HASEGAWA, Kento
147  Ergebnisse:
Personensuche X
?
1

EdgePruner: Poisoned Edge Pruning in Graph Contrastive Lear..:

, In: 2024 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML),
Kato, Hiroya ; Hasegawa, Kento ; Hidano, Seira. - p. 309-326 , 2024
 
?
3

AutoRed: Automating Red Team Assessment via Strategic Think..:

, In: Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy,
 
?
 
?
5

Membership Inference Attacks against GNN-based Hardware Tro..:

, In: 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom),
Hasegawa, Kento ; Yamashita, Kazuki ; Hidano, Seira... - p. 1222-1229 , 2023
 
?
 
?
7

Effective Hardware-Trojan Feature Extraction Against Advers..:

, In: 2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS),
 
?
9

Generating Adversarial Examples for Hardware-Trojan Detecti..:

Nozawa, Kohei ; Hasegawa, Kento ; Hidano, Seira...
Journal of Information Processing.  29 (2021)  0 - p. 236-246 , 2021
 
?
11

A Two-Stage Hardware Trojan Detection Method Considering th..:

HASEGAWA, Kento ; INOUE, Tomotaka ; TOGAWA, Nozomu
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences.  E104.A (2021)  11 - p. 1516-1525 , 2021
 
?
12

Toward Learning Robust Detectors from Imbalanced Datasets L..:

, In: Cryptology and Network Security; Lecture Notes in Computer Science,
 
?
13

FPGA-based Heterogeneous Solver for Three-Dimensional Routi..:

, In: 2020 25th Asia and South Pacific Design Automation Conference (ASP-DAC),
 
?
 
?
15

Evaluation on Hardware-Trojan Detection at Gate-Level IP Co..:

, In: 2020 IEEE 26th International Symposium on On-Line Testing and Robust System Design (IOLTS),
 
1-15