default search action
Seira Hidano
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Seira Hidano, Takao Murakami:
Degree-Preserving Randomized Response for Graph Neural Networks under Local Differential Privacy. Trans. Data Priv. 17(2): 89-121 (2024) - [c54]Kento Hasegawa, Seira Hidano, Kazuhide Fukushima:
AutoRed: Automating Red Team Assessment via Strategic Thinking Using Reinforcement Learning. CODASPY 2024: 325-336 - [c53]Ryo Meguro, Hiroya Kato, Shintaro Narisada, Seira Hidano, Kazuhide Fukushima, Takuo Suganuma, Masahiro Hiji:
Gradient-Based Clean Label Backdoor Attack to Graph Neural Networks. ICISSP 2024: 510-521 - [c52]Hibiki Nakanishi, Kota Hisafuru, Kento Hasegawa, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, Nozomu Togawa:
Initial Seeds Generation Using LLM for IoT Device Fuzzing. IOTSMS 2024: 5-10 - [c51]Yuka Ikegami, Ryotaro Negishi, Kento Hasegawa, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, Nozomu Togawa:
Prioritizing Vulnerability Assessment Items Using LLM Based on IoT Device Documentations. IOTSMS 2024: 147-152 - [c50]Hiroya Kato, Kento Hasegawa, Seira Hidano, Kazuhide Fukushima:
EdgePruner: Poisoned Edge Pruning in Graph Contrastive Learning. SaTML 2024: 309-326 - 2023
- [j5]Kento Hasegawa, Seira Hidano, Kohei Nozawa, Shinsaku Kiyomoto, Nozomu Togawa:
R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training. IEEE Trans. Computers 72(2): 333-345 (2023) - [c49]Hoang-Quoc Nguyen-Son, Seira Hidano, Kazuhide Fukushima, Shinsaku Kiyomoto, Isao Echizen:
VoteTRANS: Detecting Adversarial Text without Training by Voting on Hard Labels of Transformations. ACL (Findings) 2023: 5090-5104 - [c48]Shintaro Narisada, Seira Hidano, Kazuhide Fukushima:
Fully Hidden Dynamic Trigger Backdoor Attacks. ICAART (3) 2023: 81-91 - [c47]Kento Hasegawa, Seira Hidano, Kazuhide Fukushima:
Automating XSS Vulnerability Testing Using Reinforcement Learning. ICISSP 2023: 70-80 - [c46]Jung-Woo Chang, Mojan Javaheripi, Seira Hidano, Farinaz Koushanfar:
RoVISQ: Reduction of Video Service Quality via Adversarial Attacks on Deep Learning-based Video Compression. NDSS 2023 - [c45]Kento Hasegawa, Kazuki Yamashita, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, Nozomu Togawa:
Membership Inference Attacks against GNN-based Hardware Trojan Detection. TrustCom 2023: 1222-1229 - [i14]Jung-Woo Chang, Nojan Sheybani, Shehzeen Samarah Hussain, Mojan Javaheripi, Seira Hidano, Farinaz Koushanfar:
NetFlick: Adversarial Flickering Attacks on Deep Learning Based Video Compression. CoRR abs/2304.01441 (2023) - [i13]Hoang-Quoc Nguyen-Son, Seira Hidano, Kazuhide Fukushima, Shinsaku Kiyomoto, Isao Echizen:
VoteTRANS: Detecting Adversarial Text without Training by Voting on Hard Labels of Transformations. CoRR abs/2306.01273 (2023) - [i12]Jung-Woo Chang, Ke Sun, Nasimeh Heydaribeni, Seira Hidano, Xinyu Zhang, Farinaz Koushanfar:
Magmaw: Modality-Agnostic Adversarial Attacks on Machine Learning-Based Wireless Communication Systems. CoRR abs/2311.00207 (2023) - [i11]Hiroya Kato, Kento Hasegawa, Seira Hidano, Kazuhide Fukushima:
EdgePruner: Poisoned Edge Pruning in Graph Contrastive Learning. CoRR abs/2312.07022 (2023) - 2022
- [c44]Hoang-Quoc Nguyen-Son, Huy Quang Ung, Seira Hidano, Kazuhide Fukushima, Shinsaku Kiyomoto:
CheckHARD: Checking Hard Labels for Adversarial Text Detection, Prediction Correction, and Perturbed Word Suggestion. EMNLP (Findings) 2022: 2903-2913 - [c43]Vanessa Bracamonte, Seira Hidano, Shinsaku Kiyomoto:
