Zobrazeno 1 - 10
of 484
pro vyhledávání: '"Sakurai, Kouichi"'
Backdoor attacks pose a significant threat to deep neural networks, particularly as recent advancements have led to increasingly subtle implantation, making the defense more challenging. Existing defense mechanisms typically rely on an additional cle
Externí odkaz:
http://arxiv.org/abs/2409.12072
Deep neural networks (DNNs) have achieved significant success in real-world applications. However, safeguarding their intellectual property (IP) remains extremely challenging. Existing DNN watermarking for IP protection often require modifying DNN mo
Externí odkaz:
http://arxiv.org/abs/2409.09996
In recent years, there have been significant advancements in the development of Large Language Models (LLMs). While their practical applications are now widespread, their potential for misuse, such as generating fake news and committing plagiarism, h
Externí odkaz:
http://arxiv.org/abs/2403.20127
Autor:
Mohanty, Tapaswini, Srivastava, Vikas, Debnath, Sumit Kumar, Roy, Debasish, Sakurai, Kouichi, Mukhopadhyay, Sourav
Digital signatures are one of the simplest cryptographic building blocks that provide appealing security characteristics such as authenticity, unforgeability, and undeniability. In 1984, Shamir developed the first Identity-based signature (IBS) to si
Externí odkaz:
http://arxiv.org/abs/2403.18247
Sensor-based Human Activity Recognition (HAR) is crucial in ubiquitous computing, analysing behaviours through multi-dimensional observations. Despite research progress, HAR confronts challenges, particularly in data distribution assumptions. Most st
Externí odkaz:
http://arxiv.org/abs/2403.15422
Adversarial attacks present a significant security risk to image recognition tasks. Defending against these attacks in a real-life setting can be compared to the way antivirus software works, with a key consideration being how well the defense can ad
Externí odkaz:
http://arxiv.org/abs/2403.08170
Autor:
Park, Jong-Yeon, Ju, Jang-Won, Lee, Wonil, Kang, Bo-Gyeong, Kachi, Yasuyuki, Sakurai, Kouichi
As NIST is putting the final touches on the standardization of PQC (Post Quantum Cryptography) public key algorithms, it is a racing certainty that peskier cryptographic attacks undeterred by those new PQC algorithms will surface. Such a trend in tur
Externí odkaz:
http://arxiv.org/abs/2311.08625
All-or-nothing transforms (AONT) were proposed by Rivest as a message preprocessing technique for encrypting data to protect against brute-force attacks, and have numerous applications in cryptography and information security. Later the unconditional
Externí odkaz:
http://arxiv.org/abs/2202.10280
Autor:
Park, Jong-Yeon, Ju, Jang-Won, Lee, Wonil, Kang, Bo Gyeong, Kachi, Yasuyuki, Sakurai, Kouichi
Publikováno v:
In Journal of Information Security and Applications August 2024 84
Publikováno v:
In Engineering Applications of Artificial Intelligence August 2023 123 Part B