default search action
Hasan Dag
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Arash Heidari
, Nima Jafari Navimipour
, Hasan Dag, Samira Talebi, Mehmet Unal:
A Novel Blockchain-Based Deepfake Detection Method Using Federated and Deep Learning Models. Cogn. Comput. 16(3): 1073-1091 (2024) - [j12]Berkant Düzgün
, Aykut Çayir
, Ugur Ünal
, Hasan Dag:
Network intrusion detection system by learning jointly from tabular and text-based features. Expert Syst. J. Knowl. Eng. 41(4) (2024) - [j11]Arash Heidari
, Nima Jafari Navimipour, Hasan Dag, Mehmet Unal:
Deepfake detection using deep learning methods: A systematic and comprehensive review. WIREs Data. Mining. Knowl. Discov. 14(2) (2024) - [c11]Furkan Çolhak, Mert Ilhan Ecevit, Hasan Dag, Reiner Creutzburg:
Comparing Deep Neural Networks and Machine Learning for Detecting Malicious Domain Name Registrations. COINS 2024: 1-4 - [c10]Bilal Emir Uçar, Mert Ilhan Ecevit, Hasan Dag, Reiner Creutzburg:
A Comprehensive Review of Open Source Intelligence in Intelligent Transportation Systems. IE 2024: 109-116 - [c9]Jose Luis Cano Garcia, Izuchukwu Patrick Udechukwu, Isiaq Bolaji Ibrahim, Ikechukwu John Chukwu, Hasan Dag, Vesna Dimitrova, Elissa Mollakuqe
:
Securing AI Systems: A Comprehensive Overview of Cryptographic Techniques for Enhanced Confidentiality and Integrity. MECO 2024: 1-8 - [i5]Furkan Çolhak, Mert Ilhan Ecevit, Hasan Dag, Reiner Creutzburg:
SecureReg: A Combined Framework for Proactively Exposing Malicious Domain Name Registrations. CoRR abs/2401.03196 (2024) - [i4]Furkan Çolhak, Mert Ilhan Ecevit, Bilal Emir Uçar, Reiner Creutzburg, Hasan Dag:
Phishing Website Detection through Multi-Model Analysis of HTML Content. CoRR abs/2401.04820 (2024) - 2022
- [j10]Ugur Ünal
, Hasan Dag
:
AnomalyAdapters: Parameter-Efficient Multi-Anomaly Task Detection. IEEE Access 10: 5635-5646 (2022) - [j9]Ferhat Demirkiran
, Aykut Çayir, Ugur Ünal
, Hasan Dag:
An ensemble of pre-trained transformer models for imbalanced multiclass malware classification. Comput. Secur. 121: 102846 (2022) - 2021
- [j8]Aykut Çayir, Ugur Ünal
, Hasan Dag
:
Random CapsNet forest model for imbalanced malware type classification task. Comput. Secur. 102: 102133 (2021) - [i3]Berkant Düzgün, Aykut Çayir, Ferhat Demirkiran, Ceyda Nur Kayha, Buket Gençaydin, Hasan Dag:
New Datasets for Dynamic Malware Classification. CoRR abs/2111.15205 (2021) - [i2]Ferhat Demirkiran, Aykut Çayir, Ugur Ünal, Hasan Dag:
An Ensemble of Pre-trained Transformer Models For Imbalanced Multiclass Malware Classification. CoRR abs/2112.13236 (2021) - 2020
- [j7]Muhittin Isik
, Hasan Dag
:
The impact of text preprocessing on the prediction of review ratings. Turkish J. Electr. Eng. Comput. Sci. 28(3): 1405-1421 (2020)
2010 – 2019
- 2019
- [j6]Mohammed R. Dahman
, Hasan Dag
:
Machine learning model to predict an adult learner's decision to continue ESOL course. Educ. Inf. Technol. 24(4): 2429-2452 (2019) - [i1]Aykut Çayir, Ugur Ünal, Hasan Dag:
Random CapsNet Forest Model for Imbalanced Malware Type Classification Task. CoRR abs/1912.10836 (2019) - 2017
- [c8]Muhittin Isik, Hasan Dag
:
A recommender model based on trust value and time decay: Improve the quality of product rating score in E-commerce platforms. IEEE BigData 2017: 1946-1955 - 2016
- [c7]Ammar Jabakji, Hasan Dag
:
Improving item-based recommendation accuracy with user's preferences on Apache Mahout. IEEE BigData 2016: 1742-1749
2000 – 2009
- 2009
- [c6]Oguzhan Ceylan, Aydogan Ozdemir, Hasan Dag:
Application of Differential Evolution Method to Branch Outage Problem. GEM 2009: 185-189 - [c5]Taner Dursun, Hasan Dag:
HeteroSim: heterogeneous simulation framework. SpringSim 2009 - 2007
- [j5]Osman Yasar
, Hasan Dag
:
Preface. Int. J. High Perform. Comput. Appl. 21(1): 3-4 (2007) - [j4]Berk Onat
, Sondan Durukanoglu
, Hasan Dag
:
A Parallel Implementation: Real Space Green's Function Technique. Int. J. High Perform. Comput. Appl. 21(1): 66-74 (2007) - [j3]Osman Yasar
, Hasan Dag
:
Trends in parallel computing. Parallel Comput. 33(2): 81-82 (2007) - [j2]Hasan Dag
:
An approximate inverse preconditioner and its implementation for conjugate gradient method. Parallel Comput. 33(2): 83-91 (2007) - [c4]Gonul Uludag, Sima Uyar
, Kerem Senel
, Hasan Dag
:
Comparison of Evolutionary Techniques for Value-at-Risk Calculation. EvoWorkshops 2007: 218-227 - 2005
- [j1]Hasan Dag
, Gürkan Soykan, Senol Piskin
, Osman Yasar
:
Computational Science and Engineering at Istanbul Technical University. Comput. Sci. Eng. 7(1): 72-77 (2005) - 2004
- [c3]Hasan Dag, Gürkan Soykan, Senol Piskin
, Osman Yasar
:
Computational Science and Engineering (CSE) Education: Faculty and Student Perspectives. ICCSA (3) 2004: 795-806 - 2003
- [c2]Çagatay Akçadogan, Hasan Dag
:
A Parallel Implementation of Chebyshev Preconditioned Conjugate Gradient Method. ISPDC 2003: 1-8
1990 – 1999
- 1993
- [c1]Hasan Dag, Osman Yasar, Fernando Alvarado:
Parallel Computation of Orthogonal Factors of Sparse Matrices. PPSC 1993: 486-490
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint