through setup, communicates architecture decisions, and sets expectations for how the system behaves. Neglecting documentation is like shipping a GUI with missing buttons and unlabeled fields.
Hiring Generalists: The Startup’s Secret Weapon
Published:
Early-stage startups face a paradox: they need specialists to build complex products, but they also need people who can switch contexts rapidly as the company searches for product–market fit. Generalists thrive in this environment. They fill gaps no job description anticipated and create connective tissue between disciplines.
The Invisible Cost of Shiny Tools
Published:
Engineering teams love new tools. The promise of faster development, cleaner abstractions, or a more elegant stack is hard to resist. Yet every adoption decision carries hidden costs that rarely appear in procurement spreadsheets. The real price of a shiny tool lies in the cognitive load it introduces, the training it demands, and the fragile glue it creates between systems.
METU Sailing Team: Racing in Urla, Bodrum, and Marmaris
Published:
Middle East Technical University’s sailing club has long been a hub for students who love the sea. I was lucky to sail with the club when I was a student at METU, spending weekends trimming sails on the Aegean and getting hooked on the rhythm of race starts.
Why Early Beta Feedback Matters More Than Launch Day
Published:
Product launches often steal the spotlight, but the feedback gathered during early beta testing quietly determines whether launch day is a victory lap or a scramble to patch obvious gaps. Treating beta periods as a checkbox diminishes their power; when leveraged well, beta feedback drives the evolution of features, design, and infrastructure before they congeal into something hard to change.
Y Combinator and DNA: Fixed Points in Code and Biology
Published:
In lambda calculus, introduced by Alonzo Church, the Y combinator is a higher-order function that finds the fixed point of other functions, allowing recursion in a system that lacks native self-reference. By applying Y
to a function, the system generates an instance that calls itself, enabling algorithms like factorial or Fibonacci to emerge from purely functional constructs. Tutorials such as the Haskell Wiki on fixed-point combinators and M. Vanier’s “Y Combinator (no, not that one)” provide step-by-step explanations.
Proof of Learning: Building Trust in Future Machine Learning
Published:
Proof of Learning (PoL) verifies that a model was genuinely trained on claimed data by providing verifiable evidence of the training process. As machine learning systems become pervasive in critical domains, PoL offers a mechanism to ensure trust and accountability in model provenance.
PhD Life at Embry-Riddle: Machine Learning, Security, and Sunshine
Published:
Embarking on a PhD in Florida means waking up to ocean breezes and the low rumble of aircraft testing engines at Embry-Riddle Aeronautical University. Daytona Beach may be famous for NASCAR and spring breakers, but for me it has become a sanctuary of research and late-night coding sessions fueled by café con leche.
Model Watermarking and the Future of Trustworthy AI
Published:
Model watermarking embeds identifiable patterns into a model’s parameters or outputs so that ownership can be demonstrated without access to the original training process. Early work showed that weights of deep networks can carry hidden signatures without affecting accuracy [3]. Subsequent methods trained models on trigger sets to create behavior-based marks resilient to fine‑tuning [4,5].
ML-Enhanced Blockchain: Toward Intelligent, Adaptive Ledgers
Published:
Machine learning (ML) is increasingly used to make blockchain networks more secure, efficient, and user-friendly. In our survey on blockchain-enhanced machine learning [1], we explored how blockchains can bolster ML pipelines. This post examines the converse: how ML techniques are improving blockchains themselves.
Exploring METU Computer Engineering and the Devrim Stage
Published:
Middle East Technical University (METU) is a public research university in Ankara, Turkey, known for its emphasis on engineering, natural sciences, and social sciences [1]. Established in 1956, the university now offers 41 undergraduate programs across five faculties and hosts a large forested campus around Lake Eymir.
Blockchain Oracles and Smart Contracts: The World’s Agile Board
Published:
Traditional agile boards depend on centralized tools and manual updates. As projects span multiple organizations and trust boundaries, these boards struggle to provide real-time, trustworthy visibility. Blockchain oracles and smart contracts offer a path to an autonomous, tamper-evident coordination layer that could serve as the world’s agile board.
Blockchain-Enhanced Machine Learning: Linking Trust, Data, and Incentives
Published:
Blockchain technology and machine learning (ML) have traditionally evolved on parallel tracks. However, recent research shows that their convergence promises transparent, trustworthy, and decentralized intelligent systems. In our survey on blockchain-enhanced machine learning [1], we examine how the decentralized design of blockchain can address systemic challenges in ML and pave the way for collaborative, verifiable artificial intelligence.
Avion Level D FFS and Their Future Importance
Published:
Level D full flight simulators (FFS) represent the highest standard of flight training devices, capable of replicating every nuance of modern aircraft. At Avion, I had the opportunity to work on the development of a Level D FFS project for about two years, helping bring cockpit dynamics, flight models, and instructor tools into perfect alignment with real‑world operations.
Autonomous Drones and Their Future Importance
Published:
Previously, I worked for about two years on a project developing autonomous drone systems, focusing on platforms such as Kargu and Togan. These systems illustrate how rapidly unmanned technologies are advancing and why they will play a critical role in future security and civilian applications.
USA vs Netherlands: An Expat’s Perspective
Published:
Living as an expat has given me the chance to compare daily life in the United States and the Netherlands.
portfolio
Portfolio item number 1
Short description of portfolio item number 1
Portfolio item number 2
Short description of portfolio item number 2
publications
Autonomous Cargo and Mail Delivery
Published in Turkish Autonomous Robots Conference, 2014
Turkish Autonomous Robots Conference, Ankara, Turkey, 2014.
Recommended citation: Ural, Ozgur (2014). Autonomous Cargo and Mail Delivery. Turkish Autonomous Robots Conference, Ankara, Turkey.
Download Paper
Secure Proxy on Cloud
Published in , 2016
Automatic Detection of Cyber Security Events from Turkish Twitter Stream and Newspaper Data
Published in Proceedings of the 7th International Conference on Information Systems Security and Privacy (ICISSP), 2021
Survey on Blockchain-Enhanced Machine Learning
Published in IEEE Access, 2023
IEEE Access, December 2023.
Recommended citation: Ural, O. and Yoshigoe, K. (2023). Survey on Blockchain-Enhanced Machine Learning. IEEE Access, 145331–145362. DOI: 10.1109/ACCESS.2023.3344669.
Download Paper
Enhancing Security of Proof-of-Learning against Spoofing Attacks using Feature-Based Model Watermarking
Published in IEEE Access, 2024
IEEE Access, November 2024.
Recommended citation: Ural, O. and Yoshigoe, K. (2024). Enhancing Security of Proof-of-Learning against Spoofing Attacks using Feature-Based Model Watermarking. IEEE Access. DOI: 10.1109/ACCESS.2024.3489776.
Download Paper
Evaluation of Model Watermarking Techniques for Proof-of-Learning Security Against Spoofing Attacks
Published in IEEE Access, 2025
IEEE Access. Accepted, in press; DOI forthcoming.
Recommended citation: Ural, O. and Yoshigoe, K. (2025). Evaluation of Model Watermarking Techniques for Proof-of-Learning Security Against Spoofing Attacks. IEEE Access. Accepted, in press; DOI forthcoming.
Download Paper
Enhancing Proof-of-Learning Security Against Spoofing Attacks Using Model Watermarking
Published in Doctoral Dissertation, 2025
Doctoral dissertation, Embry-Riddle Aeronautical University, Daytona Beach, Florida.
Recommended citation: Ural, O. (2025). Enhancing Proof-of-Learning Security Against Spoofing Attacks Using Model Watermarking. Doctoral dissertation, Embry-Riddle Aeronautical University.
Download Paper
talks
Secure Proxy on Cloud Paper Demonstration
Published:
This demonstration was about my paper titled “Secure Proxy on Cloud”.
Automatic Detection of Cyber Security Events from Turkish Twitter Stream and Newspaper Data
Published:
This presentation was about my paper titled “Automatic Detection of Cyber Security Events from Turkish Twitter Stream and Newspaper Data” at the International Conference on Information Systems Security and Privacy (ICISSP).
teaching
Teaching experience 1
Undergraduate course, University 1, Department, 2014
This is a description of a teaching experience. You can use markdown like any other post.
Teaching experience 2
Workshop, University 1, Department, 2015
This is a description of a teaching experience. You can use markdown like any other post.