default search action
Yusuke Kawamoto 0001
Person information
- affiliation: National Institute of Advanced Industrial Science and Technology, Tsukuba, Japan
Other persons with the same name
- Yusuke Kawamoto 0002 — Osaka University, Japan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Yusuke Kawamoto, Tetsuya Sato, Kohei Suenaga:
Sound and relatively complete belief Hoare logic for statistical hypothesis testing programs. Artif. Intell. 326: 104045 (2024) - [i21]Yusuke Kawamoto, Kentaro Kobayashi, Kohei Suenaga:
StatWhy: Formal Verification Tool for Statistical Hypothesis Testing Programs. CoRR abs/2405.17492 (2024) - 2023
- [c22]Yusuke Kawamoto, Tetsuya Sato, Kohei Suenaga:
Formalizing Statistical Causality via Modal Logic. JELIA 2023: 681-696 - [i20]Yusuke Kawamoto, Kazumasa Miyake, Koichi Konishi, Yutaka Oiwa:
Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy. CoRR abs/2301.07474 (2023) - 2022
- [j7]Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, Catuscia Palamidessi:
Information Leakage Games: Exploring Information as a Utility Function. ACM Trans. Priv. Secur. 25(3): 20:1-20:36 (2022) - [i19]Yusuke Kawamoto, Tetsuya Sato, Kohei Suenaga:
Sound and Relatively Complete Belief Hoare Logic for Statistical Hypothesis Testing Programs. CoRR abs/2208.07074 (2022) - [i18]Yusuke Kawamoto, Tetsuya Sato, Kohei Suenaga:
Formalizing Statistical Causality via Modal Logic. CoRR abs/2210.16751 (2022) - 2021
- [j6]Takao Murakami, Koki Hamada, Yusuke Kawamoto, Takuma Hatano:
Privacy-Preserving Multiple Tensor Factorization for Synthesizing Large-Scale Location Traces with Cluster-Specific Features. Proc. Priv. Enhancing Technol. 2021(2): 5-26 (2021) - [j5]Yusuke Kawamoto:
An epistemic approach to the formal specification of statistical machine learning. Softw. Syst. Model. 20(2): 293-310 (2021) - [c21]Natasha Fernandes, Yusuke Kawamoto, Takao Murakami:
Locality Sensitive Hashing with Extended Differential Privacy. ESORICS (2) 2021: 563-583 - [c20]Seira Hidano, Takao Murakami, Yusuke Kawamoto:
TransMIA: Membership Inference Attacks Using Transfer Shadow Training. IJCNN 2021: 1-10 - [c19]Yusuke Kawamoto, Tetsuya Sato, Kohei Suenaga:
Formalizing Statistical Beliefs in Hypothesis Testing Using Program Logic. KR 2021: 411-421 - 2020
- [i17]Yusuke Kawamoto:
An Epistemic Approach to the Formal Specification of Statistical Machine Learning. CoRR abs/2004.12734 (2020) - [i16]Natasha Fernandes, Yusuke Kawamoto, Takao Murakami:
Locality Sensitive Hashing with Extended Differential Privacy. CoRR abs/2010.09393 (2020) - [i15]Seira Hidano, Yusuke Kawamoto, Takao Murakami:
TransMIA: Membership Inference Attacks Using Transfer Shadow Training. CoRR abs/2011.14661 (2020) - [i14]Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, Catuscia Palamidessi:
Information Leakage Games: Exploring Information as a Utility Function. CoRR abs/2012.12060 (2020)
2010 – 2019
- 2019
- [j4]Fabrizio Biondi, Yusuke Kawamoto, Axel Legay, Louis-Marie Traonouez:
Hybrid statistical estimation of mutual information and its application to information flow. Formal Aspects Comput. 31(2): 165-206 (2019) - [c18]Yusuke Kawamoto, Takao Murakami:
Local Distribution Obfuscation via Probability Coupling*. Allerton 2019: 718-725 - [c17]Yusuke Kawamoto:
Statistical Epistemic Logic. The Art of Modelling Computational Systems 2019: 344-362 - [c16]Yusuke Kawamoto, Takao Murakami:
Local Obfuscation Mechanisms for Hiding Probability Distributions. ESORICS (1) 2019: 128-148 - [c15]Yusuke Kawamoto:
Towards Logical Specification of Statistical Machine Learning. SEFM 2019: 293-311 - [c14]Takao Murakami, Yusuke Kawamoto:
Utility-Optimized Local Differential Privacy Mechanisms for Distribution Estimation. USENIX Security Symposium 2019: 1877-1894 - [i13]Yusuke Kawamoto, Takao Murakami:
Local Distribution Obfuscation via Probability Coupling. CoRR abs/1907.05991 (2019) - [i12]Yusuke Kawamoto:
Statistical Epistemic Logic. CoRR abs/1907.05995 (2019) - [i11]Yusuke Kawamoto:
Towards Logical Specification of Statistical Machine Learning. CoRR abs/1907.10327 (2019) - [i10]Takao Murakami, Koki Hamada, Yusuke Kawamoto, Takuma Hatano:
Privacy-Preserving Multiple Tensor Factorization for Synthesizing Large-Scale Location Traces. CoRR abs/1911.04226 (2019) - 2018
- [j3]Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, Catuscia Palamidessi:
A Game-Theoretic Approach to Information-Flow Control via Protocol Composition. Entropy 20(5): 382 (2018) - [c13]Yusuke Kawamoto, Takao Murakami:
On the Anonymization of Differentially Private Location Obfuscation. ISITA 2018: 159-163 - [c12]Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, Catuscia Palamidessi:
Leakage and Protocol Composition in a Game-Theoretic Perspective. POST 2018: 134-159 - [i9]Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, Catuscia Palamidessi:
Leakage and Protocol Composition in a Game-Theoretic Perspective. CoRR abs/1802.10465 (2018) - [i8]Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, Catuscia Palamidessi:
A Game-Theoretic Approach to Information-Flow Control via Protocol Composition. CoRR abs/1803.10042 (2018) - [i7]Yusuke Kawamoto, Takao Murakami:
On the Anonymization of Differentially Private Location Obfuscation. CoRR abs/1807.08456 (2018) - [i6]Takao Murakami, Yusuke Kawamoto:
Restricted Local Differential Privacy for Distribution Estimation with High Data Utility. CoRR abs/1807.11317 (2018) - [i5]Fabrizio Biondi, Yusuke Kawamoto, Axel Legay, Louis-Marie Traonouez:
Hybrid Statistical Estimation of Mutual Information and its Application to Information Flow. CoRR abs/1809.02613 (2018) - [i4]Yusuke Kawamoto, Takao Murakami:
Differentially Private Obfuscation Mechanisms for Hiding Probability Distributions. CoRR abs/1812.00939 (2018) - 2017
- [j2]Yusuke Kawamoto, Konstantinos Chatzikokolakis, Catuscia Palamidessi:
On the Compositionality of Quantitative Information Flow. Log. Methods Comput. Sci. 13(3) (2017) - [c11]Fabrizio Biondi, Yusuke Kawamoto, Axel Legay, Louis-Marie Traonouez:
HyLeak: Hybrid Analysis Tool for Information Leakage. ATVA 2017: 156-163 - [c10]Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, Catuscia Palamidessi:
Information Leakage Games. GameSec 2017: 437-457 - [i3]Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, Catuscia Palamidessi:
Information Leakage Games. CoRR abs/1705.05030 (2017) - 2016
- [c9]Yusuke Kawamoto, Fabrizio Biondi, Axel Legay:
Hybrid Statistical Estimation of Mutual Information for Quantifying Information Flow. FM 2016: 406-425 - [i2]Yusuke Kawamoto, Konstantinos Chatzikokolakis, Catuscia Palamidessi:
On the Compositionality of Quantitative Information Flow. CoRR abs/1611.00455 (2016) - 2015
- [c8]Yusuke Kawamoto, Thomas Given-Wilson:
Quantitative Information Flow for Scheduler-Dependent Systems. QAPL 2015: 48-62 - 2014
- [c7]Tom Chothia, Yusuke Kawamoto, Chris Novakovic:
LeakWatch: Estimating Information Leakage from Java Programs. ESORICS (2) 2014: 219-236 - [c6]Yusuke Kawamoto, Konstantinos Chatzikokolakis, Catuscia Palamidessi:
Compositionality Results for Quantitative Information Flow. QEST 2014: 368-383 - 2013
- [c5]Tom Chothia, Yusuke Kawamoto, Chris Novakovic:
A Tool for Estimating Information Leakage. CAV 2013: 690-695 - [c4]Tom Chothia, Yusuke Kawamoto, Chris Novakovic, David Parker:
Probabilistic Point-to-Point Information Leakage. CSF 2013: 193-205 - 2012
- [c3]Romain Bardou, Riccardo Focardi, Yusuke Kawamoto, Lorenzo Simionato, Graham Steel, Joe-Kai Tsay:
Efficient Padding Oracle Attacks on Cryptographic Hardware. CRYPTO 2012: 608-625 - [c2]Hubert Comon-Lundh, Masami Hagiya, Yusuke Kawamoto, Hideki Sakurada:
Computational Soundness of Indistinguishability Properties without Computable Parsing. ISPEC 2012: 63-79 - [i1]Romain Bardou, Riccardo Focardi, Yusuke Kawamoto, Lorenzo Simionato, Graham Steel, Joe-Kai Tsay:
Efficient Padding Oracle Attacks on Cryptographic Hardware. IACR Cryptol. ePrint Arch. 2012: 417 (2012)
2000 – 2009
- 2009
- [j1]Hubert Comon-Lundh, Yusuke Kawamoto, Hideki Sakurada:
Computational and Symbolic Anonymity in an Unbounded Network. JSIAM Lett. 1: 28-31 (2009) - [c1]Yusuke Kawamoto, Hideki Sakurada, Masami Hagiya:
Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption. Formal to Practical Security 2009: 158-180
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint