default search action
Ertugrul N. Ciftcioglu
Person information
- unicode name: Ertuğrul Necdet Çiftçioğlu
- affiliation: US Army Research Laboratory, Adelphi, MD, USA
- affiliation (former): Pennsylvania State University, Department of Computer Science and Engineering
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [c26]Ertugrul N. Ciftcioglu, Mike Ricos:
Efficient Power Adaptation against Deep Learning Based Predictive Adversaries. WiseML@WiSec 2019: 37-42 - 2018
- [j9]Scott T. Rager, Ertugrul N. Ciftcioglu, Ram Ramanathan, Thomas F. La Porta, Ramesh Govindan:
Scalability and Satisfiability of Quality-of-Information in Wireless Networks. IEEE/ACM Trans. Netw. 26(1): 398-411 (2018) - [c25]Ertugrul N. Ciftcioglu, Rommie L. Hardy, Kevin S. Chan, Lisa Scott, Diego F. M. Oliveira, Gunjan Verma:
Chaff Allocation and Performance for Network Traffic Obfuscation. ICDCS 2018: 1565-1568 - [c24]Gunjan Verma, Ertugrul N. Ciftcioglu, Ryan Sheatsley, Kevin S. Chan, Lisa Scott:
Network Traffic Obfuscation: An Adversarial Machine Learning Approach. MILCOM 2018: 1-6 - 2017
- [j8]Ertugrul Necdet Ciftcioglu, Siddharth Pal, Kevin S. Chan, Derya H. Cansever, Ananthram Swami, Ambuj K. Singh, Prithwish Basu:
Topology Design Games and Dynamics in Adversarial Environments. IEEE J. Sel. Areas Commun. 35(3): 628-642 (2017) - [j7]Ting He, Ertugrul Necdet Ciftcioglu, Shiqiang Wang, Kevin S. Chan:
Location Privacy in Mobile Edge Clouds: A Chaff-Based Approach. IEEE J. Sel. Areas Commun. 35(11): 2625-2636 (2017) - [j6]Ram Ramanathan, Ertugrul N. Ciftcioglu, Abhishek Samanta, Rahul Urgaonkar, Tom La Porta:
Symptotics: a framework for estimating the scalability of real-world wireless networks. Wirel. Networks 23(4): 1063-1083 (2017) - [c23]Ting He, Ertugrul N. Ciftcioglu, Shiqiang Wang, Kevin S. Chan:
Location Privacy in Mobile Edge Clouds. ICDCS 2017: 2264-2269 - [c22]Ertugrul N. Ciftcioglu, Rommie L. Hardy, Lisa M. Scott, Kevin S. Chan:
Efficient chaff-aided obfuscation in resource constrained environments. MILCOM 2017: 97-102 - [c21]Siddharth Pal, Ertugrul N. Ciftcioglu, Prithwish Basu, Kevin S. Chan, Ananthram Swami:
Decentralized network protection games in adversarial environments. Networking 2017: 1-9 - [i2]Ting He, Ertugrul N. Ciftcioglu, Shiqiang Wang, Kevin S. Chan:
Location Privacy in Mobile Edge Clouds: A Chaff-based Approach. CoRR abs/1709.03133 (2017) - 2016
- [c20]Siddharth Pal, Prithwish Basu, Ertugrul N. Ciftcioglu, Kevin S. Chan, Ananthram Swami, Derya H. Cansever:
Editing network topologies by playing potential games. CDC 2016: 7030-7035 - [c19]Scott T. Rager, Ertugrul N. Ciftcioglu, Ram Ramanathan, Thomas F. La Porta, Ramesh Govindan:
Scalability and satisfiability of quality-of-information in wireless networks. WCNC 2016: 1-6 - [c18]Ertugrul N. Ciftcioglu, Siddharth Pal, Kevin S. Chan, Derya H. Cansever, Ananthram Swami, Ambuj K. Singh, Prithwish Basu:
Topology design under adversarial dynamics. WiOpt 2016: 274-281 - [i1]Ertugrul N. Ciftcioglu, Ram Ramanathan, Prithwish Basu:
Generative Models for Global Collaboration Relationships. CoRR abs/1606.08079 (2016) - 2015
- [c17]Ertugrul N. Ciftcioglu, Kevin S. Chan, Rahul Urgaonkar, Shiqiang Wang, Ting He:
Security-aware service migration for tactical mobile micro-clouds. MILCOM 2015: 1058-1063 - [c16]Ertugrul N. Ciftcioglu, Kevin S. Chan, Ananthram Swami, Derya H. Cansever, Prithwish Basu:
Topology control for time-varying contested environments. MILCOM 2015: 1397-1402 - 2014
