Jun Sakuma

Orcid: 0000-0001-5015-3812

According to our database1, Jun Sakuma authored at least 123 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Convergence Rate of the (1+1)-ES on Locally Strongly Convex and Lipschitz Smooth Functions.
IEEE Trans. Evol. Comput., April, 2024

Attacking-Distance-Aware Attack: Semi-targeted Model Poisoning on Federated Learning.
IEEE Trans. Artif. Intell., February, 2024

Parameter Matching Attack: Enhancing Practical Applicability of Availability Attacks.
CoRR, 2024

Zero-shot domain adaptation based on dual-level mix and contrast.
CoRR, 2024

Behavior-Targeted Attack on Reinforcement Learning with Limited Access to Victim's Policy.
CoRR, 2024

Harnessing the Power of Vicinity-Informed Analysis for Classification under Covariate Shift.
CoRR, 2024

Adversarial Attacks on Hidden Tasks in Multi-Task Learning.
CoRR, 2024

Remembering Transformer for Continual Learning.
CoRR, 2024

Instance-Level Trojan Attacks on Visual Question Answering via Adversarial Learning in Neuron Activation Space.
Proceedings of the International Joint Conference on Neural Networks, 2024

Linear Convergence Rate Analysis of the (1+1)-ES on Locally Strongly Convex and Lipschitz Smooth Functions.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2024

Trojan attribute inference attack on gradient boosting decision trees.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

2023
Statistically Significant Pattern Mining With Ordinal Utility.
IEEE Trans. Knowl. Data Eng., September, 2023

Covariance Matrix Adaptation Evolutionary Strategy with Worst-Case Ranking Approximation for Min-Max Optimization and Its Application to Berthing Control Tasks.
ACM Trans. Evol. Learn. Optim., June, 2023

CAMRI Loss: Improving the Recall of a Specific Class without Sacrificing Accuracy.
IEICE Trans. Inf. Syst., April, 2023

Adaptive scenario subset selection for worst-case optimization and its application to well placement optimization.
Appl. Soft Comput., January, 2023

Unauthorized AI cannot recognize me: Reversible adversarial example.
Pattern Recognit., 2023

Certified Defense for Content Based Image Retrieval.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023

Demographic Parity Constrained Minimax Optimal Regression under Linear Model.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Mixing Histopathology Prototypes into Robust Slide-Level Representations for Cancer Subtyping.
Proceedings of the Machine Learning in Medical Imaging - 14th International Workshop, 2023

Statistically Significant Concept-based Explanation of Image Classifiers via Model Knockoffs.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Privformer: Privacy-preserving Transformer with MPC.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

Heterogeneous Domain Adaptation with Positive and Unlabeled Data.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Locally Differentially Private Minimum Finding.
IEICE Trans. Inf. Syst., August, 2022

Convergence rate of the (1+1)-evolution strategy on locally strongly convex functions with lipschitz continuous gradient and their monotonic transformations.
CoRR, 2022

Domain Generalization via Adversarially Learned Novel Domains.
IEEE Access, 2022

Explicitly Constrained Black-Box Optimization With Disconnected Feasible Domains Using Deep Generative Models.
IEEE Access, 2022

Max-Min Off-Policy Actor-Critic Method Focusing on Worst-Case Robustness to Model Misspecification.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Semi-Targeted Model Poisoning Attack on Federated Learning via Backward Error Analysis.
Proceedings of the International Joint Conference on Neural Networks, 2022

Few-Shot Image-to-Semantics Translation for Policy Transfer in Reinforcement Learning.
Proceedings of the International Joint Conference on Neural Networks, 2022

Did You Use My GAN to Generate Fake? Post-hoc Attribution of GAN Generated Images via Latent Recovery.
Proceedings of the International Joint Conference on Neural Networks, 2022

Black-box min-max continuous optimization using CMA-ES with worst-case ranking approximation.
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Boston, Massachusetts, USA, July 9, 2022

Unsupervised Causal Binary Concepts Discovery with VAE for Black-Box Model Explanation.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Application of Adversarial Examples to Physical ECG Signals.
CoRR, 2021

Level generation for angry birds with sequential VAE and latent variable evolution.
Proceedings of the GECCO '21: Genetic and Evolutionary Computation Conference, 2021

Convergence rate of the (1+1)-evolution strategy with success-based step-size adaptation on convex quadratic functions.
Proceedings of the GECCO '21: Genetic and Evolutionary Computation Conference, 2021

Adaptive scenario subset selection for min-max black-box continuous optimization.
Proceedings of the GECCO '21: Genetic and Evolutionary Computation Conference, 2021

Toward Practical Adversarial Attacks on Face Verification Systems.
Proceedings of the 20th International Conference of the Biometrics Special Interest Group, 2021

AdvantageNAS: Efficient Neural Architecture Search with Credit Assignment.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Seasonal-adjustment Based Feature Selection Method for Large-scale Search Engine Logs.
CoRR, 2020

Deep generative model for non-convex constraint handling.
Proceedings of the GECCO '20: Genetic and Evolutionary Computation Conference, 2020

Generate (Non-Software) Bugs to Fool Classifiers.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Locally Differentially Private Minimum Finding.
CoRR, 2019

Neural malware analysis with attention mechanism.
Comput. Secur., 2019

Seasonal-adjustment Based Feature Selection Method for Predicting Epidemic with Large-scale Search Engine Logs.
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019

Robust Audio Adversarial Example for a Physical Attack.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Robust Watermarking of Neural Network with Exponential Weighting.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Recommendation with k-Anonymized Ratings.
Trans. Data Priv., 2018

Toward Distribution Estimation under Local Differential Privacy with Small Samples.
Proc. Priv. Enhancing Technol., 2018

Study on Record Linkage of Anonymizied Data.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Model-based and actual independence for fairness-aware classification.
Data Min. Knowl. Discov., 2018

General-to-Detailed GAN for Infrequent Class Medical Images.
CoRR, 2018

Minimax Optimal Additive Functional Estimation with Discrete Distribution.
CoRR, 2018

Interval-based Prediction Uncertainty Bound Computation in Learning with Missing Values.
CoRR, 2018

Outsourced Private Function Evaluation with Privacy Policy Enforcement.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Minimax Optimal Additive Functional Estimation with Discrete Distribution: Slow Divergence Speed Case.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Recommendation Independence.
Proceedings of the Conference on Fairness, Accountability and Transparency, 2018

Non-interactive and Output Expressive Private Comparison from Homomorphic Encryption.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

More Practical Privacy-Preserving Machine Learning as A Service via Efficient Secure Matrix Multiplication.
Proceedings of the 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2018

Efficiently Monitoring Small Data Modification Effect for Large-Scale Learning in Changing Environment.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Differentially Private Semi-Supervised Classification.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

Minimax optimal estimators for additive scalar functionals of discrete distributions.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Differentially Private Chi-squared Test by Unit Circle Mechanism.
Proceedings of the 34th International Conference on Machine Learning, 2017

Differentially Private Empirical Risk Minimization with Input Perturbation.
Proceedings of the Discovery Science - 20th International Conference, 2017

Towards Privacy-Preserving Record Linkage with Record-Wise Linkage Policy.
Proceedings of the Database and Expert Systems Applications, 2017

Malware Analysis of Imaged Binary Samples by Convolutional Neural Network with Attention Mechanism.
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, 2017

Privacy-preserving and Optimal Interval Release for Disease Susceptibility.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Mis-operation Resistant Searchable Homomorphic Encryption.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Using Fully Homomorphic Encryption for Statistical Analysis of Categorical, Ordinal and Numerical Data.
IACR Cryptol. ePrint Arch., 2016

Efficiently Bounding Optimal Solutions after Small Data Modification in Large-Scale Empirical Risk Minimization.
CoRR, 2016

Fairy ring: Ubiquitous secure multiparty computation framework for smartphone applications.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

A Study from the Data Anonymization Competition Pwscup 2015.
Proceedings of the Data Privacy Management and Security Assurance, 2016

Ice and Fire: Quantifying the Risk of Re-identification and Utility in Data Anonymization.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

Secure Approximation Guarantee for Cryptographically Private Empirical Risk Minimization.
Proceedings of The 8th Asian Conference on Machine Learning, 2016

2015
Privacy-preserving genome-wide association studies on cloud environment using fully homomorphic encryption.
BMC Medical Informatics Decis. Mak., December, 2015

Privacy-preserving search for chemical compound databases.
BMC Bioinform., December, 2015

Prediction with Model-Based Neutrality.
IEICE Trans. Inf. Syst., 2015

Differentially Private Analysis of Outliers.
CoRR, 2015

Fairness-Aware Learning with Restriction of Universal Dependency using f-Divergences.
CoRR, 2015

Privacy-Preserving Statistical Analysis by Exact Logistic Regression.
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015

Efficient Secure Outsourcing of Genome-Wide Association Studies.
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015

Differentially Private Analysis of Outliers.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2015

2014
Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size of an Intersection.
J. Inf. Process., 2014

Oblivious Evaluation of Non-deterministic Finite Automata with Application to Privacy-Preserving Virus Genome Detection.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Correcting Popularity Bias by Enhancing Recommendation Neutrality.
Proceedings of the Poster Proceedings of the 8th ACM Conference on Recommender Systems, 2014

Neutralized Empirical Risk Minimization with Generalization Neutrality Bound.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2014

Privacy-Preserving Dose-Response Relationship Test.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

A scheme for privacy-preserving ontology mapping.
Proceedings of the 18th International Database Engineering & Applications Symposium, 2014

Privacy-Preserving Hypothesis Testing for the Analysis of Epidemiological Medical Data.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
Efficiency Improvement of Neutrality-Enhanced Recommendation.
Proceedings of the 3rd Workshop on Human Decision Making in Recommender Systems in conjunction with the 7th ACM Conference on Recommender Systems (RecSys 2013), 2013

Round-Efficient Private Stable Matching from Additive Homomorphic Encryption.
Proceedings of the Information Security, 16th International Conference, 2013

Privacy-Preserving Protocol for Epidemiology in Effect of Radiation.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

The Independence of Fairness-Aware Classifiers.
Proceedings of the 13th IEEE International Conference on Data Mining Workshops, 2013

2012
Applicability of existing anonymization methods to large location history data in urban travel.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012

Enhancement of the Neutrality in Recommendation.
Proceedings of the 2nd Workshop on Human Decision Making in Recommender Systems, 2012

Fairness-Aware Classifier with Prejudice Remover Regularizer.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2012

Considerations on Fairness-Aware Data Mining.
Proceedings of the 12th IEEE International Conference on Data Mining Workshops, 2012

2011
Privacy Preserving Semi-supervised Learning for Labeled Graphs.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2011

Fairness-aware Learning through Regularization Approach.
Proceedings of the Data Mining Workshops (ICDMW), 2011

2010
Large-scale <i>k</i>-means clustering with user-centric privacy-preservation.
Knowl. Inf. Syst., 2010

Collusion-resistant privacy-preserving data mining.
Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2010

Online Prediction with Privacy.
Proceedings of the 27th International Conference on Machine Learning (ICML-10), 2010

2009
Link analysis for private weighted graphs.
Proceedings of the 32nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2009

Adaptation of expansion rate for real-coded crossovers.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

A new real-coded genetic algorithm using the adaptive selection network for detecting multiple optima.
Proceedings of the IEEE Congress on Evolutionary Computation, 2009

Privacy-Preserving Evaluation of Generalization Error and Its Application to Model and Attribute Selection.
Proceedings of the Advances in Machine Learning, 2009

2008
Functional-Specialization Multi-Objective Real-Coded Genetic Algorithm: FS-MOGA.
Proceedings of the Parallel Problem Solving from Nature, 2008

Large-Scale k-Means Clustering with User-Centric Privacy Preservation.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2008

Privacy-preserving reinforcement learning.
Proceedings of the Machine Learning, 2008

Functionally specialized CMA-ES: a modification of CMA-ES based on the specialization of the functions of covariance matrix adaptation and step size adaptation.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

2007
A genetic algorithm for privacy preserving combinatorial optimization.
Proceedings of the Genetic and Evolutionary Computation Conference, 2007

Uniform sampling of local pareto-optimal solution curves by pareto path following and its applications in multi-objective GA.
Proceedings of the Genetic and Evolutionary Computation Conference, 2007

Constraint-Handling Method for Multi-objective Function Optimization: Pareto Descent Repair Operator.
Proceedings of the Evolutionary Multi-Criterion Optimization, 4th International Conference, 2007

2006
An Evolutionary Algorithm for Optimizing Functions with UV Structures.
Proceedings of the IEEE International Conference on Systems, 2006

Local search for multiobjective function optimization: pareto descent method.
Proceedings of the Genetic and Evolutionary Computation Conference, 2006

Instance-Based Policy Search using Binomial Distribution Crossover and Iterated Refreshment.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006

2005
An Effective Rule Based Policy Representation and its Optimization using Inter Normal Distribution Crossover.
Proceedings of the Soft Computing as Transdisciplinary Science and Technology, 2005

Fast Approximate Similarity Search in Extremely High-Dimensional Data Sets.
Proceedings of the 21st International Conference on Data Engineering, 2005

Latent variable crossover for k-tablet structures and its application to lens design problems.
Proceedings of the Genetic and Evolutionary Computation Conference, 2005

Real-coded crossover as a role of kernel density estimation.
Proceedings of the Genetic and Evolutionary Computation Conference, 2005

Adaptive isolation model using data clustering for multimodal function optimization.
Proceedings of the Genetic and Evolutionary Computation Conference, 2005

2002
k-tablet Structures and Crossover on Latent Variables for Real-Coded GA.
Proceedings of the Late Breaking papers at the Genetic and Evolutionary Computation Conference (GECCO-2002), 2002

2001
Extrapolation-directed crossover for real-coded GA: overcoming deceptive phenomena by extrapolative search.
Proceedings of the 2001 Congress on Evolutionary Computation, 2001

2000
Extrapolation-Directed Crossover for Job-shop Scheduling Problems: Complementary Combination with JOX.
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO '00), 2000


  Loading...