Picture for Naoto Yanai

Naoto Yanai

Decoding BACnet Packets: A Large Language Model Approach for Packet Interpretation

Add code
Jul 22, 2024
Viaarxiv icon

JABBERWOCK: A Tool for WebAssembly Dataset Generation and Its Application to Malicious Website Detection

Add code
Jun 09, 2023
Viaarxiv icon

Privacy-Preserving Taxi-Demand Prediction Using Federated Learning

Add code
May 21, 2023
Viaarxiv icon

Do Backdoors Assist Membership Inference Attacks?

Add code
Mar 22, 2023
Viaarxiv icon

Membership Inference Attacks against Diffusion Models

Add code
Feb 07, 2023
Viaarxiv icon

First to Possess His Statistics: Data-Free Model Extraction Attack on Tabular Data

Add code
Sep 30, 2021
Figure 1 for First to Possess His Statistics: Data-Free Model Extraction Attack on Tabular Data
Figure 2 for First to Possess His Statistics: Data-Free Model Extraction Attack on Tabular Data
Figure 3 for First to Possess His Statistics: Data-Free Model Extraction Attack on Tabular Data
Figure 4 for First to Possess His Statistics: Data-Free Model Extraction Attack on Tabular Data
Viaarxiv icon

Eth2Vec: Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts

Add code
Jan 08, 2021
Figure 1 for Eth2Vec: Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts
Figure 2 for Eth2Vec: Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts
Figure 3 for Eth2Vec: Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts
Figure 4 for Eth2Vec: Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts
Viaarxiv icon

Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for Intrusion Detection

Add code
Aug 28, 2020
Figure 1 for Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for Intrusion Detection
Figure 2 for Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for Intrusion Detection
Figure 3 for Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for Intrusion Detection
Figure 4 for Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for Intrusion Detection
Viaarxiv icon

Model Extraction Attacks against Recurrent Neural Networks

Add code
Feb 01, 2020
Figure 1 for Model Extraction Attacks against Recurrent Neural Networks
Figure 2 for Model Extraction Attacks against Recurrent Neural Networks
Figure 3 for Model Extraction Attacks against Recurrent Neural Networks
Figure 4 for Model Extraction Attacks against Recurrent Neural Networks
Viaarxiv icon

MOBIUS: Model-Oblivious Binarized Neural Networks

Add code
Nov 29, 2018
Figure 1 for MOBIUS: Model-Oblivious Binarized Neural Networks
Figure 2 for MOBIUS: Model-Oblivious Binarized Neural Networks
Figure 3 for MOBIUS: Model-Oblivious Binarized Neural Networks
Figure 4 for MOBIUS: Model-Oblivious Binarized Neural Networks
Viaarxiv icon