Naoto Yanai
Naoto Yanai
Osaka Universiy
Verified email at
Cited by
Cited by
RBAC-SC: Role-based access control using smart contract
JP Cruz, Y Kaji, N Yanai
Ieee Access 6, 12240-12251, 2018
Eth2vec: learning contract-wide code representations for vulnerability detection on ethereum smart contracts
N Ashizawa, N Yanai, JP Cruz, S Okamura
Proceedings of the 3rd ACM international symposium on blockchain and secure …, 2021
RA: Hunting for re-entrancy attacks in ethereum smart contracts via static analysis
Y Chinen, N Yanai, JP Cruz, S Okamura
2020 IEEE International Conference on Blockchain (Blockchain), 327-336, 2020
Multi-scale self-organizing map assisted deep autoencoding Gaussian mixture model for unsupervised intrusion detection
Y Chen, N Ashizawa, CK Yeo, N Yanai, S Yean
Knowledge-Based Systems 224, 107086, 2021
Detecting flooding attack and accommodating burst traffic in delay-tolerant networks
TND Pham, CK Yeo, N Yanai, T Fujiwara
IEEE Transactions on Vehicular Technology 67 (1), 795-808, 2017
Membership inference attacks against diffusion models
T Matsumoto, T Miura, N Yanai
2023 IEEE Security and Privacy Workshops (SPW), 77-83, 2023
Model extraction attacks on recurrent neural networks
T Takemura, N Yanai, T Fujiwara
Journal of Information Processing 28, 1010-1024, 2020
ISDSR+: improving the security and availability of secure routing protocol
H Kojima, N Yanai, JP Cruz
IEEE Access 7, 74849-74868, 2019
Self-organizing map assisted deep autoencoding gaussian mixture model for intrusion detection
Y Chen, N Ashizawa, S Yean, CK Yeo, N Yanai
2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC …, 2021
Tightly-secure identity-based structured aggregate signature scheme under the computational Diffie-Hellman assumption
T Iwasaki, N Yanai, M Inamura, K Iwamura
2016 IEEE 30th International Conference on Advanced Information Networking …, 2016
Model extraction attacks against recurrent neural networks
T Takemura, N Yanai, T Fujiwara
arXiv preprint arXiv:2002.00123, 2020
A secure structured multisignature scheme based on a non-commutative ring homomorphism
N Yanai, E Chida, M Mambo
IEICE transactions on fundamentals of electronics, communications and …, 2011
Anonymous broadcast authentication for securely remote-controlling IoT devices
Y Watanabe, N Yanai, J Shikata
International Conference on Advanced Information Networking and Applications …, 2021
MOBIUS: model-oblivious binarized neural networks
H Kitai, JP Cruz, N Yanai, N Nishida, T Oba, Y Unagami, T Teruya, ...
IEEE Access 7, 139021-139034, 2019
Key-aggregate searchable encryption, revisited: formal foundations for cloud applications, and their implementation
M Kamimura, N Yanai, S Okamura, JP Cruz
IEEE Access 8, 24153-24169, 2020
ISDSR: Secure DSR with ID-based sequential aggregate signature
K Muranaka, N Yanai, S Okamura, T Fujiwara
International Conference on Security and Cryptography 2, 376-387, 2016
A Certificateless Ordered Sequential Aggregate Signature Scheme Secure against Super Adverssaries.
N Yanai, R Tso, M Mambo, E Okamoto
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3 (1/2), 30-54, 2012
Crypto makes ai evolve
B Zolfaghari, H Nemati, N Yanai, K Bibak
Crypto and AI: From Coevolution to Quantum Revolution, 73-92, 2023
Meeting tight security for multisignatures in the plain public key model
N Yanai
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2018
Certificateless ordered sequential aggregate signature scheme
N Yanai, R Tso, M Mambo, E Okamoto
2011 Third International Conference on Intelligent Networking and …, 2011
The system can't perform the operation now. Try again later.
Articles 1–20