1 code implementation • 9 Jun 2023 • Chika Komiya, Naoto Yanai, Kyosuke Yamashita, Shingo Okamura
We also conduct experimental evaluations of JABBERWOCK in terms of the processing time for dataset generation, comparison of the generated samples with actual WebAssembly samples gathered from the Internet, and an application for malicious website detection.
no code implementations • 14 May 2023 • Yumeki Goto, Tomoya Matsumoto, Hamada Rizk, Naoto Yanai, Hirozumi Yamaguchi
Taxi-demand prediction is an important application of machine learning that enables taxi-providing facilities to optimize their operations and city planners to improve transportation infrastructure and services.
no code implementations • 22 Mar 2023 • Yumeki Goto, Nami Ashizawa, Toshiki Shibahara, Naoto Yanai
When an adversary provides poison samples to a machine learning model, privacy leakage, such as membership inference attacks that infer whether a sample was included in the training of the model, becomes effective by moving the sample to an outlier.
1 code implementation • 7 Feb 2023 • Tomoya Matsumoto, Takayuki Miura, Naoto Yanai
We primarily discuss the diffusion model from the standpoints of comparison with a generative adversarial network (GAN) as conventional models and hyperparameters unique to the diffusion model, i. e., time steps, sampling steps, and sampling variances.
no code implementations • 30 Sep 2021 • Masataka Tasumi, Kazuki Iwahana, Naoto Yanai, Katsunari Shishido, Toshiya Shimizu, Yuji Higuchi, Ikuya Morikawa, Jun Yajima
Whereas model extraction is more challenging on tabular data due to normalization, TEMPEST no longer needs initial samples that previous attacks require; instead, it makes use of publicly available statistics to generate query samples.
1 code implementation • 7 Jan 2021 • Nami Ashizawa, Naoto Yanai, Jason Paul Cruz, Shingo Okamura
Therefore, Eth2Vec can detect vulnerabilities in smart contracts by comparing the code similarity between target EVM bytecodes and the EVM bytecodes it already learned.
1 code implementation • 28 Aug 2020 • Yang Chen, Nami Ashizawa, Seanglidet Yean, Chai Kiat Yeo, Naoto Yanai
In this paper, we propose a self-organizing map assisted deep autoencoding Gaussian mixture model (SOMDAGMM) supplemented with well-preserved input space topology for more accurate network intrusion detection.
1 code implementation • 2 Jul 2020 • Yuichiro Chinen, Naoto Yanai, Jason Paul Cruz, Shingo Okamura
Ethereum smart contracts are programs that are deployed and executed in a consensus-based blockchain managed by a peer-to-peer network.
Cryptography and Security
no code implementations • 1 Feb 2020 • Tatsuya Takemura, Naoto Yanai, Toru Fujiwara
First, in a case of a classification problem, such as image recognition, extraction of an RNN model without final outputs from an LSTM model is presented by utilizing outputs halfway through the sequence.
no code implementations • 29 Nov 2018 • Hiromasa Kitai, Jason Paul Cruz, Naoto Yanai, Naohisa Nishida, Tatsumi Oba, Yuji Unagami, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka
A privacy-preserving framework in which a computational resource provider receives encrypted data from a client and returns prediction results without decrypting the data, i. e., oblivious neural network or encrypted prediction, has been studied in machine learning that provides prediction services.