Adversarial attacks for tabular data: Application to fraud detection and imbalanced data F Cartella, O Anunciacao, Y Funabiki, D Yamaguchi, T Akishita, ... arXiv preprint arXiv:2101.08030, 2021 | 81 | 2021 |
More results on shortest linear programs S Banik, Y Funabiki, T Isobe Advances in Information and Computer Security: 14th International Workshop …, 2019 | 42 | 2019 |
Improved integral attack on HIGHT Y Funabiki, Y Todo, T Isobe, M Morii IEICE Transactions on Fundamentals of Electronics, Communications and …, 2019 | 19 | 2019 |
Several MILP-aided attacks against SNOW 2.0 Y Funabiki, Y Todo, T Isobe, M Morii International Conference on Cryptology and Network Security, 394-413, 2018 | 19 | 2018 |
Tweakable TWINE: building a tweakable block cipher on generalized feistel structure K Sakamoto, K Minematsu, N Shibata, M Shigeri, H Kubo, Y Funabiki, ... IEICE Transactions on Fundamentals of Electronics, Communications and …, 2020 | 18 | 2020 |
Further results on efficient implementations of block cipher linear layers S Banik, Y Funabiki, T Isobe IEICE Transactions on Fundamentals of Electronics, Communications and …, 2021 | 11 | 2021 |
Adversarial attacks for tabular data: application to fraud detection and imbalanced data (2021) F Cartella, O Anunciaçao, Y Funabiki, D Yamaguchi, T Akishita, ... URL https://arxiv. org/abs/2101.08030, 2021 | 5 | 2021 |
Security of related-key differential attacks on twine, revisited K Sakamoto, K Minematsu, N Shibata, M Shigeri, H Kubo, Y Funabiki, ... IEICE Transactions on Fundamentals of Electronics, Communications and …, 2020 | 2 | 2020 |
Robust image hashing for detecting small tampering using a hyperrectangular region T Itagaki, Y Funabiki, T Akishita 2021 IEEE International Workshop on Information Forensics and Security (WIFS …, 2021 | 1 | 2021 |