Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Ikuya Morikawa"'
Autor:
Ikuya Morikawa
Publikováno v:
IEICE ESS Fundamentals Review. 15:37-46
Publikováno v:
2022 4th International Conference on Data Intelligence and Security (ICDIS).
Autor:
Edita Grolman, Hodaya Binyamini, Asaf Shabtai, Yuval Elovici, Ikuya Morikawa, Toshiya Shimizu
Publikováno v:
Proceedings of the 30th ACM Conference on User Modeling, Adaptation and Personalization.
Autor:
Jun Yajima, Maki Inui, Takanori Oikawa, Fumiyoshi Kasahara, Ikuya Morikawa, Nobukazu Yoshioka
Publikováno v:
Proceedings of the 1st International Conference on AI Engineering: Software Engineering for AI.
Publikováno v:
CANDAR (Workshops)
With the widespread use of machine learning, we are seeing many use cases where personal data are used for training. There are two privacy threats in such use cases: leakage of training data to a model constructor and inference of personal informatio
Publikováno v:
Advances in Network-Based Information Systems ISBN: 9783319985299
NBiS
NBiS
Intel Software Guard Extensions (SGX) protects user software from malware by maintaining the confidentiality and integrity of the software executed in secure enclaves on random access memory. However, the confidentiality of its stored executable is n
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a1906d2bf42a823cc2c95741bf710ca3
https://doi.org/10.1007/978-3-319-98530-5_63
https://doi.org/10.1007/978-3-319-98530-5_63
Autor:
Ikuya Morikawa, Yuji Yamaoka
Publikováno v:
NBiS
Threat trees are notable tools in the security analysis process called "threat modeling"'. The trees are used to identify how and under what condition threats can be realized, which will help proper estimation of risks and planning of countermeasures