Influence of Errors on the Evaluation of Text Classification Systems. VISIGRAPP (Revised Selected Papers) 2022: 161-181 - [c42]Vanessa Bracamonte, Seira Hidano, Shinsaku Kiyomoto:
Effect of Errors on the Evaluation of Machine Learning Systems. VISIGRAPP (2: HUCAPP) 2022: 48-57 - [c41]Kazuki Yamashita, Tomohiro Kato, Kento Hasegawa, Seira Hidano, Kazuhide Fukushima, Nozomu Togawa:
Effective Hardware-Trojan Feature Extraction Against Adversarial Attacks at Gate-Level Netlists. IOLTS 2022: 1-7 - [c40]Vanessa Bracamonte, Seira Hidano, Toru Nakamura, Shinsaku Kiyomoto:
Feature-level Approach for the Evaluation of Text Classification Models. VISIGRAPP (3: IVAPP) 2022: 164-170 - [i10]Seira Hidano, Takao Murakami:
Degree-Preserving Randomized Response for Graph Neural Networks under Local Differential Privacy. CoRR abs/2202.10209 (2022) - [i9]Jung-Woo Chang, Mojan Javaheripi, Seira Hidano, Farinaz Koushanfar:
Adversarial Attacks on Deep Learning-based Video Compression and Classification Systems. CoRR abs/2203.10183 (2022) - [i8]Kento Hasegawa, Seira Hidano, Kohei Nozawa, Shinsaku Kiyomoto, Nozomu Togawa:
R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training. CoRR abs/2205.13702 (2022) - [i7]Ruisi Zhang, Seira Hidano, Farinaz Koushanfar:
Text Revealer: Private Text Reconstruction via Model Inversion Attacks against Transformers. CoRR abs/2209.10505 (2022) - 2021
- [j4]Kohei Nozawa, Kento Hasegawa, Seira Hidano, Shinsaku Kiyomoto, Kazuo Hashimoto, Nozomu Togawa:
Generating Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists. J. Inf. Process. 29: 236-246 (2021) - [c39]Shintaro Narisada, Yuki Matsumoto, Seira Hidano, Toshihiro Uchibayashi, Takuo Suganuma, Masahiro Hiji, Shinsaku Kiyomoto:
Countermeasures Against Backdoor Attacks Towards Malware Detectors. CANS 2021: 295-314 - [c38]Kento Hasegawa, Seira Hidano, Shinsaku Kiyomoto, Nozomu Togawa:
Toward Learning Robust Detectors from Imbalanced Datasets Leveraging Weighted Adversarial Training. CANS 2021: 392-411 - [c37]Seira Hidano, Takao Murakami, Yusuke Kawamoto:
TransMIA: Membership Inference Attacks Using Transfer Shadow Training. IJCNN 2021: 1-10 - [c36]Hoang-Quoc Nguyen-Son, Tran Phuong Thao, Seira Hidano, Vanessa Bracamonte, Shinsaku Kiyomoto, Rie Shigetomi Yamaguchi:
OPA2D: One-Pixel Attack, Detection, and Defense in Deep Neural Networks. IJCNN 2021: 1-10 - [c35]Kento Hasegawa, Seira Hidano, Kohei Nozawa, Shinsaku Kiyomoto, Nozomu Togawa:
Data Augmentation for Machine Learning-Based Hardware Trojan Detection at Gate-Level Netlists. IOLTS 2021: 1-4 - [c34]Hoang-Quoc Nguyen-Son, Tran Thao Phuong, Seira Hidano, Ishita Gupta, Shinsaku Kiyomoto:
Machine Translated Text Detection Through Text Similarity with Round-Trip Translation. NAACL-HLT 2021: 5792-5797 - [c33]Hoang-Quoc Nguyen-Son, Seira Hidano, Kazuhide Fukushima, Shinsaku Kiyomoto:
SEPP: Similarity Estimation of Predicted Probabilities for Defending and Detecting Adversarial Text. PACLIC 2021: 11-20 - [i6]Hoang-Quoc Nguyen-Son, Seira Hidano, Kazuhide Fukushima, Shinsaku Kiyomoto:
SEPP: Similarity Estimation of Predicted Probabilities for Defending and Detecting Adversarial Text. CoRR abs/2110.05748 (2021) - [i5]Kento Hasegawa, Kazuki Yamashita, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, Nozomu Togawa:
Node-wise Hardware Trojan Detection Based on Graph Learning. CoRR abs/2112.02213 (2021) - 2020
- [j3]Tomoaki Mimoto, Seira Hidano, Shinsaku Kiyomoto, Atsuko Miyaji:
