Koç Lab - Publications

 Koç Lab  
 Founder  
 People  
 Projects  
 Publications  
 News  

Recent Publications

  1. S. Lv, D. Guan, W. Yuan, and Ç. K. Koç. SleepAC: Less dependency on manual annotations, more reliable sampling for automatic sleep staging. IEEE Journal of Biomedical and Health Informatics, 30(1):655-665, January 2026.   pdf

  2. Y. Wang, X. Xue, J. Liang, D. Guan, and Ç. K. Koç. An efficient FHE-based ciphertext matrix multiplication algorithm. IEEE 24th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pages 1586-1591, Guiyang, China, November 14-17, 2025.   pdf
  3. S. Ci, Y. Wang, S. Hu, D. Guan, and Ç. K. Koç. New algorithms for fully homomorphic matrix addition and multiplication. The Journal of Supercomputing, 81:1534, 2025.   pdf
  4. X. Hu, D. Guan, W. Yuan, Q. Zhu, and Ç. K. Koç. Adaptive imbalanced node classification graph contrastive learning. Neurocomputing, 654:131280, 2025.   pdf
  5. Z. Zhang, D. Guan, Ç. K. Koç, J. Wen, and Q. Zhu. AdaptPFL: Unlocking cross-device palmprint recognition via adaptive personalized federated learning with feature decoupling. Proceedings of the Thirty-Fourth International Joint Conference on Artificial Intelligence (IJCAI), pages 7074-7082, Montreal, Canada, August 16-22, 2025.   pdf
  6. C. Liu, D. Guan, W. Yuan, and Ç. K. Koç. ITS2Graph: Graph-based generative adversarial learning for imbalanced time series classification, Neural Networks, 191:10770, June 28, 2025.   pdf
  7. S. Hu, S. Ci, D. Guan, and Ç. K. Koç. SOCT: Secure outsourcing computation toolkit using threshold ElGamal algorithm, IEEE Transactions on Cloud Computing, 13(2):711-720, April-June 2025.   pdf
  8. S. Ci, S. Hu, D. Guan, and Ç. K. Koç. Privacy-preserving word vectors learning using partially homomorphic encryption. Journal of Information Security and Applications, 89:103999, 2025.   pdf
  9. S. Liu, Z. Liu, D. Chen, W. Dai, L. Zhou, Z. Liu, R. C. C. Cheung, and Ç. K. Koç. MLFormer: A high performance MPC linear inference framework for transformers. Journal of Cryptographic Engineering, 15(2):1-20, 2025.   pdf
  10. P. He, Y. Tu, T. Bao, Ç. K. Koç, and J. Xie. HSPA: High-throughput sparse polynomial multiplication accelerators for code-based post-quantum cryptography. ACM Transactions on Embedded Computing Systems, 24(1):1-24, January 2025.   pdf
  11. J. Zhang, Y. Yan, J. Huang, and Ç. K. Koç. Optimized software implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V}. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2025(1):632-655, 2025.   pdf
Award Winning Publications

  1. O. Acıiçmez, Ç. K. Koç, and J. P. Seifert. On the power of simple branch prediction analysis. ACM Symposium on Information, Computer and Communications Security, AsiaCCS 2007, R. Deng and P. Samarati, editors, pages 312-320, Singapore, March 20-22, 2007.   pdf   → AsiaCCS 2025 Test-of-Time Award   png
  2. J. Zhang, J. Huang, L. Zhao, D. Chen, and Ç. K. Koç. ENG25519: Faster TLS 1.3 handshake using optimized X25519 and Ed25519. The 33rd USENIX Symposium, Philadelphia, Pennsylvania, pages 6381-6398, August 14-16, 2024.   pdf   → USENIX 2024 Distinguished Paper Award   png
  3. J. Huang, H. Zhao, J. Zhang, W. Dai, Z. Liu, R. C. C. Cheung, Ç. K. Koç, and D. Chen. Yet another Improvement of Plantard Arithmetic for Faster Kyber on Low-end 32-bit IoT Devices. IEEE Transactions on Information Forensics & Security, Volume 19, pages 3800-3813, 2024.   pdf   → Guangdong Computer Academy 2024 Excellent Paper Award   png
  4. Y. Xin, G. Tang, D. Chen, R. Zhang, T. Liang, R. C. C. Cheung, and Ç. K. Koç. A versatility-performance balanced hardware architecture for scene text detection. IEEE International Conference on Ubiquitous Intelligence and Computing, Hainan, China, pages 540-549, December 15-18, 2022.   pdf   → IEEE 2022 Outstanding Paper Award   png
Koç Publications Archive

