Search

Your search keyword '"Sakurai, Kouichi"' showing total 1,412 results

Search Constraints

Start Over You searched for: Author "Sakurai, Kouichi" Remove constraint Author: "Sakurai, Kouichi"
1,412 results on '"Sakurai, Kouichi"'

Search Results

1. A Review on Machine Unlearning

2. Trustworthy Federated Learning: Privacy, Security, and Beyond

3. PAD-FT: A Lightweight Defense for Backdoor Attacks via Data Purification and Fine-Tuning

4. FreeMark: A Non-Invasive White-Box Watermarking for Deep Neural Networks

5. The Framework of General Channel Key Generation Based on Physical Layer

6. The Impact of Prompts on Zero-Shot Detection of AI-Generated Text

7. An Experimentally Validated Feasible Quantum Protocol for Identity-Based Signature with Application to Secure Email Communication

8. Machine Learning Techniques for Sensor-based Human Activity Recognition with Data Heterogeneity -- A Review

9. Versatile Defense Against Adversarial Attacks on Image Recognition

10. A Statistical Verification Method of Random Permutations for Hiding Countermeasure Against Side-Channel Attacks

17. On the Information-theoretic Security of Combinatorial All-or-nothing Transforms

22. Eliminating Adversarial Perturbations Using Image-to-Image Translation Method

23. POSTER: A Fine-Grained Metric for Evaluating the Performance of Adversarial Attacks and Defenses

24. POSTER: Advancing Federated Edge Computing with Continual Learning for Secure and Efficient Performance

25. Group Oriented Attribute-Based Encryption Scheme from Lattices with the Employment of Shamir’s Secret Sharing Scheme

27. Explicit Non-malleable Codes from Bipartite Graphs

33. Attribute Based Tracing for Securing Group Signatures Against Centralized Authorities

34. Key Exchange Using Tree Parity Machines: A Survey

35. Attacking Convolutional Neural Network using Differential Evolution

36. Lightweight Classification of IoT Malware based on Image Recognition

41. Theory and Application of Computationally-Independent One-Way Functions: Interactive Proof of Ability—Revisited

42. Visual Secret Sharing Scheme with Distributed Levels of Importance of Shadows

43. Simulation System of Autonomous Vehicles for Overtaking Service Using Smart Contract

48. 3-Party Adversarial Cryptography

49. Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation

50. Deniable Secret Handshake Protocol - Revisited

Catalog

Books, media, physical & digital resources