Follow
SAKURAI Kouichi
SAKURAI Kouichi
Kyushu University, Department of Computer Science
Verified email at inf.kyushu-u.ac.jp - Homepage
Title
Cited by
Cited by
Year
One pixel attack for fooling deep neural networks
J Su, DV Vargas, K Sakurai
IEEE Transactions on Evolutionary Computation 23 (5), 828-841, 2019
26632019
Two-servers PIR based DNS query scheme with privacy-preserving
F Zhao, Y Hori, K Sakurai
The 2007 International Conference on Intelligent Pervasive Computing (IPC …, 2007
402007
One Pixel Attack for Fooling Deep Neural Networks. 2017
J Su, DV Vargas, K Sakurai
Режим доступа: https://arxiv. org/pdf/1710.08864. pdf, 2019
122019
Universal rules for fooling deep neural networks based text classification
D Li, DV Vargas, S Kouichi
2019 IEEE Congress on Evolutionary Computation (CEC), 2221-2228, 2019
112019
Usage control model and architecture for data confidentiality in a database service provider
A Syalim, T Tabata, K Sakurai
Information and Media Technologies 1 (2), 762-767, 2006
102006
A behavior-based detection method for outbreaks of low-rate attacks
Y Feng, Y Hori, K Sakurai, J Takeuchi
2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet …, 2012
82012
One pixel attack for fooling deep neural networks. arXiv 2017
J Su, DV Vargas, S Kouichi
arXiv preprint arXiv:1710.08864, 2017
72017
K2 stream cipher
S Kiyomoto, T Tanaka, K Sakurai
E-business and Telecommunications: 4th International Conference, ICETE 2007 …, 2009
62009
Malware Detection Focusing on Behaviors of Process and its Implementation
Y Fukushima, A Sakai, Y Hori, K Sakurai
Joint Workshop on Information Security (JWIS2009), 2009
62009
A design of image-based spam filtering based on textual and visual information
王戦, 堀良彰, 櫻井幸一
情報処理学会研究報告= IPSJ SIG technical reports 2008 (21), 279-284, 2008
62008
One pixel attack for fooling deep neural networks. arXiv e-prints
J Su, D Vasconcellos Vargas, S Kouichi
arXiv preprint arXiv:1710.08864, 2017
42017
EQUIVAIENCE PROBLEM AND AUTOMORPHISMS OF SOME ABELIAN BRANCHED COVERINGS OF THE RIEMANN SPHERE
K Sakurai, M Suzuki
Memoirs of the Faculty of Science, Kyushu University. Series A, Mathematics …, 1988
41988
Simulation of secure volunteer computing by using blockchain
J Shota, K Kosuke, S Sharma, S Kouichi
Advanced Information Networking and Applications: Proceedings of the 33rd …, 2020
32020
Ballot-cancellation Scheme in E-voting System
YS Her, K Imamoto, K Sakurai
22005
Mathematics and Computing
D Ghosh, D Giri, RN Mohapatra, E Savas, K Sakurai, LP Singh
Springer Singapore, 2018
12018
Preserving integrity and confidentiality of a directed acyclic graph model of provenance
S Amril, N Takashi, S Kouichi
IEICE Conferences Archives, 2010
12010
Grouping Proof for RFID tags
S Junichiro, S Kouichi
SLRC 論文データベース, 2005
12005
Group Oriented Attribute-based Encryption Scheme from Lattices with Shamir's Secret Sharing scheme
NSP Maharage, N Toru, M Takashi, Y Hiroyuki, S Kouichi
コンピュータセキュリティシンポジウム 2022 論文集, 1121-1126, 2022
2022
Efficient Revocation and Anonymous Revocation in VANETs Using Ring Signatures
MNS Perera, T Nakamura, M Hashimoto, H Yokoyama, CM Cheng, ...
コンピュータセキュリティシンポジウム 2021 論文集, 239-244, 2021
2021
A Construction of Group Oriented Attribute Based Encryption Scheme from Lattices
MNS Perera, T Nakamura, M Hashimoto, H Yokoyama, K Sakurai
2020
The system can't perform the operation now. Try again later.
Articles 1–20