Picture for Naoto Yanai

Naoto Yanai

Decoding BACnet Packets: A Large Language Model Approach for Packet Interpretation

Add code
Jul 22, 2024
Viaarxiv icon

JABBERWOCK: A Tool for WebAssembly Dataset Generation and Its Application to Malicious Website Detection

Add code
Jun 09, 2023
Viaarxiv icon

Privacy-Preserving Taxi-Demand Prediction Using Federated Learning

Add code
May 21, 2023
Viaarxiv icon

Do Backdoors Assist Membership Inference Attacks?

Add code
Mar 22, 2023
Figure 1 for Do Backdoors Assist Membership Inference Attacks?
Figure 2 for Do Backdoors Assist Membership Inference Attacks?
Figure 3 for Do Backdoors Assist Membership Inference Attacks?
Figure 4 for Do Backdoors Assist Membership Inference Attacks?
Viaarxiv icon

Membership Inference Attacks against Diffusion Models

Add code
Feb 07, 2023
Viaarxiv icon

First to Possess His Statistics: Data-Free Model Extraction Attack on Tabular Data

Add code
Sep 30, 2021
Figure 1 for First to Possess His Statistics: Data-Free Model Extraction Attack on Tabular Data
Figure 2 for First to Possess His Statistics: Data-Free Model Extraction Attack on Tabular Data
Figure 3 for First to Possess His Statistics: Data-Free Model Extraction Attack on Tabular Data
Figure 4 for First to Possess His Statistics: Data-Free Model Extraction Attack on Tabular Data
Viaarxiv icon

Eth2Vec: Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts

Add code
Jan 08, 2021
Figure 1 for Eth2Vec: Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts
Figure 2 for Eth2Vec: Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts
Figure 3 for Eth2Vec: Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts
Figure 4 for Eth2Vec: Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts
Viaarxiv icon

Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for Intrusion Detection

Add code
Aug 28, 2020
Figure 1 for Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for Intrusion Detection
Figure 2 for Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for Intrusion Detection
Figure 3 for Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for Intrusion Detection
Figure 4 for Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for Intrusion Detection
Viaarxiv icon

Model Extraction Attacks against Recurrent Neural Networks

Add code
Feb 01, 2020
Figure 1 for Model Extraction Attacks against Recurrent Neural Networks
Figure 2 for Model Extraction Attacks against Recurrent Neural Networks
Figure 3 for Model Extraction Attacks against Recurrent Neural Networks
Figure 4 for Model Extraction Attacks against Recurrent Neural Networks
Viaarxiv icon

MOBIUS: Model-Oblivious Binarized Neural Networks

Add code
Nov 29, 2018
Figure 1 for MOBIUS: Model-Oblivious Binarized Neural Networks
Figure 2 for MOBIUS: Model-Oblivious Binarized Neural Networks
Figure 3 for MOBIUS: Model-Oblivious Binarized Neural Networks
Figure 4 for MOBIUS: Model-Oblivious Binarized Neural Networks
Viaarxiv icon