Isamu Teranishi

According to our database1, Isamu Teranishi authored at least 19 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Survey of Privacy Threats and Countermeasures in Federated Learning.
CoRR, 2024

2023
Personalized Federated Learning with Multi-branch Architecture.
Proceedings of the International Joint Conference on Neural Networks, 2023

pGBF: Personalized Gradient Boosting Forest.
Proceedings of the International Joint Conference on Neural Networks, 2023

Heterogeneous Domain Adaptation with Positive and Unlabeled Data.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Knowledge Cross-Distillation for Membership Privacy.
Proc. Priv. Enhancing Technol., 2022

Continual Horizontal Federated Learning for Heterogeneous Data.
Proceedings of the International Joint Conference on Neural Networks, 2022

2013
Order-Preserving Encryption Secure Beyond One-Wayness.
IACR Cryptol. ePrint Arch., 2013

2012
Anonymous Credential with Attributes Certification after Registration.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

2011
Efficient Circuit-Size Independent Public Key Encryption with KDM Security.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

Key dependent message security: recent results and applications.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

2010
Signatures Resilient to Continual Leakage on Memory and Computation.
IACR Cryptol. ePrint Arch., 2010

2009
<i>k</i>-Times Anonymous Authentication.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

2008
General Conversion for Obtaining Strongly Existentially Unforgeable Signatures.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Relationship between Standard Model Plaintext Awareness and Message Hiding.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Cramer-Shoup Satisfies a Stronger Plaintext Awareness under a Weaker Assumption.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

Relationship between Two Approaches for Defining the Standard Model PA-ness.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2006
<i>k</i>-Times Anonymous Authentication with a Constant Proving Cost.
Proceedings of the Public Key Cryptography, 2006

Using group signatures for identity management and its implementation.
Proceedings of the 2006 Workshop on Digital Identity Management, 2006

2004
k-Times Anonymous Authentication (Extended Abstract).
Proceedings of the Advances in Cryptology, 2004


  Loading...