Peer-Reviewed Published Journal Papers
[1] Yuchen Liu, O. Günlü, Yuanming Shi, and Youlong Wu, "On the Utility-Leakage Tradeoff for Federated Representation Learning," Entropy, accepted 2025.
[2] Shanuja Sasi and O. Günlü, "Novel Constructions for Computation and Communication Trade-offs in Private Coded Distributed Computing," IEEE Transactions on Communications (TCOM), accepted 2025.
[3] Shanuja Sasi, O. Günlü, and B. Sundar Rajan, "Topologies for Multi-Access Distributed Computing Models," IEEE Internet of Things Journal (IoT), 2025, accepted.
[4] Shanuja Sasi and O. Günlü, "Secure Coded Distributed Computing and Extensions to Multiple Access Setting," IEEE Transactions on Communications (TCOM), 2025, accepted.
[5] Martin Mittelbach, Rafael F. Schaefer, Matthieu Bloch, Aylin Yener, and O. Günlü, "Sensing-Assisted Secure Communications over Correlated Rayleigh Fading Channels," Entropy, February 2025.
[6] Yuzhou Gu, Ziqi Zhou, O. Günlü, Rafael G. L. D’Oliveira, Muriel Médard, Parastoo Sadeghi, and Rafael F. Schaefer,"Generalized Rainbow Differential Privacy," in Journal of Privacy and Confidentiality (JPC), June 2024.
[7] O. Günlü, Rafael F. Schaefer, and H. Vincent Poor, "Quality of Security Guarantees for and with Physical Unclonable Functions and Biometric Secrecy Systems," Entropy, vol. 25, no. 8, August 2023.
[8] O. Günlü, Rafael F. Schaefer, Holger Boche, and H. Vincent Poor, "Secure and Private Distributed Source Coding with Private Keys and Decoder Side Information," IEEE Transactions on Information Forensics and Security, vol. 18, pp. 3803-3816, June 2023.
[9] O. Günlü, Matthieu Bloch, Rafael F. Schaefer, and Aylin Yener, "Secure Integrated Sensing and Communication," IEEE Journal on Selected Areas in Information Theory, vol. 4, pp. 40-53, May 2023.
[10] O. Günlü, Rafael F. Schaefer, Holger Boche, and H. Vincent Poor, "Private Key and Decoder Side Information for Secure and Private Source Coding," Entropy, vol. 24, no. 12, November 2022.
[11] O. Günlü, Matthieu Bloch, and Rafael F. Schaefer, "Private Remote Sources for Secure Multi-Function Computation," IEEE Transactions on Information Theory, vol. 68, no. 10, pp. 6826-6841, October 2022.
[12] O. Günlü, "Function Computation under Privacy, Secrecy, Distortion, and Communication Constraints," Entropy, vol. 24, no. 1, June 2022.
[13] O. Günlü, Joerg Kliewer, Rafael F. Schaefer, and Vladimir Sidorenko, "Code Constructions and Bounds for Identification via Channels," IEEE Transactions on Communications, pp. 1486-1496, March 2022.
[14] O. Günlü, Peter Trifonov, Muah Kim, Rafael F. Schaefer, and Vladimir Sidorenko, "Privacy, Secrecy, and Storage with Nested Randomized Polar Subcode Constructions," IEEE Transactions on Communications, vol. 70, no. 1, pp. 514-525, January 2022.
[15] O. Günlü and Efe Bozkir, Wolfgang Fuhl, Rafael F. Schaefer, and Enkelejda Kasneci, "Differential Privacy for Eye Tracking with Temporal Correlations," PLOS ONE, vol. 16, no. 8, pp. 1-22, August 2021.
[16] Matthieu Bloch, O. Günlü, Aylin Yener, Frédérique Oggier, H. Vincent Poor, Lalitha Sankar, and Rafael F. Schaefer, "An Overview of Information-Theoretic Security and Privacy: Metrics, Limits, and Applications," IEEE Journal on Selected Areas in Information Theory, vol. 2, no. 1, pp. 5-22, March 2021.
[17] O. Günlü and Rafael F. Schaefer, "Controllable Key Agreement with Correlated Noise,” IEEE Journal on Selected Areas in Information Theory, vol. 2, no. 1, pp. 82-94, March 2021.
[18] O. Günlü, "Multi-Entity and Multi-Enrollment Key Agreement with Correlated Noise," IEEE Transactions on Information Forensics and Security, vol. 16, pp. 1190-1202, 2021.
[19] O. Günlü and Rafael F. Schaefer, "An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions,”Entropy, vol. 23, no. 1, January 2021.
[20] Vladimir Sidorenko, Wenhui Li, O. Günlü, and Gerhard Kramer, "Skew Convolutional Codes," Entropy, vol. 22, no. 12, December 2020.
[21] Amin Gohari, O. Günlü, and Gerhard Kramer, "Coding for Positive Rate in the Source Model Key Agreement Problem," IEEE Transactions on Information Theory, vol. 66, no. 10, pp. 6303-6323, October 2020.
[22] O. Günlü, Onurcan Iscan, Vladimir Sidorenko, and Gerhard Kramer, "Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems," IEEE Transactions on Information Forensics and Security, vol. 14, no. 11, pp. 2848 – 2858, November 2019.
[23] O. Günlü and Gerhard Kramer, "Privacy, Secrecy, and Storage with Multiple Noisy Measurements of Identifiers," IEEE Transactions on Information Forensics and Security, vol. 13, no. 11, pp. 2872-2883, November 2018.
[24] O. Günlü, Kittipong Kittichokechai, Rafael F. Schaefer, and Giuseppe Caire, "Controllable Identifier Measurements for Private Authentication with Secret Keys," IEEE Transactions on Information Forensics and Security, vol. 13, no. 8, pp. 1945-1959, August 2018.
[25] O. Günlü, Tasnad Kernetzky, Onurcan Iscan, Vladimir Sidorenko, Gerhard Kramer, and Rafael F. Schaefer, "Secure and Reliable Key Agreement with Physical Unclonable Functions," Entropy, vol. 20, no. 5, May 2018.
Published Popular Science Article
[1] O. Günlü, "Exploring the Ultimate Limits," Insights - Brain City Berlin Invited Contributions, April 2021.
Published Project White Paper
[1] Amitha Mayya, Bernhard Garn, Damir Hamidovic, Didrik Bergström, F. Javier López-Martinez, Francesco Gringoli, Junqing Zhang, Marco Gomes, Matthieu Gautier, O. Günlü, Robin Gerzaguet, Roman Marsalek, Stefano Tomasin, Tongyang Xu, and Yuan Ding, "D5.1 PLS Demonstrations, Datasets and Network Available Resources," EU COST Action 6G-PHYSEC WG5 Whitepaper, November 2025.
[2] Utz Roedig and O. Günlü, "D2.1 (Intelligent) Attacks and Countermeasures," EU COST Action 6G-PHYSEC WG2 Whitepaper, September 2025.
[3] O. Günlü, Hanadi Salman, and Hüseyin Arslan, "Whitepaper on Signal Processing for Communications, Localization, and Integrated Sensing and Communication: Security/Vulnerability," EU COST Action INTERACT WG2 Whitepaper, Alister Burr, Ana Garcia Armada, Carsten Smeenk, and Yang Miao (Eds.), December 2024.