default search action
Kouichi Sakurai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j122]Yiran Xiao, Yaokai Feng, Kouichi Sakurai:
An Efficient Detection Mechanism of Network Intrusions in IoT Environments Using Autoencoder and Data Partitioning. Comput. 13(10): 269 (2024) - [j121]Maharage Nisansala Sevwandi Perera, Takashi Matsunaka, Hiroyuki Yokoyama, Kouichi Sakurai:
Secured tracing for group signatures from attribute-based encryption. Concurr. Comput. Pract. Exp. 36(15) (2024) - [j120]Kouichi Sakurai:
Foreword. IEICE Trans. Inf. Syst. 107(9): 1110-1111 (2024) - [j119]Chunlu Chen, Kevin I-Kai Wang, Peng Li, Kouichi Sakurai:
A Multi-Head Federated Continual Learning Approach for Improved Flexibility and Robustness in Edge Environments. Int. J. Netw. Comput. 14(2): 123-144 (2024) - [j118]Jong-Yeon Park, Jang-Won Ju, Wonil Lee, Bo-Gyeong Kang, Yasuyuki Kachi, Kouichi Sakurai:
A statistical verification method of random permutations for hiding countermeasure against side-channel attacks. J. Inf. Secur. Appl. 84: 103797 (2024) - [c362]Hideki Sakurada, Kouichi Sakurai:
SoK: Directions and Issues in Formal Verification of Payment Protocols. AINA (4) 2024: 111-119 - [c361]Yang Lyu, Yaokai Feng, Kouichi Sakurai:
Design and Performance Evaluation of a Two-Stage Detection of DDoS Attacks Using a Trigger with a Feature on Riemannian Manifolds. AINA (4) 2024: 133-144 - [c360]Haibo Zhang, Kouichi Sakurai:
Experimental Exploration of the Power of Conditional GAN in Image Reconstruction-Based Adversarial Attack Defense Strategies. AINA (3) 2024: 151-162 - [c359]Chunlu Chen, Kevin I-Kai Wang, Peng Li, Kouichi Sakurai:
Enhancing Security and Efficiency: A Lightweight Federated Learning Approach. AINA (4) 2024: 349-359 - [c358]Ryu Watanabe, Ayumu Kubota, Jun Kurihara, Kouichi Sakurai:
Extension of Resource Authorization Method with SSI in Edge Computing. AINA (6) 2024: 385-394 - [c357]Kouichi Sakurai, Kaito Taguchi, Yujie Gu:
The Impact of Prompts on Zero-Shot Detection of AI-Generated Text. AISafety@IJCAI 2024 - [c356]Mariama Mbow, Rodrigo Roman, Takeshi Takahashi, Kouichi Sakurai:
Evading IoT Intrusion Detection Systems with GAN. AsiaJCIS 2024: 48-55 - [c355]Hong Zhao, Enting Guo, Xiuheng Liao, Kouichi Sakurai, Chunhua Su:
The Framework of General Channel Key Generation Based on Physical Layer. DSPP (2) 2024: 204-220 - [c354]Yiluo Liu, Yaokai Feng, Kouichi Sakurai:
A Design of Internet of Vehicles System Incorporating Lightweight Roadside Units and Blockchain Strategy. IMCOM 2024: 1-8 - [c353]Zhuotao Lian, Weiyu Wang, Chunhua Su, Kouichi Sakurai:
AggreMark: Efficient Watermarking in Federated Learning via Weighted Averaging. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2024: 473-478 - [i31]Haibo Zhang, Zhihua Yao, Kouichi Sakurai:
Versatile Defense Against Adversarial Attacks on Image Recognition. CoRR abs/2403.08170 (2024) - [i30]Xiaozhou Ye, Kouichi Sakurai, Nirmal-Kumar C. Nair, Kevin I-Kai Wang:
Machine Learning Techniques for Sensor-based Human Activity Recognition with Data Heterogeneity - A Review. CoRR abs/2403.15422 (2024) - [i29]Tapaswini Mohanty, Vikas Srivastava, Sumit Kumar Debnath, Debasish Roy, Kouichi Sakurai, Sourav Mukhopadhyay:
An Experimentally Validated Feasible Quantum Protocol for Identity-Based Signature with Application to Secure Email Communication. CoRR abs/2403.18247 (2024) - [i28]Kaito Taguchi, Yujie Gu, Kouichi Sakurai:
The Impact of Prompts on Zero-Shot Detection of AI-Generated Text. CoRR abs/2403.20127 (2024) - [i27]Yuzhang Chen, Jiangnan Zhu, Yujie Gu, Minoru Kuribayashi, Kouichi Sakurai:
FreeMark: A Non-Invasive White-Box Watermarking for Deep Neural Networks. CoRR abs/2409.09996 (2024) - [i26]Yukai Xu, Yujie Gu, Kouichi Sakurai:
PAD-FT: A Lightweight Defense for Backdoor Attacks via Data Purification and Fine-Tuning. CoRR abs/2409.12072 (2024) - [i25]Anandarup Roy, Bimal Kumar Roy, Kouichi Sakurai, Suprita Talnikar:
Access Structure Hiding Verifiable Tensor Designs. IACR Cryptol. ePrint Arch. 2024: 902 (2024) - [i24]Jong-Yeon Park, Wonil Lee, Bo Gyeong Kang, Il-jong Song, Jaekeun Oh, Kouichi Sakurai:
A Compact and Parallel Swap-Based Shuffler based on butterfly Network and its complexity against Side Channel Analysis. IACR Cryptol. ePrint Arch. 2024: 1217 (2024) - 2023
- [j117]Surbhi Soni, Ayan Seal, Sraban Kumar Mohanty, Kouichi Sakurai:
Electroencephalography signals-based sparse networks integration using a fuzzy ensemble technique for depression detection. Biomed. Signal Process. Control. 85: 104873 (2023) - [j116]Ishak Meraouche, Sabyasachi Dutta, Haowen Tan, Kouichi Sakurai:
Learning asymmetric encryption using adversarial neural networks. Eng. Appl. Artif. Intell. 123(Part B): 106220 (2023) - [j115]Rodrigo Roman, Cristina Alcaraz, Javier López, Kouichi Sakurai:
Current Perspectives on Securing Critical Infrastructures' Supply Chains. IEEE Secur. Priv. 21(4): 29-38 (2023) - [j114]Yang Lyu, Yaokai Feng, Kouichi Sakurai:
A Survey on Feature Selection Techniques Based on Filtering Methods for Cyber Attack Detection. Inf. 14(3): 191 (2023) - [j113]Haibo Zhang, Toru Nakamura, Takamasa Isohara, Kouichi Sakurai:
A Review on Machine Unlearning. SN Comput. Sci. 4(4): 337 (2023) - [j112]Haowen Tan, Wenying Zheng, Pandi Vijayakumar, Kouichi Sakurai, Neeraj Kumar:
An Efficient Vehicle-Assisted Aggregate Authentication Scheme for Infrastructure-Less Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 24(12): 15590-15600 (2023) - [j111]Chenmin Wang, Peng Li, Xuepeng Fan, Zaiyang Tang, Yulong Zeng, Kouichi Sakurai:
Phoenix: A Live Upgradable Blockchain Client. IEEE Trans. Sustain. Comput. 8(4): 703-714 (2023) - [c352]Haibo Zhang, Zhihua Yao, Kouichi Sakurai:
Eliminating Adversarial Perturbations Using Image-to-Image Translation Method. ACNS Workshops 2023: 601-620 - [c351]Chunlu Chen, Kevin I-Kai Wang, Peng Li, Kouichi Sakurai:
POSTER: Advancing Federated Edge Computing with Continual Learning for Secure and Efficient Performance. ACNS Workshops 2023: 685-689 - [c350]Haibo Zhang, Zhihua Yao, Kouichi Sakurai:
POSTER: A Fine-Grained Metric for Evaluating the Performance of Adversarial Attacks and Defenses. ACNS Workshops 2023: 690-694 - [c349]Kei Ikebe, Yudai Hata, Toru Nakamura, Takamasa Isohara, Kouichi Sakurai:
Application and Limitations of Digital Signature Schemes for Implementing Non-Fungible Token (NFT). ASSE 2023: 119-125 - [c348]Chunlu Chen, Kevin I-Kai Wang, Peng Li, Kouichi Sakurai:
Flexibility and Privacy: A Multi-Head Federated Continual Learning Framework for Dynamic Edge Environments. candar 2023: 1-10 - [c347]Muyuan Niu, Yaokai Feng, Kouichi Sakurai:
A two-stage detection system of DDoS attacks in SDN using a trigger with multiple features and self-adaptive thresholds. IMCOM 2023: 1-8 - [c346]Hideki Sakurada, Kouichi Sakurai:
Research Directions in Formal Verification of Network Configurations Toward Verification of Mobile Networks. MobiSec 2023: 248-259 - [c345]Maharage Nisansala Sevwandi Perera, Toru Nakamura, Takashi Matsunaka, Hiroyuki Yokoyama, Kouichi Sakurai:
Group Oriented Attribute-Based Encryption Scheme from Lattices with the Employment of Shamir's Secret Sharing Scheme. NSS 2023: 155-176 - [c344]Pengju He, Haibo Zhang, Yaokai Feng, Kouichi Sakurai:
A Design of Network Attack Detection Using Causal and Non-causal Temporal Convolutional Network. SciSec 2023: 513-523 - [i23]Jong-Yeon Park, Jang-Won Ju, Wonil Lee, Bo-Gyeong Kang, Yasuyuki Kachi, Kouichi Sakurai:
A Statistical Verification Method of Random Permutations for Hiding Countermeasure Against Side-Channel Attacks. CoRR abs/2311.08625 (2023) - [i22]Jong-Yeon Park, Jang-Won Ju, Wonil Lee, Bo-Gyeong Kang, Yasuyuki Kachi, Kouichi Sakurai:
A Statistical Verification Method of Random Permutations for Hiding Countermeasure Against Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2023: 1750 (2023) - [i21]Jong-Yeon Park, Dongsoo Lee, Seonggyeom Kim, Wonil Lee, Bo-Gyeong Kang, Kouichi Sakurai:
Fully Parallel, One-Cycle Random Shuffling for Efficient Countermeasure in Post-Quantum Cryptography. IACR Cryptol. ePrint Arch. 2023: 1889 (2023) - 2022
- [j110]Jong-Yeon Park, Yong-Hyuk Moon, Won-Il Lee, Sung-Hyun Kim, Kouichi Sakurai:
A Survey of Polynomial Multiplication With RSA-ECC Coprocessors and Implementations of NIST PQC Round3 KEM Algorithms in Exynos2100. IEEE Access 10: 2546-2563 (2022) - [j109]Ishak Meraouche, Sabyasachi Dutta, Sraban Kumar Mohanty, Isaac Agudo, Kouichi Sakurai:
Learning Multi-Party Adversarial Encryption and Its Application to Secret Sharing. IEEE Access 10: 121329-121339 (2022) - [j108]Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai:
A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity. Cryptogr. 6(1): 3 (2022) - [j107]Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai:
Certificate Management Scheme for VANETs Using Blockchain Structure. Cryptogr. 6(2): 20 (2022) - [j106]Hao Wang, Zhe Liu, Chunpeng Ge, Kouichi Sakurai, Chunhua Su:
A Privacy-Preserving Data Feed Scheme for Smart Contracts. IEICE Trans. Inf. Syst. 105-D(2): 195-204 (2022) - [j105]Mariama Mbow, Hiroshi Koide, Kouichi Sakurai:
Handling class Imbalance problem in Intrusion Detection System based on deep learning. Int. J. Netw. Comput. 12(2): 467-492 (2022) - [j104]Sumit Kumar Debnath, Vikas Srivastava, Tapaswini Mohanty, Nibedita Kundu, Kouichi Sakurai:
Quantum secure privacy preserving technique to obtain the intersection of two datasets for contact tracing. J. Inf. Secur. Appl. 66: 103127 (2022) - [j103]Yujie Gu, Sonata Akao, Navid Nasr Esfahani, Ying Miao, Kouichi Sakurai:
On the Information-Theoretic Security of Combinatorial All-or-Nothing Transforms. IEEE Trans. Inf. Theory 68(10): 6904-6914 (2022) - [c343]Misni Harjo Suwito, Bayu Adhi Tama, Bagus Santoso, Sabyasachi Dutta, Haowen Tan, Yoshifumi Ueshige, Kouichi Sakurai:
A Systematic Study of Bulletin Board and Its Application. AsiaCCS 2022: 1213-1215 - [c342]Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai:
Decentralized and Collaborative Tracing for Group Signatures. AsiaCCS 2022: 1258-1260 - [c341]Kevin I-Kai Wang, Xiaozhou Ye, Kouichi Sakurai:
