Zobrazeno 1 - 10
of 73
pro vyhledávání: '"Fukushima, Kazuhide"'
Graph Contrastive Learning (GCL) is unsupervised graph representation learning that can obtain useful representation of unknown nodes. The node representation can be utilized as features of downstream tasks. However, GCL is vulnerable to poisoning at
Externí odkaz:
http://arxiv.org/abs/2312.07022
Autor:
Nguyen-Son, Hoang-Quoc, Hidano, Seira, Fukushima, Kazuhide, Kiyomoto, Shinsaku, Echizen, Isao
Adversarial attacks reveal serious flaws in deep learning models. More dangerously, these attacks preserve the original meaning and escape human recognition. Existing methods for detecting these attacks need to be trained using original/adversarial d
Externí odkaz:
http://arxiv.org/abs/2306.01273
Publikováno v:
In Computers & Security January 2025 148
Autor:
Hasegawa, Kento, Yamashita, Kazuki, Hidano, Seira, Fukushima, Kazuhide, Hashimoto, Kazuo, Togawa, Nozomu
In the fourth industrial revolution, securing the protection of the supply chain has become an ever-growing concern. One such cyber threat is a hardware Trojan (HT), a malicious modification to an IC. HTs are often identified in the hardware manufact
Externí odkaz:
http://arxiv.org/abs/2112.02213
There are two cases describing how a classifier processes input text, namely, misclassification and correct classification. In terms of misclassified texts, a classifier handles the texts with both incorrect predictions and adversarial texts, which a
Externí odkaz:
http://arxiv.org/abs/2110.05748
Autor:
Le, Huy Quoc, Duong, Dung Hoang, Roy, Partha Sarathi, Susilo, Willy, Fukushima, Kazuhide, Kiyomoto, Shinsaku
A signcryption, which is an integration of a public key encryption and a digital signature, can provide confidentiality and authenticity simultaneously. Additionally, a signcryption associated with equality test allows a third party (e.g., a cloud se
Externí odkaz:
http://arxiv.org/abs/2012.15423
Autor:
Duong, Dung Hoang, Fukushima, Kazuhide, Kiyomoto, Shinsaku, Roy, Partha Sarathi, Sipasseuth, Arnaud, Susilo, Willy
Public key encryption with equality test (PKEET) supports to check whether two ciphertexts encrypted under different public keys contain the same message or not. PKEET has many interesting applications such as keyword search on encrypted data, encryp
Externí odkaz:
http://arxiv.org/abs/2005.05308
Autor:
Duong, Dung Hoang, Roy, Partha Sarathi, Susilo, Willy, Fukushima, Kazuhide, Kiyomoto, Shinsaku, Sipasseuth, Arnaud
With the rapid growth of cloud storage and cloud computing services, many organisations and users choose to store the data on a cloud server for saving costs. However, due to security concerns, data of users would be encrypted before sending to the c
Externí odkaz:
http://arxiv.org/abs/2005.03178
Publikováno v:
In Journal of Information Security and Applications June 2023 75
Autor:
Roy, Partha Sarathi, Duong, Dung Hoang, Susilo, Willy, Sipasseuth, Arnaud, Fukushima, Kazuhide, Kiyomoto, Shinsaku
Publikováno v:
In Theoretical Computer Science 11 September 2022 929:124-139