Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 1.767
1.
  • Defect analysis and fatigue... Defect analysis and fatigue design basis for Ni-based superalloy 718 manufactured by selective laser melting
    Yamashita, Yoichi; Murakami, Takao; Mihara, Rei ... International journal of fatigue, December 2018, 2018-12-00, 20181201, Letnik: 117
    Journal Article
    Recenzirano

    •The fatigue properties of a Ni-based alloy 718 manufactured by AM were studied.•A defect in contact with specimen surface has higher influence in terms of areaeff.•The successful application of the ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP
2.
Celotno besedilo

PDF
3.
  • Effect of overload on fatig... Effect of overload on fatigue crack growth behavior of thin copper foil
    Shiraiwa, Takayuki; Murakami, Takao; Enoki, Manabu International journal of fatigue, September 2019, 2019-09-00, 20190901, Letnik: 126
    Journal Article
    Recenzirano

    •Fatigue crack growth behavior was studied for application to a fatigue sensor.•The effect of single overload and variable loading was investigated.•The delayed retardation was observed in thin ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
4.
  • Localization Attacks Using ... Localization Attacks Using Matrix and Tensor Factorization
    Murakami, Takao; Watanabe, Hajime IEEE transactions on information forensics and security, 08/2016, Letnik: 11, Številka: 8
    Journal Article
    Recenzirano

    It is known that various types of location privacy attacks can be carried out using a personalized transition matrix that is learned for each target user, or a population transition matrix that is ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
5.
  • Group Sparsity Tensor Facto... Group Sparsity Tensor Factorization for Re-Identification of Open Mobility Traces
    Murakami, Takao; Kanemura, Atsunori; Hino, Hideitsu IEEE transactions on information forensics and security, 2017-March, 2017-3-00, Letnik: 12, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    Re-identification attacks based on a Markov chain model have been widely studied to understand how anonymized traces are linked to users. This approach is known to enable users to be re-identified ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
6.
  • Differentially Private Tria... Differentially Private Triangle and 4-Cycle Counting in the Shuffle Model
    Imola, Jacob; Murakami, Takao; Chaudhuri, Kamalika Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 11/2022
    Conference Proceeding
    Odprti dostop

    Subgraph counting is fundamental for analyzing connection patterns or clustering tendencies in graph data. Recent studies have applied LDP (Local Differential Privacy) to subgraph counting to protect ...
Celotno besedilo
Dostopno za: NUK, UL
7.
  • Cancelable Permutation-Base... Cancelable Permutation-Based Indexing for Secure and Efficient Biometric Identification
    Murakami, Takao; Fujita, Ryo; Ohki, Tetsushi ... IEEE access, 2019, Letnik: 7
    Journal Article
    Recenzirano
    Odprti dostop

    Cancelable biometric schemes have been widely studied to protect templates in biometric authentication over networks. These schemes transform biometric features and perform pattern matching without ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
8.
  • Model Inversion Attacks for... Model Inversion Attacks for Online Prediction Systems: Without Knowledge of Non-Sensitive Attributes
    HIDANO, Seira; MURAKAMI, Takao; KATSUMATA, Shuichi ... IEICE Transactions on Information and Systems, 11/2018, Letnik: E101.D, Številka: 11
    Journal Article
    Recenzirano
    Odprti dostop

    The number of IT services that use machine learning (ML) algorithms are continuously and rapidly growing, while many of them are used in practice to make some type of predictions from personal data. ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
9.
  • Modality Selection Attacks ... Modality Selection Attacks and Modality Restriction in Likelihood-Ratio Based Biometric Score Fusion
    MURAKAMI, Takao; KAGA, Yosuke; TAKAHASHI, Kenta IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 01/2017, Letnik: E100.A, Številka: 12
    Journal Article
    Recenzirano

    The likelihood-ratio based score level fusion (LR fusion) scheme is known as one of the most promising multibiometric fusion schemes. This scheme verifies a user by computing a log-likelihood ratio ...
Celotno besedilo
Dostopno za: NUK, UL, UM
10.
  • Information-Theoretic Perfo... Information-Theoretic Performance Evaluation of Multibiometric Fusion under Modality Selection Attacks
    MURAKAMI, Takao; KAGA, Yosuke; TAKAHASHI, Kenta IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2016, Letnik: E99.A, Številka: 5
    Journal Article
    Recenzirano

    The likelihood-ratio based score level fusion (LR-based fusion) scheme has attracted much attention, since it maximizes accuracy if a log-likelihood ratio (LLR) is accurately estimated. In reality, ...
Celotno besedilo
Dostopno za: NUK, UL, UM
1 2 3 4 5
zadetkov: 1.767

Nalaganje filtrov