One pixel attack for fooling deep neural networks J Su, DV Vargas, K Sakurai IEEE Transactions on Evolutionary Computation 23 (5), 828-841, 2019 | 884 | 2019 |
Usage control model and architecture for data confidentiality in a database service provider A Syalim, T Tabata, K Sakurai Information and Media Technologies 1 (2), 762-767, 2006 | 9 | 2006 |
Malware Detection Focusing on Behaviors of Process and its Implementation Y Fukushima, S Akihiro, H Yoshiaki, S Kouichi Joint Workshop on Information Security (JWIS2009), 2009 | 6 | 2009 |
EQUIVAIENCE PROBLEM AND AUTOMORPHISMS OF SOME ABELIAN BRANCHED COVERINGS OF THE RIEMANN SPHERE K Sakurai, M Suzuki Memoirs of the Faculty of Science, Kyushu University. Series A, Mathematics …, 1988 | 4 | 1988 |
Ballot-Cancellation Scheme In E-voting System H Yong-Sork, I Kenji, S Kouichi E-Government Workshop 5, 2005 | 3 | 2005 |
Mathematics and Computing: ICMC 2018, Varanasi, India, January 9-11, Selected Contributions D Ghosh, D Giri, RN Mohapatra, K Sakurai, E Savas, T Som Springer, 2018 | 1 | 2018 |
A new approach based on fog and cloud to provide security for Internet of Things constrained devices W Razouk, D Sgandurra, S Kouichi | | 2017 |
QR コードに基づいて効果的な偽造卒業証明書を防ぐ方法 MH Suwito, F Yaokai, M Shin'ich, S Kouichi 電気関係学会九州支部連合大会講演論文集 平成 28 年度電気・情報関係学会九州支部 …, 2016 | | 2016 |
Graphics Processing Unit を用いた非線形連立多元方程式解決法の高速化 T Satoshi, Y Bo-Yin, C Chen-Mou, S Kouichi 電気関係学会九州支部連合大会講演論文集 平成 25 年度電気関係学会九州支部連合 …, 2013 | | 2013 |
画素ベースの照合手法に基づく画像スプライシング認証 CR Whidiana, R Kyung-Hyune, S Kouichi 電気関係学会九州支部連合大会講演論文集 平成 24 年度電気関係学会九州支部連合 …, 2012 | | 2012 |
The open provenance model The open provenance model, 2007 A SYALIM, T NISHIDE, K Sakurai IEICE transactions on information and systems 95 (7), 1894-1907, 2012 | | 2012 |
A security model for provenance A security model for provenance, 2006 A SYALIM, T NISHIDE, K Sakurai IEICE transactions on information and systems 95 (7), 1894-1907, 2012 | | 2012 |
An architecture for provenance systems An architecture for provenance systems, 2006 A SYALIM, T NISHIDE, K Sakurai IEICE transactions on information and systems 95 (7), 1894-1907, 2012 | | 2012 |
Construction of Dynamic Threshold Scheme G Cheng, L Mingchu, R Yizhi, S Kouichi コンピュータセキュリティシンポジウム 2009 (CSS2009) 論文集, 1-6, 2011 | | 2011 |
Fault-Tolerant Systems Fault-Tolerant Systems, 2006 L ZHAO, K SAKURAI 情報処理学会研究報告. AL, アルゴリズム研究会報告 129, H1-H11, 2010 | | 2010 |
A reliability analysis based scheduling algorithm in heterogeneous system Z Laiping, S Kouichi 情報処理学会研究報告. AL, アルゴリズム研究会報告 2010 (9), 1-11, 2010 | | 2010 |
A Tutorial on Evolutionary Multiobjective optimization A Tutorial on Evolutionary Multiobjective optimization, 2003 Z Laiping, S Kouichi 情報処理学会研究報告. AL, アルゴリズム研究会報告 128, H1-H8, 2010 | | 2010 |
Scheduling Algorithms for Grid Computing: state of the Art and Open Problems Scheduling Algorithms for Grid Computing: state of the Art and Open Problems, 2006 Z Laiping, S Kouichi 情報処理学会研究報告. AL, アルゴリズム研究会報告 128, H1-H8, 2010 | | 2010 |
A Flexible User-centric Resource Scheduling Algorithm Z Laiping, S Kouichi 情報処理学会研究報告. AL, アルゴリズム研究会報告 128, H1-H8, 2010 | | 2010 |
http://openprovenance. org/http://openprovenance. org A SYALIM, Y Hori, K Sakurai 情報処理学会研究報告. マルチメディア通信と分散処理研究会報告 138, 13-18, 2009 | | 2009 |