Search filters

List of works by Mehmet A Orgun

A 2-Stage Approach for Inferring Gene Regulatory Networks Using Dynamic Bayesian Networks

article

A Critical Analysis of ECG-Based Key Distribution for Securing Wearable and Implantable Medical Devices

A Critical Analysis of Mobility Management Related Issues of Wireless Sensor Networks in Cyber Physical Systems

article

A Deep Framework for Cross-Domain and Cross-System Recommendations

A Dispute Arbitration Protocol Based on a Peer-to-Peer Service Contract Management Scheme

A Dynamic Trust Establishment and Management Framework for Wireless Sensor Networks

scholarly article published December 2010

A Fibred Belief Logic for Multi-agent Systems

A Heuristic Algorithm for Trust-Oriented Service Provider Selection in Complex Social Networks

scholarly article published July 2010

A Hybrid Quantum Key Distribution Protocol for Tele-care Medicine Information Systems

A Multi-Versioning Scheme for Intention Preservation in Collaborative Editing Systems*

A Proof-of-Trust Consensus Protocol for Enhancing Accountability in Crowdsourcing Services

article by Jun Zou et al published 2018 in IEEE transactions on services computing

A Quantum Secret Sharing Scheme Using Orbital Angular Momentum onto Multiple Spin States Based on Fibonacci Compression Encoding

A Review of Secure Routing Approaches for Current and Next-Generation Wireless Multimedia Sensor Networks

article

A Robust Approach to Finding Trustworthy Influencer in Trust-Oriented E-Commerce Environments

article by Feng Zhu et al published 2016 in Lecture Notes in Computer Science

A Stratified Model for Short-Term Prediction of Time Series

A Survey of Authentication Schemes in Telecare Medicine Information Systems

scientific article published on 30 November 2016

A Tabu–Harmony Search-Based Approach to Fuzzy Linear Regression

scholarly article by M H Mashinchi et al published June 2011 in IEEE Transactions on Fuzzy Systems

A Top-Down Approach for Hierarchical Cluster Exploration by Visualization

scholarly article by Ke-Bing Zhang et al published 2010 in Lecture Notes in Computer Science

A Visual Approach for Classification Based on Data Projection

A Visual Approach for External Cluster Validation

A Visual Method for High-Dimensional Data Cluster Exploration

A comparison of key distribution schemes using fuzzy commitment and fuzzy vault within wireless body area networks

A constraint mechanism for knowledge specification of simulation systems based on temporal logic

A framework for exploiting parallelism in Chronolog

A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes

A learning ontology with metadata and user profiles for enhancing accessibility of resources

A least square approach for the detection and removal of outliers for fuzzy linear regressions

A non-key based security scheme supporting emergency treatment of wireless implants

A novel biomedical image indexing and retrieval system via deep preference learning.

scientific article published on 6 February 2018

A novel end-to-end classifier using domain transferred deep convolutional neural networks for biomedical images

scientific article

A novel fused convolutional neural network for biomedical image classification

scientific article published on 12 July 2018

A reverse-engineering approach to subsystem structure identification

A scalable approach for inferring transcriptional regulation in the yeast cell cycle

A secure transaction environment for workflows in distributed systems

A survey on real-time event detection from the Twitter data stream

scholarly article by Mahmud Hasan et al published 17 March 2017 in Journal of Information Science

A trust management architecture for hierarchical wireless sensor networks

scholarly article published October 2010

ADDROL: a method for on-line reorganization in a multisystem DBMS with shared disks

AI 2007: Advances in Artificial Intelligence

An Adaptive Labeling Method for Dynamic XML Documents

An Application of Element Oriented Analysis Based Credit Scoring

An ECG-based Secret Data Sharing scheme supporting emergency treatment of Implantable Medical Devices

An Improved Binary Sequence Generation for Securing Wireless Body Area Networks

An Improved Wavelet Analysis Method for Detecting DDoS Attacks

An Uncertain Assessment Compatible Incentive Mechanism for Eliciting Continual and Truthful Assessments of Cloud Services

An adaptive learning system using plug and play ontologies

An analytic tableau calculus for a temporalised belief logic

An efficient quantum blind digital signature scheme

An exclusive version locking scheme in Internet-based real-time group editors

An improved coding method of quantum key distribution protocols based on Fibonacci-valued OAM entangled states

An overview of temporal and modal logic programming

Analysing Stream Authentication Protocols in Autonomous Agent-Based Systems

Analysis of Authentication Protocols in Agent-Based Systems Using Labeled Tableaux

scientific article published on 05 May 2009

Analysis of microarray data to infer transcription regulation in the yeast cell cycle

Analysis of the Scalability and Stability of an ACO Based Routing Protocol for Wireless Sensor Networks

Analytic Tableaux for Verifying Agent Beliefs

Analyzing ant colony optimization based routing protocol against the hole problem for enhancing user’s connectivity experience

BRINK: Initial theory on bounded rationality and inconsistent knowledge

Behavior analysis in social networks: Challenges, technologies, and trends

Belief Erasure Using Partial Imaging

BiNet: Trust Sub-network Extraction Using Binary Ant Colony Algorithm in Contextual Social Networks

scholarly article published June 2015

CCCloud: Context-Aware and Credible Cloud Service Selection Based on Subjective Assessment and Objective Assessment

Classifying high dimensional data by interactive visual analysis

Cloud Service Selection Based on the Aggregation of User Feedback and Quantitative Performance Assessment

Clustering techniques for minimizing object access time

Context-Aware Cloud Service Selection Based on Comparison and Aggregation of User Subjective Assessment and Objective Performance Assessment

Context-Aware Trust Management for Peer-to-Peer Mobile Ad-Hoc Networks

scholarly article published 2009

Contextual Sub-network Extraction in Contextual Social Networks

Controllable quantum private queries using an entangled Fibonacci-sequence spiral source

Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks

scientific article published on 31 March 2016

Critical issues in trust management for Mobile Ad-Hoc Networks

scholarly article published August 2009

Cybersecurity and privacy issues for socially integrated mobile healthcare applications operating in a multi-cloud environment

scientific article published in May 2017

Design and deployment challenges in immersive and wearable technologies

Discovering Trust Networks for the Selection of Trustworthy Service Providers in Complex Contextual Social Networks

scholarly article published June 2012

Dual compressible hybrid quantum secret sharing schemes based on extended unitary operations

Dynamic (2, 3) Threshold Quantum Secret Sharing of Secure Direct Communication

article by Hong Lai et al published 1 April 2015 in Communications in Theoretical Physics

Dynamic Theories of Trust for Secure Agent-Based Systems

scholarly article published April 2008

ESAS 2009 Message

ESAS 2010 - The Fifth IEEE International Workshop on Engineering Semantic Agent Systems

ESAS 2011 - The Sixth IEEE International Workshop on Engineering Semantic Agent Systems

ESAS 2012: The Seventh IEEE International Workshop on Engineering Semantic Agent Systems

ESAS 2013: Message from the Workshop Organizers

Editing any version at any time: a consistency maintenance mechanism in Internet-based collaborative environments

Editorial: Special issue on security of information and networks

Efficient Random Key Based Encryption System for Data Packet Confidentiality in WSNs

Efficiently Querying XML Documents Stored in RDBMS in the Presence of Dewey-Based Labeling Scheme

Efficiently querying dynamic XML documents stored in relational database systems

Empirical Studies of ECG Multiple Fiducial-Points Based Binary Sequence Generation (MFBSG) Algorithm in E-Health Sensor Platform

article

Encryption for Implantable Medical Devices Using Modified One-Time Pads

Executing specifications of distributed computations with Chronolog(MC)

Failed-tuple triggered blocking strategy for managing near real-time spatial data replication

Fast and simple high-capacity quantum cryptography with error detection

scientific article

Fault-tolerant high-capacity quantum key distribution over a collective-noise channel using extended unitary operations

Finding K Optimal Social Trust Paths for the Selection of Trustworthy Service Providers in Complex Social Networks

scholarly article published July 2011

Finding the Optimal Social Trust Path for the Selection of Trustworthy Service Providers in Complex Social Networks

article by Guanfeng Liu et al published April 2013 in IEEE transactions on services computing

