Alert button
Picture for Yusuke Kawamoto

Yusuke Kawamoto

Alert button

Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy

Add code
Bookmark button
Alert button
Jan 19, 2023
Yusuke Kawamoto, Kazumasa Miyake, Koichi Konishi, Yutaka Oiwa

Figure 1 for Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy
Figure 2 for Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy
Figure 3 for Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy
Figure 4 for Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy
Viaarxiv icon

Formalizing Statistical Causality via Modal Logic

Add code
Bookmark button
Alert button
Nov 01, 2022
Yusuke Kawamoto, Tetsuya Sato, Kohei Suenaga

Figure 1 for Formalizing Statistical Causality via Modal Logic
Figure 2 for Formalizing Statistical Causality via Modal Logic
Figure 3 for Formalizing Statistical Causality via Modal Logic
Figure 4 for Formalizing Statistical Causality via Modal Logic
Viaarxiv icon

Sound and Relatively Complete Belief Hoare Logic for Statistical Hypothesis Testing Programs

Add code
Bookmark button
Alert button
Aug 15, 2022
Yusuke Kawamoto, Tetsuya Sato, Kohei Suenaga

Figure 1 for Sound and Relatively Complete Belief Hoare Logic for Statistical Hypothesis Testing Programs
Figure 2 for Sound and Relatively Complete Belief Hoare Logic for Statistical Hypothesis Testing Programs
Figure 3 for Sound and Relatively Complete Belief Hoare Logic for Statistical Hypothesis Testing Programs
Figure 4 for Sound and Relatively Complete Belief Hoare Logic for Statistical Hypothesis Testing Programs
Viaarxiv icon

Information Leakage Games: Exploring Information as a Utility Function

Add code
Bookmark button
Alert button
Dec 22, 2020
Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, Catuscia Palamidessi

Figure 1 for Information Leakage Games: Exploring Information as a Utility Function
Figure 2 for Information Leakage Games: Exploring Information as a Utility Function
Figure 3 for Information Leakage Games: Exploring Information as a Utility Function
Figure 4 for Information Leakage Games: Exploring Information as a Utility Function
Viaarxiv icon

TransMIA: Membership Inference Attacks Using Transfer Shadow Training

Add code
Bookmark button
Alert button
Nov 30, 2020
Seira Hidano, Yusuke Kawamoto, Takao Murakami

Figure 1 for TransMIA: Membership Inference Attacks Using Transfer Shadow Training
Figure 2 for TransMIA: Membership Inference Attacks Using Transfer Shadow Training
Figure 3 for TransMIA: Membership Inference Attacks Using Transfer Shadow Training
Figure 4 for TransMIA: Membership Inference Attacks Using Transfer Shadow Training
Viaarxiv icon

Locality Sensitive Hashing with Extended Differential Privacy

Add code
Bookmark button
Alert button
Nov 01, 2020
Natasha Fernandes, Yusuke Kawamoto, Takao Murakami

Figure 1 for Locality Sensitive Hashing with Extended Differential Privacy
Figure 2 for Locality Sensitive Hashing with Extended Differential Privacy
Figure 3 for Locality Sensitive Hashing with Extended Differential Privacy
Figure 4 for Locality Sensitive Hashing with Extended Differential Privacy
Viaarxiv icon

An Epistemic Approach to the Formal Specification of Statistical Machine Learning

Add code
Bookmark button
Alert button
Apr 27, 2020
Yusuke Kawamoto

Figure 1 for An Epistemic Approach to the Formal Specification of Statistical Machine Learning
Figure 2 for An Epistemic Approach to the Formal Specification of Statistical Machine Learning
Figure 3 for An Epistemic Approach to the Formal Specification of Statistical Machine Learning
Figure 4 for An Epistemic Approach to the Formal Specification of Statistical Machine Learning
Viaarxiv icon

Privacy-Preserving Multiple Tensor Factorization for Synthesizing Large-Scale Location Traces

Add code
Bookmark button
Alert button
Dec 21, 2019
Takao Murakami, Koki Hamada, Yusuke Kawamoto, Takuma Hatano

Figure 1 for Privacy-Preserving Multiple Tensor Factorization for Synthesizing Large-Scale Location Traces
Figure 2 for Privacy-Preserving Multiple Tensor Factorization for Synthesizing Large-Scale Location Traces
Figure 3 for Privacy-Preserving Multiple Tensor Factorization for Synthesizing Large-Scale Location Traces
Figure 4 for Privacy-Preserving Multiple Tensor Factorization for Synthesizing Large-Scale Location Traces
Viaarxiv icon

Towards Logical Specification of Statistical Machine Learning

Add code
Bookmark button
Alert button
Jul 24, 2019
Yusuke Kawamoto

Figure 1 for Towards Logical Specification of Statistical Machine Learning
Figure 2 for Towards Logical Specification of Statistical Machine Learning
Figure 3 for Towards Logical Specification of Statistical Machine Learning
Viaarxiv icon

Local Distribution Obfuscation via Probability Coupling

Add code
Bookmark button
Alert button
Jul 13, 2019
Yusuke Kawamoto, Takao Murakami

Figure 1 for Local Distribution Obfuscation via Probability Coupling
Figure 2 for Local Distribution Obfuscation via Probability Coupling
Figure 3 for Local Distribution Obfuscation via Probability Coupling
Figure 4 for Local Distribution Obfuscation via Probability Coupling
Viaarxiv icon