SAKURAI Kouichi
SAKURAI Kouichi
Kyushu University, Department of Computer Science
Verified email at inf.kyushu-u.ac.jp - Homepage
Title
Cited by
Cited by
Year
One pixel attack for fooling deep neural networks
J Su, DV Vargas, K Sakurai
IEEE Transactions on Evolutionary Computation 23 (5), 828-841, 2019
10442019
Usage control model and architecture for data confidentiality in a database service provider
A Syalim, T Tabata, K Sakurai
Information and Media Technologies 1 (2), 762-767, 2006
102006
Malware Detection Focusing on Behaviors of Process and its Implementation
Y Fukushima, S Akihiro, H Yoshiaki, S Kouichi
Joint Workshop on Information Security (JWIS2009), 2009
62009
A design of image-based spam filtering based on textual and visual information
W Zhan, H Yoshiaki, S Kouichi
IPSJ SIG Notes 2008 (21), 279-284, 2008
62008
EQUIVAIENCE PROBLEM AND AUTOMORPHISMS OF SOME ABELIAN BRANCHED COVERINGS OF THE RIEMANN SPHERE
K SakURAI, M Suzuki
Memoirs of the Faculty of Science, Kyushu University. Series A, Mathematics …, 1988
41988
Ballot-Cancellation Scheme In E-Voting System
H Yong-Sork, I Kenji, S Kouichi
E-Government Workshop 5, 2005
32005
Mathematics and Computing
D Ghosh, D Giri, RN Mohapatra, E Savas, K Sakurai, LP Singh
Springer Singapore, 2018
12018
A new approach based on fog and cloud to provide security for Internet of Things constrained devices
W Razouk, D Sgandurra, S Kouichi
2017
QR コードに基づいて効果的な偽造卒業証明書を防ぐ方法
MH Suwito, F Yaokai, M Shin'ich, S Kouichi
電気関係学会九州支部連合大会講演論文集 平成 28 年度電気・情報関係学会九州支部 …, 2016
2016
Graphics Processing Unit を用いた非線形連立多元方程式解決法の高速化
T Satoshi, Y Bo-Yin, C Chen-Mou, S Kouichi
電気関係学会九州支部連合大会講演論文集 平成 25 年度電気関係学会九州支部連合 …, 2013
2013
画素ベースの照合手法に基づく画像スプライシング認証
CR Whidiana, R Kyung-Hyune, S Kouichi
電気関係学会九州支部連合大会講演論文集 平成 24 年度電気関係学会九州支部連合 …, 2012
2012
The open provenance model The open provenance model, 2007
A SYALIM, T NISHIDE, K Sakurai
IEICE transactions on information and systems 95 (7), 1894-1907, 2012
2012
A security model for provenance A security model for provenance, 2006
A SYALIM, T NISHIDE, K Sakurai
IEICE transactions on information and systems 95 (7), 1894-1907, 2012
2012
An architecture for provenance systems An architecture for provenance systems, 2006
A SYALIM, T NISHIDE, K Sakurai
IEICE transactions on information and systems 95 (7), 1894-1907, 2012
2012
Construction of Dynamic Threshold Scheme
G Cheng, L Mingchu, R Yizhi, S Kouichi
コンピュータセキュリティシンポジウム 2009 (CSS2009) 論文集, 1-6, 2011
2011
Integrity for the In-flight Web Page Using Fragile Watermarking
G Peng, N Takashi, H Yoshiaki, S Kouichi
IEICE Conferences Archives, 2010
2010
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance
S Amril, N Takashi, S Kouichi
IEICE Conferences Archives, 2010
2010
Fault-Tolerant Systems Fault-Tolerant Systems, 2006
L ZHAO, K SAKURAI
情報処理学会研究報告. AL, アルゴリズム研究会報告 129, H1-H11, 2010
2010
A reliability analysis based scheduling algorithm in heterogeneous system
Z Laiping, S Kouichi
情報処理学会研究報告. AL, アルゴリズム研究会報告 2010 (9), 1-11, 2010
2010
A Tutorial on Evolutionary Multiobjective optimization A Tutorial on Evolutionary Multiobjective optimization, 2003
Z Laiping, S Kouichi
情報処理学会研究報告. AL, アルゴリズム研究会報告 128, H1-H8, 2010
2010
The system can't perform the operation now. Try again later.
Articles 1–20