Shibahara, Toshiki
15  results:
Search for persons X
?
1

Evaluation of Adversarial Examples Based on Original Defini..:

, In: HCI International 2024 Posters; Communications in Computer and Information Science,
Fujimori, Ko ; Shibahara, Toshiki ; Chiba, Daiki.. - p. 36-43 , 2024
 
?
2

MEGEX: Data-Free Model Extraction Attack Against Gradient-B..:

, In: Proceedings of the 2nd ACM Workshop on Secure and Trustworthy Deep Learning Systems,
 
?
3

Noisy Label Detection for Multi-labeled Malware:

, In: 2024 IEEE 21st Consumer Communications & Networking Conference (CCNC),
 
?
4

Competitive Information Spreading on Modular Networks:

, In: Network Science; Lecture Notes in Computer Science,
 
?
5

Objection!: Identifying Misclassified Malicious Activities ..:

, In: ICC 2022 - IEEE International Conference on Communications,
Fujita, Koji ; Shibahara, Toshiki ; Chiba, Daiki.. - p. 2065-2070 , 2022
 
?
6

Understanding Update of Machine-Learning-Based Malware Dete..:

, In: Advances in Information and Computer Security; Lecture Notes in Computer Science,
Fan, Yun ; Shibahara, Toshiki ; Ohsita, Yuichi... - p. 99-118 , 2021
 
?
7

Timing Attack on Random Forests for Generating Adversarial ..:

, In: Advances in Information and Computer Security; Lecture Notes in Computer Science,
 
?
8

Detecting Malware-infected Hosts Using Templates of Multipl..:

, In: 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC),
 
?
9

Sybil Detection as Graph Filtering:

, In: GLOBECOM 2020 - 2020 IEEE Global Communications Conference,
 
?
10

Special-Purpose Model Extraction Attacks: Stealing Coarse M..:

, In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom),
Okada, Rina ; Ishikura, Zen ; Shibahara, Toshiki. - p. 1995-2000 , 2020
 
?
11

Graph Signal Processing for Directed Graphs Based on the He..:

, In: Machine Learning and Knowledge Discovery in Databases; Lecture Notes in Computer Science,
 
?
12

Anomaly Detection for Mixed Transmission CAN Messages Using..:

, In: Proceedings of the ACM Workshop on Automotive Cybersecurity,
 
?
13

Cross-Vendor Knowledge Transfer for Managed Security Servic..:

, In: Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security,
 
?
14

Understanding the origins of mobile app vulnerabilities ..:

, In: Proceedings of the 14th International Conference on Mining Software Repositories,
 
?
15

POSTER : Detecting Malicious Web Pages based on Structur..:

, In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security,
Shibahara, Toshiki ; Yagi, Takeshi ; Akiyama, Mitsuaki.. - p. 1671-1673 , 2015
 
1-15