Seira Hidano

According to our database1, Seira Hidano authored at least 61 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Gradient-Based Clean Label Backdoor Attack to Graph Neural Networks.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

2023
R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training.
IEEE Trans. Computers, February, 2023

EdgePruner: Poisoned Edge Pruning in Graph Contrastive Learning.
CoRR, 2023

Magmaw: Modality-Agnostic Adversarial Attacks on Machine Learning-Based Wireless Communication Systems.
CoRR, 2023

NetFlick: Adversarial Flickering Attacks on Deep Learning Based Video Compression.
CoRR, 2023

RoVISQ: Reduction of Video Service Quality via Adversarial Attacks on Deep Learning-based Video Compression.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Automating XSS Vulnerability Testing Using Reinforcement Learning.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Fully Hidden Dynamic Trigger Backdoor Attacks.
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023

VoteTRANS: Detecting Adversarial Text without Training by Voting on Hard Labels of Transformations.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023

2022
Text Revealer: Private Text Reconstruction via Model Inversion Attacks against Transformers.
CoRR, 2022

Adversarial Attacks on Deep Learning-based Video Compression and Classification Systems.
CoRR, 2022

Degree-Preserving Randomized Response for Graph Neural Networks under Local Differential Privacy.
CoRR, 2022

Feature-level Approach for the Evaluation of Text Classification Models.
Proceedings of the 17th International Joint Conference on Computer Vision, 2022

Effective Hardware-Trojan Feature Extraction Against Adversarial Attacks at Gate-Level Netlists.
Proceedings of the 28th IEEE International Symposium on On-Line Testing and Robust System Design, 2022

Effect of Errors on the Evaluation of Machine Learning Systems.
Proceedings of the 17th International Joint Conference on Computer Vision, 2022

CheckHARD: Checking Hard Labels for Adversarial Text Detection, Prediction Correction, and Perturbed Word Suggestion.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022

2021
Generating Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists.
J. Inf. Process., 2021

Node-wise Hardware Trojan Detection Based on Graph Learning.
CoRR, 2021

SEPP: Similarity Estimation of Predicted Probabilities for Defending and Detecting Adversarial Text.
Proceedings of the 35th Pacific Asia Conference on Language, Information and Computation, 2021

Machine Translated Text Detection Through Text Similarity with Round-Trip Translation.
Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2021

Data Augmentation for Machine Learning-Based Hardware Trojan Detection at Gate-Level Netlists.
Proceedings of the 27th IEEE International Symposium on On-Line Testing and Robust System Design, 2021

OPA2D: One-Pixel Attack, Detection, and Defense in Deep Neural Networks.
Proceedings of the International Joint Conference on Neural Networks, 2021

TransMIA: Membership Inference Attacks Using Transfer Shadow Training.
Proceedings of the International Joint Conference on Neural Networks, 2021

Countermeasures Against Backdoor Attacks Towards Malware Detectors.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021

Toward Learning Robust Detectors from Imbalanced Datasets Leveraging Weighted Adversarial Training.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021

2020
Exposing Private User Behaviors of Collaborative Filtering via Model Inversion Techniques.
Proc. Priv. Enhancing Technol., 2020

Anonymization Technique Based on SGD Matrix Factorization.
IEICE Trans. Inf. Syst., 2020

Recommender Systems Robust to Data Poisoning using Trim Learning.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Effects of Explanatory Information on Privacy Policy Summarization Tool Perception.
Proceedings of the Information Systems Security and Privacy - 6th International Conference, 2020

Evaluating the Effect of Justification and Confidence Information on User Perception of a Privacy Policy Summarization Tool.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Stronger Targeted Poisoning Attacks Against Malware Detection.
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020

2019
Identifying Adversarial Sentences by Analyzing Text Complexity.
CoRR, 2019

On Embedding Backdoor in Malware Detectors Using Machine Learning.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Detecting Machine-Translated Text using Back Translation.
Proceedings of the 12th International Conference on Natural Language Generation, 2019

User Study of the Effectiveness of a Privacy Policy Summarization Tool.
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019

Evaluating Privacy Policy Summarization: An Experimental Study among Japanese Users.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Detecting Machine-Translated Paragraphs by Matching Similar Words.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2019

2018
Model Inversion Attacks for Online Prediction Systems: Without Knowledge of Non-Sensitive Attributes.
IEICE Trans. Inf. Syst., 2018

Linear Depth Integer-Wise Homomorphic Division.
Proceedings of the Information Security Theory and Practice, 2018

The Possibility of Matrix Decomposition as Anonymization and Evaluation for Time-sequence Data.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

An Evaluation Framework for Fastest Oblivious RAM.
Proceedings of the 3rd International Conference on Internet of Things, 2018

Active Attack Against Oblivious RAM.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
Model Inversion Attacks for Prediction Systems: Without Knowledge of Non-Sensitive Attributes.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

Verification of Data Collection Methods for Live Migration Protection Mechanism.
Proceedings of the Advances in Network-Based Information Systems, 2017

White-box Implementation of Stream Cipher.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

A Control Mechanism for Live Migration with Data Regulations Preservation.
Proceedings of the Computational Science and Its Applications - ICCSA 2017, 2017

2016
Delay PUF Assessment Method Based on Side-Channel and Modeling Analyzes: The Final Piece of All-in-One Assessment Methodology.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Sensor-based Wearable PUF.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Access Control for Cross-Border Transfer of Sensor Data.
Proceedings of the Mobile Internet Security - First International Symposium, 2016

Proposed data audit system enhances use in accordance with the data owner's policy.
Proceedings of the 11th International Conference on Knowledge, 2016

Data Protection for Cross-Border Live Migration in Multi-cloud Environment.
Proceedings of the Fourth International Symposium on Computing and Networking, 2016

2015
On Partitioning Secret Data Based on Concept of Functional Safety.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

k-anonymity: Risks and the Reality.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

New Security Challenges in the 5G Network.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

Design of a Security Gateway for iKaaS Platform.
Proceedings of the Cloud Computing - 6th International Conference, 2015

2013
Brain Signal Based Continuous Authentication: Functional NIRS Approach.
Proceedings of the Advances in Computational Intelligence, 2013

2012
Evaluation of wolf attack for classified target on speaker verification systems.
Proceedings of the 12th International Conference on Control Automation Robotics & Vision, 2012

Evaluation of security for biometric guessing attacks in biometric cryptosystem using fuzzy commitment scheme.
Proceedings of the 2012 BIOSIG, 2012

2010
A metric of identification performance of biometrics based on information content.
Proceedings of the 11th International Conference on Control, 2010

2008
On biometric encryption using fingerprint and it's security evaluation.
Proceedings of the 10th International Conference on Control, 2008


  Loading...