Toshinori Araki

According to our database1, Toshinori Araki authored at least 25 papers between 2006 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
IC-SECURE: Intelligent System for Assisting Security Experts in Generating Playbooks for Automated Incident Response.
CoRR, 2023

Simultaneous Adversarial Attacks On Multiple Face Recognition System Components.
CoRR, 2023

Advancing Deep Metric Learning With Adversarial Robustness.
Proceedings of the Asian Conference on Machine Learning, 2023

2022
Advancing Deep Metric Learning Through Multiple Batch Norms And Multi-Targeted Adversarial Examples.
CoRR, 2022

Latent SHAP: Toward Practical Human-Interpretable Explanations.
CoRR, 2022

Powerful Physical Adversarial Examples Against Practical Face Recognition Systems.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision Workshops, 2022

2021
Universal Adversarial Spoofing Attacks against Face Recognition.
Proceedings of the International IEEE Joint Conference on Biometrics, 2021

Secure Graph Analysis at Scale.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

On Brightness Agnostic Adversarial Examples Against Face Recognition Systems.
Proceedings of the 20th International Conference of the Biometrics Special Interest Group, 2021

Adversarial Robustness for Face Recognition: How to Introduce Ensemble Diversity among Feature Extractors?
Proceedings of the Workshop on Artificial Intelligence Safety 2021 (SafeAI 2021) co-located with the Thirty-Fifth AAAI Conference on Artificial Intelligence (AAAI 2021), 2021

2018
Generalizing the SPDZ Compiler For Other Protocols.
IACR Cryptol. ePrint Arch., 2018

How to Choose Suitable Secure Multiparty Computation Using Generalized SPDZ.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Computationally Secure Verifiable Secret Sharing Scheme for Distributing Many Secrets.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Optimized Honest-Majority MPC for Malicious Adversaries - Breaking the 1 Billion-Gate Per Second Barrier.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

2016
High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority.
IACR Cryptol. ePrint Arch., 2016

DEMO: High-Throughput Secure Three-Party Computation of Kerberos Ticket Generation.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2013
Cheating Detectable Secret Sharing Schemes for Random Bit Strings.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

New Security Definitions for Biometric Authentication with Template Protection: Toward covering more threats against authentication systems.
Proceedings of the 2013 BIOSIG, 2013

2011
A Simple and Efficient Secret Sharing Scheme Secure against Cheating.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

2010
Efficient Almost Secure 1-Round Message Transmission Schemes for 3t+1 Channels.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

2008
Almost Secure 1-Round Message Transmission Scheme with Polynomial-Time Message Decryption.
Proceedings of the Information Theoretic Security, Third International Conference, 2008

2007
TinyPEDS: Tiny persistent encrypted data storage in asynchronous wireless sensor networks.
Ad Hoc Networks, 2007

Flaws in Some Secret Sharing Schemes Against Cheating.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

Efficient (<i>k</i>, <i>n</i>) Threshold Secret Sharing Schemes Secure Against Cheating from <i>n</i>-1 Cheaters.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution.
Proceedings of the Advances in Cryptology, 2006


  Loading...