关注
Yuki Funabiki
Yuki Funabiki
在 sony.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
Adversarial attacks for tabular data: Application to fraud detection and imbalanced data
F Cartella, O Anunciacao, Y Funabiki, D Yamaguchi, T Akishita, ...
arXiv preprint arXiv:2101.08030, 2021
812021
More results on shortest linear programs
S Banik, Y Funabiki, T Isobe
Advances in Information and Computer Security: 14th International Workshop …, 2019
422019
Improved integral attack on HIGHT
Y Funabiki, Y Todo, T Isobe, M Morii
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2019
192019
Several MILP-aided attacks against SNOW 2.0
Y Funabiki, Y Todo, T Isobe, M Morii
International Conference on Cryptology and Network Security, 394-413, 2018
192018
Tweakable TWINE: building a tweakable block cipher on generalized feistel structure
K Sakamoto, K Minematsu, N Shibata, M Shigeri, H Kubo, Y Funabiki, ...
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2020
182020
Further results on efficient implementations of block cipher linear layers
S Banik, Y Funabiki, T Isobe
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2021
112021
Adversarial attacks for tabular data: application to fraud detection and imbalanced data (2021)
F Cartella, O Anunciaçao, Y Funabiki, D Yamaguchi, T Akishita, ...
URL https://arxiv. org/abs/2101.08030, 2021
52021
Security of related-key differential attacks on twine, revisited
K Sakamoto, K Minematsu, N Shibata, M Shigeri, H Kubo, Y Funabiki, ...
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2020
22020
Robust image hashing for detecting small tampering using a hyperrectangular region
T Itagaki, Y Funabiki, T Akishita
2021 IEEE International Workshop on Information Forensics and Security (WIFS …, 2021
12021
系统目前无法执行此操作,请稍后再试。
文章 1–9