Federated Learning with Clustering-Based Participant Selection for IoT Applications. IEEE Big Data 2022: 6830-6831 - [c340]Kei Ikebe, Kouichi Sakurai:
Computational experimental evaluation of the time variance of cryptocurrency mining using cryptographic hash functions. BIOTC 2022: 54-61 - [c339]Kaito Taguchi, Kouichi Sakurai, Masahiro Iida:
Towards the Design of Locally Differential Private Hardware System for Edge Computing. CANDAR 2022: 186-191 - [c338]Kei Ikebe, Kouichi Sakurai:
Analysis of Variance of Searching Time for Serial Concatenation of Graph-Clique based Cryptocurrency Mining. CANDARW 2022: 380-383 - [c337]Yujie Gu, Sonata Akao, Navid Nasr Esfahani, Ying Miao, Kouichi Sakurai:
On the Security Properties of Combinatorial All-or-nothing Transforms. ISIT 2022: 1447-1452 - [c336]Maharage Nisansala Sevwandi Perera, Toru Nakamura, Takashi Matsunaka, Hiroyuki Yokoyama, Kouichi Sakurai:
Attribute Based Tracing for Securing Group Signatures Against Centralized Authorities. ISPEC 2022: 554-572 - [c335]Shohei Satake, Yujie Gu, Kouichi Sakurai:
Explicit Non-malleable Codes from Bipartite Graphs. WAIFI 2022: 221-236 - [c334]Issei Murata, Pengju He, Yujie Gu, Kouichi Sakurai:
Towards Evaluating the Security of Human Computable Passwords Using Neural Networks. WISA 2022: 303-312 - [e9]Yuji Suga, Kouichi Sakurai, Xuhua Ding, Kazue Sako:
ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022. ACM 2022, ISBN 978-1-4503-9140-5 [contents] - [e8]Chunhua Su, Kouichi Sakurai, Feng Liu:
Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13580, Springer 2022, ISBN 978-3-031-17550-3 [contents] - [i20]Yujie Gu, Sonata Akao, Navid Nasr Esfahani, Ying Miao, Kouichi Sakurai:
On the Information-theoretic Security of Combinatorial All-or-nothing Transforms. CoRR abs/2202.10280 (2022) - 2021
- [j102]Haibo Zhang, Kouichi Sakurai:
A Survey of Software Clone Detection From Security Perspective. IEEE Access 9: 48157-48173 (2021) - [j101]Ishak Meraouche, Sabyasachi Dutta, Haowen Tan, Kouichi Sakurai:
Neural Networks-Based Cryptography: A Survey. IEEE Access 9: 124727-124740 (2021) - [j100]Haibo Zhang, Kouichi Sakurai:
Conditional Generative Adversarial Network-Based Image Denoising for Defending Against Adversarial Attack. IEEE Access 9: 169031-169043 (2021) - [j99]Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Kouichi Sakurai:
Almost fully anonymous attribute-based group signatures with verifier-local revocation and member registration from lattice assumptions. Theor. Comput. Sci. 891: 131-148 (2021) - [j98]Mojtaba Alizadeh, Mohammad Hesam Tadayon, Kouichi Sakurai, Hiroaki Anada, Alireza Jolfaei:
A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing. ACM Trans. Internet Techn. 21(4): 82:1-82:16 (2021) - [c333]Laltu Sardar, Gaurav Bansal, Sushmita Ruj, Kouichi Sakurai:
Securely Computing Clustering Coefficient for Outsourced Dynamic Encrypted Graph Data. COMSNETS 2021: 465-473 - [c332]Xiaojuan Cai, Yaokai Feng, Kouichi Sakurai:
Sequential Detection of Cyber-attacks Using a Classification Filter. DASC/PiCom/CBDCom/CyberSciTech 2021: 659-666 - [c331]Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai:
Perpetual Secret Sharing from Dynamic Data Structures. DSC 2021: 1-8 - [c330]Sumit Kumar Debnath, Kouichi Sakurai, Kunal Dey, Nibedita Kundu:
Secure Outsourced Private Set Intersection with Linear Complexity. DSC 2021: 1-8 - [c329]Sabyasachi Dutta, Arinjita Paul, Rocki H. Ozaki, C. Pandu Rangan, Kouichi Sakurai:
