default search action
Alptekin Küpçü
- > Home > Persons > Alptekin Küpçü
Publications
- 2023
- [i52]Ege Erdogan, Unat Teksen, Mehmet Salih Celiktenyildiz, Alptekin Küpçü, A. Ercüment Çiçek:
Defense Mechanisms Against Training-Hijacking Attacks in Split Learning. CoRR abs/2302.08618 (2023) - 2022
- [c37]Ege Erdogan, Alptekin Küpçü, A. Ercüment Çiçek:
UnSplit: Data-Oblivious Model Inversion, Model Stealing, and Label Inference Attacks against Split Learning. WPES@CCS 2022: 115-124 - [c36]Ege Erdogan, Alptekin Küpçü, A. Ercüment Çiçek:
SplitGuard: Detecting and Mitigating Training-Hijacking Attacks in Split Learning. WPES@CCS 2022: 125-137 - 2021
- [j20]Mohammad Etemad, Alptekin Küpçü:
Generic Dynamic Data Outsourcing Framework for Integrity Verification. ACM Comput. Surv. 53(1): 8:1-8:32 (2021) - [j19]Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap:
Interlaced: Fully decentralized churn stabilization for Skip Graph-based DHTs. J. Parallel Distributed Comput. 149: 13-28 (2021) - [j18]Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap:
LightChain: Scalable DHT-Based Blockchain. IEEE Trans. Parallel Distributed Syst. 32(10): 2582-2593 (2021) - [c33]Alptekin Küpçü, Reihaneh Safavi-Naini:
Smart Contracts for Incentivized Outsourcing of Computation. DPM/CBT@ESORICS 2021: 245-261 - [i48]Günther Eibl, Sanaz Taheri Boshrooyeh, Alptekin Küpçü:
AggFT: Low-Cost Fault-Tolerant Smart Meter Aggregation with Proven Termination and Privacy. CoRR abs/2102.09429 (2021) - [i47]Ege Erdogan, Alptekin Küpçü, A. Ercüment Çiçek:
UnSplit: Data-Oblivious Model Inversion, Model Stealing, and Label Inference Attacks Against Split Learning. CoRR abs/2108.09033 (2021) - [i46]Ege Erdogan, Alptekin Küpçü, A. Ercüment Çiçek:
SplitGuard: Detecting and Mitigating Training-Hijacking Attacks in Split Learning. CoRR abs/2108.09052 (2021) - [i45]Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap:
LightChain: Scalable DHT-Based Blockchain. CoRR abs/2109.00416 (2021) - [i44]Alptekin Küpçü, Reihaneh Safavi-Naini:
Smart Contracts for Incentivized Outsourcing of Computation. IACR Cryptol. ePrint Arch. 2021: 174 (2021) - [i42]Ege Erdogan, Alptekin Küpçü, A. Ercüment Çiçek:
UnSplit: Data-Oblivious Model Inversion, Model Stealing, and Label Inference Attacks Against Split Learning. IACR Cryptol. ePrint Arch. 2021: 1074 (2021) - [i41]Ege Erdogan, Alptekin Küpçü, A. Ercüment Çiçek:
SplitGuard: Detecting and Mitigating Training-Hijacking Attacks in Split Learning. IACR Cryptol. ePrint Arch. 2021: 1080 (2021) - 2020
- [j16]Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap:
Privado: Privacy-preserving Group-based Advertising Using Multiple Independent Social Network Providers. ACM Trans. Priv. Secur. 23(3): 12:1-12:36 (2020) - [j15]Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap:
Decentralized Utility- and Locality-Aware Replication for Heterogeneous DHT-Based P2P Cloud Storage Systems. IEEE Trans. Parallel Distributed Syst. 31(5): 1183-1193 (2020) - [c30]Yahya Hassanzadeh-Nazarabadi, Ali Utkan Sahin, Öznur Özkasap, Alptekin Küpçü:
SkipSim: Scalable Skip Graph Simulator. IEEE ICBC 2020: 1-2 - [c29]Yahya Hassanzadeh-Nazarabadi, Nazir Nayal, Shadi Sameh Hamdan, Öznur Özkasap, Alptekin Küpçü:
A containerized proof-of-concept implementation of LightChain system. IEEE ICBC 2020: 1-2 - [c28]Yahya Hassanzadeh-Nazarabadi, Nazir Nayal, Shadi Sameh Hamdan, Ali Utkan Sahin, Öznur Özkasap, Alptekin Küpçü:
Demo: Skip Graph Middleware Implementation. SRDS 2020: 335-337 - [i39]Faizan Safdar Ali, Alptekin Küpçü:
Improving PKI, BGP, and DNS Using Blockchain: A Systematic Review. CoRR abs/2001.00747 (2020) - [i38]Yahya Hassanzadeh-Nazarabadi, Ali Utkan Sahin, Öznur Özkasap, Alptekin Küpçü:
SkipSim: Scalable Skip Graph Simulator. CoRR abs/2007.13200 (2020) - [i37]Yahya Hassanzadeh-Nazarabadi, Nazir Nayal, Shadi Sameh Hamdan, Öznur Özkasap, Alptekin Küpçü:
A containerized proof-of-concept implementation of LightChain system. CoRR abs/2007.13203 (2020) - 2019
- [j14]Mohammad Etemad, Alptekin Küpçü:
Verifiable dynamic searchable encryption. Turkish J. Electr. Eng. Comput. Sci. 27(4): 2606-2623 (2019) - [j13]Andreas Unterweger, Sanaz Taheri Boshrooyeh, Günther Eibl, Fabian Knirsch, Alptekin Küpçü, Dominik Engel:
Understanding Game-Based Privacy Proofs for Energy Consumption Aggregation Protocols. IEEE Trans. Smart Grid 10(5): 5514-5523 (2019) - [i31]Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap:
Interlaced: Fully decentralized churn stabilization for Skip Graph-based DHTs. CoRR abs/1903.07289 (2019) - [i30]Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap:
LightChain: A DHT-based Blockchain for Resource Constrained Environments. CoRR abs/1904.00375 (2019) - [i29]Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap:
Decentralized utility- and locality-aware replication for heterogeneous DHT-based P2P cloud storage systems. CoRR abs/1907.11997 (2019) - [i27]Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap:
LightChain: A DHT-based Blockchain for Resource Constrained Environments. IACR Cryptol. ePrint Arch. 2019: 342 (2019) - [i26]Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap:
Privado: Privacy-Preserving Group-based Advertising using Multiple Independent Social Network Providers. IACR Cryptol. ePrint Arch. 2019: 372 (2019) - [i25]Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap:
Anonyma: Anonymous Invitation-Only Registration in Malicious Adversarial Model. IACR Cryptol. ePrint Arch. 2019: 1215 (2019) - [i24]Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap:
Integrita: Protecting View-Consistency in Online Social Network with Federated Servers. IACR Cryptol. ePrint Arch. 2019: 1223 (2019) - 2018
- [j12]Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap:
Decentralized and locality aware replication method for DHT-based P2P storage systems. Future Gener. Comput. Syst. 84: 32-46 (2018) - [j11]Mohammad Etemad, Alptekin Küpçü:
Verifiable database outsourcing supporting join. J. Netw. Comput. Appl. 115: 1-19 (2018) - [j10]Mohammad Etemad, Alptekin Küpçü, Charalampos Papamanthou, David Evans:
Efficient Dynamic Searchable Encryption with Forward Privacy. Proc. Priv. Enhancing Technol. 2018(1): 5-20 (2018) - [c26]Seny Kamara, Alptekin Küpçü:
DogFish: Decentralized Optimistic Game-theoretic FIle SHaring. ACNS 2018: 696-714 - [c25]Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap:
PPAD: Privacy Preserving Group-Based ADvertising in Online Social Networks. Networking 2018: 514-522 - [i23]Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap:
PPAD: Privacy Preserving Group-Based ADvertising in Online Social Networks. IACR Cryptol. ePrint Arch. 2018: 323 (2018) - 2017
- [j9]Buket Yüksel, Alptekin Küpçü, Öznur Özkasap:
Research issues for privacy and security of electronic health services. Future Gener. Comput. Syst. 68: 1-13 (2017) - [j8]David Cash, Alptekin Küpçü, Daniel Wichs:
Dynamic Proofs of Retrievability Via Oblivious RAM. J. Cryptol. 30(1): 22-57 (2017) - [c23]Sanaz Taheri Boshrooyeh, Alptekin Küpçü:
Inonymous: Anonymous Invitation-Based System. DPM/CBT@ESORICS 2017: 219-235 - [c22]Mohammad Etemad, Filipe Beato, Alptekin Küpçü, Bart Preneel:
Are You Really My Friend? Efficient and Secure Friend-Matching in Mobile Social Networks. EuroS&P Workshops 2017: 122-131 - [i19]Mohammad Etemad, Alptekin Küpçü, Charalampos Papamanthou, David Evans:
Efficient Dynamic Searchable Encryption with Forward Privacy. CoRR abs/1710.00208 (2017) - 2016
- [j6]Ertem Esiner, Adilet Kachkeev, Samuel Braunfeld, Alptekin Küpçü, Öznur Özkasap:
FlexDPDP: Flexlist-Based Optimized Dynamic Provable Data Possession. ACM Trans. Storage 12(4): 23:1-23:44 (2016) - [c21]Mohammad Etemad, Alptekin Küpçü:
Generic Efficient Dynamic Proofs of Retrievability. CCSW 2016: 85-96 - [c19]Alptekin Küpçü, Payman Mohassel:
Fast Optimistically Fair Cut-and-Choose 2PC. Financial Cryptography 2016: 208-228 - [c18]Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap:
LARAS: Locality aware replication algorithm for the Skip Graph. NOMS 2016: 324-332 - [c17]Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap:
Awake: Decentralized and Availability Aware Replication for P2P Cloud Storage. SmartCloud 2016: 289-294 - [i18]Mohammad Etemad, Alptekin Küpçü:
A Generic Dynamic Provable Data Possession Framework. IACR Cryptol. ePrint Arch. 2016: 748 (2016) - 2015
- [j4]C. Christopher Erway, Alptekin Küpçü, Charalampos Papamanthou, Roberto Tamassia:
Dynamic Provable Data Possession. ACM Trans. Inf. Syst. Secur. 17(4): 15:1-15:29 (2015) - [c15]Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap:
Locality Aware Skip Graph. ICDCS Workshops 2015: 105-111 - [c14]Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap:
Security and Privacy of Distributed Online Social Networks. ICDCS Workshops 2015: 112-119 - [c13]Mohammad Etemad, Alptekin Küpçü:
Efficient Key Authentication Service for Secure End-to-End Communications. ProvSec 2015: 183-197 - [i16]Mohammad Etemad, Alptekin Küpçü:
Database Outsourcing with Hierarchical Authenticated Data Structures. IACR Cryptol. ePrint Arch. 2015: 351 (2015) - [i15]Mohammad Etemad, Alptekin Küpçü:
Efficient Key Authentication Service for Secure End-to-end Communications. IACR Cryptol. ePrint Arch. 2015: 833 (2015) - [i14]Mohammad Etemad, Alptekin Küpçü:
Generic Efficient Dynamic Proofs of Retrievability. IACR Cryptol. ePrint Arch. 2015: 880 (2015) - [i13]Alptekin Küpçü, Payman Mohassel:
Fast Optimistically Fair Cut-and-Choose 2PC. IACR Cryptol. ePrint Arch. 2015: 1209 (2015) - 2014
- [c12]Ertem Esiner, Alptekin Küpçü, Öznur Özkasap:
Analysis and Optimization on FlexDPDP: A Practical Solution for Dynamic Provable Data Possession. ICC 2014: 65-83 - 2013
- [j3]Tolga Acar, Mira Belenkiy, Alptekin Küpçü:
Single password authentication. Comput. Networks 57(13): 2597-2614 (2013) - [c11]Mohammad Etemad, Alptekin Küpçü:
