


default search action
Abbas Acar
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j12]Carlo Mazzocca
, Abbas Acar
, A. Selcuk Uluagac
, Rebecca Montanari
, Paolo Bellavista
, Mauro Conti
:
A Survey on Decentralized Identifiers and Verifiable Credentials. IEEE Commun. Surv. Tutorials 27(6): 3641-3671 (2025)
[j11]Harun Oz
, Daniele Cono D'Elia
, Güliz Seray Tuncay
, Abbas Acar
, Riccardo Lazzeretti
, Arif Selcuk Uluagac
:
With Great Power Comes Great Responsibility: Security and Privacy Issues of Modern Browser Application Programming Interfaces. IEEE Secur. Priv. 23(2): 52-60 (2025)
[j10]Harun Oz
, Güliz Seray Tuncay
, Ahmet Aris
, Abbas Acar
, Leonardo Babun
, A. Selcuk Uluagac
:
Ransomware Over Modern Web Browsers: A Novel Strain and a New Defense Mechanism. ACM Trans. Web 19(1): 6:1-6:28 (2025)
[c22]Andrea Martinez, Cem Topcuoglu, Abbas Acar, A. Selcuk Uluagac, Engin Kirda:
Users' Privacy Perceptions in Smart Devices from Race and Ethnicity Perspectives. ICCE 2025: 1-6
[c21]Andrea Martinez, Cem Topcuoglu, Abbas Acar, A. Selcuk Uluagac, Engin Kirda:
Diversity Perspectives on Access Control and Authentication in Shared IoT Devices. ICCE 2025: 1-6
[c20]Derin Cayir, Reham Mohamed Aburas, Riccardo Lazzeretti, Marco Angelini, Abbas Acar, Mauro Conti, Z. Berkay Celik, A. Selcuk Uluagac:
Speak Up, I'm Listening: Extracting Speech from Zero-Permission VR Sensors. NDSS 2025- 2024
[j9]Nazli Tekin
, Ahmet Aris
, Abbas Acar
, A. Selcuk Uluagac
, Vehbi Cagri Gungor
:
A review of on-device machine learning for IoT: An energy perspective. Ad Hoc Networks 153: 103348 (2024)
[j8]Derin Cayir
, Abbas Acar
, Riccardo Lazzeretti
, Marco Angelini
, Mauro Conti
, A. Selcuk Uluagac
:
Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices. IEEE Secur. Priv. 22(1): 10-23 (2024)
[j7]Yassine Mekdad
, Ahmet Aris, Abbas Acar
, Mauro Conti
, Riccardo Lazzeretti, Abdeslam El Fergougui, A. Selcuk Uluagac:
A comprehensive security and performance assessment of UAV authentication schemes. Secur. Priv. 7(1) (2024)
[c19]Yassine Mekdad, Abbas Acar, Ahmet Aris, Abdeslam El Fergougui
, Mauro Conti, Riccardo Lazzeretti, A. Selcuk Uluagac:
Exploring Jamming and Hijacking Attacks for Micro Aerial Drones. ICC 2024: 1939-1944
[c18]Abbas Acar, Güliz Seray Tuncay, Esteban Luques, Harun Oz, Ahmet Aris, A. Selcuk Uluagac:
50 Shades of Support: A Device-Centric Analysis of Android Security Updates. NDSS 2024
[c17]Carlo Mazzocca, Abbas Acar, A. Selcuk Uluagac, Rebecca Montanari:
EVOKE: Efficient Revocation of Verifiable Credentials in IoT Networks. USENIX Security Symposium 2024
[c16]Harun Oz
, Abbas Acar
, Ahmet Aris
, Güliz Seray Tuncay
, Amin Kharraz
, A. Selcuk Uluagac
:
(In)Security of File Uploads in Node.js. WWW 2024: 1573-1584
[i12]Carlo Mazzocca, Abbas Acar, A. Selcuk Uluagac, Rebecca Montanari, Paolo Bellavista, Mauro Conti:
A Survey on Decentralized Identifiers and Verifiable Credentials. CoRR abs/2402.02455 (2024)
[i11]Derin Cayir, Abbas Acar, Riccardo Lazzeretti, Marco Angelini, Mauro Conti, A. Selcuk Uluagac:
Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices. CoRR abs/2402.03114 (2024)
[i10]Yassine Mekdad, Abbas Acar, Ahmet Aris, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, A. Selcuk Uluagac:
Exploring Jamming and Hijacking Attacks for Micro Aerial Drones. CoRR abs/2403.03858 (2024)- 2023
[j6]Nazli Tekin
, Abbas Acar, Ahmet Aris, A. Selcuk Uluagac, Vehbi Cagri Gungor:
Energy consumption of on-device machine learning models for IoT intrusion detection. Internet Things 21: 100670 (2023)
[c15]Javier Franco, Abbas Acar, Ahmet Aris, A. Selcuk Uluagac:
Forensic Analysis of Cryptojacking in Host-Based Docker Containers Using Honeypots. ICC 2023: 4860-4865
[c14]Harun Oz, Ahmet Aris, Abbas Acar, Güliz Seray Tuncay, Leonardo Babun, A. Selcuk Uluagac:
RøB: Ransomware over Modern Web Browsers. USENIX Security Symposium 2023: 7073-7090- 2022
[c13]Leonardo Babun, Amit Kumar Sikder, Abbas Acar, A. Selcuk Uluagac:
The Truth Shall Set Thee Free: Enabling Practical Forensic Capabilities in Smart Environments. NDSS 2022
[c12]Ege Tekiner, Abbas Acar, A. Selcuk Uluagac:
A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks. NDSS 2022
[c11]Shrenik Bhansali, Ahmet Aris, Abbas Acar, Harun Oz, A. Selcuk Uluagac:
A First Look at Code Obfuscation for WebAssembly. WISEC 2022: 140-145- 2021
[j5]Abbas Acar, Shoukat Ali, Koray Karabina, Cengiz Kaygusuz, Hidayet Aksu, Kemal Akkaya, Arif Selcuk Uluagac:
A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA. ACM Trans. Priv. Secur. 24(4): 24:1-24:28 (2021)
[j4]Abbas Acar
, Hidayet Aksu
, A. Selcuk Uluagac
, Kemal Akkaya
:
A Usable and Robust Continuous Authentication Framework Using Wearables. IEEE Trans. Mob. Comput. 20(6): 2140-2153 (2021)
[c10]Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selçuk:
In-Browser Cryptomining for Good: An Untold Story. DAPPS 2021: 20-29
[c9]Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selçuk:
SoK: Cryptojacking Malware. EuroS&P 2021: 120-139
[i9]Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selçuk:
SoK: Cryptojacking Malware. CoRR abs/2103.03851 (2021)- 2020
[c8]Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick D. McDaniel, Engin Kirda, A. Selcuk Uluagac:
Kratos: multi-user multi-device-aware access control system for the smart home. WISEC 2020: 1-12
[c7]Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen
, Hidayet Aksu, Mauro Conti
, Ahmad-Reza Sadeghi, A. Selcuk Uluagac:
Peek-a-boo: i see your smart home activities, even encrypted! WISEC 2020: 207-218
2010 – 2019
- 2019
[j3]Abbas Acar
, Wenyi Liu, Raheem Beyah, Kemal Akkaya, Arif Selcuk Uluagac:
A privacy-preserving multifactor authentication system. Secur. Priv. 2(5) (2019)
[j2]Abbas Acar, Wenyi Liu, Raheem Beyah, Kemal Akkaya, Arif Selcuk Uluagac:
A privacy-preserving multifactor authentication system. Secur. Priv. 2(6) (2019)
[c6]Z. Berkay Celik, Abbas Acar
, Hidayet Aksu, Ryan Sheatsley, Patrick D. McDaniel, A. Selcuk Uluagac
:
Curie: Policy-based Secure Data Exchange. CODASPY 2019: 121-132
[c5]Abbas Acar
, Long Lu, A. Selcuk Uluagac
, Engin Kirda:
An Analysis of Malware Trends in Enterprise Networks. ISC 2019: 360-380
[c4]Leonardo Babun, Amit Kumar Sikder
, Abbas Acar
, A. Selcuk Uluagac
:
A digital forensics framework for smart settings: poster. WiSec 2019: 332-333
[i8]Abbas Acar, Long Lu, A. Selcuk Uluagac, Engin Kirda:
An Analysis of Malware Trends in Enterprise Networks. CoRR abs/1910.00508 (2019)
[i7]Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick D. McDaniel, Engin Kirda, A. Selcuk Uluagac:
Multi-User Multi-Device-Aware Access Control System for Smart Home. CoRR abs/1911.10186 (2019)- 2018
[j1]Abbas Acar
, Hidayet Aksu, A. Selcuk Uluagac
, Mauro Conti
:
A Survey on Homomorphic Encryption Schemes: Theory and Implementation. ACM Comput. Surv. 51(4): 79:1-79:35 (2018)
[c3]Amit Kumar Sikder
, Abbas Acar
, Hidayet Aksu, A. Selcuk Uluagac
, Kemal Akkaya, Mauro Conti
:
IoT-enabled smart lighting systems for smart cities. CCWC 2018: 639-645
[c2]Abbas Acar
, Hidayet Aksu, A. Selcuk Uluagac
, Kemal Akkaya:
WACA: Wearable-Assisted Continuous Authentication. IEEE Symposium on Security and Privacy Workshops 2018: 264-269
[i6]Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya:
WACA: Wearable-Assisted Continuous Authentication. CoRR abs/1802.10417 (2018)
[i5]Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, A. Selcuk Uluagac:
Peek-a-Boo: I see your smart home activities, even encrypted! CoRR abs/1808.02741 (2018)
[i4]Leonardo Babun, Amit Kumar Sikder, Abbas Acar, A. Selcuk Uluagac:
IoTDots: A Digital Forensics Framework for Smart Environments. CoRR abs/1809.00745 (2018)- 2017
[c1]Abbas Acar
, Z. Berkay Celik, Hidayet Aksu, A. Selcuk Uluagac
, Patrick D. McDaniel:
Achieving Secure and Differentially Private Computations in Multiparty Settings. PAC 2017: 49-59
[i3]Z. Berkay Celik, Hidayet Aksu, Abbas Acar, Ryan Sheatsley, A. Selcuk Uluagac, Patrick D. McDaniel:
Curie: Policy-based Secure Data Exchange. CoRR abs/1702.08342 (2017)
[i2]Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Mauro Conti:
A Survey on Homomorphic Encryption Schemes: Theory and Implementation. CoRR abs/1704.03578 (2017)
[i1]Abbas Acar, Z. Berkay Celik, Hidayet Aksu, A. Selcuk Uluagac, Patrick D. McDaniel:
Achieving Secure and Differentially Private Computations in Multiparty Settings. CoRR abs/1707.01871 (2017)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-01-22 02:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







