Zobrazeno 1 - 10
of 68
pro vyhledávání: '"Yanai, Naoto"'
Autor:
Sharma, Rashi, Okada, Hiroyuki, Oba, Tatsumi, Subramanian, Karthikk, Yanai, Naoto, Pranata, Sugiri
The Industrial Control System (ICS) environment encompasses a wide range of intricate communication protocols, posing substantial challenges for Security Operations Center (SOC) analysts tasked with monitoring, interpreting, and addressing network ac
Externí odkaz:
http://arxiv.org/abs/2407.15428
Machine learning is often used for malicious website detection, but an approach incorporating WebAssembly as a feature has not been explored due to a limited number of samples, to the best of our knowledge. In this paper, we propose JABBERWOCK (JAvas
Externí odkaz:
http://arxiv.org/abs/2306.05698
Vulnerabilities of Ethereum smart contracts often cause serious financial damage. Whereas the Solidity compiler has been updated to prevent vulnerabilities, its effectiveness has not been revealed so far, to the best of our knowledge. In this paper,
Externí odkaz:
http://arxiv.org/abs/2306.04250
Taxi-demand prediction is an important application of machine learning that enables taxi-providing facilities to optimize their operations and city planners to improve transportation infrastructure and services. However, the use of sensitive data in
Externí odkaz:
http://arxiv.org/abs/2305.08107
When an adversary provides poison samples to a machine learning model, privacy leakage, such as membership inference attacks that infer whether a sample was included in the training of the model, becomes effective by moving the sample to an outlier.
Externí odkaz:
http://arxiv.org/abs/2303.12589
Publikováno v:
DLSP 2023 (co-located in IEEE S&P 2023)
Diffusion models have attracted attention in recent years as innovative generative models. In this paper, we investigate whether a diffusion model is resistant to a membership inference attack, which evaluates the privacy leakage of a machine learnin
Externí odkaz:
http://arxiv.org/abs/2302.03262
IoT technology has been developing rapidly, while at the same time, notorious IoT malware such as Mirai is a severe and inherent threat. We believe it is essential to consider systems that enable us to remotely control infected devices in order to pr
Externí odkaz:
http://arxiv.org/abs/2208.03781
Autor:
Tasumi, Masataka, Iwahana, Kazuki, Yanai, Naoto, Shishido, Katsunari, Shimizu, Toshiya, Higuchi, Yuji, Morikawa, Ikuya, Yajima, Jun
Model extraction attacks are a kind of attacks where an adversary obtains a machine learning model whose performance is comparable with one of the victim model through queries and their results. This paper presents a novel model extraction attack, na
Externí odkaz:
http://arxiv.org/abs/2109.14857
Ethereum smart contracts are programs that run on the Ethereum blockchain, and many smart contract vulnerabilities have been discovered in the past decade. Many security analysis tools have been created to detect such vulnerabilities, but their perfo
Externí odkaz:
http://arxiv.org/abs/2101.02377
Autor:
Junjie, Ouyang, Yanai, Naoto, Takemura, Tatsuya, Okada, Masayuki, Okamura, Shingo, Cruz, Jason Paul
The \textit{BGPsec} protocol, which is an extension of the border gateway protocol (BGP), uses digital signatures to guarantee the validity of routing information. However, BGPsec's use of digital signatures in routing information causes a lack of me
Externí odkaz:
http://arxiv.org/abs/2008.13346