|
Recent Publications
- S. Lv, D. Guan, W. Yuan, and Ç. K. Koç.
SleepAC: Less dependency on manual annotations, more reliable
sampling for automatic sleep staging.
IEEE Journal of Biomedical and Health Informatics,
30(1):655-665, January 2026.
pdf
- Y. Wang, X. Xue, J. Liang, D. Guan, and Ç. K. Koç.
An efficient FHE-based ciphertext matrix multiplication algorithm.
IEEE 24th International Conference on Trust, Security and Privacy
in Computing and Communications (TrustCom), pages 1586-1591,
Guiyang, China, November 14-17, 2025.
pdf
- S. Ci, Y. Wang, S. Hu, D. Guan, and Ç. K. Koç.
New algorithms for fully homomorphic matrix addition and multiplication.
The Journal of Supercomputing, 81:1534, 2025.
pdf
- X. Hu, D. Guan, W. Yuan, Q. Zhu, and Ç. K. Koç.
Adaptive imbalanced node classification graph contrastive learning.
Neurocomputing, 654:131280, 2025.
pdf
- Z. Zhang, D. Guan, Ç. K. Koç, J. Wen, and Q. Zhu.
AdaptPFL: Unlocking cross-device palmprint recognition via
adaptive personalized federated learning with feature decoupling.
Proceedings of the Thirty-Fourth International Joint Conference
on Artificial Intelligence (IJCAI), pages 7074-7082,
Montreal, Canada, August 16-22, 2025.
pdf
- C. Liu, D. Guan, W. Yuan, and Ç. K. Koç.
ITS2Graph: Graph-based generative adversarial learning for
imbalanced time series classification,
Neural Networks,
191:10770, June 28, 2025.
pdf
- S. Hu, S. Ci, D. Guan, and Ç. K. Koç.
SOCT: Secure outsourcing computation toolkit using threshold
ElGamal algorithm, IEEE Transactions on Cloud Computing,
13(2):711-720, April-June 2025.
pdf
- S. Ci, S. Hu, D. Guan, and Ç. K. Koç.
Privacy-preserving word vectors learning using partially
homomorphic encryption. Journal of Information Security
and Applications, 89:103999, 2025.
pdf
- S. Liu, Z. Liu, D. Chen, W. Dai, L. Zhou, Z. Liu, R. C. C. Cheung,
and Ç. K. Koç. MLFormer: A high performance MPC linear
inference framework for transformers. Journal of Cryptographic
Engineering, 15(2):1-20, 2025.
pdf
- P. He, Y. Tu, T. Bao, Ç. K. Koç, and J. Xie.
HSPA: High-throughput sparse polynomial multiplication
accelerators for code-based post-quantum cryptography.
ACM Transactions on Embedded Computing Systems,
24(1):1-24, January 2025.
pdf
- J. Zhang, Y. Yan, J. Huang, and Ç. K. Koç.
Optimized software implementation of Keccak, Kyber, and Dilithium
on RV{32,64}IM{B}{V}. IACR Transactions on
Cryptographic Hardware and Embedded Systems,
2025(1):632-655, 2025.
pdf
|
|
Award Winning Publications
- O. Acıiçmez, Ç. K. Koç, and J. P.
Seifert. On the power of simple branch prediction analysis.
ACM Symposium on Information, Computer and Communications
Security, AsiaCCS 2007, R. Deng and P. Samarati, editors,
pages 312-320, Singapore, March 20-22, 2007.
pdf
→ AsiaCCS 2025 Test-of-Time Award
→
png
- J. Zhang, J. Huang, L. Zhao, D. Chen, and Ç. K. Koç.
ENG25519: Faster TLS 1.3 handshake using optimized X25519 and
Ed25519. The 33rd USENIX Symposium, Philadelphia,
Pennsylvania, pages 6381-6398, August 14-16, 2024.
pdf
→ USENIX 2024 Distinguished Paper Award
→
png
- J. Huang, H. Zhao, J. Zhang, W. Dai, Z. Liu,
R. C. C. Cheung, Ç. K. Koç, and D. Chen.
Yet another Improvement of Plantard Arithmetic for Faster Kyber
on Low-end 32-bit IoT Devices. IEEE Transactions on Information
Forensics & Security, Volume 19, pages 3800-3813, 2024.
pdf
→ Guangdong Computer Academy 2024
Excellent Paper Award
→
png
- Y. Xin, G. Tang, D. Chen, R. Zhang, T. Liang,
R. C. C. Cheung, and Ç. K. Koç.
A versatility-performance balanced hardware architecture
for scene text detection.
IEEE International Conference on Ubiquitous Intelligence
and Computing, Hainan, China, pages 540-549,
December 15-18, 2022.
pdf
→ IEEE 2022 Outstanding Paper Award
→
png
|
|
Koç Publications Archive
|
|
Sam Green Publications
- S. Green, C. M. Vineyard, R. Helsinki, and Ç. K. Koç.
RAPDARTS: Resource-aware progressive differentiable architecture search.
International Joint Conference on Neural Networks (IJCNN),
Glasgow, UK, July 19-24, 2020.
pdf
- S. Green, C. M. Vineyard, R. Helsinki, and Ç. K. Koç.
RAPDARTS: Resource-aware progressive differentiable architecture search.
arXiv:1911.05704, November 8, 2019.
pdf
(also: pdf)
- S. Green, C. M. Vineyard, W. M. Severa, and Ç. K. Koç.
Benchmarking event-driven neuromorphic architectures.
International Conference on Neuromorphic Systems (ICONS),
Knoxville, Tennessee, July 23-25, 2019.
pdf
- J. Luo, S. Green, P. Feghali, G. Legrady, and Ç. K. Koç.
Visual diagnostics for deep reinforcement learning policy development.
NVIDIA GPU Technology Conference (GTC),
San Jose, California, March 18-21, 2019.
pdf
- S. Green, C. M. Vineyard, and Ç. K. Koç.
Distillation strategies for proximal policy optimization.
arXiv:1901.08128, January 23, 2019.
pdf
(also: pdf)
- S. Green, C. M. Vineyard, and Ç. K. Koç.
Mathematical Optimizations for Deep Learning.
Cyber-Physical Systems Security,
Ç. K. Koç, editor, pages 69-92,
Springer, 2018.
pdf
- J. Luo, S. Green, P. Feghali, G. Legrady and Ç. K. Koç.
Reinforcement Learning and Trustworthy Autonomy.
Cyber-Physical Systems Security,
Ç. K. Koç, editor, pages 191-217,
Springer, 2018.
pdf
- J. Luo, S. Green, P. Feghali, G. Legrady, and Ç. K. Koç.
Visual diagnostics for deep reinforcement learning policy development.
arXiv:1809.06781, September 26, 2018.
pdf
(also: pdf)
- S. Green, C. M. Vineyard, and Ç. K. Koç.
Impacts of mathematical optimizations on reinforcement learning
policy performance.
International Joint Conference on Neural Networks (IJCNN),
Rio de Janeiro, Brazil, July 8-13, 2018.
pdf
- S. Green, İ. Çiçek, and Ç. K. Koç.
Continuous-time computational aspects of cyber-physical security.
Workshop on Fault Diagnosis and Tolerance in Cryptography,
pages 59-62, Santa Barbara, CA, August 16, 2016.
pdf
|
|
İsmail San Publications
- N. Fern, İ. San, Ç. K. Koç, and K.-T. Cheng.
Hiding hardware Trojan communication channels in partially
specified SoC bus functionality.
IEEE Transactions on Computer-Aided Design of Integrated
Circuits and Systems, 36(9):1435-1444, September 2017.
pdf
- İ. San, N. Fern, Ç. K. Koç, and K.-T. Cheng.
Trojans modifying soft-processor instruction sequences embedded in
FPGA bitstreams. 26th International Conference on
Field-Programmable Logic and Applications (FPL), pages 334-337,
Lausanne, Switzerland, August 29 - September 2, 2016.
pdf
- N. Fern, İ. San, Ç. K. Koç, and K.-T. Cheng.
Hardware Trojans in incompletely specified on-chip bus systems.
Design, Automation and Test in Europe (DATE), pages 527-530,
Dresden, Germany, March 14-18, 2016.
pdf
|
|
Wangchen Dai Publications
- W. Dai, D. D. Chen, R. C. C. Cheung, and Ç. K. Koç.
FFT-based McLaughlin's Montgomery exponentiation without
conditional selections.
IEEE Transactions on Computers, 67(9):1301-1314,
September 2018.
pdf
- W. Dai, D. D. Chen, R. C. C. Cheung, and Ç. K. Koç.
Area-time efficient architecture of FFT-based Montgomery multiplication.
IEEE Transactions on Computers, 66(3):375-388, March 2017.
pdf
|
|
Vladimir Trujillo-Olaya Publications
- V. Trujillo-Olaya, T. Sherwood, and Ç. K. Koç.
Analysis of performance versus security in hardware
realizations of small elliptic curves for lightweight
applications. Journal of Cryptographic Engineering,
2(3):179-188, 2012.
pdf
|
|
Zeynep Ödemiş Özger Publications
- Ç. K. Koç, F. Özdemir, and Z. Ö. Özger.
Partially Homomorphic Encryption.
Springer, 2021.
URL
|
|
Funda Özdemir Publications
- F. Özdemir and Ç. K. Koç.
Development of Cryptography since Shannon.
IACR ePrint Report 2022/100, January 26, 2022.
pdf
(also: pdf)
- Ç. K. Koç, F. Özdemir, and Z. Ö. Özger.
Partially Homomorphic Encryption.
Springer, 2021.
URL
|