SAKURAI Kouichi
SAKURAI Kouichi
Kyushu University, Department of Computer Science
Verified email at inf.kyushu-u.ac.jp - Homepage
Title
Cited by
Cited by
Year
One pixel attack for fooling deep neural networks
J Su, DV Vargas, K Sakurai
IEEE Transactions on Evolutionary Computation 23 (5), 828-841, 2019
8042019
Usage control model and architecture for data confidentiality in a database service provider
A Syalim, T Tabata, K Sakurai
Information and Media Technologies 1 (2), 762-767, 2006
92006
Malware Detection Focusing on Behaviors of Process and its Implementation
Y Fukushima, S Akihiro, H Yoshiaki, S Kouichi
Joint Workshop on Information Security (JWIS2009), 2009
52009
EQUIVAIENCE PROBLEM AND AUTOMORPHISMS OF SOME ABELIAN BRANCHED COVERINGS OF THE RIEMANN SPHERE
K Sakurai, M Suzuki
Memoirs of the Faculty of Science, Kyushu University. Series A, Mathematics …, 1988
41988
Ballot-Cancellation Scheme In E-voting System
H Yong-Sork, I Kenji, S Kouichi
E-Government Workshop 5, 2005
32005
Mathematics and Computing: ICMC 2018, Varanasi, India, January 9-11, Selected Contributions
D Ghosh, D Giri, RN Mohapatra, K Sakurai, E Savas, T Som
Springer, 2018
12018
A new approach based on fog and cloud to provide security for Internet of Things constrained devices
W Razouk, D Sgandurra, S Kouichi
2017
QR コードに基づいて効果的な偽造卒業証明書を防ぐ方法
MH Suwito, F Yaokai, M Shin'ich, S Kouichi
電気関係学会九州支部連合大会講演論文集 平成 28 年度電気・情報関係学会九州支部 …, 2016
2016
Graphics Processing Unit を用いた非線形連立多元方程式解決法の高速化
T Satoshi, Y Bo-Yin, C Chen-Mou, S Kouichi
電気関係学会九州支部連合大会講演論文集 平成 25 年度電気関係学会九州支部連合 …, 2013
2013
画素ベースの照合手法に基づく画像スプライシング認証
CR Whidiana, R Kyung-Hyune, S Kouichi
電気関係学会九州支部連合大会講演論文集 平成 24 年度電気関係学会九州支部連合 …, 2012
2012
The open provenance model The open provenance model, 2007
A SYALIM, T NISHIDE, K Sakurai
IEICE transactions on information and systems 95 (7), 1894-1907, 2012
2012
A security model for provenance A security model for provenance, 2006
A SYALIM, T NISHIDE, K Sakurai
IEICE transactions on information and systems 95 (7), 1894-1907, 2012
2012
An architecture for provenance systems An architecture for provenance systems, 2006
A SYALIM, T NISHIDE, K Sakurai
IEICE transactions on information and systems 95 (7), 1894-1907, 2012
2012
Construction of Dynamic Threshold Scheme
G Cheng, L Mingchu, R Yizhi, S Kouichi
コンピュータセキュリティシンポジウム 2009 (CSS2009) 論文集, 1-6, 2011
2011
Fault-Tolerant Systems Fault-Tolerant Systems, 2006
L ZHAO, K SAKURAI
情報処理学会研究報告. AL, アルゴリズム研究会報告 129, H1-H11, 2010
2010
A reliability analysis based scheduling algorithm in heterogeneous system
Z Laiping, S Kouichi
情報処理学会研究報告. AL, アルゴリズム研究会報告 2010 (9), 1-11, 2010
2010
A Tutorial on Evolutionary Multiobjective optimization A Tutorial on Evolutionary Multiobjective optimization, 2003
Z Laiping, S Kouichi
情報処理学会研究報告. AL, アルゴリズム研究会報告 128, H1-H8, 2010
2010
Scheduling Algorithms for Grid Computing: state of the Art and Open Problems Scheduling Algorithms for Grid Computing: state of the Art and Open Problems, 2006
Z Laiping, S Kouichi
情報処理学会研究報告. AL, アルゴリズム研究会報告 128, H1-H8, 2010
2010
A Flexible User-centric Resource Scheduling Algorithm
Z Laiping, S Kouichi
情報処理学会研究報告. AL, アルゴリズム研究会報告 128, H1-H8, 2010
2010
http://openprovenance. org/http://openprovenance. org
A SYALIM, Y Hori, K Sakurai
情報処理学会研究報告. マルチメディア通信と分散処理研究会報告 138, 13-18, 2009
2009
The system can't perform the operation now. Try again later.
Articles 1–20