Naoto Yanai

Orcid: 0000-0002-0817-6188

According to our database1, Naoto Yanai authored at least 80 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
JABBERWOCK: A Tool for WebAssembly Dataset Generation and Its Application to Malicious Website Detection.
J. Inf. Process., 2024

Designated Verifier Signature with Claimability.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024

REN-A.I.: A Video Game for AI Security Education Leveraging Episodic Memory.
IEEE Access, 2024

2023
Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware.
IEICE Trans. Inf. Syst., September, 2023

APVAS: Reducing the Memory Requirement of AS_PATH Validation by Introducing Aggregate Signatures into BGPsec.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023

The Juice Is Worth the Squeeze: Analysis of Autonomous System Provider Authorization in Partial Deployment.
IEEE Open J. Commun. Soc., 2023

A Study on Quantized Parameters for Protection of a Model and Its Inference Input.
J. Inf. Process., 2023

An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities in Ethereum Smart Contracts.
CoRR, 2023

Do Backdoors Assist Membership Inference Attacks?
CoRR, 2023

Anonymous Broadcast Authentication With One-to-Many Transmission to Control IoT Devices.
IEEE Access, 2023

Membership Inference Attacks against Diffusion Models.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023

Privacy-Preserving Taxi-Demand Prediction Using Federated Learning.
Proceedings of the 2023 IEEE International Conference on Smart Computing, 2023

MADONNA: Browser-Based MAlicious Domain Detection Through Optimized Neural Network with Feature Analysis.
Proceedings of the ICT Systems Security and Privacy Protection, 2023

An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2023

IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-designated Verifier Signatures.
Proceedings of the Information Security Practice and Experience, 2023

Generic Construction of Key-Aggregate Searchable Encryption.
Proceedings of the 1st ACM SIGSPATIAL International Workshop on Geo-Privacy and Data Utility for Smart Societies, 2023

Backdoor Attacks Leveraging Latent Representation in Competitive Learning.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

JABBERWOCK: A Tool for WebAssembly Dataset Generation towards Malicious Website Detection.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

2022
SQUAB: A Virtualized Infrastructure for BGP-related Experiments and Its Applications to Evaluation on BGPsec.
J. Inf. Process., 2022

SPGC: Integration of Secure Multiparty Computation and Differential Privacy for Gradient Computation on Collaborative Learning.
J. Inf. Process., 2022

MOTUS: How Quantized Parameters Improve Protection of Model and Its Inference Input.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2022

Implementing Access Control in Chaincodes on Hyperledger Fabric with Attribute-Based Encryption.
Proceedings of the IEEE 19th International Conference on Software Architecture Companion, 2022

Implementation and Evaluation of Leader Election in the Population Protocol Model Using an Emulation Environment.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022

APKC '22: 9th ACM ASIA Public-Key Cryptography Workshop.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Multi-scale Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for unsupervised intrusion detection.
Knowl. Based Syst., 2021

RA: A Static Analysis Tool for Analyzing Re-Entrancy Attacks in Ethereum Smart Contracts.
J. Inf. Process., 2021

First to Possess His Statistics: Data-Free Model Extraction Attack on Tabular Data.
CoRR, 2021

MADMAX: Browser-Based Malicious Domain Detection Through Extreme Learning Machine.
IEEE Access, 2021

APVAS+: A Practical Extension of BGPsec with Low Memory Requirement.
Proceedings of the ICC 2021, 2021

SPGC: An Integrated Framework of Secure Computation and Differential Privacy for Collaborative Learning.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021

Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for Intrusion Detection.
Proceedings of the 18th IEEE Annual Consumer Communications & Networking Conference, 2021

Eth2Vec: Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts.
Proceedings of the BSCI '21: Proceedings of the 3rd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2021

SQUAB: A Virtualized Infrastructure for Experiments on BGP and its Extensions.
Proceedings of the Advanced Information Networking and Applications, 2021

Anonymous Broadcast Authentication for Securely Remote-Controlling IoT Devices.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
Model Extraction Attacks on Recurrent Neural Networks.
J. Inf. Process., 2020

Efficient Secure Neural Network Prediction Protocol Reducing Accuracy Degradation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

APVAS: Reducing Memory Size of AS_PATH Validation by Using Aggregate Signatures.
CoRR, 2020

Hunting for Re-Entrancy Attacks in Ethereum Smart Contracts via Static Analysis.
CoRR, 2020

Model Extraction Attacks against Recurrent Neural Networks.
CoRR, 2020

Key-Aggregate Searchable Encryption, Revisited: Formal Foundations for Cloud Applications, and Their Implementation.
IEEE Access, 2020

A Model Checking Method for Secure Routing Protocols by SPIN with State Space Reduction.
Proceedings of the 2020 IEEE International Parallel and Distributed Processing Symposium Workshops, 2020

RA: Hunting for Re-Entrancy Attacks in Ethereum Smart Contracts via Static Analysis.
Proceedings of the IEEE International Conference on Blockchain, 2020

2019
Towards Further Formal Foundation of Web Security: Expression of Temporal Logic in Alloy and Its Application to a Security Model With Cache.
IEEE Access, 2019

ISDSR+: Improving the Security and Availability of Secure Routing Protocol.
IEEE Access, 2019

MOBIUS: Model-Oblivious Binarized Neural Networks.
IEEE Access, 2019

Implementation and Evaluation of ISDSR in Emulation Environments.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

A State Space Suppression Method for Formal Verification of Secure Routing Protocols With SPIN.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019

A State Space Reduction Method for Model Checking of Wireless Multi-Hop Network Routing Protocols Focusing on Topologies.
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019

2018
An Anonymous Authentication Protocol for the Smart Grid.
Proceedings of the Smart Micro-Grid Systems Security and Privacy, 2018

Detecting Flooding Attack and Accommodating Burst Traffic in Delay-Tolerant Networks.
IEEE Trans. Veh. Technol., 2018

Tighter Reductions for Deterministic Identity-Based Signatures.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Meeting Tight Security for Multisignatures in the Plain Public Key Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

RBAC-SC: Role-Based Access Control Using Smart Contract.
IEEE Access, 2018

On Security of Anonymous Invitation-Based System.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

2017
SPaCIS: Secure Payment Protocol for Charging Information over Smart Grid.
J. Inf. Process., 2017

Provably Secure Structured Signature Schemes with Tighter Reductions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Performance Evaluation for the Signature Algorithm of ISDSR on Raspberry Pi.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017

Towards Efficient and Secure Encrypted Databases: Extending Message-Locked Encryption in Three-Party Model.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

Identity-Based Key-Insulated Aggregate Signatures, Revisited.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

An Anonymous Authentication Protocol for Smart Grid.
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017

2016
Fail-Stop Signatures for Multiple-Signers: Definitions, Constructions, and Their Extensions.
J. Inf. Process., 2016

ISDSR: Secure DSR with ID-based Sequential Aggregate Signature.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Web security model with cache.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

Towards a formal foundation of protection against data-oriented attacks.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

On the Tightness of Deterministic Identity-Based Signatures.
Proceedings of the Fourth International Symposium on Computing and Networking, 2016

Towards Provable Security of Dynamic Source Routing Protocol and Its Applications.
Proceedings of the Advances in Conceptual Modeling, 2016

Tightly-Secure Identity-Based Structured Aggregate Signature Scheme under the Computational Diffie-Hellman Assumption.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
Secure Routing Protocols for Sensor Networks: Construction with Signature Schemes for Multiple Signers.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack.
Proceedings of the SECRYPT 2015, 2015

Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs.
Proceedings of the Trusted Systems - 7th International Conference, 2015

Revisiting Authentication with Shoulder-Surfing Resistance for Smartphones.
Proceedings of the Third International Symposium on Computing and Networking, 2015

Constructions of Fail-Stop Signatures for Multi-signer Setting.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

2014
A CDH-based Ordered Multisignature Scheme Provably Secure without Random Oracles.
J. Inf. Process., 2014

A CDH-based ordered multisignature scheme in the standard model with better efficiency.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

2013
An Ordered Multisignature Scheme Under the CDH Assumption Without Random Oracles.
Proceedings of the Information Security, 16th International Conference, 2013

2012
A Certificateless Ordered Sequential Aggregate Signature Scheme Secure against Super Adverssaries.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

2011
A Secure Structured Multisignature Scheme Based on a Non-commutative Ring Homomorphism.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Certificateless Ordered Sequential Aggregate Signature Scheme.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

2010
A structured aggregate signature scheme.
Proceedings of the International Symposium on Information Theory and its Applications, 2010


  Loading...