Ikuya Morikawa

According to our database1, Ikuya Morikawa authored at least 15 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
X-Detect: explainable adversarial patch detection for object detectors in retail.
Mach. Learn., September, 2024

YolOOD: Utilizing Object Detection Concepts for Multi-Label Out-of-Distribution Detection.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

2023
ASRA-Q: AI Security Risk Assessment by Selective Questions.
J. Inf. Process., 2023

Pros and Cons of Weight Pruning for Out-of-Distribution Detection: An Empirical Survey.
Proceedings of the International Joint Conference on Neural Networks, 2023

OOD-Robust Boosting Tree for Intrusion Detection Systems.
Proceedings of the International Joint Conference on Neural Networks, 2023

2022
YolOOD: Utilizing Object Detection Concepts for Out-of-Distribution Detection.
CoRR, 2022

Seeds Don't Lie: An Adaptive Watermarking Framework for Computer Vision Models.
CoRR, 2022

HateVersarial: Adversarial Attack Against Hate Speech Detection Algorithms on Twitter.
Proceedings of the UMAP '22: 30th ACM Conference on User Modeling, Adaptation and Personalization, Barcelona, Spain, July 4, 2022

Membership Inference Countermeasure With A Partially Synthetic Data Approach.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

A new approach for machine learning security risk assessment: work in progress.
Proceedings of the 1st International Conference on AI Engineering: Software Engineering for AI, 2022

2021
First to Possess His Statistics: Data-Free Model Extraction Attack on Tabular Data.
CoRR, 2021

2020
Dataset Properties and Degradation of Machine Learning Accuracy with an Anonymized Training Dataset.
Proceedings of the Eighth International Symposium on Computing and Networking Workshops, 2020

2018
A Secure Framework for User-Key Provisioning to SGX Enclaves.
Proceedings of the Advances in Network-Based Information Systems, 2018

2011
Threat Tree Templates to Ease Difficulties in Threat Modeling.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

2004
Cozilet: Transparent Encapsulation to Prevent Abuse of Trusted Applets.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004


  Loading...