default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 535 matches
- 2024
- Yiran Xiao, Yaokai Feng, Kouichi Sakurai:
An Efficient Detection Mechanism of Network Intrusions in IoT Environments Using Autoencoder and Data Partitioning. Comput. 13(10): 269 (2024) - Maharage Nisansala Sevwandi Perera, Takashi Matsunaka, Hiroyuki Yokoyama, Kouichi Sakurai:
Secured tracing for group signatures from attribute-based encryption. Concurr. Comput. Pract. Exp. 36(15) (2024) - Kouichi Sakurai:
Foreword. IEICE Trans. Inf. Syst. 107(9): 1110-1111 (2024) - Chunlu Chen, Kevin I-Kai Wang, Peng Li, Kouichi Sakurai:
A Multi-Head Federated Continual Learning Approach for Improved Flexibility and Robustness in Edge Environments. Int. J. Netw. Comput. 14(2): 123-144 (2024) - Jong-Yeon Park, Jang-Won Ju, Wonil Lee, Bo-Gyeong Kang, Yasuyuki Kachi, Kouichi Sakurai:
A statistical verification method of random permutations for hiding countermeasure against side-channel attacks. J. Inf. Secur. Appl. 84: 103797 (2024) - Haibo Zhang, Kouichi Sakurai:
Experimental Exploration of the Power of Conditional GAN in Image Reconstruction-Based Adversarial Attack Defense Strategies. AINA (3) 2024: 151-162 - Chunlu Chen, Kevin I-Kai Wang, Peng Li, Kouichi Sakurai:
Enhancing Security and Efficiency: A Lightweight Federated Learning Approach. AINA (4) 2024: 349-359 - Yang Lyu, Yaokai Feng, Kouichi Sakurai:
Design and Performance Evaluation of a Two-Stage Detection of DDoS Attacks Using a Trigger with a Feature on Riemannian Manifolds. AINA (4) 2024: 133-144 - Hideki Sakurada, Kouichi Sakurai:
SoK: Directions and Issues in Formal Verification of Payment Protocols. AINA (4) 2024: 111-119 - Ryu Watanabe, Ayumu Kubota, Jun Kurihara, Kouichi Sakurai:
Extension of Resource Authorization Method with SSI in Edge Computing. AINA (6) 2024: 385-394 - Mariama Mbow, Rodrigo Roman, Takeshi Takahashi, Kouichi Sakurai:
Evading IoT Intrusion Detection Systems with GAN. AsiaJCIS 2024: 48-55 - Hong Zhao, Enting Guo, Xiuheng Liao, Kouichi Sakurai, Chunhua Su:
The Framework of General Channel Key Generation Based on Physical Layer. DSPP (2) 2024: 204-220 - Yiluo Liu, Yaokai Feng, Kouichi Sakurai:
A Design of Internet of Vehicles System Incorporating Lightweight Roadside Units and Blockchain Strategy. IMCOM 2024: 1-8 - Zhuotao Lian, Weiyu Wang, Chunhua Su, Kouichi Sakurai:
AggreMark: Efficient Watermarking in Federated Learning via Weighted Averaging. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2024: 473-478 - Haibo Zhang, Zhihua Yao, Kouichi Sakurai:
Versatile Defense Against Adversarial Attacks on Image Recognition. CoRR abs/2403.08170 (2024) - Xiaozhou Ye, Kouichi Sakurai, Nirmal-Kumar C. Nair, Kevin I-Kai Wang:
Machine Learning Techniques for Sensor-based Human Activity Recognition with Data Heterogeneity - A Review. CoRR abs/2403.15422 (2024) - Tapaswini Mohanty, Vikas Srivastava, Sumit Kumar Debnath, Debasish Roy, Kouichi Sakurai, Sourav Mukhopadhyay:
An Experimentally Validated Feasible Quantum Protocol for Identity-Based Signature with Application to Secure Email Communication. CoRR abs/2403.18247 (2024) - Kaito Taguchi, Yujie Gu, Kouichi Sakurai:
The Impact of Prompts on Zero-Shot Detection of AI-Generated Text. CoRR abs/2403.20127 (2024) - Yuzhang Chen, Jiangnan Zhu, Yujie Gu, Minoru Kuribayashi, Kouichi Sakurai:
FreeMark: A Non-Invasive White-Box Watermarking for Deep Neural Networks. CoRR abs/2409.09996 (2024) - Yukai Xu, Yujie Gu, Kouichi Sakurai:
PAD-FT: A Lightweight Defense for Backdoor Attacks via Data Purification and Fine-Tuning. CoRR abs/2409.12072 (2024) - Jong-Yeon Park, Wonil Lee, Bo Gyeong Kang, Il-jong Song, Jaekeun Oh, Kouichi Sakurai:
A Compact and Parallel Swap-Based Shuffler based on butterfly Network and its complexity against Side Channel Analysis. IACR Cryptol. ePrint Arch. 2024: 1217 (2024) - Anandarup Roy, Bimal Kumar Roy, Kouichi Sakurai, Suprita Talnikar:
Access Structure Hiding Verifiable Tensor Designs. IACR Cryptol. ePrint Arch. 2024: 902 (2024) - 2023
- Surbhi Soni, Ayan Seal, Sraban Kumar Mohanty, Kouichi Sakurai:
Electroencephalography signals-based sparse networks integration using a fuzzy ensemble technique for depression detection. Biomed. Signal Process. Control. 85: 104873 (2023) - Ishak Meraouche, Sabyasachi Dutta, Haowen Tan, Kouichi Sakurai:
Learning asymmetric encryption using adversarial neural networks. Eng. Appl. Artif. Intell. 123(Part B): 106220 (2023) - Rodrigo Roman, Cristina Alcaraz, Javier López, Kouichi Sakurai:
Current Perspectives on Securing Critical Infrastructures' Supply Chains. IEEE Secur. Priv. 21(4): 29-38 (2023) - Yang Lyu, Yaokai Feng, Kouichi Sakurai:
A Survey on Feature Selection Techniques Based on Filtering Methods for Cyber Attack Detection. Inf. 14(3): 191 (2023) - Haibo Zhang, Toru Nakamura, Takamasa Isohara, Kouichi Sakurai:
A Review on Machine Unlearning. SN Comput. Sci. 4(4): 337 (2023) - Haowen Tan, Wenying Zheng, Pandi Vijayakumar, Kouichi Sakurai, Neeraj Kumar:
An Efficient Vehicle-Assisted Aggregate Authentication Scheme for Infrastructure-Less Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 24(12): 15590-15600 (2023) - Chenmin Wang, Peng Li, Xuepeng Fan, Zaiyang Tang, Yulong Zeng, Kouichi Sakurai:
Phoenix: A Live Upgradable Blockchain Client. IEEE Trans. Sustain. Comput. 8(4): 703-714 (2023) - Chunlu Chen, Kevin I-Kai Wang, Peng Li, Kouichi Sakurai:
POSTER: Advancing Federated Edge Computing with Continual Learning for Secure and Efficient Performance. ACNS Workshops 2023: 685-689
skipping 505 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-09 00:14 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint