Follow
Naoto Yanai
Naoto Yanai
Panasonic Holding Corporatoin
No verified email
Title
Cited by
Cited by
Year
RBAC-SC: Role-based access control using smart contract
JP Cruz, Y Kaji, N Yanai
Ieee Access 6, 12240-12251, 2018
3942018
Eth2vec: learning contract-wide code representations for vulnerability detection on ethereum smart contracts
N Ashizawa, N Yanai, JP Cruz, S Okamura
Proceedings of the 3rd ACM international symposium on blockchain and secure …, 2021
1392021
RA: Hunting for re-entrancy attacks in ethereum smart contracts via static analysis
Y Chinen, N Yanai, JP Cruz, S Okamura
2020 IEEE International Conference on blockchain (blockchain), 327-336, 2020
552020
Multi-scale self-organizing map assisted deep autoencoding Gaussian mixture model for unsupervised intrusion detection
Y Chen, N Ashizawa, CK Yeo, N Yanai, S Yean
Knowledge-Based Systems 224, 107086, 2021
512021
Membership inference attacks against diffusion models
T Matsumoto, T Miura, N Yanai
2023 IEEE Security and Privacy Workshops (SPW), 77-83, 2023
472023
Megex: Data-free model extraction attack against gradient-based explainable ai
T Miura, T Shibahara, N Yanai
Proceedings of the 2nd ACM Workshop on Secure and Trustworthy Deep Learning …, 2024
422024
Model extraction attacks on recurrent neural networks
T Takemura, N Yanai, T Fujiwara
Journal of Information Processing 28, 1010-1024, 2020
392020
Detecting flooding attack and accommodating burst traffic in delay-tolerant networks
TND Pham, CK Yeo, N Yanai, T Fujiwara
IEEE Transactions on Vehicular Technology 67 (1), 795-808, 2017
352017
ISDSR+: improving the security and availability of secure routing protocol
H Kojima, N Yanai, JP Cruz
IEEE Access 7, 74849-74868, 2019
222019
Self-organizing map assisted deep autoencoding gaussian mixture model for intrusion detection
Y Chen, N Ashizawa, S Yean, CK Yeo, N Yanai
2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC …, 2021
182021
Tightly-secure identity-based structured aggregate signature scheme under the computational Diffie-Hellman assumption
T Iwasaki, N Yanai, M Inamura, K Iwamura
2016 IEEE 30th International Conference on Advanced Information Networking …, 2016
162016
MOBIUS: model-oblivious binarized neural networks
H Kitai, JP Cruz, N Yanai, N Nishida, T Oba, Y Unagami, T Teruya, ...
IEEE Access 7, 139021-139034, 2019
152019
Anonymous broadcast authentication for securely remote-controlling IoT devices
Y Watanabe, N Yanai, J Shikata
International Conference on Advanced Information Networking and Applications …, 2021
132021
Key-aggregate searchable encryption, revisited: formal foundations for cloud applications, and their implementation
M Kamimura, N Yanai, S Okamura, JP Cruz
IEEE Access 8, 24153-24169, 2020
132020
A secure structured multisignature scheme based on a non-commutative ring homomorphism
N Yanai, E Chida, M Mambo
IEICE transactions on fundamentals of electronics, communications and …, 2011
132011
Privacy-preserving taxi-demand prediction using federated learning
Y Goto, T Matsumoto, H Rizk, N Yanai, H Yamaguchi
2023 IEEE International Conference on Smart Computing (SMARTCOMP), 297-302, 2023
122023
ISDSR: Secure DSR with ID-based sequential aggregate signature
K Muranaka, N Yanai, S Okamura, T Fujiwara
International Conference on Security and Cryptography 2, 376-387, 2016
122016
Crypto makes AI evolve
B Zolfaghari, H Nemati, N Yanai, K Bibak
Crypto and AI: From Coevolution to Quantum Revolution, 73-92, 2023
102023
A Certificateless Ordered Sequential Aggregate Signature Scheme Secure against Super Adverssaries.
N Yanai, R Tso, M Mambo, E Okamoto
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3 (1/2), 30-54, 2012
102012
Meeting tight security for multisignatures in the plain public key model
N Yanai
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2018
92018
The system can't perform the operation now. Try again later.
Articles 1–20