Transparent, Distributed, and Replicated Dynamic Provable Data Possession. ACNS 2013: 1-18 - [c10]Adilet Kachkeev, Ertem Esiner, Alptekin Küpçü, Öznur Özkasap:
Energy Efficiency in Secure and Dynamic Cloud Storage. EE-LSDS 2013: 125-130 - [c9]David Cash, Alptekin Küpçü, Daniel Wichs:
Dynamic Proofs of Retrievability via Oblivious RAM. EUROCRYPT 2013: 279-295 - [c8]Mohammad Etemad, Alptekin Küpçü:
Database Outsourcing with Hierarchical Authenticated Data Structures. ICISC 2013: 381-399 - [i10]Mira Belenkiy, Melissa Chase, C. Christopher Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya:
Incentivizing Outsourced Computation. IACR Cryptol. ePrint Arch. 2013: 156 (2013) - [i9]Tolga Acar, Mira Belenkiy, Alptekin Küpçü:
Single Password Authentication. IACR Cryptol. ePrint Arch. 2013: 167 (2013) - [i8]Mohammad Etemad, Alptekin Küpçü:
Transparent, Distributed, and Replicated Dynamic Provable Data Possession. IACR Cryptol. ePrint Arch. 2013: 225 (2013) - [i7]Ertem Esiner, Adilet Kachkeev, Samuel Braunfeld, Alptekin Küpçü, Öznur Özkasap:
FlexDPDP: FlexList-based Optimized Dynamic Provable Data Possession. IACR Cryptol. ePrint Arch. 2013: 645 (2013) - 2012
- [j1]Alptekin Küpçü, Anna Lysyanskaya:
Usable optimistic fair exchange. Comput. Networks 56(1): 50-63 (2012) - [i6]Sarah Meiklejohn, C. Christopher Erway, Alptekin Küpçü, Theodora Hinkle, Anna Lysyanskaya:
ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash. IACR Cryptol. ePrint Arch. 2012: 226 (2012) - [i4]David Cash, Alptekin Küpçü, Daniel Wichs:
Dynamic Proofs of Retrievability via Oblivious RAM. IACR Cryptol. ePrint Arch. 2012: 550 (2012) - 2010
- [c7]Alptekin Küpçü, Anna Lysyanskaya:
Usable Optimistic Fair Exchange. CT-RSA 2010: 252-267 - [c6]Alptekin Küpçü, Anna Lysyanskaya:
Optimistic Fair Exchange with Multiple Arbiters. ESORICS 2010: 488-507 - [c5]Sarah Meiklejohn, C. Christopher Erway, Alptekin Küpçü, Theodora Hinkle, Anna Lysyanskaya:
ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash. USENIX Security Symposium 2010: 193-206 - 2009
- [c4]C. Christopher Erway, Alptekin Küpçü, Charalampos Papamanthou, Roberto Tamassia:
Dynamic provable data possession. CCS 2009: 213-222 - [c3]Alptekin Küpçü, Anna Lysyanskaya:
Brief announcement: impossibility results for optimistic fair exchange with multiple autonomous arbiters. PODC 2009: 336-337 - [i3]Alptekin Küpçü, Anna Lysyanskaya:
Optimistic Fair Exchange with Multiple Arbiters. IACR Cryptol. ePrint Arch. 2009: 69 (2009) - 2008
- [c2]Mira Belenkiy, Melissa Chase, C. Christopher Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya:
Incentivizing outsourced computation. NetEcon 2008: 85-90 - [i2]Alptekin Küpçü, Anna Lysyanskaya:
Usable Optimistic Fair Exchange. IACR Cryptol. ePrint Arch. 2008: 431 (2008) - [i1]C. Christopher Erway, Alptekin Küpçü, Charalampos Papamanthou, Roberto Tamassia:
Dynamic Provable Data Possession. IACR Cryptol. ePrint Arch. 2008: 432 (2008) - 2007
- [c1]Mira Belenkiy, Melissa Chase, C. Christopher Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya, Eric Rachlin:
Making p2p accountable without losing privacy. WPES 2007: 31-40
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-16 19:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint