Yusuke Kawamoto

Orcid: 0000-0002-2151-9560

Affiliations:
  • National Institute of Advanced Industrial Science and Technology, Tsukuba, Japan


According to our database1, Yusuke Kawamoto authored at least 35 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Sound and relatively complete belief Hoare logic for statistical hypothesis testing programs.
Artif. Intell., January, 2024

2023
Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy.
CoRR, 2023

Formalizing Statistical Causality via Modal Logic.
Proceedings of the Logics in Artificial Intelligence - 18th European Conference, 2023

2022
Information Leakage Games: Exploring Information as a Utility Function.
ACM Trans. Priv. Secur., 2022

2021
An epistemic approach to the formal specification of statistical machine learning.
Softw. Syst. Model., 2021

Privacy-Preserving Multiple Tensor Factorization for Synthesizing Large-Scale Location Traces with Cluster-Specific Features.
Proc. Priv. Enhancing Technol., 2021

Formalizing Statistical Beliefs in Hypothesis Testing Using Program Logic.
Proceedings of the 18th International Conference on Principles of Knowledge Representation and Reasoning, 2021

TransMIA: Membership Inference Attacks Using Transfer Shadow Training.
Proceedings of the International Joint Conference on Neural Networks, 2021

Locality Sensitive Hashing with Extended Differential Privacy.
Proceedings of the Computer Security - ESORICS 2021, 2021

2019
Hybrid statistical estimation of mutual information and its application to information flow.
Formal Aspects Comput., 2019

Privacy-Preserving Multiple Tensor Factorization for Synthesizing Large-Scale Location Traces.
CoRR, 2019

Local Distribution Obfuscation via Probability Coupling.
CoRR, 2019

Utility-Optimized Local Differential Privacy Mechanisms for Distribution Estimation.
Proceedings of the 28th USENIX Security Symposium, 2019

Towards Logical Specification of Statistical Machine Learning.
Proceedings of the Software Engineering and Formal Methods - 17th International Conference, 2019

Local Obfuscation Mechanisms for Hiding Probability Distributions.
Proceedings of the Computer Security - ESORICS 2019, 2019

Statistical Epistemic Logic.
Proceedings of the Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy, 2019

Local Distribution Obfuscation via Probability Coupling<sup>*</sup>.
Proceedings of the 57th Annual Allerton Conference on Communication, 2019

2018
A Game-Theoretic Approach to Information-Flow Control via Protocol Composition.
Entropy, 2018

Differentially Private Obfuscation Mechanisms for Hiding Probability Distributions.
CoRR, 2018

Restricted Local Differential Privacy for Distribution Estimation with High Data Utility.
CoRR, 2018

Leakage and Protocol Composition in a Game-Theoretic Perspective.
Proceedings of the Principles of Security and Trust - 7th International Conference, 2018

On the Anonymization of Differentially Private Location Obfuscation.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

2017
On the Compositionality of Quantitative Information Flow.
Log. Methods Comput. Sci., 2017

Information Leakage Games.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

HyLeak: Hybrid Analysis Tool for Information Leakage.
Proceedings of the Automated Technology for Verification and Analysis, 2017

2016
Hybrid Statistical Estimation of Mutual Information for Quantifying Information Flow.
Proceedings of the FM 2016: Formal Methods, 2016

2015
Quantitative Information Flow for Scheduler-Dependent Systems.
Proceedings of the Proceedings Thirteenth Workshop on Quantitative Aspects of Programming Languages and Systems, 2015

2014
Compositionality Results for Quantitative Information Flow.
Proceedings of the Quantitative Evaluation of Systems - 11th International Conference, 2014

LeakWatch: Estimating Information Leakage from Java Programs.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
Probabilistic Point-to-Point Information Leakage.
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013

A Tool for Estimating Information Leakage.
Proceedings of the Computer Aided Verification - 25th International Conference, 2013

2012
Efficient Padding Oracle Attacks on Cryptographic Hardware.
IACR Cryptol. ePrint Arch., 2012

Computational Soundness of Indistinguishability Properties without Computable Parsing.
Proceedings of the Information Security Practice and Experience, 2012

2009
Computational and Symbolic Anonymity in an Unbounded Network.
JSIAM Lett., 2009

Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption.
Proceedings of the Formal to Practical Security, 2009


  Loading...