default search action
Ramin Fouladi
Person information
- affiliation: Ericsson Research, Istanbul, Turkey
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Loay Abdelrazek, Ramin Fuladi, János Kövér, Leyli Karaçay, Utku Gülen:
Detecting IP DDoS Attacks Using 3GPP Radio Protocols. IEEE Access 12: 24776-24790 (2024) - [j5]Ramin Fuladi, Tuncer Baykas, Emin Anarim:
The use of statistical features for low-rate denial-of-service attack detection. Ann. des Télécommunications 79(9-10): 679-691 (2024) - [c17]Fahri Sinan, Ramin Fuladi, Emin Anarim:
Matrix Profile Based Algorithms Using Self-Collected Data for Detecting DDoS Attacks in loT Equipment. BlackSeaCom 2024: 135-139 - [c16]Leyli Karaçay, Ahmet Cihat Baktir, Ramin Fuladi, Elham Dehghan Biyar, Ömer Faruk Tuna, Ipek Arikan:
Secure AI/ML-Based Control in Intent-Based Management System. CSR 2024: 618-623 - [c15]Ramin Fuladi, Khadija Hanifi:
CodeGrapher: An Image Representation Method to Enhance Software Vulnerability Prediction. ENASE 2024: 666-673 - [c14]Sébastien Faye, Miguel Camelo, Jean-Sébastien Sottet, Christoph Sommer, Mario Franke, Julien Baudouin, German Castellanos, Régis Decorme, Maria Pia Fanti, Ramin Fuladi, Gunes Kesik, Beatriz Mendes, Chris Murphy, Stephen Parker, Simon Pryor, Sidi Mohammed Senouci, Ion Turcanu:
Integrating Network Digital Twinning into Future AI-based 6G Systems: The 6G-TWIN Vision. EuCNC/6G Summit 2024: 883-888 - [i2]Ferhat Karakoç, Betül Güvenç Paltun, Leyli Karaçay, Ömer Faruk Tuna, Ramin Fuladi, Utku Gülen:
FASIL: A challenge-based framework for secure and privacy-preserving federated learning. IACR Cryptol. ePrint Arch. 2024: 1028 (2024) - 2023
- [j4]Ferhat Karakoç, Leyli Karaçay, Pinar Çomak De Cnudde, Utku Gülen, Ramin Fuladi, Elif Ustundag Soykan:
A security-friendly privacy-preserving solution for federated learning. Comput. Commun. 207: 27-35 (2023) - [c13]Ramin Fuladi, Tuncer Baykas, Emin Anarim:
The Use of Statistical Features for Low-Rate Denial of Service Attack Detection. 6GNet 2023: 1-6 - [c12]Rusen Halepmollasi, Khadija Hanifi, Ramin Fadaei Fouladi, Ayse Tosun:
A Comparison of Source Code Representation Methods to Predict Vulnerability Inducing Code Changes. ENASE 2023: 469-478 - [c11]Khadija Hanifi, Ramin Fadaei Fouladi, Basak Gencer Unsalver, Goksu Karadag:
Software Vulnerability Prediction Knowledge Transferring Between Programming Languages. ENASE 2023: 479-486 - [c10]Engincan Varan, Khadija Hanifi, Aysegul Rana Erdemli, Musa Unal, Yunus Emre Tat, Dilara Tekinoglu, Orçun Çetin, Ramin Fuladi, Cemal Yilmaz:
Using Page Offsets for Detecting Control-Flow Anomalies. SecITC 2023: 13-25 - [i1]Khadija Hanifi, Ramin Fadaei Fouladi, Basak Gencer Unsalver, Goksu Karadag:
Software Vulnerability Prediction Knowledge Transferring Between Programming Languages. CoRR abs/2303.06177 (2023) - 2022
- [j3]Ramin Fadaei Fouladi, Orhan Ermis, Emin Anarim:
A DDoS attack detection and countermeasure scheme based on DWT and auto-encoder neural network for SDN. Comput. Networks 214: 109140 (2022) - [j2]Ramin Fadaei Fouladi, Orhan Ermis, Emin Anarim:
A Novel Approach for distributed denial of service defense using continuous wavelet transform and convolutional neural network for software-Defined network. Comput. Secur. 112: 102524 (2022) - [c9]Tugce Coskun, Rusen Halepmollasi, Khadija Hanifi, Ramin Fadaei Fouladi, Pinar Çomak De Cnudde, Ayse Tosun:
Profiling developers to predict vulnerable code changes. PROMISE 2022: 32-41 - [c8]Ramin Fadaei Fouladi, Orhan Ermis, Emin Anarim:
A Comparative Study on the Performance Evaluation of DDoS Attack Detection Methods. SIU 2022: 1-4 - [c7]Ferhat Karakoç, Leyli Karaçay, Pinar Çomak, Utku Gülen, Ramin Fuladi, Elif Ustundag Soykan:
A Security-Friendly Privacy Solution for Federated Learning. AI6G@WCCI 2022 - 2020
- [j1]Ramin Fadaei Fouladi, Orhan Ermis, Emin Anarim:
A DDoS attack detection and defense scheme using time-series analysis for SDN. J. Inf. Secur. Appl. 54: 102587 (2020)
2010 – 2019
- 2019
- [c6]Ramin Fadaei Fouladi, Orhan Ermis, Emin Anarim:
Anomaly-Based DDoS Attack Detection by Using Sparse Coding and Frequency Domain. PIMRC 2019: 1-6 - 2018
- [c5]Cemil Eren Kayatas, Ramin Fadaei Fouladi, Orhan Ermis, Emin Anarim:
Statistical measures: Promising features for time series based DDoS attack detection. SIU 2018: 1-4 - 2017
- [c4]Ramin Fadaei Fouladi, Cemil Eren Kayatas, Emin Anarim:
Statistical Measures: Promising Features for Time Series Based DDoS Attack Detection. IWCIM@EUSIPCO 2017: 96 - 2016
- [c3]Ramin Fadaei Fouladi, Cemil Eren Kayatas, Emin Anarim:
Frequency based DDoS attack detection approach using naive Bayes classification. TSP 2016: 104-107 - 2013
- [c2]Ramin Fadaei Fouladi, Tina Seifpoor, Emin Anarim:
Frequency characteristics of DoS and DDoS attacks. SIU 2013: 1-4 - [c1]Ramin Fadaei Fouladi, Ahmet Öncü:
Vital signs modeling for Doppler radar cardiorespiratory monitoring. TSP 2013: 363-366
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint