Seira Hidano
Orcid: 0009-0006-0571-7168
According to our database1,
Seira Hidano
authored at least 66 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Degree-Preserving Randomized Response for Graph Neural Networks under Local Differential Privacy.
Trans. Data Priv., May, 2024
Proceedings of the IEEE Conference on Secure and Trustworthy Machine Learning, 2024
Proceedings of the 11th International Conference on Internet of Things: Systems, 2024
Prioritizing Vulnerability Assessment Items Using LLM Based on IoT Device Documentations.
Proceedings of the 11th International Conference on Internet of Things: Systems, 2024
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
AutoRed: Automating Red Team Assessment via Strategic Thinking Using Reinforcement Learning.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
2023
IEEE Trans. Computers, February, 2023
Magmaw: Modality-Agnostic Adversarial Attacks on Machine Learning-Based Wireless Communication Systems.
CoRR, 2023
CoRR, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
RoVISQ: Reduction of Video Service Quality via Adversarial Attacks on Deep Learning-based Video Compression.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023
VoteTRANS: Detecting Adversarial Text without Training by Voting on Hard Labels of Transformations.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023
2022
Text Revealer: Private Text Reconstruction via Model Inversion Attacks against Transformers.
CoRR, 2022
Adversarial Attacks on Deep Learning-based Video Compression and Classification Systems.
CoRR, 2022
Proceedings of the 17th International Joint Conference on Computer Vision, 2022
Effective Hardware-Trojan Feature Extraction Against Adversarial Attacks at Gate-Level Netlists.
Proceedings of the 28th IEEE International Symposium on On-Line Testing and Robust System Design, 2022
Proceedings of the 17th International Joint Conference on Computer Vision, 2022
Proceedings of the Computer Vision, Imaging and Computer Graphics Theory and Applications, 2022
CheckHARD: Checking Hard Labels for Adversarial Text Detection, Prediction Correction, and Perturbed Word Suggestion.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022
2021
Generating Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists.
J. Inf. Process., 2021
SEPP: Similarity Estimation of Predicted Probabilities for Defending and Detecting Adversarial Text.
Proceedings of the 35th Pacific Asia Conference on Language, Information and Computation, 2021
Machine Translated Text Detection Through Text Similarity with Round-Trip Translation.
Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2021
Data Augmentation for Machine Learning-Based Hardware Trojan Detection at Gate-Level Netlists.
Proceedings of the 27th IEEE International Symposium on On-Line Testing and Robust System Design, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021
Toward Learning Robust Detectors from Imbalanced Datasets Leveraging Weighted Adversarial Training.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021
2020
Exposing Private User Behaviors of Collaborative Filtering via Model Inversion Techniques.
Proc. Priv. Enhancing Technol., 2020
IEICE Trans. Inf. Syst., 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Proceedings of the Information Systems Security and Privacy - 6th International Conference, 2020
Evaluating the Effect of Justification and Confidence Information on User Perception of a Privacy Policy Summarization Tool.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020
2019
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
Proceedings of the 12th International Conference on Natural Language Generation, 2019
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2019
2018
Model Inversion Attacks for Online Prediction Systems: Without Knowledge of Non-Sensitive Attributes.
IEICE Trans. Inf. Syst., 2018
Proceedings of the Information Security Theory and Practice, 2018
The Possibility of Matrix Decomposition as Anonymization and Evaluation for Time-sequence Data.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Proceedings of the 3rd International Conference on Internet of Things, 2018
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018
2017
Model Inversion Attacks for Prediction Systems: Without Knowledge of Non-Sensitive Attributes.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
Proceedings of the Advances in Network-Based Information Systems, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the Computational Science and Its Applications - ICCSA 2017, 2017
2016
Delay PUF Assessment Method Based on Side-Channel and Modeling Analyzes: The Final Piece of All-in-One Assessment Methodology.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Proceedings of the Mobile Internet Security - First International Symposium, 2016
Proceedings of the 11th International Conference on Knowledge, 2016
Proceedings of the Fourth International Symposium on Computing and Networking, 2016
2015
Proceedings of the Information Security Applications - 16th International Workshop, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the Computational Intelligence and Intelligent Systems, 2015
Proceedings of the Cloud Computing - 6th International Conference, 2015
2013
Proceedings of the Advances in Computational Intelligence, 2013
2012
Proceedings of the 12th International Conference on Control Automation Robotics & Vision, 2012
Evaluation of security for biometric guessing attacks in biometric cryptosystem using fuzzy commitment scheme.
Proceedings of the 2012 BIOSIG, 2012
2010
Proceedings of the 11th International Conference on Control, 2010
2008
Proceedings of the 10th International Conference on Control, 2008