One pixel attack for fooling deep neural networks J Su, DV Vargas, K Sakurai IEEE Transactions on Evolutionary Computation 23 (5), 828-841, 2019 | 3073 | 2019 |
Two-servers PIR based DNS query scheme with privacy-preserving F Zhao, Y Hori, K Sakurai The 2007 International Conference on Intelligent Pervasive Computing (IPC …, 2007 | 42 | 2007 |
Universal rules for fooling deep neural networks based text classification D Li, DV Vargas, S Kouichi 2019 IEEE Congress on Evolutionary Computation (CEC), 2221-2228, 2019 | 13 | 2019 |
One Pixel Attack for Fooling Deep Neural Networks. 2017 J Su, DV Vargas, K Sakurai Режим доступа: https://arxiv. org/pdf/1710.08864. pdf, 2017 | 13 | 2017 |
Usage control model and architecture for data confidentiality in a database service provider A Syalim, T Tabata, K Sakurai Information and Media Technologies 1 (2), 762-767, 2006 | 10 | 2006 |
K2 stream cipher S Kiyomoto, T Tanaka, K Sakurai E-business and Telecommunications: 4th International Conference, ICETE 2007 …, 2009 | 9 | 2009 |
One pixel attack for fooling deep neural networks. arXiv 2017 J Su, DV Vargas, S Kouichi arXiv preprint arXiv:1710.08864, 2017 | 7 | 2017 |
A behavior-based detection method for outbreaks of low-rate attacks Y Feng, Y Hori, K Sakurai, J Takeuchi 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet …, 2012 | 7 | 2012 |
Malware Detection Focusing on Behaviors of Process and its Implementation Y Fukushima, A Sakai, Y Hori, K Sakurai Joint Workshop on Information Security (JWIS2009), 2009 | 7 | 2009 |
A design of image-based spam filtering based on textual and visual information 王戦, 堀良彰, 櫻井幸一 情報処理学会研究報告= IPSJ SIG technical reports 2008 (21), 279-284, 2008 | 6 | 2008 |
EQUIVAIENCE PROBLEM AND AUTOMORPHISMS OF SOME ABELIAN BRANCHED COVERINGS OF THE RIEMANN SPHERE K Sakurai, M Suzuki Memoirs of the Faculty of Science, Kyushu University. Series A, Mathematics …, 1988 | 5 | 1988 |
One pixel attack for fooling deep neural networks. arXiv e-prints J Su, D Vasconcellos Vargas, S Kouichi arXiv preprint arXiv:1710.08864, 2017 | 4 | 2017 |
Simulation of secure volunteer computing by using blockchain J Shota, K Kosuke, S Sharma, S Kouichi Advanced Information Networking and Applications: Proceedings of the 33rd …, 2020 | 3 | 2020 |
Some remarks on security of receipt-free e-auction YS Her, K Imamoto, K Sakurai Third International Conference on Information Technology and Applications …, 2005 | 3 | 2005 |
Ballot-cancellation Scheme in E-voting System YS Her, K Imamoto, K Sakurai | 2 | 2005 |
Mathematics and Computing D Ghosh, D Giri, RN Mohapatra, E Savas, K Sakurai, LP Singh Springer Singapore, 2018 | 1 | 2018 |
Cross-group secret sharing for secure cloud storage service K Chenyutao, A Hiroaki, K Junpei, M Kirill, S Kouichi Proceedings of the 10th International Conference on Ubiquitous Information …, 2016 | 1 | 2016 |
Grouping Proof for RFID tags S Junichiro, S Kouichi SLRC 論文データベース, 2005 | 1 | 2005 |
Group Oriented Attribute-based Encryption Scheme from Lattices with Shamir’s Secret Sharing scheme MNS Perera, T Nakamura, T Matsunaka, H Yokoyama, K Sakurai | | 2022 |
Efficient Revocation and Anonymous Revocation in VANETs Using Ring Signatures MNS Perera, T Nakamura, M Hashimoto, H Yokoyama, CM Cheng, ... コンピュータセキュリティシンポジウム 2021 論文集, 239-244, 2021 | | 2021 |