default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 22 matches
- 2021
- Subhadeep Banik, Yuki Funabiki, Takanori Isobe:
Further Results on Efficient Implementations of Block Cipher Linear Layers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(1): 213-225 (2021) - Francesco Cartella, Orlando Anunciação, Yuki Funabiki, Daisuke Yamaguchi, Toru Akishita, Olivier Elshocht:
Adversarial Attacks for Tabular Data: Application to Fraud Detection and Imbalanced Data. SafeAI@AAAI 2021 - Toshiki Itagaki, Yuki Funabiki, Toru Akishita:
Robust Image Hashing for Detecting Small Tampering Using a Hyperrectangular Region. WIFS 2021: 1-6 - Francesco Cartella, Orlando Anunciação, Yuki Funabiki, Daisuke Yamaguchi, Toru Akishita, Olivier Elshocht:
Adversarial Attacks for Tabular Data: Application to Fraud Detection and Imbalanced Data. CoRR abs/2101.08030 (2021) - Ali Agha, Kyohei Otsu, Benjamin Morrell, David D. Fan, Rohan Thakker, Angel Santamaria-Navarro, Sung-Kyun Kim, Amanda Bouman, Xianmei Lei, Jeffrey A. Edlund, Muhammad Fadhil Ginting, Kamak Ebadi, Matthew Anderson, Torkom Pailevanian, Edward Terry, Michael T. Wolf, Andrea Tagliabue, Tiago Stegun Vaquero, Matteo Palieri, Scott Tepsuporn, Yun Chang, Arash Kalantari, Fernando Chavez, Brett Thomas Lopez, Nobuhiro Funabiki, Gregory Miles, Thomas Touma, Alessandro Buscicchio, Jesus Tordesillas, Nikhilesh Alatur, Jeremy Nash, William Walsh, Sunggoo Jung, Hanseob Lee, Christoforos Kanellakis, John Mayo, Scott Harper, Marcel Kaufmann, Anushri Dixit, Gustavo Correa, Carlyn Lee, Jay Gao, Gene Merewether, Jairo Maldonado-Contreras, Gautam Salhotra, Maíra Saboia da Silva, Benjamin Ramtoula, Yuki Kubo, Seyed Abolfazl Fakoorian, Alexander Hatteland, Taeyeon Kim, Tara Bartlett, Alex Stephens, Leon Kim, Chuck Bergh, Eric Heiden, Thomas Lew, Abhishek Cauligi, Tristan Heywood, Andrew Kramer, Henry A. Leopold, Hyungho Chris Choi, Shreyansh Daftry, Olivier Toupet, Inhwan Wee, Abhishek Thakur, Micah Feras, Giovanni Beltrame, George Nikolakopoulos, David Hyunchul Shim, Luca Carlone, Joel Burdick:
NeBula: Quest for Robotic Autonomy in Challenging Environments; TEAM CoSTAR at the DARPA Subterranean Challenge. CoRR abs/2103.11470 (2021) - 2020
- Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Takanori Isobe:
Security of Related-Key Differential Attacks on TWINE, Revisited. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1): 212-214 (2020) - Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Andrey Bogdanov, Sumio Morioka, Takanori Isobe:
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(12): 1629-1639 (2020) - 2019
- Yuki Funabiki, Yosuke Todo, Takanori Isobe, Masakatu Morii:
Improved Integral Attack on HIGHT. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(9): 1259-1271 (2019) - Subhadeep Banik, Yuki Funabiki, Takanori Isobe:
More Results on Shortest Linear Programs. IWSEC 2019: 109-128 - Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Andrey Bogdanov, Sumio Morioka, Takanori Isobe:
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure. IWSEC 2019: 129-145 - Subhadeep Banik, Yuki Funabiki, Takanori Isobe:
More results on Shortest Linear Programs. IACR Cryptol. ePrint Arch. 2019: 856 (2019) - 2018
- Yuki Funabiki, Yosuke Todo, Takanori Isobe, Masakatu Morii:
Several MILP-Aided Attacks Against SNOW 2.0. CANS 2018: 394-413 - 2017
- Yuki Funabiki, Yosuke Todo, Takanori Isobe, Masakatu Morii:
Improved Integral Attack on HIGHT. ACISP (1) 2017: 363-383 - 2015
- Yukiko Matsushima, Nobuo Funabiki:
A Cooking-Step Scheduling Algorithm with Guidance System for Homemade Cooking. IEICE Trans. Inf. Syst. 98-D(8): 1439-1448 (2015) - Yukiko Matsushima, Nobuo Funabiki:
Practices of Cooking-Step Scheduling Algorithm for Homemade Cooking. IIAI-AAI 2015: 500-505 - 2013
- Nobuo Funabiki, Yukiko Matsushima, Toru Nakanishi, Kan Watanabe:
An extension of menu planning algorithm for two-phase homemade cooking. GCCE 2013: 352-356 - Yukiko Matsushima, Nobuo Funabiki, Yijia Zhang, Toru Nakanishi, Kan Watanabe:
Extensions of cooking guidance function on Android tablet for homemade cooking assistance system. GCCE 2013: 397-401 - 2012
- Nobuo Funabiki, Yousuke Korenaga, Yukiko Matsushima, Toru Nakanishi, Kan Watanabe:
An Online Fill-in-the-Blank Problem Function for Learning Reserved Words in Java Programming Education. AINA Workshops 2012: 375-380 - 2011
- Nobuo Funabiki, Shiho Taniguchi, Yukiko Matsushima, Toru Nakanishi:
A Proposal of a Menu Planning Algorithm for Two-phase Cooking by Busy Persons. CISIS 2011: 668-673 - Yukikazu Murakami, Erina Kagawa, Nobuo Funabiki:
Automatic Generation of Configuration Manuals for Open-Source Software. CISIS 2011: 653-658 - 2009
- Yukikazu Murakami, Nobuo Funabiki, Hidekazu Tokunaga, Kazuhiro Shigeta, Toru Nakanishi:
A Web-Based Installation Manual Management System for Open Source Software. NCM 2009: 1261-1266 - 2008
- Yukikazu Murakami, Nobuo Funabiki, Hidekazu Tokunaga, Kazuhiro Shigeta, Toru Nakanishi:
A Proposal of an Installation Manual Generation Method for Open Source Software Using Operation Logs. SITIS 2008: 547-554
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-04 17:50 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint