Jun Sakuma
Orcid: 0000-0001-5015-3812
According to our database1,
Jun Sakuma
authored at least 123 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Convergence Rate of the (1+1)-ES on Locally Strongly Convex and Lipschitz Smooth Functions.
IEEE Trans. Evol. Comput., April, 2024
Attacking-Distance-Aware Attack: Semi-targeted Model Poisoning on Federated Learning.
IEEE Trans. Artif. Intell., February, 2024
Parameter Matching Attack: Enhancing Practical Applicability of Availability Attacks.
CoRR, 2024
Behavior-Targeted Attack on Reinforcement Learning with Limited Access to Victim's Policy.
CoRR, 2024
Harnessing the Power of Vicinity-Informed Analysis for Classification under Covariate Shift.
CoRR, 2024
Instance-Level Trojan Attacks on Visual Question Answering via Adversarial Learning in Neuron Activation Space.
Proceedings of the International Joint Conference on Neural Networks, 2024
Linear Convergence Rate Analysis of the (1+1)-ES on Locally Strongly Convex and Lipschitz Smooth Functions.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2024
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
2023
IEEE Trans. Knowl. Data Eng., September, 2023
Covariance Matrix Adaptation Evolutionary Strategy with Worst-Case Ranking Approximation for Min-Max Optimization and Its Application to Berthing Control Tasks.
ACM Trans. Evol. Learn. Optim., June, 2023
IEICE Trans. Inf. Syst., April, 2023
Adaptive scenario subset selection for worst-case optimization and its application to well placement optimization.
Appl. Soft Comput., January, 2023
Pattern Recognit., 2023
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Mixing Histopathology Prototypes into Robust Slide-Level Representations for Cancer Subtyping.
Proceedings of the Machine Learning in Medical Imaging - 14th International Workshop, 2023
Statistically Significant Concept-based Explanation of Image Classifiers via Model Knockoffs.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
2022
IEICE Trans. Inf. Syst., August, 2022
Convergence rate of the (1+1)-evolution strategy on locally strongly convex functions with lipschitz continuous gradient and their monotonic transformations.
CoRR, 2022
Explicitly Constrained Black-Box Optimization With Disconnected Feasible Domains Using Deep Generative Models.
IEEE Access, 2022
Max-Min Off-Policy Actor-Critic Method Focusing on Worst-Case Robustness to Model Misspecification.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Semi-Targeted Model Poisoning Attack on Federated Learning via Backward Error Analysis.
Proceedings of the International Joint Conference on Neural Networks, 2022
Few-Shot Image-to-Semantics Translation for Policy Transfer in Reinforcement Learning.
Proceedings of the International Joint Conference on Neural Networks, 2022
Did You Use My GAN to Generate Fake? Post-hoc Attribution of GAN Generated Images via Latent Recovery.
Proceedings of the International Joint Conference on Neural Networks, 2022
Black-box min-max continuous optimization using CMA-ES with worst-case ranking approximation.
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Boston, Massachusetts, USA, July 9, 2022
Unsupervised Causal Binary Concepts Discovery with VAE for Black-Box Model Explanation.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
2021
Proceedings of the GECCO '21: Genetic and Evolutionary Computation Conference, 2021
Convergence rate of the (1+1)-evolution strategy with success-based step-size adaptation on convex quadratic functions.
Proceedings of the GECCO '21: Genetic and Evolutionary Computation Conference, 2021
Proceedings of the GECCO '21: Genetic and Evolutionary Computation Conference, 2021
Proceedings of the 20th International Conference of the Biometrics Special Interest Group, 2021
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
2020
Seasonal-adjustment Based Feature Selection Method for Large-scale Search Engine Logs.
CoRR, 2020
Proceedings of the GECCO '20: Genetic and Evolutionary Computation Conference, 2020
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
Seasonal-adjustment Based Feature Selection Method for Predicting Epidemic with Large-scale Search Engine Logs.
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
Proc. Priv. Enhancing Technol., 2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Data Min. Knowl. Discov., 2018
CoRR, 2018
Interval-based Prediction Uncertainty Bound Computation in Learning with Missing Values.
CoRR, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Minimax Optimal Additive Functional Estimation with Discrete Distribution: Slow Divergence Speed Case.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018
Proceedings of the Conference on Fairness, Accountability and Transparency, 2018
Non-interactive and Output Expressive Private Comparison from Homomorphic Encryption.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
More Practical Privacy-Preserving Machine Learning as A Service via Efficient Secure Matrix Multiplication.
Proceedings of the 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2018
Efficiently Monitoring Small Data Modification Effect for Large-Scale Learning in Changing Environment.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018
2017
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017
Minimax optimal estimators for additive scalar functionals of discrete distributions.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
Proceedings of the 34th International Conference on Machine Learning, 2017
Proceedings of the Discovery Science - 20th International Conference, 2017
Proceedings of the Database and Expert Systems Applications, 2017
Malware Analysis of Imaged Binary Samples by Convolutional Neural Network with Attention Mechanism.
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
Using Fully Homomorphic Encryption for Statistical Analysis of Categorical, Ordinal and Numerical Data.
IACR Cryptol. ePrint Arch., 2016
Efficiently Bounding Optimal Solutions after Small Data Modification in Large-Scale Empirical Risk Minimization.
CoRR, 2016
Fairy ring: Ubiquitous secure multiparty computation framework for smartphone applications.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
Proceedings of the Data Privacy Management and Security Assurance, 2016
Ice and Fire: Quantifying the Risk of Re-identification and Utility in Data Anonymization.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016
Secure Approximation Guarantee for Cryptographically Private Empirical Risk Minimization.
Proceedings of The 8th Asian Conference on Machine Learning, 2016
2015
Privacy-preserving genome-wide association studies on cloud environment using fully homomorphic encryption.
BMC Medical Informatics Decis. Mak., December, 2015
BMC Bioinform., December, 2015
Fairness-Aware Learning with Restriction of Universal Dependency using f-Divergences.
CoRR, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2015
2014
Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size of an Intersection.
J. Inf. Process., 2014
Oblivious Evaluation of Non-deterministic Finite Automata with Application to Privacy-Preserving Virus Genome Detection.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
Proceedings of the Poster Proceedings of the 8th ACM Conference on Recommender Systems, 2014
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2014
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014
Proceedings of the 18th International Database Engineering & Applications Symposium, 2014
Privacy-Preserving Hypothesis Testing for the Analysis of Epidemiological Medical Data.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
2013
Proceedings of the 3rd Workshop on Human Decision Making in Recommender Systems in conjunction with the 7th ACM Conference on Recommender Systems (RecSys 2013), 2013
Proceedings of the Information Security, 16th International Conference, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Proceedings of the 13th IEEE International Conference on Data Mining Workshops, 2013
2012
Applicability of existing anonymization methods to large location history data in urban travel.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012
Proceedings of the 2nd Workshop on Human Decision Making in Recommender Systems, 2012
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2012
Proceedings of the 12th IEEE International Conference on Data Mining Workshops, 2012
2011
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2011
Proceedings of the Data Mining Workshops (ICDMW), 2011
2010
Knowl. Inf. Syst., 2010
Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2010
Proceedings of the 27th International Conference on Machine Learning (ICML-10), 2010
2009
Proceedings of the 32nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2009
Proceedings of the Genetic and Evolutionary Computation Conference, 2009
A new real-coded genetic algorithm using the adaptive selection network for detecting multiple optima.
Proceedings of the IEEE Congress on Evolutionary Computation, 2009
Privacy-Preserving Evaluation of Generalization Error and Its Application to Model and Attribute Selection.
Proceedings of the Advances in Machine Learning, 2009
2008
Proceedings of the Parallel Problem Solving from Nature, 2008
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2008
Functionally specialized CMA-ES: a modification of CMA-ES based on the specialization of the functions of covariance matrix adaptation and step size adaptation.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008
2007
Proceedings of the Genetic and Evolutionary Computation Conference, 2007
Uniform sampling of local pareto-optimal solution curves by pareto path following and its applications in multi-objective GA.
Proceedings of the Genetic and Evolutionary Computation Conference, 2007
Constraint-Handling Method for Multi-objective Function Optimization: Pareto Descent Repair Operator.
Proceedings of the Evolutionary Multi-Criterion Optimization, 4th International Conference, 2007
2006
Proceedings of the IEEE International Conference on Systems, 2006
Proceedings of the Genetic and Evolutionary Computation Conference, 2006
Instance-Based Policy Search using Binomial Distribution Crossover and Iterated Refreshment.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006
2005
An Effective Rule Based Policy Representation and its Optimization using Inter Normal Distribution Crossover.
Proceedings of the Soft Computing as Transdisciplinary Science and Technology, 2005
Proceedings of the 21st International Conference on Data Engineering, 2005
Latent variable crossover for k-tablet structures and its application to lens design problems.
Proceedings of the Genetic and Evolutionary Computation Conference, 2005
Proceedings of the Genetic and Evolutionary Computation Conference, 2005
Proceedings of the Genetic and Evolutionary Computation Conference, 2005
2002
k-tablet Structures and Crossover on Latent Variables for Real-Coded GA.
Proceedings of the Late Breaking papers at the Genetic and Evolutionary Computation Conference (GECCO-2002), 2002
2001
Extrapolation-directed crossover for real-coded GA: overcoming deceptive phenomena by extrapolative search.
Proceedings of the 2001 Congress on Evolutionary Computation, 2001
2000
Extrapolation-Directed Crossover for Job-shop Scheduling Problems: Complementary Combination with JOX.
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO '00), 2000