Akira Otsuka

Orcid: 0000-0001-6862-2576

According to our database1, Akira Otsuka authored at least 65 papers between 1998 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Robustness Bounds on the Successful Adversarial Examples: Theory and Practice.
CoRR, 2024

Compiler Provenance Recovery for Multi-CPU Architectures Using a Centrifuge Mechanism.
IEEE Access, 2024

2023
Feature Extraction Methods for Binary Code Similarity Detection Using Neural Machine Translation Models.
IEEE Access, 2023

Electronic Cash with Open-Source Observers.
Proceedings of the Financial Cryptography and Data Security. FC 2023 International Workshops, 2023

2022
SIBYL: A Method for Detecting Similar Binary Functions Using Machine Learning.
IEICE Trans. Inf. Syst., 2022

VeloCash: Anonymous Decentralized Probabilistic Micropayments With Transferability.
IEEE Access, 2022

Permissionless Blockchain-Based Sybil-Resistant Self-Sovereign Identity Utilizing Attested Execution Secure Processors.
Proceedings of the IEEE International Conference on Blockchain, 2022

2021
Probabilistic micropayments with transferability.
IACR Cryptol. ePrint Arch., 2021

CyExec*: A High-Performance Container-Based Cyber Range With Scenario Randomization.
IEEE Access, 2021

Evaluation of Vulnerability Reproducibility in Container-based Cyber Range.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

CyExec*: Automatic Generation of Randomized Cyber Range Scenarios.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

2020
Anonymous probabilistic payment in payment hub.
IACR Cryptol. ePrint Arch., 2020

o-glasses: Visualizing X86 Code From Binary Using a 1D-CNN.
IEEE Access, 2020

Traceability in Permissioned Blockchain.
IEEE Access, 2020

An Expert System for Classifying Harmful Content on the Dark Web.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Deep Self-Supervised Clustering of the Dark Web for Cyber Threat Intelligence.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Confidential and Auditable Payments.
Proceedings of the Financial Cryptography and Data Security, 2020

2019
Exploring the Dark Web for Cyber Threat Intelligence using Machine Leaning.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

Short Paper: Secure Offline Payments in Bitcoin.
Proceedings of the Financial Cryptography and Data Security, 2019

2018
A Mobile Cough Strength Evaluation Device Using Cough Sounds.
Sensors, 2018

Estimation of Cough Peak Flow Using Cough Sounds.
Sensors, 2018

o-glasses: Visualizing x86 Code from Binary Using a 1d-CNN.
CoRR, 2018

2017
Ability to cough can be evaluated through cough sounds: An experimental investigation of effects of microphone type on accuracy.
Proceedings of the IEEE/SICE International Symposium on System Integration, 2017

Theoretical vulnerabilities in map speaker adaptation.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

A Study on Autoencoder-based Reconstruction Method for Wi-Fi Location Data with Erasures.
Proceedings of the 2017 on Multimedia Privacy and Security, 2017

2015
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model.
Int. J. Inf. Sec., 2015

Electromyographic prosthetic hand using grasping-force-magnification mechanism with five independently driven fingers.
Adv. Robotics, 2015

2014
Theoretical vulnerability in likelihood-ratio-based biometric verification.
Proceedings of the IEEE International Joint Conference on Biometrics, Clearwater, 2014

2013
A Quasi-Optimal Channel Selection Method for Bioelectric Signal Classification Using a Partial Kullback-Leibler Information Measure.
IEEE Trans. Biomed. Eng., 2013

A Theoretical Framework for Constructing Matching Algorithms Secure against Wolf Attack.
IEICE Trans. Inf. Syst., 2013

Relations among security metrics for template protection algorithms.
Proceedings of the IEEE Sixth International Conference on Biometrics: Theory, 2013

A training system for the MyoBock hand in a virtual reality environment.
Proceedings of the 2013 IEEE Biomedical Circuits and Systems Conference (BioCAS), Rotterdam, The Netherlands, October 31, 2013

2012
Advanced wireless cooperation mechanisms for interference mitigation in the 2.4 GHz ISM band.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

2011
Practical E-Cash.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

RFID Tag Filtering Protocol.
Proceedings of IEEE International Conference on Communications, 2011

2010
Theoretical Analysis of Mean Waiting Time for Message Delivery in Lattice Ad Hoc Networks.
J. Circuits Syst. Comput., 2010

Enhanced Cancelable Biometrics for Online Signature Verification.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Wolf fingerprints against minutiae count matching systems.
IEICE Electron. Express, 2010

Unconditionally Secure Electronic Voting.
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010

Practical Searching over Encrypted Data by Private Information Retrieval.
Proceedings of the Global Communications Conference, 2010

How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of ISO/IEC 29128 and CRYPTREC.
Proceedings of the Financial Cryptography and Data Security, 2010

2009
Analysis of Mean Waiting Time for Delivery of a Message in Mobile Multi-Hop Networks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Formally verifiable features in embedded vehicular security systems.
Proceedings of the IEEE Vehicular Networking Conference, 2009

Theoretical Framework for Constructing Matching Algorithms in Biometric Authentication Systems.
Proceedings of the Advances in Biometrics, Third International Conference, 2009

A Matching Algorithm Secure against the Wolf Attack in Biometric Authentication Systems.
Proceedings of the Biometric ID Management and Multimodal Communication, 2009

2008
Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems.
IEICE Trans. Inf. Syst., 2008

The Cybernetic Rehabilitation Aid: A novel concept for direct rehabilitation.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2008

New Attestation Based Security Architecture for In-Vehicle Communication.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report).
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

2007
A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services.
Proceedings of the Research in Cryptology, Second Western European Workshop, 2007

Wolf Attack Probability: A New Security Measure in Biometric Authentication Systems.
Proceedings of the Advances in Biometrics, International Conference, 2007

2006
A Provably Secure Refreshable Partially Anonymous Token and Its Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Lightweight Privacy for Ubiquitous Devices.
Proceedings of the IEEE International Conference on Systems, 2006

2004
Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model.
Proceedings of the Applied Cryptography and Network Security, 2004

Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
A human-assisting manipulator teleoperated by EMG signals and arm motions.
IEEE Trans. Robotics Autom., 2003

Anonymous authentication scheme for XML security standard with Refreshable Tokens.
Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, 2003

Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations.
Proceedings of the Information Security, 6th International Conference, 2003

Unconditionally Secure Homomorphic Pre-distributed Commitments.
Proceedings of the Applied Algebra, 2003

2002
An Unconditionally Secure Electronic Cash Scheme with Computational Untraceability.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

Cryptography with information theoretic security.
Proceedings of the 2002 IEEE Information Theory Workshop, 2002

An Anonymous Loan System Based on Group Signature Scheme.
Proceedings of the Information Security, 5th International Conference, 2002

1999
A human supporting manipulator using neural network and its clinical application for forearm amputation.
Proceedings of the Third International Conference on Knowledge-Based Intelligent Information Engineering Systems, 1999

1998
EMG-based Human-Robot Interface for Rehabilitation Aid.
Proceedings of the IEEE International Conference on Robotics and Automation, 1998


  Loading...