Shu Takemoto

Orcid: 0009-0009-8861-2346

According to our database1, Shu Takemoto authored at least 23 papers between 2019 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Parameter Free Countermeasure Against Adversarial Examples.
Proceedings of the 17th International Conference on Computer and Automation Engineering, 2025

Power Based Side-Channel Analysis for Lightweight Cipher Ltlbc.
Proceedings of the 17th International Conference on Computer and Automation Engineering, 2025

Quantization of Tiny MLP-Mixer and Its Evaluation.
Proceedings of the 17th International Conference on Computer and Automation Engineering, 2025

Security Evaluation of Differentially Private Federated Learning Against Model Inversion Attacks.
Proceedings of the 17th International Conference on Computer and Automation Engineering, 2025

Quantitative Evaluation of Vulnerabilities in Adversarial Shadow Attack.
Proceedings of the 17th International Conference on Computer and Automation Engineering, 2025

2024
Luminance Correction based Countermeasure against Adversarial Examples.
Proceedings of the Proceeding of the 2024 6th International Conference on Information Technology and Computer Communications, 2024

Error Correction Method for Lightweight Cipher PRINCE based Physically Unclonable Function.
Proceedings of the Proceeding of the 2024 6th International Conference on Information Technology and Computer Communications, 2024

Hue and Saturation oriented Imperceptible Adversarial Examples and their Evaluation.
Proceedings of the Proceeding of the 2024 6th International Conference on Information Technology and Computer Communications, 2024

SuperSonic Glitch Physical Unclonable Function for Encryption and Device Authentication.
Proceedings of the 2024 7th Artificial Intelligence and Cloud Computing Conference, 2024

Adversarial Examples for Field Programmable Gate Array based AI Module.
Proceedings of the 2024 7th Artificial Intelligence and Cloud Computing Conference, 2024

2023
Tamper Resistance Evaluation of Midori128 against Differential Power Analysis.
Proceedings of the 6th IEEE International Conference on Knowledge Innovation and Invention, 2023

Explainable AI based Adversarial Examples and its Evaluation.
Proceedings of the 6th International Conference on Electronics, 2023

Machine Learning Based Power Analysis for Simon with Secure Mechanism.
Proceedings of the 15th International Conference on Computer and Automation Engineering, 2023

Deep Learning Based Side-Channel Analysis for Lightweight Cipher PRESENT.
Proceedings of the 15th International Conference on Computer and Automation Engineering, 2023

Security Evaluation of Glitch Based Authentication Function for Edge AI.
Proceedings of the 12th IEEE Global Conference on Consumer Electronics, 2023

Hamming Weight aware Fault Analysis for Lightweight Cryptography TWINE.
Proceedings of the 8th International Conference on Cloud Computing and Internet of Things, 2023

2022
AI Hardware Oriented Trojan Detection Architecture.
Proceedings of the ICECC 2022: The 5th International Conference on Electronics, Communications and Control Engineering, Higashi-ku, Japan, March 25, 2022

Authenticated Encryption based Secure In-vehicle System against DoS Attacks.
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022

2021
Performance Evaluation of Unrolled Cipher based Glitch PUF Implemented on Virtex-7.
Proceedings of the 4th International Symposium on Devices, Circuits and Systems, 2021

Hardware Trojan for Lightweight Cryptoraphy Elephant.
Proceedings of the 10th IEEE Global Conference on Consumer Electronics, 2021

2019
Evaluation of the Hiding-Countermeasure PRINCE Using Differential Power Analysis.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

Performance Evaluation of CAESAR Authenticated Encryption on SROS2.
Proceedings of the AICCC 2019: 2nd Artificial Intelligence and Cloud Computing Conference, 2019

Statistical Power Analysis for IoT Device Oriented Encryption with Glitch Canceller.
Proceedings of the 11th IEEE International Workshop on Computational Intelligence and Applications, 2019


  Loading...