- [j5]Ertugrul N. Ciftcioglu, Antonios Michaloliakos, Aylin Yener, Konstantinos Psounis, Thomas F. La Porta, Ramesh Govindan:
Operational information content sum capacity: From theory to practice. Comput. Networks 75: 1-17 (2014) - [c15]Scott T. Rager, Ertugrul N. Ciftcioglu, Thomas F. La Porta, Alice Leung, William Dron, Ram Ramanathan, John P. Hancock:
Data Selection for Maximum Coverage in Sensor Networks with Cost Constraints. DCOSS 2014: 209-216 - [c14]Scott T. Rager, Ertugrul N. Ciftcioglu, Thomas F. La Porta:
Performance analysis of practical distributed backpressure protocols. ICCCN 2014: 1-8 - [c13]Ertugrul Necdet Ciftcioglu, Antonios Michaloliakos, Konstantinos Psounis, Thomas F. La Porta, Aylin Yener:
Power minimization with quality-of-information outages. WCNC 2014: 1655-1660 - 2013
- [j4]Ertugrul Necdet Ciftcioglu, Aylin Yener, Michael J. Neely:
Maximizing Quality of Information From Multiple Sensor Devices: The Exploration vs Exploitation Tradeoff. IEEE J. Sel. Top. Signal Process. 7(5): 883-894 (2013) - [c12]Ertugrul Necdet Ciftcioglu, Ram Ramanathan, Thomas F. La Porta:
Scalability Analysis of Tactical Mobility Patterns. MILCOM 2013: 1888-1893 - 2012
- [c11]Ertugrul Necdet Ciftcioglu, Aylin Yener:
Maximizing credibility-based network utility via power allocation. PerCom Workshops 2012: 8-13 - 2011
- [j3]Ertugrul Necdet Ciftcioglu, Yalin Evren Sagduyu, Randall A. Berry, Aylin Yener:
Cost-Delay Tradeoffs for Two-Way Relay Networks. IEEE Trans. Wirel. Commun. 10(12): 4100-4109 (2011) - [j2]Ertugrul Necdet Ciftcioglu, Özgür Gürbüz:
Scheduling for next generation WLANs: filling the gap between offered and observed data rates. Wirel. Commun. Mob. Comput. 11(5): 654-666 (2011) - [c10]Ertugrul Necdet Ciftcioglu, Aylin Yener, Ramesh Govindan, Konstantinos Psounis:
Operational information content sum capacity: Formulation and examples. FUSION 2011: 1-7 - [c9]Ertugrul Necdet Ciftcioglu, Aylin Yener:
Quality-of-information aware transmission policies with time-varying links. MILCOM 2011: 230-235 - [c8]Scott T. Rager, Ertugrul N. Ciftcioglu, Aylin Yener, Thomas F. La Porta, Michael J. Neely:
Distributed backpressure protocols with limited state feedback. MILCOM 2011: 693-698 - [c7]Rahul Urgaonkar, Ertugrul Necdet Ciftcioglu, Aylin Yener, Michael J. Neely:
Quality of Information aware scheduling in task processing networks. WiOpt 2011: 401-406 - 2010
- [c6]Ertugrul Necdet Ciftcioglu, Yalin Evren Sagduyu, Aylin Yener, Randall A. Berry:
Queue based compression in a two-way relay network. CISS 2010: 1-6
2000 – 2009
- 2009
- [c5]Ertugrul Necdet Ciftcioglu, Yalin Evren Sagduyu, Randall Berry, Aylin Yener:
Cost sharing with network coding in two-way relay networks. Allerton 2009: 1597-1604 - 2008
- [c4]Ertugrul Necdet Ciftcioglu, Aylin Yener, Randall Berry:
Stability of bi-directional cooperative relay networks. ITW 2008: 144-148 - [c3]Ertugrul Necdet Ciftcioglu, Aylin Yener, Randall Berry:
Stability regions of two-way relaying with network coding. WICON 2008: 66 - 2007
- [j1]Özgür Erçetin, Özgür Gürbüz, Kerem Bülbül, Ertugrul Necdet Ciftcioglu, Aylin Aksu:
A Practical Routing and MAC Framework for Maximum Lifetime Sensor Telemetry. IEICE Trans. Commun. 90-B(11): 3146-3157 (2007) - [c2]Ertugrul Necdet Ciftcioglu, Özgür Gürbüz:
Access Scheduling Based on Time Water-Filling for Next Generation Wireless LANs. VTC Spring 2007: 2966-2970 - 2006
- [c1]Ertugrul Necdet Ciftcioglu, Özgür Gürbüz:
Opportunistic Scheduling with Frame Aggregation for Next Generation Wireless LANs. ICC 2006: 5228-5233
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint