Naoto Yanai
Orcid: 0000-0002-0817-6188
According to our database1,
Naoto Yanai
authored at least 86 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
SETSUBUN: Revisiting Membership Inference Game for Evaluating Synthetic Data Generation.
J. Inf. Process., 2024
JABBERWOCK: A Tool for WebAssembly Dataset Generation and Its Application to Malicious Website Detection.
J. Inf. Process., 2024
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024
CoRR, 2024
IEEE Access, 2024
Proceedings of the 2nd ACM Workshop on Secure and Trustworthy Deep Learning Systems, 2024
Score and You Shall Find: A Novel Regularization Technique for Cyberattack Detection in Industrial Control Systems.
Proceedings of the 2024 Workshop on Re-design Industrial Control Systems with Security, 2024
Performance Evaluation of ID-Based Aggregate Signature Scheme Based on Lattice for Wireless Multi-hop Secure Routing Protocols.
Proceedings of the 7th International Conference on Information and Computer Technologies, 2024
2023
Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware.
IEICE Trans. Inf. Syst., September, 2023
APVAS: Reducing the Memory Requirement of AS_PATH Validation by Introducing Aggregate Signatures into BGPsec.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023
The Juice Is Worth the Squeeze: Analysis of Autonomous System Provider Authorization in Partial Deployment.
IEEE Open J. Commun. Soc., 2023
J. Inf. Process., 2023
An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities in Ethereum Smart Contracts.
CoRR, 2023
Anonymous Broadcast Authentication With One-to-Many Transmission to Control IoT Devices.
IEEE Access, 2023
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023
Proceedings of the 2023 IEEE International Conference on Smart Computing, 2023
MADONNA: Browser-Based MAlicious Domain Detection Through Optimized Neural Network with Feature Analysis.
Proceedings of the ICT Systems Security and Privacy Protection, 2023
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2023
IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-designated Verifier Signatures.
Proceedings of the Information Security Practice and Experience, 2023
Proceedings of the 1st ACM SIGSPATIAL International Workshop on Geo-Privacy and Data Utility for Smart Societies, 2023
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
JABBERWOCK: A Tool for WebAssembly Dataset Generation towards Malicious Website Detection.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023
2022
SQUAB: A Virtualized Infrastructure for BGP-related Experiments and Its Applications to Evaluation on BGPsec.
J. Inf. Process., 2022
SPGC: Integration of Secure Multiparty Computation and Differential Privacy for Gradient Computation on Collaborative Learning.
J. Inf. Process., 2022
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2022
Implementing Access Control in Chaincodes on Hyperledger Fabric with Attribute-Based Encryption.
Proceedings of the IEEE 19th International Conference on Software Architecture Companion, 2022
Implementation and Evaluation of Leader Election in the Population Protocol Model Using an Emulation Environment.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Multi-scale Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for unsupervised intrusion detection.
Knowl. Based Syst., 2021
RA: A Static Analysis Tool for Analyzing Re-Entrancy Attacks in Ethereum Smart Contracts.
J. Inf. Process., 2021
CoRR, 2021
IEEE Access, 2021
Proceedings of the ICC 2021, 2021
SPGC: An Integrated Framework of Secure Computation and Differential Privacy for Collaborative Learning.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021
Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for Intrusion Detection.
Proceedings of the 18th IEEE Annual Consumer Communications & Networking Conference, 2021
Eth2Vec: Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts.
Proceedings of the BSCI '21: Proceedings of the 3rd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2021
Proceedings of the Advanced Information Networking and Applications, 2021
Proceedings of the Advanced Information Networking and Applications, 2021
2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
CoRR, 2020
CoRR, 2020
Key-Aggregate Searchable Encryption, Revisited: Formal Foundations for Cloud Applications, and Their Implementation.
IEEE Access, 2020
A Model Checking Method for Secure Routing Protocols by SPIN with State Space Reduction.
Proceedings of the 2020 IEEE International Parallel and Distributed Processing Symposium Workshops, 2020
Proceedings of the IEEE International Conference on Blockchain, 2020
2019
Towards Further Formal Foundation of Web Security: Expression of Temporal Logic in Alloy and Its Application to a Security Model With Cache.
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
A State Space Suppression Method for Formal Verification of Secure Routing Protocols With SPIN.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019
A State Space Reduction Method for Model Checking of Wireless Multi-Hop Network Routing Protocols Focusing on Topologies.
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019
2018
Proceedings of the Smart Micro-Grid Systems Security and Privacy, 2018
Detecting Flooding Attack and Accommodating Burst Traffic in Delay-Tolerant Networks.
IEEE Trans. Veh. Technol., 2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018
2017
J. Inf. Process., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Proceedings of the Fifth International Symposium on Computing and Networking, 2017
Towards Efficient and Secure Encrypted Databases: Extending Message-Locked Encryption in Three-Party Model.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017
2016
Fail-Stop Signatures for Multiple-Signers: Definitions, Constructions, and Their Extensions.
J. Inf. Process., 2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
Proceedings of the Fourth International Symposium on Computing and Networking, 2016
Proceedings of the Advances in Conceptual Modeling, 2016
Tightly-Secure Identity-Based Structured Aggregate Signature Scheme under the Computational Diffie-Hellman Assumption.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016
2015
Secure Routing Protocols for Sensor Networks: Construction with Signature Schemes for Multiple Signers.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack.
Proceedings of the SECRYPT 2015, 2015
Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs.
Proceedings of the Trusted Systems - 7th International Conference, 2015
Proceedings of the Third International Symposium on Computing and Networking, 2015
Proceedings of the 10th Asia Joint Conference on Information Security, 2015
2014
J. Inf. Process., 2014
A CDH-based ordered multisignature scheme in the standard model with better efficiency.
Proceedings of the International Symposium on Information Theory and its Applications, 2014
2013
Proceedings of the Information Security, 16th International Conference, 2013
2012
A Certificateless Ordered Sequential Aggregate Signature Scheme Secure against Super Adverssaries.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012
2011
A Secure Structured Multisignature Scheme Based on a Non-commutative Ring Homomorphism.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
2010
Proceedings of the International Symposium on Information Theory and its Applications, 2010