A Distributed Ledger Management Mechanism for Storing and Selling Private Data. DSC 2021: 1-8 - [c328]Mariama Mbow, Hiroshi Koide, Kouichi Sakurai:
An Intrusion Detection System for Imbalanced Dataset Based on Deep Learning. CANDAR 2021: 38-47 - [c327]Siqi Zeng, Kosuke Kaneko, Ke Yan, Haowen Tan, Kouichi Sakurai:
Design and Evaluation of Escrow Scheme on Autonomous Vehicles for Overtaking Service with Ethereum. CANDAR (Workshops) 2021: 473-477 - [c326]Tao Wang, Yaokai Feng, Kouichi Sakurai:
Improving the Two-stage Detection of Cyberattacks in SDN Environment Using Dynamic Thresholding. IMCOM 2021: 1-7 - [i19]Misni Harjo Suwito, Yoshifumi Ueshige, Kouichi Sakurai:
Evolution of Bulletin Board & its application to E-Voting - A Survey. IACR Cryptol. ePrint Arch. 2021: 47 (2021) - [i18]Shohei Satake, Yujie Gu, Kouichi Sakurai:
Graph-Based Construction for Non-Malleable Codes. IACR Cryptol. ePrint Arch. 2021: 164 (2021) - [i17]Amril Syalim, Takashi Nishide, Kouichi Sakurai:
Improved Proxy Re-encryption Scheme for Symmetric Key Cryptography. IACR Cryptol. ePrint Arch. 2021: 276 (2021) - [i16]Sumit Kumar Debnath, Vikas Srivastava, Tapaswini Mohanty, Nibedita Kundu, Kouichi Sakurai:
Quantum Secure Privacy Preserving Technique to Obtain the Intersection of Two Datasets for Contact Tracing. IACR Cryptol. ePrint Arch. 2021: 618 (2021) - 2020
- [j97]Zhao Hao, Yaokai Feng, Hiroshi Koide, Kouichi Sakurai:
A Sequential Detection Method for Intrusion Detection System Based on Artificial Neural Networks. Int. J. Netw. Comput. 10(2): 213-226 (2020) - [j96]Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai:
Machine Learning-Based IoT-Botnet Attack Detection with Sequential Architecture. Sensors 20(16): 4372 (2020) - [c325]Kosuke Kaneko, Ke Yan, Kouichi Sakurai:
Simulation System of Autonomous Vehicles for Overtaking Service Using Smart Contract. CISIS 2020: 199-209 - [c324]Ishak Meraouche, Sabyasachi Dutta, Kouichi Sakurai:
3-Party Adversarial Cryptography. EIDWT 2020: 247-258 - [c323]Daiji Hara, Kouichi Sakurai, Yasuo Musashi:
Classification of Malicious Domains by Their LIFETIME. EIDWT 2020: 334-341 - [c322]Haibo Zhang, Kouichi Sakurai:
Blockchain for IoT-Based Digital Supply Chain: A Survey. EIDWT 2020: 564-573 - [c321]Shilei Cao, Kouichi Sakurai:
Face completion with pyramid semantic attention and latent codes. CANDAR 2020: 1-8 - [c320]Sabyasachi Dutta, Md Kutubuddin Sardar, Avishek Adhikari, Sushmita Ruj, Kouichi Sakurai:
Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings. ICISS 2020: 198-217 - [c319]Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai:
AC0 Constructions of Secret Sharing Schemes - Accommodating New Parties. NSS 2020: 292-308 - [c318]Ishak Meraouche, Sabyasachi Dutta, Kouichi Sakurai:
3-Party Adversarial Steganography. WISA 2020: 89-100 - [e7]Guojun Wang, Zhong Fan, Md. Zakirul Alam Bhuiyan, Kouichi Sakurai:
8th IEEE International Conference on Smart City and Informatization, iSCI 2020, Guangzhou, China, December 31, 2020 - January 1, 2021. IEEE 2020, ISBN 978-1-6654-0394-8 [contents] - [i15]Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai:
Hypercube and Cascading-based Algorithms for Secret Sharing Schemes. IACR Cryptol. ePrint Arch. 2020: 719 (2020)
2010 – 2019
- 2019
- [j95]Mosarrat Jahan, Suranga Seneviratne, Partha Sarathi Roy, Kouichi Sakurai, Aruna Seneviratne, Sanjay K. Jha:
Light weight and fine-grained access mechanism for secure access to outsourced data. Concurr. Comput. Pract. Exp. 31(23) (2019) - [j94]Wai Kyi Kyi Oo, Hiroshi Koide, Kouichi Sakurai:
Analyzing the Effect of Moving Target Defense for a Web System. Int. J. Netw. Comput. 9(2): 188-200 (2019) - [j93]Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Attacking convolutional neural network using differential evolution. IPSJ Trans. Comput. Vis. Appl. 11: 1 (2019) - [j92]Hiroaki Anada, Takanori Yasuda, Junpei Kawamoto, Jian Weng, Kouichi Sakurai:
RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust. J. Inf. Secur. Appl. 45: 10-19 (2019) - [j91]Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai:
One Pixel Attack for Fooling Deep Neural Networks. IEEE Trans. Evol. Comput. 23(5): 828-841 (2019) - [c317]Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai:
Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation. AINA 2019: 458-469 - [c316]Johjima Shota, Kosuke Kaneko, Subodh Sharma, Kouichi Sakurai:
Simulation of Secure Volunteer Computing by Using Blockchain. AINA 2019: 883-894 - [c315]Somnath Panja, Sabyasachi Dutta, Kouichi Sakurai:
Deniable Secret Handshake Protocol - Revisited. AINA 2019: 1266-1278 - [c314]Di Li, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Universal Rules for Fooling Deep Neural Networks based Text Classification. CEC 2019: 2221-2228 - [c313]Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai:
A Sequential Scheme for Detecting Cyber Attacks in IoT Environment. DASC/PiCom/DataCom/CyberSciTech 2019: 238-244 - [c312]Haibo Zhang, Toru Nakamura, Kouichi Sakurai:
Security and Trust Issues on Digital Supply Chain. DASC/PiCom/DataCom/CyberSciTech 2019: 338-343 - [c311]Rui Qiu, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Frame Difference Generative Adversarial Networks: Clearer Contour Video Generating. CANDAR Workshops 2019: 169-175 - [c310]Hao Zhao, Yaokai Feng, Hiroshi Koide, Kouichi Sakurai:
An ANN Based Sequential Detection Method for Balancing Performance Indicators of IDS. CANDAR 2019: 239-244 - [c309]Limao Ma, Kosuke Kaneko, Subodh Sharma, Kouichi Sakurai:
Reliable Decentralized Oracle with Mechanisms for Verification and Disputation. CANDAR Workshops 2019: 346-352 - [c308]Sabyasachi Dutta, Tamal Bhore, Md Kutubuddin Sardar, Avishek Adhikari, Kouichi Sakurai:
Visual Secret Sharing Scheme with Distributed Levels of Importance of Shadows. ICMC 2019: 19-32 - [c307]Sabyasachi Dutta, Kouichi Sakurai:
Theory and Application of Computationally-Independent One-Way Functions: Interactive Proof of Ability - Revisited. ICMC 2019: 97-109 - [c306]Katsumi Nagai, Hiroshi Koide, Kouichi Sakurai:
Proposal and Evaluation of a Security Incident Response Training Method using Programming. SIGITE 2019: 165 - [c305]Longjian Ye, Hiroshi Koide, Dirceu Cavendish, Kouichi Sakurai:
Efficient Shortest Path Routing Algorithms for Distributed XML Processing. WEBIST 2019: 265-272 - [c304]Sabyasachi Dutta, Partha Sarathi Roy, Kazuhide Fukushima, Shinsaku Kiyomoto, Kouichi Sakurai:
Secret Sharing on Evolving Multi-level Access Structure. WISA 2019: 180-191 - [i14]Di Li, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Universal Rules for Fooling Deep Neural Networks based Text Classification. CoRR abs/1901.07132 (2019) - [i13]