Alert button
Picture for Naoto Yanai

Naoto Yanai

Alert button

JABBERWOCK: A Tool for WebAssembly Dataset Generation and Its Application to Malicious Website Detection

Add code
Bookmark button
Alert button
Jun 09, 2023
Chika Komiya, Naoto Yanai, Kyosuke Yamashita, Shingo Okamura

Figure 1 for JABBERWOCK: A Tool for WebAssembly Dataset Generation and Its Application to Malicious Website Detection
Figure 2 for JABBERWOCK: A Tool for WebAssembly Dataset Generation and Its Application to Malicious Website Detection
Figure 3 for JABBERWOCK: A Tool for WebAssembly Dataset Generation and Its Application to Malicious Website Detection
Figure 4 for JABBERWOCK: A Tool for WebAssembly Dataset Generation and Its Application to Malicious Website Detection
Viaarxiv icon

Privacy-Preserving Taxi-Demand Prediction Using Federated Learning

Add code
Bookmark button
Alert button
May 21, 2023
Yumeki Goto, Tomoya Matsumoto, Hamada Rizk, Naoto Yanai, Hirozumi Yamaguchi

Figure 1 for Privacy-Preserving Taxi-Demand Prediction Using Federated Learning
Figure 2 for Privacy-Preserving Taxi-Demand Prediction Using Federated Learning
Figure 3 for Privacy-Preserving Taxi-Demand Prediction Using Federated Learning
Figure 4 for Privacy-Preserving Taxi-Demand Prediction Using Federated Learning
Viaarxiv icon

Balancing Privacy and Utility of Spatio-Temporal Data for Taxi-Demand Prediction

Add code
Bookmark button
Alert button
May 14, 2023
Yumeki Goto, Tomoya Matsumoto, Hamada Rizk, Naoto Yanai, Hirozumi Yamaguchi

Figure 1 for Balancing Privacy and Utility of Spatio-Temporal Data for Taxi-Demand Prediction
Figure 2 for Balancing Privacy and Utility of Spatio-Temporal Data for Taxi-Demand Prediction
Figure 3 for Balancing Privacy and Utility of Spatio-Temporal Data for Taxi-Demand Prediction
Figure 4 for Balancing Privacy and Utility of Spatio-Temporal Data for Taxi-Demand Prediction
Viaarxiv icon

Do Backdoors Assist Membership Inference Attacks?

Add code
Bookmark button
Alert button
Mar 22, 2023
Yumeki Goto, Nami Ashizawa, Toshiki Shibahara, Naoto Yanai

Figure 1 for Do Backdoors Assist Membership Inference Attacks?
Figure 2 for Do Backdoors Assist Membership Inference Attacks?
Figure 3 for Do Backdoors Assist Membership Inference Attacks?
Figure 4 for Do Backdoors Assist Membership Inference Attacks?
Viaarxiv icon

Membership Inference Attacks against Diffusion Models

Add code
Bookmark button
Alert button
Feb 07, 2023
Tomoya Matsumoto, Takayuki Miura, Naoto Yanai

Figure 1 for Membership Inference Attacks against Diffusion Models
Figure 2 for Membership Inference Attacks against Diffusion Models
Figure 3 for Membership Inference Attacks against Diffusion Models
Figure 4 for Membership Inference Attacks against Diffusion Models
Viaarxiv icon

First to Possess His Statistics: Data-Free Model Extraction Attack on Tabular Data

Add code
Bookmark button
Alert button
Sep 30, 2021
Masataka Tasumi, Kazuki Iwahana, Naoto Yanai, Katsunari Shishido, Toshiya Shimizu, Yuji Higuchi, Ikuya Morikawa, Jun Yajima

Figure 1 for First to Possess His Statistics: Data-Free Model Extraction Attack on Tabular Data
Figure 2 for First to Possess His Statistics: Data-Free Model Extraction Attack on Tabular Data
Figure 3 for First to Possess His Statistics: Data-Free Model Extraction Attack on Tabular Data
Figure 4 for First to Possess His Statistics: Data-Free Model Extraction Attack on Tabular Data
Viaarxiv icon

Eth2Vec: Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts

Add code
Bookmark button
Alert button
Jan 08, 2021
Nami Ashizawa, Naoto Yanai, Jason Paul Cruz, Shingo Okamura

Figure 1 for Eth2Vec: Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts
Figure 2 for Eth2Vec: Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts
Figure 3 for Eth2Vec: Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts
Figure 4 for Eth2Vec: Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts
Viaarxiv icon

Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for Intrusion Detection

Add code
Bookmark button
Alert button
Aug 28, 2020
Yang Chen, Nami Ashizawa, Seanglidet Yean, Chai Kiat Yeo, Naoto Yanai

Figure 1 for Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for Intrusion Detection
Figure 2 for Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for Intrusion Detection
Figure 3 for Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for Intrusion Detection
Figure 4 for Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for Intrusion Detection
Viaarxiv icon

Model Extraction Attacks against Recurrent Neural Networks

Add code
Bookmark button
Alert button
Feb 01, 2020
Tatsuya Takemura, Naoto Yanai, Toru Fujiwara

Figure 1 for Model Extraction Attacks against Recurrent Neural Networks
Figure 2 for Model Extraction Attacks against Recurrent Neural Networks
Figure 3 for Model Extraction Attacks against Recurrent Neural Networks
Figure 4 for Model Extraction Attacks against Recurrent Neural Networks
Viaarxiv icon

MOBIUS: Model-Oblivious Binarized Neural Networks

Add code
Bookmark button
Alert button
Nov 29, 2018
Hiromasa Kitai, Jason Paul Cruz, Naoto Yanai, Naohisa Nishida, Tatsumi Oba, Yuji Unagami, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka

Figure 1 for MOBIUS: Model-Oblivious Binarized Neural Networks
Figure 2 for MOBIUS: Model-Oblivious Binarized Neural Networks
Figure 3 for MOBIUS: Model-Oblivious Binarized Neural Networks
Figure 4 for MOBIUS: Model-Oblivious Binarized Neural Networks
Viaarxiv icon