default search action
Oguzhan Ersoy
Person information
- unicode name: Oğuzhan Ersoy
- affiliation: TU Delft, The Netherlands
- affiliation (former): Bogazici University, Istanbul, Turkey
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c23]Xiaoyun Xu, Oguzhan Ersoy, Behrad Tajalli, Stjepan Picek:
Universal Soldier: Using Universal Adversarial Perturbations for Detecting Backdoor Attacks. DSN-W 2024: 66-73 - [c22]Gorka Abad, Oguzhan Ersoy, Stjepan Picek, Aitor Urbieta:
Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data. NDSS 2024 - [i15]Ali Reza Ghavamipour, Benjamin Zi Hao Zhao, Oguzhan Ersoy, Fatih Turkmen:
Privacy-Preserving Aggregation for Decentralized Learning with Byzantine-Robustness. CoRR abs/2404.17970 (2024) - 2023
- [c21]Muhammed F. Esgin, Oguzhan Ersoy, Veronika Kuchta, Julian Loss, Amin Sakzad, Ron Steinfeld, Xiangwen Yang, Raymond K. Zhao:
A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum. AsiaCCS 2023: 623-637 - [c20]Jing Xu, Stefanos Koffas, Oguzhan Ersoy, Stjepan Picek:
Watermarking Graph Neural Networks based on Backdoor Attacks. EuroS&P 2023: 1179-1197 - [c19]Oguzhan Ersoy, Pedro Moreno-Sanchez, Stefanie Roos:
Get Me Out of This Payment! Bailout: An HTLC Re-routing Protocol. FC 2023: 92-109 - [c18]Yu Shen, Oguzhan Ersoy, Stefanie Roos:
Extras and Premiums: Local PCN Routing with Redundancy and Fees. FC 2023: 110-127 - [c17]Gorka Abad, Servio Paguada, Oguzhan Ersoy, Stjepan Picek, Víctor Julio Ramírez-Durán, Aitor Urbieta:
Sniper Backdoor: Single Client Targeted Backdoor Attack in Federated Learning. SaTML 2023: 377-391 - [c16]Behrad Tajalli, Oguzhan Ersoy, Stjepan Picek:
On Feasibility of Server-side Backdoor Attacks on Split Learning. SP (Workshops) 2023: 84-93 - [c15]Xianrui Qin, Shimin Pan, Arash Mirzaei, Zhimei Sui, Oguzhan Ersoy, Amin Sakzad, Muhammed F. Esgin, Joseph K. Liu, Jiangshan Yu, Tsz Hon Yuen:
BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts. SP 2023: 2462-2480 - [i14]Xiaoyun Xu, Oguzhan Ersoy, Stjepan Picek:
Universal Soldier: Using Universal Adversarial Perturbations for Detecting Backdoor Attacks. CoRR abs/2302.00747 (2023) - [i13]Gorka Abad, Oguzhan Ersoy, Stjepan Picek, Aitor Urbieta:
Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data. CoRR abs/2302.06279 (2023) - [i12]Behrad Tajalli, Oguzhan Ersoy, Stjepan Picek:
On Feasibility of Server-side Backdoor Attacks on Split Learning. CoRR abs/2302.09578 (2023) - 2022
- [c14]Oguzhan Ersoy, Jérémie Decouchant, Satwik Prabhu Kumble, Stefanie Roos:
SyncPCN/PSyncPCN: Payment Channel Networks without Blockchain Synchrony. AFT 2022: 16-29 - [c13]Gorka Abad, Oguzhan Ersoy, Stjepan Picek, Víctor Julio Ramírez-Durán, Aitor Urbieta:
Poster: Backdoor Attacks on Spiking NNs and Neuromorphic Datasets. CCS 2022: 3315-3317 - [i11]Oguzhan Ersoy, Jérémie Decouchant, Satwik Prabhu Kumble, Stefanie Roos:
SyncPCN/PSyncPCN: Payment Channel Networks without Blockchain Synchrony. CoRR abs/2207.11615 (2022) - [i10]Oguzhan Ersoy, Pedro Moreno-Sanchez, Stefanie Roos:
Get Me out of This Payment! Bailout: An HTLC Re-routing Protocol. IACR Cryptol. ePrint Arch. 2022: 958 (2022) - [i9]Muhammed F. Esgin, Oguzhan Ersoy, Veronika Kuchta, Julian Loss, Amin Sakzad, Ron Steinfeld, Wayne Yang, Raymond K. Zhao:
A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum. IACR Cryptol. ePrint Arch. 2022: 993 (2022) - [i8]Xianrui Qin, Shimin Pan, Arash Mirzaei, Zhimei Sui, Oguzhan Ersoy, Amin Sakzad, Muhammed F. Esgin, Joseph K. Liu, Jiangshan Yu, Tsz Hon Yuen:
BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts. IACR Cryptol. ePrint Arch. 2022: 1735 (2022) - 2021
- [c12]Lukas Aumayr, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostáková, Matteo Maffei, Pedro Moreno-Sanchez, Siavash Riahi:
Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures. ASIACRYPT (2) 2021: 635-664 - [c11]Oguzhan Ersoy, Ziya Alper Genç, Zekeriya Erkin, Mauro Conti:
Practical Exchange for Unique Digital Goods. DAPPS 2021: 49-58 - [c10]Lukas Aumayr, Matteo Maffei, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Siavash Riahi, Kristina Hostáková, Pedro Moreno-Sanchez:
Bitcoin-Compatible Virtual Channels. SP 2021: 901-918 - 2020
- [j2]Oguzhan Ersoy, Thomas Brochmann Pedersen, Emin Anarim:
Homomorphic extensions of CRT-based secret sharing. Discret. Appl. Math. 285: 317-329 (2020) - [c9]Muhammed F. Esgin, Oguzhan Ersoy, Zekeriya Erkin:
Post-Quantum Adaptor Signatures and Payment Channel Networks. ESORICS (2) 2020: 378-397 - [c8]Oguzhan Ersoy, Stefanie Roos, Zekeriya Erkin:
How to Profit from Payments Channels. Financial Cryptography 2020: 284-303 - [i7]Lukas Aumayr, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostáková, Matteo Maffei, Pedro Moreno-Sanchez, Siavash Riahi:
Generalized Bitcoin-Compatible Channels. IACR Cryptol. ePrint Arch. 2020: 476 (2020) - [i6]Lukas Aumayr, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostáková, Matteo Maffei, Pedro Moreno-Sanchez, Siavash Riahi:
Bitcoin-Compatible Virtual Channels. IACR Cryptol. ePrint Arch. 2020: 554 (2020) - [i5]Muhammed F. Esgin, Oguzhan Ersoy, Zekeriya Erkin:
Post-Quantum Adaptor Signatures and Payment Channel Networks. IACR Cryptol. ePrint Arch. 2020: 845 (2020)
2010 – 2019
- 2019
- [c7]Oguzhan Ersoy, Zekeriya Erkin, Reginald L. Lagendijk:
TULIP: A Fully Incentive Compatible Blockchain Framework Amortizing Redundant Communication. EuroS&P Workshops 2019: 396-405 - [c6]Oguzhan Ersoy, Zekeriya Erkin, Reginald L. Lagendijk:
Decentralized Incentive-Compatible and Sybil-Proof Transaction Advertisement. MARBLE 2019: 151-165 - [c5]Mourad el Maouchi, Oguzhan Ersoy, Zekeriya Erkin:
DECOUPLES: a decentralized, unlinkable and privacy-preserving traceability system for the supply chain. SAC 2019: 364-373 - [c4]Bjorn van der Laan, Oguzhan Ersoy, Zekeriya Erkin:
MUSCLE: authenticated external data retrieval from multiple sources for smart contracts. SAC 2019: 382-391 - [i4]Oguzhan Ersoy, Stefanie Roos, Zekeriya Erkin:
How to profit from payments channels. CoRR abs/1911.08803 (2019) - 2018
- [c3]Oguzhan Ersoy, Zhijie Ren, Zekeriya Erkin, Reginald L. Lagendijk:
Transaction Propagation on Permissionless Blockchains: Incentive and Routing Mechanisms. CVCBT 2018: 20-30 - 2017
- [i3]Oguzhan Ersoy, Zhijie Ren, Zekeriya Erkin, Reginald L. Lagendijk:
Information Propagation on Permissionless Blockchains. CoRR abs/1712.07564 (2017) - 2016
- [j1]Oguzhan Ersoy, Thomas Brochmann Pedersen, Kamer Kaya, Ali Aydin Selçuk, Emin Anarim:
A CRT-based verifiable secret sharing scheme secure against unbounded adversaries. Secur. Commun. Networks 9(17): 4416-4427 (2016) - [c2]Aslí Bay, Oguzhan Ersoy, Ferhat Karakoç:
Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm. ASIACRYPT (1) 2016: 354-368 - [c1]Ferhat Karakoç, Öznur Mut Sagdiçoglu, Mehmet Emin Gönen, Oguzhan Ersoy:
Impossible Differential Cryptanalysis of 16/18-Round Khudra. LightSec 2016: 33-44 - [i2]Oguzhan Ersoy, Kamer Kaya, Kerem Kaskaloglu:
Multilevel Threshold Secret and Function Sharing based on the Chinese Remainder Theorem. CoRR abs/1605.07988 (2016) - [i1]Aslí Bay, Oguzhan Ersoy, Ferhat Karakoç:
Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm. IACR Cryptol. ePrint Arch. 2016: 640 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-26 00:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint