RBAC-SC: Role-based access control using smart contract JP Cruz, Y Kaji, N Yanai Ieee Access 6, 12240-12251, 2018 | 362 | 2018 |
Eth2vec: learning contract-wide code representations for vulnerability detection on ethereum smart contracts N Ashizawa, N Yanai, JP Cruz, S Okamura Proceedings of the 3rd ACM international symposium on blockchain and secure …, 2021 | 101 | 2021 |
RA: Hunting for re-entrancy attacks in ethereum smart contracts via static analysis Y Chinen, N Yanai, JP Cruz, S Okamura 2020 IEEE International Conference on Blockchain (Blockchain), 327-336, 2020 | 45 | 2020 |
Multi-scale self-organizing map assisted deep autoencoding Gaussian mixture model for unsupervised intrusion detection Y Chen, N Ashizawa, CK Yeo, N Yanai, S Yean Knowledge-Based Systems 224, 107086, 2021 | 35 | 2021 |
Model extraction attacks on recurrent neural networks T Takemura, N Yanai, T Fujiwara Journal of Information Processing 28, 1010-1024, 2020 | 33 | 2020 |
Detecting flooding attack and accommodating burst traffic in delay-tolerant networks TND Pham, CK Yeo, N Yanai, T Fujiwara IEEE Transactions on Vehicular Technology 67 (1), 795-808, 2017 | 33 | 2017 |
Membership inference attacks against diffusion models T Matsumoto, T Miura, N Yanai 2023 IEEE Security and Privacy Workshops (SPW), 77-83, 2023 | 26 | 2023 |
ISDSR+: improving the security and availability of secure routing protocol H Kojima, N Yanai, JP Cruz IEEE Access 7, 74849-74868, 2019 | 21 | 2019 |
Self-organizing map assisted deep autoencoding gaussian mixture model for intrusion detection Y Chen, N Ashizawa, S Yean, CK Yeo, N Yanai 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC …, 2021 | 16 | 2021 |
Tightly-secure identity-based structured aggregate signature scheme under the computational Diffie-Hellman assumption T Iwasaki, N Yanai, M Inamura, K Iwamura 2016 IEEE 30th International Conference on Advanced Information Networking …, 2016 | 15 | 2016 |
A secure structured multisignature scheme based on a non-commutative ring homomorphism N Yanai, E Chida, M Mambo IEICE transactions on fundamentals of electronics, communications and …, 2011 | 14 | 2011 |
Anonymous broadcast authentication for securely remote-controlling IoT devices Y Watanabe, N Yanai, J Shikata International Conference on Advanced Information Networking and Applications …, 2021 | 13 | 2021 |
MOBIUS: model-oblivious binarized neural networks H Kitai, JP Cruz, N Yanai, N Nishida, T Oba, Y Unagami, T Teruya, ... IEEE Access 7, 139021-139034, 2019 | 13 | 2019 |
Key-aggregate searchable encryption, revisited: formal foundations for cloud applications, and their implementation M Kamimura, N Yanai, S Okamura, JP Cruz IEEE Access 8, 24153-24169, 2020 | 12 | 2020 |
ISDSR: Secure DSR with ID-based sequential aggregate signature K Muranaka, N Yanai, S Okamura, T Fujiwara International Conference on Security and Cryptography 2, 376-387, 2016 | 12 | 2016 |
Crypto makes ai evolve B Zolfaghari, H Nemati, N Yanai, K Bibak Crypto and AI: From Coevolution to Quantum Revolution, 73-92, 2023 | 10 | 2023 |
A Certificateless Ordered Sequential Aggregate Signature Scheme Secure against Super Adverssaries. N Yanai, R Tso, M Mambo, E Okamoto J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3 (1/2), 30-54, 2012 | 10 | 2012 |
Privacy-preserving taxi-demand prediction using federated learning Y Goto, T Matsumoto, H Rizk, N Yanai, H Yamaguchi 2023 IEEE International Conference on Smart Computing (SMARTCOMP), 297-302, 2023 | 9 | 2023 |
Certificateless ordered sequential aggregate signature scheme N Yanai, R Tso, M Mambo, E Okamoto 2011 Third International Conference on Intelligent Networking and …, 2011 | 9 | 2011 |
Towards further formal foundation of web security: expression of temporal logic in Alloy and its application to a security model with cache H Shimamoto, N Yanai, S Okamura, JP Cruz, S Ou, T Okubo IEEE Access 7, 74941-74960, 2019 | 8 | 2019 |