Anonymization Technique Based on SGD Matrix Factorization. IEICE Trans. Inf. Syst. 103-D(2): 299-308 (2020) - [j2]Seira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro Hanaoka:
Exposing Private User Behaviors of Collaborative Filtering via Model Inversion Techniques. Proc. Priv. Enhancing Technol. 2020(3): 264-283 (2020) - [c32]Shintaro Narisada, Shoichiro Sasaki, Seira Hidano, Toshihiro Uchibayashi, Takuo Suganuma, Masahiro Hiji, Shinsaku Kiyomoto:
Stronger Targeted Poisoning Attacks Against Malware Detection. CANS 2020: 65-84 - [c31]Vanessa Bracamonte, Seira Hidano, Welderufael B. Tesfay, Shinsaku Kiyomoto:
Evaluating the Effect of Justification and Confidence Information on User Perception of a Privacy Policy Summarization Tool. ICISSP 2020: 142-151 - [c30]Vanessa Bracamonte, Seira Hidano, Welderufael B. Tesfay, Shinsaku Kiyomoto:
Effects of Explanatory Information on Privacy Policy Summarization Tool Perception. ICISSP (Revised Selected Papers) 2020: 156-177 - [c29]Seira Hidano, Shinsaku Kiyomoto:
Recommender Systems Robust to Data Poisoning using Trim Learning. ICISSP 2020: 721-724 - [i4]Seira Hidano, Yusuke Kawamoto, Takao Murakami:
TransMIA: Membership Inference Attacks Using Transfer Shadow Training. CoRR abs/2011.14661 (2020)
2010 – 2019
- 2019
- [c28]Hoang-Quoc Nguyen-Son, Tran Phuong Thao, Seira Hidano, Shinsaku Kiyomoto:
Detecting Machine-Translated Paragraphs by Matching Similar Words. CICLing (1) 2019: 521-532 - [c27]Kohei Nozawa, Kento Hasegawa, Seira Hidano, Shinsaku Kiyomoto, Kazuo Hashimoto, Nozomu Togawa:
Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 341-359 - [c26]Vanessa Bracamonte, Seira Hidano, Welderufael B. Tesfay, Shinsaku Kiyomoto:
User Study of the Effectiveness of a Privacy Policy Summarization Tool. ICISSP (Revised Selected Papers) 2019: 186-206 - [c25]Vanessa Bracamonte, Seira Hidano, Welderufael B. Tesfay, Shinsaku Kiyomoto:
Evaluating Privacy Policy Summarization: An Experimental Study among Japanese Users. ICISSP 2019: 370-377 - [c24]Hoang-Quoc Nguyen-Son, Tran Thao Phuong, Seira Hidano, Shinsaku Kiyomoto:
Detecting Machine-Translated Text using Back Translation. INLG 2019: 189-197 - [c23]Shoichiro Sasaki, Seira Hidano, Toshihiro Uchibayashi, Takuo Suganuma, Masahiro Hiji, Shinsaku Kiyomoto:
On Embedding Backdoor in Malware Detectors Using Machine Learning. PST 2019: 1-5 - [i3]Hoang-Quoc Nguyen-Son, Tran Phuong Thao, Seira Hidano, Shinsaku Kiyomoto:
Detecting Machine-Translated Paragraphs by Matching Similar Words. CoRR abs/1904.10641 (2019) - [i2]Hoang-Quoc Nguyen-Son, Tran Phuong Thao, Seira Hidano, Shinsaku Kiyomoto:
Detecting Machine-Translated Text using Back Translation. CoRR abs/1910.06558 (2019) - [i1]Hoang-Quoc Nguyen-Son, Tran Phuong Thao, Seira Hidano, Shinsaku Kiyomoto:
Identifying Adversarial Sentences by Analyzing Text Complexity. CoRR abs/1912.08981 (2019) - 2018
- [j1]Seira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro Hanaoka:
Model Inversion Attacks for Online Prediction Systems: Without Knowledge of Non-Sensitive Attributes. IEICE Trans. Inf. Syst. 101-D(11): 2665-2676 (2018) - [c22]Yuto Nakano, Seira Hidano, Shinsaku Kiyomoto, Kouichi Sakurai:
Active Attack Against Oblivious RAM. AINA 2018: 744-751 - [c21]Seira Hidano, Yuto Nakano, Shinsaku Kiyomoto:
An Evaluation Framework for Fastest Oblivious RAM. IoTBDS 2018: 114-122 - [c20]Tomoaki Mimoto, Shinsaku Kiyomoto, Seira Hidano, Anirban Basu, Atsuko Miyaji:
The Possibility of Matrix Decomposition as Anonymization and Evaluation for Time-sequence Data. PST 2018: 1-7 - [c19]Hiroki Okada, Carlos Cid, Seira Hidano, Shinsaku Kiyomoto:
Linear Depth Integer-Wise Homomorphic Division. WISTP 2018: 91-106 - 2017
- [c18]Toshihiro Uchibayashi, Yuichi Hashi, Seira Hidano, Shinsaku Kiyomoto, Bernady O. Apduhan, Toru Abe, Takuo Suganuma, Masahiro Hiji:
A Control Mechanism for Live Migration with Data Regulations Preservation. ICCSA (1) 2017: 509-522 - [c17]Kazuhide Fukushima, Seira Hidano, Shinsaku Kiyomoto:
White-box Implementation of Stream Cipher. ICISSP 2017: 263-269 - [c16]Toshihiro Uchibayashi, Yuichi Hashi, Seira Hidano, Shinsaku Kiyomoto, Takuo Suganuma, Masahiro Hiji:
Verification of Data Collection Methods for Live Migration Protection Mechanism. NBiS 2017: 420-430 - [c15]Seira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro Hanaoka:
Model Inversion Attacks for Prediction Systems: Without Knowledge of Non-Sensitive Attributes. PST 2017: 115-126 - 2016
- [c14]Yuichi Hashi, Toshihiro Uchibayashi, Seira Hidano, Shinsaku Kiyomoto, Abdur Rahim Biswas, Takuo Suganuma, Masahiro Hiji:
Data Protection for Cross-Border Live Migration in Multi-cloud Environment. CANDAR 2016: 681-685 - [c13]Toshihiro Uchibayashi, Masahiro Hiji, Takuo Suganuma, Yuichi Hashi, Seira Hidano:
Proposed data audit system enhances use in accordance with the data owner's policy. KICSS 2016: 1-5 - [c12]Seira Hidano, Shinsaku Kiyomoto, Abdur Rahim Biswas, Toshihiro Uchibayashi, Takuo Suganuma:
Access Control for Cross-Border Transfer of Sensor Data. MobiSec 2016: 143-153 - [c11]Kazuhide Fukushima, Seira Hidano, Shinsaku Kiyomoto:
Sensor-based Wearable PUF. SECRYPT 2016: 207-214 - [c10]Kazuhide Fukushima, Youssef Souissi, Seira Hidano, Robert Nguyen, Jean-Luc Danger, Sylvain Guilley, Yuto Nakano, Shinsaku Kiyomoto, Laurent Sauvage:
Delay PUF Assessment Method Based on Side-Channel and Modeling Analyzes: The Final Piece of All-in-One Assessment Methodology. Trustcom/BigDataSE/ISPA 2016: 201-207 - 2015
- [c9]Seira Hidano, Shinsaku Kiyomoto, Yosuke Murakami, Panagiotis Vlacheas, Klaus Moessner:
Design of a Security Gateway for iKaaS Platform. CloudComp 2015: 323-333 - [c8]Seira Hidano, Martin Pecovský, Shinsaku Kiyomoto:
New Security Challenges in the 5G Network. ISICA 2015: 619-630 - [c7]Anirban Basu, Toru Nakamura, Seira Hidano, Shinsaku Kiyomoto:
k-anonymity: Risks and the Reality. TrustCom/BigDataSE/ISPA (1) 2015: 983-989 - [c6]Seira Hidano, Shinsaku Kiyomoto:
On Partitioning Secret Data Based on Concept of Functional Safety. WISA 2015: 110-121 - 2013
- [c5]Michitaro Shozawa, Ryota Yokote, Seira Hidano, Chi-Hua Wu, Yasuo Matsuyama:
Brain Signal Based Continuous Authentication: Functional NIRS Approach. IWANN (2) 2013: 171-180 - 2012
- [c4]Seira Hidano, Tetsushi Ohki, Kenta Takahashi:
Evaluation of security for biometric guessing attacks in biometric cryptosystem using fuzzy commitment scheme. BIOSIG 2012: 1-6 - [c3]Tetsushi Ohki, Seira Hidano, Tatsuya Takehisa:
Evaluation of wolf attack for classified target on speaker verification systems. ICARCV 2012: 182-187 - 2010
- [c2]Seira Hidano, Tetsushi Ohki, Naohisa Komatsu, Kenta Takahashi:
A metric of identification performance of biometrics based on information content. ICARCV 2010: 1274-1279
2000 – 2009
- 2008
- [c1]Seira Hidano, Tetsushi Ohki, Naohisa Komatsu, Masao Kasahara:
On biometric encryption using fingerprint and it's security evaluation. ICARCV 2008: 950-956
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint