Yasin Yilmaz

First name
Yasin
Last name
Yilmaz
Shuvo, S. ., Yilmaz, Y. ., Bush, A. ., & Hafen, M. . (2019). Scenario Planning for Sea Level Rise via Reinforcement Learning. In 2019 IEEE Global Conference on Signal and Information Processing (GlobalSIP). Retrieved from https://par.nsf.gov/biblio/10119464
Nassar, A. ., & Yilmaz, Y. . (2019). Smart Network Slicing for Vehicular Fog-RANs. In 2019 IEEE Global Conference on Signal and Information Processing (GlobalSIP). Retrieved from https://par.nsf.gov/biblio/10119462
Kurt, M. N., Yilmaz, Y. ., & Wang, X. . (2019). Secure Distributed Dynamic State Estimation in Wide-Area Smart Grids. IEEE Transactions on Information Forensics and Security, 1. http://doi.org/10.1109/TIFS.2019.2928207
Nassar, A. ., & Yilmaz, Y. . (2019). Resource Allocation in Fog RAN for Heterogeneous IoT Environments Based on Reinforcement Learning. In ICC 2019 - 2019 IEEE International Conference on Communications (ICC) (p. 6). http://doi.org/10.1109/ICC.2019.8761626
Hou, E. ., Yilmaz, Y. ., & Hero, A. O. (2019). Anomaly Detection in Partially Observed Traffic Networks. IEEE Transactions on Signal Processing, 67(6), 16. http://doi.org/10.1109/TSP.2019.2892026
Kurt, M. N., Yilmaz, Y. ., & Wang, X. . (2019). Real-Time Detection of Hybrid and Stealthy Cyber-Attacks in Smart Grid. IEEE Transactions on Information Forensics and Security, 14(2), 16. http://doi.org/10.1109/TIFS.2018.2854745
Nassar, A. ., & Yilmaz, Y. . (2019). Reinforcement Learning for Adaptive Resource Allocation in Fog RAN for IoT With Heterogeneous Latency Requirements. IEEE Access, 7, 12. http://doi.org/10.1109/ACCESS.2019.2939735
Yilmaz, Y. ., Kurt, M. N., & Wang, X. . (2018). Distributed Dynamic State Estimation and LQG Control in Resource-Constrained Networks. IEEE Transactions on Signal and Information Processing over Networks, 4(3), 14. http://doi.org/10.1109/TSIPN.2018.2801460
Kurt, M. N., Yilmaz, Y. ., & Wang, X. . (2018). Distributed Quickest Detection of Cyber-Attacks in Smart Grid. IEEE Transactions on Information Forensics and Security, 13(8), 16. http://doi.org/10.1109/TIFS.2018.2800908