Kota Yoshida

Orcid: 0000-0003-1293-6415

According to our database1, Kota Yoshida authored at least 25 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SEDMA: Self-Distillation with Model Aggregation for Membership Privacy.
Proc. Priv. Enhancing Technol., January, 2024

Adversarial Examples Created by Fault Injection Attack on Image Sensor Interface.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024

2023
Practical aspects on non-profiled deep-learning side-channel attacks against AES software implementation with two types of masking countermeasures including RSM.
J. Cryptogr. Eng., November, 2023

Profiling Deep Learning Side-Channel Attacks Using Multi-Label against AES Circuits with RSM Countermeasure.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023

Backdoor Attack on Deep Neural Networks Triggered by Fault Injection Attack on Image Sensor Interface.
Sensors, 2023

Evaluation of Model Quantization Method on Vitis-AI for Mitigating Adversarial Examples.
IEEE Access, 2023

Multispectral Pedestrian Detection with Visible and Far-infrared Images Under Drifting Ambient Light and Temperature.
Proceedings of the 2023 IEEE SENSORS, Vienna, Austria, October 29 - Nov. 1, 2023, 2023

Evaluation of Membership Inference Attack Against Federated Learning With Differential Privacy on Edge Devices.
Proceedings of the 12th IEEE Global Conference on Consumer Electronics, 2023

2022
Adversarial Scan Attack against Scan Matching Algorithm for Pose Estimation in LiDAR-Based SLAM.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022

Experimental Study of Fault Injection Attack on Image Sensor Interface for Triggering Backdoored DNN Models.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022

Fault Injection Attacks Utilizing Waveform Pattern Matching against Neural Networks Processing on Microcontroller.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022

Deep Learning-Based Side-Channel Attacks against Software-Implemented RSA using Binary Exponentiation with Dummy Multiplication.
Proceedings of the 4th International Symposium on Advanced Technologies and Applications in the Internet of Things (ATAIT 2022), 2022

Deep Learning Side-Channel Attacks against Hardware-Implemented Lightweight Cipher Midori 64.
Proceedings of the 4th International Symposium on Advanced Technologies and Applications in the Internet of Things (ATAIT 2022), 2022

Fundamental Study of Adversarial Examples Created by Fault Injection Attack on Image Sensor Interface.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2022

2021
Deep learning side-channel attack against hardware implementations of AES.
Microprocess. Microsystems, November, 2021

Model Reverse-Engineering Attack against Systolic-Array-Based DNN Accelerator Using Correlation Power Analysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Towards Trusted IoT Sensing Systems: Implementing PUF as Secure Key Generator for Root of Trust and Message Authentication Code.
Proceedings of the HASP '21: Workshop on Hardware and Architectural Support for Security and Privacy, 2021

Deep Learning Side-Channel Attacks Against Lightweight SCA Countermeasure RSM-AES.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2021

Model Evasion Attacks Against Partially Encrypted Deep Neural Networks in Isolated Execution Environment.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021

2020
Model Reverse-Engineering Attack using Correlation Power Analysis against Systolic Array Based Neural Network Accelerator.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2020

Joking AI via Visual Cues.
Proceedings of the Artificial Intelligence in HCI, 2020

Disabling Backdoor and Identifying Poison Data by using Knowledge Distillation in Backdoor Attacks on Deep Neural Networks.
Proceedings of the AISec@CCS 2020: Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security, 2020

2019
Model-Extraction Attack Against FPGA-DNN Accelerator Utilizing Correlation Electromagnetic Analysis.
Proceedings of the 27th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2019

2018
Neural Joking Machine : Humorous image captioning.
CoRR, 2018

2015
Pilot-scale exhaust gas treatment for a glass manufacturing system using a plasma combined semi-dry chemical process.
Proceedings of the 2015 IEEE Industry Applications Society Annual Meeting, 2015


  Loading...