Hidano, Seira
36  results:
Search for persons X
?
1

EdgePruner: Poisoned Edge Pruning in Graph Contrastive Lear..:

, In: 2024 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML),
Kato, Hiroya ; Hasegawa, Kento ; Hidano, Seira. - p. 309-326 , 2024
 
?
3

AutoRed: Automating Red Team Assessment via Strategic Think..:

, In: Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy,
 
?
 
?
5

Membership Inference Attacks against GNN-based Hardware Tro..:

, In: 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom),
Hasegawa, Kento ; Yamashita, Kazuki ; Hidano, Seira... - p. 1222-1229 , 2023
 
?
6

Influence of Errors on the Evaluation of Text Classificatio..:

, In: Communications in Computer and Information Science; Computer Vision, Imaging and Computer Graphics Theory and Applications,
 
?
7

Detecting Machine-Translated Paragraphs by Matching Similar..:

, In: Computational Linguistics and Intelligent Text Processing; Lecture Notes in Computer Science,
 
?
8

Effective Hardware-Trojan Feature Extraction Against Advers..:

, In: 2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS),
 
?
9

Effects of Explanatory Information on Privacy Policy Summar..:

, In: Communications in Computer and Information Science; Information Systems Security and Privacy,
 
?
10

Generating Adversarial Examples for Hardware-Trojan Detecti..:

Nozawa, Kohei ; Hasegawa, Kento ; Hidano, Seira...
Journal of Information Processing.  29 (2021)  0 - p. 236-246 , 2021
 
?
11

Toward Learning Robust Detectors from Imbalanced Datasets L..:

, In: Cryptology and Network Security; Lecture Notes in Computer Science,
 
?
12

Countermeasures Against Backdoor Attacks Towards Malware De..:

, In: Cryptology and Network Security; Lecture Notes in Computer Science,
Narisada, Shintaro ; Matsumoto, Yuki ; Hidano, Seira... - p. 295-314 , 2021
 
?
13

Stronger Targeted Poisoning Attacks Against Malware Detecti..:

, In: Cryptology and Network Security; Lecture Notes in Computer Science,
 
?
14

Anonymization Technique Based on SGD Matrix Factorization:

MIMOTO, Tomoaki ; HIDANO, Seira ; KIYOMOTO, Shinsaku.
IEICE Transactions on Information and Systems.  E103.D (2020)  2 - p. 299-308 , 2020
 
?
15

Adversarial Examples for Hardware-Trojan Detection at Gate-..:

, In: Computer Security; Lecture Notes in Computer Science,
Nozawa, Kohei ; Hasegawa, Kento ; Hidano, Seira... - p. 341-359 , 2020
 
1-15