Finger-to-Heart (F2H): Authentication for Wireless Implantable Medical Devices

scientific article published on 10 August 2018

Formalising theories of trust for authentication protocols

article by Ji Ma & Mehmet A Orgun published 4 October 2007 in Information Systems Frontiers

Foundations of linear-time logic programming

From Predefined Consistency to User-Centered Emergent Consistency in Real-Time Collaborative Editing Systems

Fundamental Issues in Mobile Healthcare Information Systems

article

Geospatial editing over a federated cloud geodatabase for the state of NSW

High-capacity quantum key distribution using Chebyshev-map values corresponding to Lucas numbers coding

Hybrid optimization with improved tabu search

Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding

scientific article published on 12 August 2016

Hypothesis oriented cluster analysis in data mining by visualization

scholarly article published 2006

INTRODUCTION: SPECIAL ISSUE ON KNOWLEDGE REPRESENTATION AND ONTOLOGY RESEARCH

Ideas and Challenges for Securing Wireless Implantable Medical Devices: A Review

article

In Honour of Bill Wadge

Incremental Graph Pattern Based Node Matching

Intelligent Agents and P2P Semantic Web

Interactive Visual Classification of Multivariate Data

Introduction to the special issue on Next Generation Network Architectures, Protocols, Theory, Systems and Applications

Introduction to the special issue on advances in ontologies

Introduction to the special issue on engineering semantic agent systems

KPMCF: A Learning Model for Measuring Social Relationship Strength

Knowledge Representation, Reasoning and Integration Using Temporal Logic with Clocks

Labeling XML Nodes in RDBMS

Large-Capacity Three-Party Quantum Digital Secret Sharing Using Three Particular Matrices Coding

article by Hong Lai et al published 1 November 2016 in Communications in Theoretical Physics

Leveraging adjusted user behavior in the detection and prevention of outgoing malicious SMSs in Android devices

Leveraging deep preference learning for indexing and retrieval of biomedical images

scholarly article published May 2017

Locking without requesting a lock: A consistency maintenance mechanism in Internet-based real-time group editors

Managing Theories of Trust in Agent Based Systems

article by Ji Ma & Mehmet A Orgun published 2005 in Lecture Notes in Computer Science

Message from the ESAS 2008 Workshop Organizers

Message from the Workshop Organizers - ESAS 2014

Mining Multidimensional Data through Element Oriented Analysis

Modal tableaux for verifying stream authentication protocols

Modeling Accountable Cloud Services

Modeling Accountable Cloud Services Based on Dynamic Logic for Accountability

Modeling the Dynamic Trust of Online Service Providers Using HMM

scholarly article published June 2013

Modelling and manipulating multidimensional data in semistructured databases

Multi-Constrained Graph Pattern Matching in large-scale contextual social graphs

scholarly article published April 2015

Multiple ECG Fiducial Points-Based Random Binary Sequence Generation for Securing Wireless Body Area Networks

scientific article published on 24 March 2016

OWL 2 learn profile: an ontology sublanguage for the learning domain

scientific article published on 8 March 2016

Offer acceptance prediction of academic placement

On the Analysis of On-Line Database Reorganization

Optimization of XML Queries by Using Semantics in XML Schemas and the Document Structure

Optimizing XML twig queries in relational systems

Privacy Preservation in e-Healthcare Environments: State of the Art and Future Directions

article

Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model

article

QoS-Aware Energy Management and Node Scheduling Schemes for Sensor Network-Based Surveillance Applications

scientific article published in 2021

Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes

Querying Historical Data Over Multiple Time-Lines

Real-time event detection from the Twitter data stream using the TwitterNews+ Framework

scholarly article by Mahmud Hasan et al published March 2018 in Information Processing & Management

Reasoning about Dynamics of Trust and Agent Beliefs

article

Representation and Integration of Knowledge based on Multiple Granularity of Time using Temporal Logic

Representing and Reasoning about Utilization of Cloud Computing as Bayesian Games with Epistemic Logic

scholarly article by Oldooz Dianat & Mehmet A Orgun published 2013 in Procedia Computer Science

Resource Allocation for Underlay D2D Communication With Proportional Fairness

Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry

article

Secure sensors data acquisition and communication protection in eHealthcare: Review on the state of the art

article

Secure transfer of environmental data to enhance human decision accuracy

Securing Session Initiation Protocol in Voice over IP Domain

Securing wireless medical implants using an ECG-based secret data sharing scheme

Semantic Agent Systems

Separating XHTML content from navigation clutter using DOM-structure block analysis

Software Clustering Using Automated Feature Subset Selection

Solving Fuzzy Linear Regression with Hybrid Optimization

scholarly article by M. H. Mashinchi et al published 2009 in Lecture Notes in Computer Science

Special issue on Information Visualization in Machine Learning and Applications

scholarly article by Du Zhang et al published April 2016 in Journal of Visual Languages and Computing

Special issue on logics for intelligent agents and multi-agent systems

Special issue on trust and security in wireless sensor networks

article by Mehmet A Orgun et al published 20 May 2015 in Concurrency and Computation: Practice and Experience

Specifying Agent Beliefs for Authentication Systems

Strong Social Component-Aware Trust Sub-network Extraction in Contextual Social Networks

scholarly article published June 2016

Subset Selection Classifier (SSC): A Training Set Reduction Method

Supporting Distributed Collaborative Work with Multi-versioning

Survey on cybersecurity issues in wireless mesh networks based eHealthcare

article

Taking Levi Identity Seriously: A Plea for Iterated Belief Contraction

Temporal Belief-Change: κ-functions Approach

Temporal Data Mining Using Hidden Markov-Local Polynomial Models

Temporal Data Mining Using Hidden Periodicity Analysis

Temporal Data Mining Using Multilevel-Local Polynomial Models

Temporalised Epistemic Logic for Reasoning about Agent-Based Systems

The Discovery of Hierarchical Cluster Structures Assisted by a Visualization Technique

scholarly article by Ke-Bing Zhang et al published 2010 in Lecture Notes in Computer Science

The Impact of Discrimination on the Spread of Infectious Diseases in Complex Networks

The Reactive-Causal Architecture: Radar Task Simulation

The Reactive-Causal Architecture: Towards Development of Believable Agents

The Reactive-Causal Cognitive Agent Architecture

article by Ali Orhan Aydın & Mehmet A Orgun published 2010 in Studies in Computational Intelligence

The impact of human activity patterns on asymptomatic infectious processes in complex networks

The interpreted system model of knowledge, belief, desire and intention

The prediction of trust rating based on the quality of services using fuzzy linear regression

scholarly article published June 2011

The reactive-causal architecture: Combining intentional notion and theories of needs

scholarly article published August 2008

Theories of Trust for Communication Protocols

article by Ji Ma et al published 2009 in Lecture Notes in Computer Science

Theory and Practice of Cryptography Solutions for Secure Information Systems

scholarly article published 2013

Three Approaches to Iterated Belief Contraction

Towards Context Sensitive Defeasible Rules

Towards a Logical Basis for Modelling and Querying Multi-dimensional Databases

article

Towards a unified theory of intensional logic programming

article

Towards an OWL 2 Profile for Defining Learning Ontologies

Trust Inference in Complex Trust-Oriented Social Networks

scholarly article published 2009

Trust management and trust theory revision

article by Ji Ma & M.A. Orgun published May 2006 in IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans

Truthful Channel Sharing for Self Coexistence of Overlapping Medical Body Area Networks

scientific article

TwitterNews+: A Framework for Real Time Event Detection from the Twitter Data Stream

scholarly article by Mahmud Hasan et al published 2016 in Lecture Notes in Computer Science

Two Approaches to Iterated Belief Contraction

Unsupervised Learning Aided by Hierarchical Analysis in Knowledge Exploration

Using dynamic bayesian networks to infer gene regulatory networks from expression profiles

article

XMask: An Enabled XML Management System