Saran, Ayşe Nurdan

Loading...
Profile Picture
Name Variants
Saran, Nurdan Ayse
Saran, Nurdan
Saran, Ayse Nurdan
Saran, Nurdan Buz
Buz, Ayşe Nurdan
Job Title
Dr. Öğr. Üyesi
Email Address
buz@cankaya.edu.tr
Main Affiliation
Bilgisayar Mühendisliği
Status
Current Staff
Scopus Author ID
Turkish CoHE Profile ID
Google Scholar ID
WoS Researcher ID

Sustainable Development Goals

NO POVERTY1
NO POVERTY
0
Research Products
ZERO HUNGER2
ZERO HUNGER
0
Research Products
GOOD HEALTH AND WELL-BEING3
GOOD HEALTH AND WELL-BEING
0
Research Products
QUALITY EDUCATION4
QUALITY EDUCATION
0
Research Products
GENDER EQUALITY5
GENDER EQUALITY
0
Research Products
CLEAN WATER AND SANITATION6
CLEAN WATER AND SANITATION
0
Research Products
AFFORDABLE AND CLEAN ENERGY7
AFFORDABLE AND CLEAN ENERGY
0
Research Products
DECENT WORK AND ECONOMIC GROWTH8
DECENT WORK AND ECONOMIC GROWTH
0
Research Products
INDUSTRY, INNOVATION AND INFRASTRUCTURE9
INDUSTRY, INNOVATION AND INFRASTRUCTURE
0
Research Products
REDUCED INEQUALITIES10
REDUCED INEQUALITIES
0
Research Products
SUSTAINABLE CITIES AND COMMUNITIES11
SUSTAINABLE CITIES AND COMMUNITIES
0
Research Products
RESPONSIBLE CONSUMPTION AND PRODUCTION12
RESPONSIBLE CONSUMPTION AND PRODUCTION
0
Research Products
CLIMATE ACTION13
CLIMATE ACTION
0
Research Products
LIFE BELOW WATER14
LIFE BELOW WATER
0
Research Products
LIFE ON LAND15
LIFE ON LAND
0
Research Products
PEACE, JUSTICE AND STRONG INSTITUTIONS16
PEACE, JUSTICE AND STRONG INSTITUTIONS
1
Research Products
PARTNERSHIPS FOR THE GOALS17
PARTNERSHIPS FOR THE GOALS
1
Research Products
Documents

15

Citations

79

h-index

6

Documents

14

Citations

49

Scholarly Output

32

Articles

17

Views / Downloads

3399/1174

Supervised MSc Theses

4

Supervised PhD Theses

0

WoS Citation Count

49

Scopus Citation Count

85

Patents

0

Projects

0

WoS Citations per Publication

1.53

Scopus Citations per Publication

2.66

Open Access Source

14

Supervised Theses

4

JournalCount
PeerJ Computer Science6
Turkish Journal of Electrical Engineering and Computer Sciences2
2017 25th Signal Processing And Communications Applications Conference (SIU)1
25th Signal Processing and Communications Applications Conference (SIU) -- MAY 15-18, 2017 -- Antalya, TURKEY1
29th IEEE Conference on Signal Processing and Communications Applications (SIU) -- JUN 09-11, 2021 -- ELECTR NETWORK1
Current Page: 1 / 5

Scopus Quartile Distribution

Competency Cloud

GCRIS Competency Cloud

Scholarly Output Search Results

Now showing 1 - 10 of 32
  • Article
    Cassandra ve MongoDB NoSQL Veri Tabanlarının Karşılaştırmalı Güvenlik Analizi
    (2019) Saran, Murat; Saran, Nurdan
    In this study, we analyze the security of two NoSQL databases, MongoDB 3.6.3 and Cassandra 3.11.1 in a multi-node configuration in two steps. The first step is a comparative study of both databases’ security features according to ten selected criteria from the literature. The second step is analyzing data encryption overhead using the Yahoo Cloud Serving Benchmark tool. This study will help decision-makers and researchers to realize the most crucial security features concerning NoSQL databases as well as to be able to analyze the NoSQL databases regarding the security features. Our security comparison results show that both databases have noteworthy security features. However, Cassandra takes the lead as it supports more security criteria. Besides, the encryption/decryption performance of the MongoDB business version is 53% faster than the Cassandra business version, and the average amount of data that the MongoDB business version can process per minute is 45% higher than the Cassandra business version. This result shows that it is more appropriate to use MongoDB in environments where encryption is required.
  • Book Part
    Parallelization of sparsity-driven change detection method
    (IEEE, 2017) Özgür, Atilla; Saran, Ayşe Nurdan; Nar, Fatih
    In this study, Sparsity-driven Change Detection (SDCD) method, which has been proposed for detecting changes in multitemporal synthetic aperture radar (SAR) images, is parallelized to reduce the execution time. Parallelization of the SDCD is realized using OpenMP on CPU and CUDA on GPU. Execution speed of the parallelized SDCD is shown on real-world SAR images. Our experimental results show that the computation time of the parallel implementation brings significant speed-ups.
  • Publication
    New distinguishers based on random mappings against stream ciphers
    (Springer-Verlag Berlin, 2008) Turan, Meltem Sönmez; Çalık, Çağdaş; Saran, Nurdan Buz; Doğanaksoy, Ali
    Statistical randomness testing plays an important role in security analysis of cryptosystems. In this study, we aim to propose a new framework of randomness testing based on random mappings. Considering the probability distributions of coverage and P-lengths, we present three new distinguishers; (i) coverage test, (ii) p-test and (iii) DP-coverage test and applied them on Phase III Candidates of eSTREAM project. We experimentally observed some statistical weaknesses of Po-maranch using the coverage test.
  • Article
    Citation - WoS: 13
    Citation - Scopus: 15
    Sparsity-Driven Change Detection in Multitemporal Sar Images
    (Ieee-inst Electrical Electronics Engineers inc, 2016) Saran, Ayse Nurdan; Nar, Fatih; Ozgur, Atilla
    In this letter, a method for detecting changes in multitemporal synthetic aperture radar (SAR) images by minimizing a novel cost function is proposed. This cost function is constructed with log-ratio-based data fidelity terms and an l(1)-norm-based total variation (TV) regularization term. Log-ratio terms model the changes between the two SAR images where the TV regularization term imposes smoothness on these changes in a sparse manner such that fine details are extracted while effects like speckle noise are reduced. The proposed method, sparsity-driven change detection (SDCD), employs accurate approximation techniques for the minimization of the cost function since data fidelity terms are not convex and the employed l(1)-norm TV regularization term is not differentiable. The performance of the SDCD is shown on real-world SAR images obtained from various SAR sensors.
  • Article
    Citation - WoS: 2
    Citation - Scopus: 4
    On Time-Memory Trade-Offs for Password Hashing Schemes
    (Frontiers Media Sa, 2024) Saran, Ayse Nurdan
    A password hashing algorithm is a cryptographic method that transforms passwords into a secure and irreversible format. It is used not only for authentication purposes but also for key derivation mechanisms. The primary purpose of password hashing is to enhance the security of user credentials by preventing the exposure of plaintext passwords in the event of a data breach. As a key derivation function, password hashing aims to derive secret keys from a master key, password, or passphrase using a pseudorandom function. This review focuses on the design and analysis of time-memory trade-off (TMTO) attacks on recent password hashing algorithms. This review presents a comprehensive survey of TMTO attacks and recent studies on password hashing for authentication by examining the literature. The study provides valuable insights and strategies for safely navigating transitions, emphasizing the importance of a systematic approach and thorough testing to mitigate risk. The purpose of this paper is to provide guidance to developers and administrators on how to update cryptographic practices in response to evolving security standards and threats.
  • Conference Object
    Parallelization of Sparsity-Driven Change Detection Method
    (Ieee, 2017) Ozgur, Atilla; Saran, Ayse Nurdan; Nar, Fatih
    In this study, Sparsity-driven Change Detection (SDCD) method, which has been proposed for detecting changes in multitemporal synthetic aperture radar (SAR) images, is parallelized to reduce the execution time. Parallelization of the SDCD is realized using OpenMP on CPU and CUDA on GPU. Execution speed of the parallelized SDCD is shown on real-world SAR images. Our experimental results show that the computation time of the parallel implementation brings significant speed-ups.
  • Article
    Distribution-Preserving Data Augmentation
    (PeerJ Inc., 2021) Saran, Nurdan Ayse; Nar, Fatih; Saran, Murat
  • Article
    Citation - WoS: 2
    Citation - Scopus: 6
    Fast Binary Logistic Regression
    (Peerj inc, 2025) Saran, Nurdan Ayse; Nar, Fatih
    This study presents a novel numerical approach that improves the training efficiency of binary logistic regression, a popular statistical model in the machine learning community. Our method achieves training times an order of magnitude faster than traditional logistic regression by employing a novel Soft-Plus approximation, which enables reformulation of logistic regression parameter estimation into matrix-vector form. We also adopt the L-f-norm penalty, which allows using fractional norms, including the L-2-norm, L-1-norm, and L-0-norm, to regularize the model parameters. We put L-f-norm formulation in matrix-vector form, providing flexibility to include or exclude penalization of the intercept term when applying regularization. Furthermore, to address the common problem of collinear features, we apply singular value decomposition (SVD), resulting in a low-rank representation commonly used to reduce computational complexity while preserving essential features and mitigating noise. Moreover, our approach incorporates a randomized SVD alongside a newly developed SVD with row reduction (SVD-RR) method, which aims to manage datasets with many rows and features efficiently. This computational efficiency is crucial in developing a generalized model that requires repeated training over various parameters to balance bias and variance. We also demonstrate the effectiveness of our fast binary logistic regression (FBLR) method on various datasets from the OpenML repository in addition to synthetic datasets.
  • Article
    Citation - WoS: 5
    Citation - Scopus: 5
    Vessel Segmentation in Mri Using a Variational Image Subtraction Approach
    (2014) Saran, Ayşe Nurdan; Nar, Fatih; Saran, Murat
    Vessel segmentation is important for many clinical applications, such as the diagnosis of vascular diseases, the planning of surgery, or the monitoring of the progress of disease. Although various approaches have been proposed to segment vessel structures from 3-dimensional medical images, to the best of our knowledge, there has been no known technique that uses magnetic resonance imaging (MRI) as prior information within the vessel segmentation of magnetic resonance angiography (MRA) or magnetic resonance venography (MRV) images. In this study, we propose a novel method that uses MRI images as an atlas, assuming that the patient has an MRI image in addition to MRA/MRV images. The proposed approach intends to increase vessel segmentation accuracy by using the available MRI image as prior information. We use a rigid mutual information registration of the MRA/MRV to the MRI, which provides subvoxel accurate multimodal image registration. On the other hand, vessel segmentation methods tend to mostly suffer from imaging artifacts, such as Rician noise, radio frequency (RF) inhomogeneity, or partial volume effects that are generated by imaging devices. Therefore, this proposed method aims to extract all of the vascular structures from MRA/MRI or MRV/MRI pairs at the same time, while minimizing the combined effects of noise and RF inhomogeneity. Our method is validated both quantitatively and visually using BrainWeb phantom images and clinical MRI, MRA, and MRV images. Comparison and observer studies are also realized using the BrainWeb database and clinical images. The computation time is markedly reduced by developing a parallel implementation using the Nvidia compute unified device architecture and OpenMP frameworks in order to allow the use of the method in clinical settings.
  • Master Thesis
    Gizliliği Koruyan Federated Öğrenme ile Giriş Tespitini Geliştirme: Farklı Mahremiyet ve Artırımlı Öğrenme Entegrasyonu
    (2025) Asal, Ali Sadeq Hussein; Saran, Ayşe Nurdan
    Siber güvenlikte, Saldırı Tespit Sistemleri (IDS), ağları ve sistemleri kötü niyetli faaliyetleri tespit etmek için tarar ve hassas veriler tehlikeye girmeden tehditleri tanımlamaya yardımcı olur. Makine öğreniminin (ML) tanıtılması, IDS'yi otomatik ve akıllı tehdit algılama mekanizmaları sağlayarak geliştirmiştir. Ancak, Federated Learning (FL) gibi dağıtılmış ortamlarda ML modellerinin eğitimi, model parametrelerinin analizi yoluyla hassas bilgileri açığa çıkarabilir. FL, verileri yerelleştirerek belirli gizlilik sorunlarını hafifletir, ancak gerçek bir gizlilik koruması için yeterli değildir ve geliştirilmesi gereklidir. Özellikle, Artırımlı Öğrenme (IL), IDS'yi yeniden eğitime ihtiyaç duymadan yeni siber güvenlik tehditlerine uyum sağlama yeteneği sunarak iyileştirir. Bu, hesaplama açısından maliyeti düşük tutar ve yeni saldırı davranışlarına hızla uyum sağlar. Özellikle, Federated Differential Privacy Enhanced Model Aggregation adlı bir yöntem öneriyoruz; bu yöntem, federated ML bağlamında hem gizliliği hem de doğruluğu artırmayı hedeflemektedir. Bu yöntem, bir global modelin başlatıldığı ve istemci tarafında eğitimle daha da geliştirildiği bir sunucu-istemci mimarisi kullanır ve güncellemeler güvenli bir şekilde birleştirilir. Ayrıca, veri gizliliğini artırmak için gradyanlara gürültü ekleyen DP-SGD optimizasyonuyla eğitilmiş çok katmanlı bir algılayıcı (MLP) kullandık. Performansı değerlendirdik ve deneysel sonuçlar, önerdiğimiz yaklaşımda sınıf artımlı öğrenmenin doğruluğunun %92,4'e ve özellik artımlı öğrenmenin %99,4'e ulaştığını göstermektedir. Bu sonuçlar, modelimizin yeni verileri iyi bir şekilde öğrenebildiğini ortaya koymaktadır. Süreç, gizliliği koruyucu ve verimli kalmakta olup farklı veri kümesi türleri üzerinde iyi performans sergilemektedir. Bu nedenle, modern çağda bir saldırı tespit sistemi (IDS) için geçerli bir aday olduğuna inanıyoruz.