![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 97 matches
- 2024
- Ren Takeuchi, Rikima Mitsuhashi, Masakatsu Nishigaki, Tetsushi Ohki:
Ensemble Malware Classifier Considering PE Section Information. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(3): 306-318 (2024) - Jun Narita, Takao Murakami, Hideitsu Hino, Masakatsu Nishigaki, Tetsushi Ohki
:
Synthesizing differentially private location traces including co-locations. Int. J. Inf. Sec. 23(1): 389-410 (2024) - Ayane Sano, Yukiko Sawaya, Takamasa Isohara, Masakatsu Nishigaki:
Messages and Incentives to Promote Updating of Software on Smartphones. AINA (4) 2024: 187-200 - Kota Numada, Shinnosuke Nozaki, Takumi Takaiwa, Tetsushi Ohki, Masakatsu Nishigaki:
Perceiving Human Psychological Consistency: Attack Detection Against Advanced Persistent Social Engineering. EIDWT 2024: 152-162 - Toi Kojima, Tomoya Aiba, Soshi Maeda, Hiromi Arai, Masakatsu Nishigaki, Tetsushi Ohki:
Are Dark Patterns Self-destructive for Service Providers?: Revealing Their Impacts on Usability and User Satisfaction. HCI (37) 2024: 66-78 - Takumi Takaiwa, Shinnosuke Nozaki, Kota Numada, Tsubasa Shibata, Sana Okumura, Soichi Takigawa, Tetsushi Ohki, Masakatsu Nishigaki:
Electrical Muscle Stimulation System for Automatic Reproduction of Secret Information Without Exposing Biometric Data. HCI (46) 2024: 234-249 - Tussoun Jitpanyoyos, Yuya Sato, Soshi Maeda, Masakatsu Nishigaki, Tetsushi Ohki:
ExpressionAuth: Utilizing Avatar Expression Blendshapes for Behavioral Biometrics in VR. VR Workshops 2024: 679-680 - 2023
- Hiroshi Horikawa
, Hisamichi Ohtani, Yuji Takahashi, Takehisa Kato, Fumihiko Magata, Yoshimi Teshigawara, Ryôichi Sasaki, Masakatsu Nishigaki:
Enhancement of a Company-Wide Information Security Management System Through Incident Learning. SN Comput. Sci. 4(3): 211 (2023) - Sana Okumura, Tomoya Amagasa, Tsubasa Shibata, Takumi Yamamoto, Tadakazu Yamanaka, Tetsushi Ohki, Masakatsu Nishigaki:
Scheme for Selection of Deceptions as a Countermeasure for Insider Threats. BWCCA 2023: 109-121 - Ayane Sano, Yukiko Sawaya, Takamasa Isohara, Masakatsu Nishigaki:
Human Factors Impacting the Security Actions of Help Recipients. BWCCA 2023: 81-93 - Ayane Sano, Yukiko Sawaya, Takamasa Isohara, Masakatsu Nishigaki:
Proposal for Approaches to Updating Software on Android Smartphone. BWCCA 2023: 94-108 - 2022
- Takamichi Terada, Vo Ngoc Khoi Nguyen, Masakatsu Nishigaki, Tetsushi Ohki:
Improving Robustness and Visibility of Adversarial CAPTCHA Using Low-Frequency Perturbation. AINA (2) 2022: 586-597 - Muku Akasaka, Soshi Maeda, Yuya Sato, Masakatsu Nishigaki, Tetsushi Ohki:
Model-Free Template Reconstruction Attack with Feature Converter. BIOSIG 2022: 14-22 - Ayumi Serizawa, Ryosuke Okudera, Yumo Ouchi, Mizuho Yoshihira, Yuya Shiomi, Naoya Nitta, Masataka Nakahara, Akira Baba, Yutaka Miyake, Tetsushi Ohki, Masakatsu Nishigaki:
Improving Palmprint-Region Estimation for ID-Less Palmprint Recognition. BWCCA 2022: 125-136 - Kohei Yagyu, Ren Takeuchi, Masakatsu Nishigaki, Tetsushi Ohki:
Improving Classification Accuracy by Optimizing Activation Function for Convolutional Neural Network on Homomorphic Encryption. BWCCA 2022: 102-113 - Mizuho Yoshihira, Ayumi Serizawa, Ryosuke Okudera, Yumo Ouchi, Yuya Shiomi, Naoya Nitta, Masataka Nakahara, Akira Baba, Yutaka Miyake, Tetsushi Ohki, Masakatsu Nishigaki
:
Improving Rank-N Identification Rate of Palmprint Identification Using Permutation-Based Indexing. HCI (32) 2022: 78-93 - Shinnosuke Nozaki, Ayumi Serizawa, Mizuho Yoshihira, Masahiro Fujita, Yoichi Shibata, Tadakazu Yamanaka, Nori Matsuda, Tetsushi Ohki, Masakatsu Nishigaki:
Multi-observed Multi-factor Authentication: A Multi-factor Authentication Using Single Credential. NBiS 2022: 201-211 - 2021
- Vo Ngoc Khoi Nguyen, Takamichi Terada, Masakatsu Nishigaki, Tetsushi Ohki:
Examining of Shallow Autoencoder on Black-box Attack against Face Recognition. APSIPA ASC 2021: 1775-1780 - Jun Narita, Yayoi Suganuma, Masakatsu Nishigaki, Takao Murakami, Tetsushi Ohki:
Synthesizing Privacy-Preserving Location Traces Including Co-locations. DPM/CBT@ESORICS 2021: 20-36 - Takumi Kitagawa, Tetsushi Ohki, Yuki Koizumi, Yoshinobu Kawabe, Toru Hasegawa, Masakatsu Nishigaki:
Deterrence-Based Trust: A Study on Improving the Credibility of Social Media Messages in Disaster Using Registered Volunteers. NBiS 2021: 188-201 - 2020
- Nori Matsuda, Takato Hirano, Yutaka Kawai, Takashi Ito, Mitsuhiro Hattori, Tadakazu Yamanaka, Masakatsu Nishigaki:
Public-key Searchable Encryption with Index Generation for Shared Database. J. Inf. Process. 28: 520-536 (2020) - Yuya Shiomi, Genki Sugimoto, Ayaka Sugimoto, Kota Uehara, Masahiro Fujita, Yuto Mano, Tetsushi Ohki, Masakatsu Nishigaki:
Micro Biometric Authentication Using Fingernail Surfaces: A Study of Practical Use. AINA 2020: 1330-1340 - Kota Uehara, Hiroki Nishikawa, Takumi Yamamoto, Kiyoto Kawauchi, Masakatsu Nishigaki:
Analysis of the Relationship Between Psychological Manipulation Techniques and Both Personality Factors and Behavioral Characteristics in Targeted Email. AINA 2020: 1278-1290 - Yumo Ouchi, Ryosuke Okudera, Yuya Shiomi, Kota Uehara, Ayaka Sugimoto, Tetsushi Ohki, Masakatsu Nishigaki:
Study on Possibility of Estimating Smartphone Inputs from Tap Sounds. APSIPA 2020: 1425-1429 - Hiroki Nishikawa, Takumi Yamamoto, Bret A. Harsham, Ye Wang, Kota Uehara, Chiori Hori, Aiko Iwasaki, Kiyoto Kawauchi, Masakatsu Nishigaki:
Analysis of Malicious Email Detection using Cialdini's Principles. AsiaJCIS 2020: 137-142 - Kotomi Kuroki, Yo Kanemoto, Kazufumi Aoki, Yasuhiro Noguchi, Masakatsu Nishigaki:
Attack Intention Estimation Based on Syntax Analysis and Dynamic Analysis for SQL Injection. COMPSAC 2020: 1510-1515 - Yayoi Suganuma, Jun Narita, Masakatsu Nishigaki, Tetsushi Ohki
:
Understanding the Impact of Service Trials on Privacy Disclosure. HCI (40) 2020: 605-612 - Koki Mukaihira, Yasuyoshi Jinno, Takashi Tsuchiya, Tetsushi Ohki, Kenta Takahashi, Wakaha Ogata, Masakatsu Nishigaki:
Communication Protocol Between Humans and Bank Server Secure Against Man-in-the-Browser Attacks. IHSI 2020: 503-509 - Ayaka Sugimoto, Yuya Shiomi, Akira Baba, Norihiro Okui, Tetsushi Ohki, Yutaka Miyake, Masakatsu Nishigaki:
A Liveness Detection Method for Palmprint Authentication. IHSI 2020: 385-391 - 2019
- Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki:
Signature schemes with a fuzzy private key. Int. J. Inf. Sec. 18(5): 581-617 (2019)
skipping 67 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-18 19:18 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint