WANT A PROFILE LIKE THIS?
Create my FREE Plan Or learn about other options
Sedat Akleylek
Silver Contributor
15,855 Points

Contributions by role

Author 405
Editor 15,450

Contributions by subject area

Algorithms and Analysis of Algorithms
Computer Networks and Communications
Emerging Technologies
Security and Privacy
Artificial Intelligence
Internet of Things
Cryptography
Theory and Formal Methods
Software Engineering
Visual Analytics
Multimedia
Cryptocurrency
Data Mining and Machine Learning
Computer Education
Mobile and Ubiquitous Computing
Data Science
Neural Networks
Natural Language and Speech
Text Mining
Sentiment Analysis
Databases
Blockchain
Adaptive and Self-Organizing Systems
Distributed and Parallel Computing
Human-Computer Interaction
Bioinformatics
Computer Vision
Computer Aided Design
Programming Languages
Digital Libraries
World Wide Web and Web Science
Autonomous Systems
Scientific Computing and Simulation
Robotics
Network Science and Online Social Networks
Embedded Computing
Quantum Computing
Optimization Theory and Computation
Real-Time and Embedded Systems
Operating Systems
Computational Biology
Spatial and Geographic Information Systems
Social Computing
Brain-Computer Interface
Silver Contributor

Sedat Akleylek

PeerJ Editor & Author

Summary

Sedat Akleylek received the B.Sc. degree in Mathematics majored in Computer Science from Ege University in 2004 in Izmir, Turkey, M.Sc. and Ph.D. degrees in Cryptography from Middle East Technical University in 2008 and 2010, in Ankara, Turkey, respectively. He was a post-doctoral researcher at Cryptography and Computer Algebra Group, TU Darmstadt, Germany between 2014-2015. He was employed as a professor at the Department of Computer Engineering, Ondokuz Mayis University, Samsun, Türkiye. He has been a professor at the Department of Computer Engineering, Istinye University, Istanbul, Türkiye. Now, he is a member of Chair of Security and Theoretical Computer Science, University of Tartu, Tartu, Estonia. He is a member of the editorial board of IEEE Access, Turkish Journal of Electrical Engineering and Computer Sciences, Peerj Computer Science, and International Journal of Information Security Science. He is co-chair of IEEE Turkey Blockchain Group. His research interests include the areas of post-quantum cryptography, algorithms and complexity, architectures for computations in finite fields, blockchain, applied cryptography for cyber security, malware analysis, IoT and fog computing. He has published more than 100 research papers in international journals, conference proceedings, book chapters and has solved several real-world security and data analytics problems for the industry.

Algorithms & Analysis of Algorithms Blockchain Cryptocurrency Cryptography Data Mining & Machine Learning Security & Privacy

Section Editor

Cryptography, Security and Privacy

Editorial Board Member

PeerJ Computer Science

Past or current institution affiliations

University of Tartu
Ondokuz Mayis University Samsun

Work details

Assoc. Prof. Dr.

University of Tartu
October 2022
Chair of Security and Theoretical Computer Science

Prof. Dr.

Istinye University
February 2024
Department of Computer Engineering

Websites

  • Google Scholar

PeerJ Contributions

  • Articles 13
  • Edited 44
June 9, 2025
Automatic dependent surveillance-broadcast (ADS-B) anomalous messages and attack type detection: deep learning-based architecture
Waqas Ahmed, Ammar Masood, Jawad Manzoor, Sedat Akleylek
https://doi.org/10.7717/peerj-cs.2886
March 10, 2025
DeepSpoofNet: a framework for securing UAVs against GPS spoofing attacks
Aziz Ur Rehman Badar, Danish Mahmood, Adeel Iqbal, Sung Won Kim, Sedat Akleylek, Korhan Cengiz, Ali Nauman
https://doi.org/10.7717/peerj-cs.2714
January 3, 2025
Expectation maximization—vector approximate message passing based generalized linear model for channel estimation in intelligent reflecting surface-assisted millimeter multi-user multiple-input multiple-output systems
Shoukath Ali K, Sajan P Philip, Arfat Ahmad Khan, Leeban Moses, Korhan Cengiz, Sedat Akleylek, Nikola Ivković
https://doi.org/10.7717/peerj-cs.2582
October 31, 2024
Metaheuristic optimized complex-valued dilated recurrent neural network for attack detection in internet of vehicular communications
Prasanalakshmi Balaji, Korhan Cengiz, Sangita Babu, Omar Alqahtani, Sedat Akleylek
https://doi.org/10.7717/peerj-cs.2366
April 30, 2024
Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection systems
Mohamed Aly Bouke, Azizol Abdullah, Korhan Cengiz, Sedat Akleylek
https://doi.org/10.7717/peerj-cs.2043
March 29, 2024
Password authenticated key exchange-based on Kyber for mobile devices
Kübra Seyhan, Sedat Akleylek, Ahmet Faruk Dursun
https://doi.org/10.7717/peerj-cs.1960
January 31, 2024
A new lattice-based password authenticated key exchange scheme with anonymity and reusable key
Kübra Seyhan, Sedat Akleylek
https://doi.org/10.7717/peerj-cs.1791
December 8, 2023
Modified graph-based algorithm to analyze security threats in IoT
Ferhat Arat, Sedat Akleylek
https://doi.org/10.7717/peerj-cs.1743
September 19, 2023
Modelling and verification of post-quantum key encapsulation mechanisms using Maude
Víctor García, Santiago Escobar, Kazuhiro Ogata, Sedat Akleylek, Ayoub Otmani
https://doi.org/10.7717/peerj-cs.1547
September 19, 2023
A new hybrid method combining search and direct based construction ideas to generate all 4 × 4 involutory maximum distance separable (MDS) matrices over binary field extensions
Gökhan Tuncay, Fatma Büyüksaraçoğlu Sakallı, Meltem Kurt Pehlivanoğlu, Gülsüm Gözde Yılmazgüç, Sedat Akleylek, Muharrem Tolga Sakallı
https://doi.org/10.7717/peerj-cs.1577
July 10, 2023
SDN-IoT: SDN-based efficient clustering scheme for IoT using improved Sailfish optimization algorithm
Ramin Mohammadi, Sedat Akleylek, Ali Ghaffari
https://doi.org/10.7717/peerj-cs.1424
May 26, 2023
Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism
Kübra Seyhan, Sedat Akleylek
https://doi.org/10.7717/peerj-cs.1391
February 3, 2021
A novel IoT-based health and tactical analysis model with fog computing
Aykut Karakaya, Sedat Akleylek
https://doi.org/10.7717/peerj-cs.342

Academic Editor on

August 4, 2025
Identity-based linear homomorphic signature for a restricted combiners’ group for e-commerce
Yuan Tian, Weitao Song, Tanping Zhou, Bin Hu, Xuan Zhou, Yujie Ding, Weidong Zhong, Xiaoyuan Yang
https://doi.org/10.7717/peerj-cs.3068
July 28, 2025
Further observations on the security of Speck32-like ciphers using machine learning
Zezhou Hou, Jiongjiong Ren, Shaozhen Chen
https://doi.org/10.7717/peerj-cs.3015
June 9, 2025
Intelligent reflecting surface backscatter-enabled physical layer security enhancement via deep reinforcement learning
Manzoor Ahmed, Touseef Hussain, Muhammad Shahwar, Feroz Khan, Muhammad Sheraz, Wali Ullah Khan, Teong Chee Chuah, It Ee Lee
https://doi.org/10.7717/peerj-cs.2902
May 26, 2025
High-fidelity steganography in EEG signals using advanced transform-based methods
Enes Efe
https://doi.org/10.7717/peerj-cs.2900
April 30, 2025
Fish species identification on low resolution—a study with enhanced super-resolution generative adversarial network (ESRGAN), YOLO and VGG-16
Subhrangshu Adhikary, Saikat Banerjee, Rajani Singh, Ashutosh Dhar Dwivedi
https://doi.org/10.7717/peerj-cs.2860
March 28, 2025
Efficient unified architecture for post-quantum cryptography: combining Dilithium and Kyber
Patrik Dobias, Lukas Malina, Jan Hajny
https://doi.org/10.7717/peerj-cs.2746
December 23, 2024
A survey on gait recognition against occlusion: taxonomy, dataset and methodology
Tianhao Li, Weizhi Ma, Yujia Zheng, Xinchao Fan, Guangcan Yang, Lijun Wang, Zhengping Li
https://doi.org/10.7717/peerj-cs.2602
December 23, 2024
ISAnWin: inductive generalized zero-shot learning using deep CNN for malware detection across windows and android platforms
Umm-e-Hani Tayyab, Faiza Babar Khan, Asifullah Khan, Muhammad Hanif Durad, Farrukh Aslam Khan, Aftab Ali
https://doi.org/10.7717/peerj-cs.2604
December 13, 2024
SA-FLIDS: secure and authenticated federated learning-based intelligent network intrusion detection system for smart healthcare
Radjaa Bensaid, Nabila Labraoui, Ado Adamou Abba Ari, Hafida Saidi, Joel Herve Mboussam Emati, Leandros Maglaras
https://doi.org/10.7717/peerj-cs.2414
October 17, 2024
A novel deep neural network structure for software fault prediction
Mehrasa Modanlou Jouybari, Alireza Tajary, Mansoor Fateh, Vahid Abolghasemi
https://doi.org/10.7717/peerj-cs.2270
October 17, 2024
PermQRDroid: Android malware detection with novel attention layered mini-ResNet architecture over effective permission information image
Kazım Kılıç, İbrahim Alper Doğru, Sinan Toklu
https://doi.org/10.7717/peerj-cs.2362
September 9, 2024
Bio-Rollup: a new privacy protection solution for biometrics based on two-layer scalability-focused blockchain
Jian Yun, Yusheng Lu, Xinyang Liu, Jingdan Guan
https://doi.org/10.7717/peerj-cs.2268
June 28, 2024
An intrusion detection system based on convolution neural network
Yanmeng Mo, Huige Li, Dongsheng Wang, Gaqiong Liu
https://doi.org/10.7717/peerj-cs.2152
June 14, 2024
CyberEduPlatform: an educational tool to improve cybersecurity through anomaly detection with Artificial Intelligence
Iván Ortiz-Garcés, Jaime Govea, Santiago Sánchez-Viteri, William Villegas-Ch.
https://doi.org/10.7717/peerj-cs.2041
May 14, 2024
Spatio-temporal characterisation and compensation method based on CNN and LSTM for residential travel data
Adi Alhudhaif, Kemal Polat
https://doi.org/10.7717/peerj-cs.2035
April 29, 2024
Analysis on the impact of dynamic innovation investment strategy of green supply chain enabled by blockchain
Fangfang Guo, Zhuang Wu, Yuanyuan Wang, Chenjun Liu
https://doi.org/10.7717/peerj-cs.2002
April 10, 2024
A lightweight framework for cyber risk management in Western Balkan higher education institutions
Krenar Kepuska, Milo Tomasevic
https://doi.org/10.7717/peerj-cs.1958
February 21, 2024
Enhanced architecture and implementation of spectrum shaping codes
Bingrui Wang, Zhaopeng Xie, Xingang Zhang
https://doi.org/10.7717/peerj-cs.1883
January 15, 2024
Improving fraud detection with semi-supervised topic modeling and keyword integration
Marco Sánchez, Luis Urquiza
https://doi.org/10.7717/peerj-cs.1733
January 15, 2024
Cyberterrorism as a global threat: a review on repercussions and countermeasures
Saman Iftikhar
https://doi.org/10.7717/peerj-cs.1772
January 3, 2024
An empirical approach and practical framework for a decentralized Ethereum Ecosystem Index (EEI)
Manoel Fernando Alonso Gadi, Maximilian Schmidt, Noah Ruemmele, Miguel-Angel Sicilia
https://doi.org/10.7717/peerj-cs.1766
December 14, 2023
Parallel path detection for fraudulent accounts in banks based on graph analysis
Zuxi Chen, ShiFan Zhang, XianLi Zeng, Meng Mei, Xiangyu Luo, Lixiao Zheng
https://doi.org/10.7717/peerj-cs.1749
November 15, 2023
A secure cross-domain interaction scheme for blockchain-based intelligent transportation systems
Haiping Si, Weixia Li, Qingyi Wang, Haohao Cao, Fernando Bacao, Changxia Sun
https://doi.org/10.7717/peerj-cs.1678
October 26, 2023
In-vehicle network intrusion detection systems: a systematic survey of deep learning-based approaches
Feng Luo, Jiajia Wang, Xuan Zhang, Yifan Jiang, Zhihao Li, Cheng Luo
https://doi.org/10.7717/peerj-cs.1648
October 18, 2023
An electronic voting scheme based on homomorphic encryption and decentralization
Ke Yuan, Peng Sang, Suya Zhang, Xi Chen, Wei Yang, Chunfu Jia
https://doi.org/10.7717/peerj-cs.1649
September 29, 2023
An ensemble learning based IDS using Voting rule: VEL-IDS
Sura Emanet, Gozde Karatas Baydogmus, Onder Demir
https://doi.org/10.7717/peerj-cs.1553
September 28, 2023
Natural differential privacy—a perspective on protection guarantees
Micah Altman, Aloni Cohen
https://doi.org/10.7717/peerj-cs.1576
August 29, 2023
A wormhole attack detection method for tactical wireless sensor networks
Ke Zhang
https://doi.org/10.7717/peerj-cs.1449
July 27, 2023
A novel privacy protection method of residents’ travel trajectories based on federated blockchain and InterPlanetary file systems in smart cities
Fenghan Liu, Pan Wang
https://doi.org/10.7717/peerj-cs.1495
January 16, 2023
A comprehensive review of security threats and solutions for the online social networks industry
Naeem A. Nawaz, Kashif Ishaq, Uzma Farooq, Amna Khalil, Saim Rasheed, Adnan Abid, Fadhilah Rosdi
https://doi.org/10.7717/peerj-cs.1143
August 16, 2022
A novel steganography method for binary and color halftone images
Efe Çiftci, Emre Sümer
https://doi.org/10.7717/peerj-cs.1062
May 11, 2022
A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map
Asim Ali, Muhammad Asif Khan, Ramesh Kumar Ayyasamy, Muhammad Wasif
https://doi.org/10.7717/peerj-cs.940
April 1, 2022
Techniques and countermeasures for preventing insider threats
Rakan A. Alsowail, Taher Al-Shehari
https://doi.org/10.7717/peerj-cs.938
March 11, 2022
Evaluating knowledge-based security questions for fallback authentication
Reem AlHusain, Ali Alkhalifah
https://doi.org/10.7717/peerj-cs.903
January 14, 2022
The role of software in science: a knowledge graph-based analysis of software mentions in PubMed Central
David Schindler, Felix Bensmann, Stefan Dietze, Frank Krüger
https://doi.org/10.7717/peerj-cs.835
January 4, 2022
Data privacy during pandemics: a systematic literature review of COVID-19 smartphone applications
Amany Alshawi, Muna Al-Razgan, Fatima H. AlKallas, Raghad Abdullah Bin Suhaim, Reem Al-Tamimi, Norah Alharbi, Sarah Omar AlSaif
https://doi.org/10.7717/peerj-cs.826
August 3, 2021
Digital security vulnerabilities and threats implications for financial institutions deploying digital technology platforms and application: FMEA and FTOPSIS analysis
Abeeku Sam Edu, Mary Agoyi, Divine Agozie
https://doi.org/10.7717/peerj-cs.658
July 29, 2021
COVID-Nets: deep CNN architectures for detecting COVID-19 using chest CT scans
Hammam Alshazly, Christoph Linse, Mohamed Abdalla, Erhardt Barth, Thomas Martinetz
https://doi.org/10.7717/peerj-cs.655
July 23, 2021
Image-based many-language programming language identification
Francesca Del Bonifro, Maurizio Gabbrielli, Antonio Lategano, Stefano Zacchiroli
https://doi.org/10.7717/peerj-cs.631
July 19, 2021
A secure key dependent dynamic substitution method for symmetric cryptosystems
Aisha Ejaz, Ijaz Ali Shoukat, Umer Iqbal, Abdul Rauf, Afshan Kanwal
https://doi.org/10.7717/peerj-cs.587
June 11, 2021
Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation)
Rosmalissa Jusoh, Ahmad Firdaus, Shahid Anwar, Mohd Zamri Osman, Mohd Faaizie Darmawan, Mohd Faizal Ab Razak
https://doi.org/10.7717/peerj-cs.522
June 9, 2021
A privacy-preserving design for sharing demand-driven patient datasets over permissioned blockchains and P2P secure transfer
Mercedes Rodriguez-Garcia, Miguel-Angel Sicilia, Juan Manuel Dodero
https://doi.org/10.7717/peerj-cs.568
May 4, 2021
Efficient VANET safety message delivery and authenticity with privacy preservation
Taha M. Mohamed, Islam Z. Ahmed, Rowayda A. Sadek
https://doi.org/10.7717/peerj-cs.519
April 15, 2021
Malware homology determination using visualized images and feature fusion
Xuejin Zhu, Jie Huang, Bin Wang, Chunyang Qi
https://doi.org/10.7717/peerj-cs.494