Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 53
1.
  • Anonymization Technique Bas... Anonymization Technique Based on SGD Matrix Factorization
    MIMOTO, Tomoaki; HIDANO, Seira; KIYOMOTO, Shinsaku ... IEICE Transactions on Information and Systems, 02/2020, Letnik: E103.D, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Time-sequence data is high dimensional and contains a lot of information, which can be utilized in various fields, such as insurance, finance, and advertising. Personal data including time-sequence ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
2.
Celotno besedilo
3.
  • Model Inversion Attacks for... Model Inversion Attacks for Online Prediction Systems: Without Knowledge of Non-Sensitive Attributes
    HIDANO, Seira; MURAKAMI, Takao; KATSUMATA, Shuichi ... IEICE Transactions on Information and Systems, 11/2018, Letnik: E101.D, Številka: 11
    Journal Article
    Recenzirano
    Odprti dostop

    The number of IT services that use machine learning (ML) algorithms are continuously and rapidly growing, while many of them are used in practice to make some type of predictions from personal data. ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
4.
  • R-HTDetector: Robust Hardwa... R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training
    Hasegawa, Kento; Hidano, Seira; Nozawa, Kohei ... IEEE transactions on computers, 2023-Feb.-1, 2023-2-1, Letnik: 72, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Hardware Trojans (HTs) have become a serious problem, and extermination of them is strongly required for enhancing the security and safety of integrated circuits. An effective solution is to identify ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
5.
  • Node-wise Hardware Trojan D... Node-wise Hardware Trojan Detection Based on Graph Learning
    Hasegawa, Kento; Yamashita, Kazuki; Hidano, Seira ... IEEE transactions on computers, 2024
    Journal Article
    Recenzirano
    Odprti dostop

    In the fourth industrial revolution, securing the protection of supply chains has become an ever-growing concern. One such cyber threat is a hardware Trojan (HT), a malicious modification to an IC. ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
6.
  • Exposing Private User Behav... Exposing Private User Behaviors of Collaborative Filtering via Model Inversion Techniques
    Hidano, Seira; Murakami, Takao; Katsumata, Shuichi ... Proceedings on Privacy Enhancing Technologies, 07/2020, Letnik: 2020, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    Privacy risks of collaborative filtering (CF) have been widely studied. The current state-of-theart inference attack on user behaviors (e.g., ratings/purchases on sensitive items) for CF is by ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
7.
  • Generating Adversarial Exam... Generating Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists
    Nozawa, Kohei; Hasegawa, Kento; Hidano, Seira ... Journal of Information Processing, 2021, 2021-00-00, Letnik: 29
    Journal Article
    Odprti dostop

    Recently, the great demand for integrated circuits (ICs) drives third parties to be involved in IC design and manufacturing steps. At the same time, the threat of injecting a malicious circuit, ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
8.
  • Degree-Preserving Randomized Response for Graph Neural Networks under Local Differential Privacy
    Hidano, Seira; Murakami, Takao arXiv (Cornell University), 06/2024
    Paper, Journal Article
    Odprti dostop

    Differentially private GNNs (Graph Neural Networks) have been recently studied to provide high accuracy in various tasks on graph data while strongly protecting user privacy. In particular, a recent ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
9.
  • The Possibility of Matrix Decomposition as Anonymization and Evaluation for Time-sequence Data
    Mimoto, Tomoaki; Kiyomoto, Shinsaku; Hidano, Seira ... 2018 16th Annual Conference on Privacy, Security and Trust (PST), 08/2018
    Conference Proceeding

    Time-sequence data is high dimensional and con- tains a lot of information, which can be utilized in various fields, such as insurance, finance, and advertising. Personal data including time-sequence ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
10.
  • Active Attack Against Oblivious RAM
    Nakano, Yuto; Hidano, Seira; Kiyomoto, Shinsaku ... 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)
    Conference Proceeding

    When a user consumes an encrypted digital content (for example video and music files), the player application accesses the secret key to decrypt the content. If the user is malicious, he can analyse ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
1 2 3 4 5
zadetkov: 53

Nalaganje filtrov