Sam Green Publications

  • S. Green, C. M. Vineyard, R. Helsinki, and Ç. K. Koç. RAPDARTS: Resource-aware progressive differentiable architecture search. International Joint Conference on Neural Networks (IJCNN), Glasgow, UK, July 19-24, 2020.   pdf
  • S. Green, C. M. Vineyard, R. Helsinki, and Ç. K. Koç. RAPDARTS: Resource-aware progressive differentiable architecture search. arXiv:1911.05704, November 8, 2019.   pdf   (also: pdf)
  • S. Green, C. M. Vineyard, W. M. Severa, and Ç. K. Koç. Benchmarking event-driven neuromorphic architectures. International Conference on Neuromorphic Systems (ICONS), Knoxville, Tennessee, July 23-25, 2019.   pdf
  • J. Luo, S. Green, P. Feghali, G. Legrady, and Ç. K. Koç. Visual diagnostics for deep reinforcement learning policy development. NVIDIA GPU Technology Conference (GTC), San Jose, California, March 18-21, 2019.   pdf
  • S. Green, C. M. Vineyard, and Ç. K. Koç. Distillation strategies for proximal policy optimization. arXiv:1901.08128, January 23, 2019.   pdf   (also: pdf)
  • S. Green, C. M. Vineyard, and Ç. K. Koç. Mathematical Optimizations for Deep Learning. Cyber-Physical Systems Security, Ç. K. Koç, editor, pages 69-92, Springer, 2018.   pdf
  • J. Luo, S. Green, P. Feghali, G. Legrady and Ç. K. Koç. Reinforcement Learning and Trustworthy Autonomy. Cyber-Physical Systems Security, Ç. K. Koç, editor, pages 191-217, Springer, 2018.   pdf
  • J. Luo, S. Green, P. Feghali, G. Legrady, and Ç. K. Koç. Visual diagnostics for deep reinforcement learning policy development. arXiv:1809.06781, September 26, 2018.   pdf   (also: pdf)
  • S. Green, C. M. Vineyard, and Ç. K. Koç. Impacts of mathematical optimizations on reinforcement learning policy performance. International Joint Conference on Neural Networks (IJCNN), Rio de Janeiro, Brazil, July 8-13, 2018.   pdf
  • S. Green, İ. Çiçek, and Ç. K. Koç. Continuous-time computational aspects of cyber-physical security. Workshop on Fault Diagnosis and Tolerance in Cryptography, pages 59-62, Santa Barbara, CA, August 16, 2016.   pdf
İsmail San Publications

  • N. Fern, İ. San, Ç. K. Koç, and K.-T. Cheng. Hiding hardware Trojan communication channels in partially specified SoC bus functionality. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 36(9):1435-1444, September 2017.   pdf
  • İ. San, N. Fern, Ç. K. Koç, and K.-T. Cheng. Trojans modifying soft-processor instruction sequences embedded in FPGA bitstreams. 26th International Conference on Field-Programmable Logic and Applications (FPL), pages 334-337, Lausanne, Switzerland, August 29 - September 2, 2016.   pdf
  • N. Fern, İ. San, Ç. K. Koç, and K.-T. Cheng. Hardware Trojans in incompletely specified on-chip bus systems. Design, Automation and Test in Europe (DATE), pages 527-530, Dresden, Germany, March 14-18, 2016.   pdf
Wangchen Dai Publications

  • W. Dai, D. D. Chen, R. C. C. Cheung, and Ç. K. Koç. FFT-based McLaughlin's Montgomery exponentiation without conditional selections. IEEE Transactions on Computers, 67(9):1301-1314, September 2018.   pdf
  • W. Dai, D. D. Chen, R. C. C. Cheung, and Ç. K. Koç. Area-time efficient architecture of FFT-based Montgomery multiplication. IEEE Transactions on Computers, 66(3):375-388, March 2017.   pdf
Vladimir Trujillo-Olaya Publications

  • V. Trujillo-Olaya, T. Sherwood, and Ç. K. Koç. Analysis of performance versus security in hardware realizations of small elliptic curves for lightweight applications. Journal of Cryptographic Engineering, 2(3):179-188, 2012.   pdf
Zeynep Ödemiş Özger Publications

  • Ç. K. Koç, F. Özdemir, and Z. Ö. Özger. Partially Homomorphic Encryption. Springer, 2021. URL
Funda Özdemir Publications

  • F. Özdemir and Ç. K. Koç. Development of Cryptography since Shannon. IACR ePrint Report 2022/100, January 26, 2022.   pdf   (also: pdf)
  • Ç. K. Koç, F. Özdemir, and Z. Ö. Özger. Partially Homomorphic Encryption. Springer, 2021. URL