Login / Signup
Tsunato Nakai
Publication Activity (10 Years)
Years Active: 2014-2024
Publications (10 Years): 10
Top Topics
Execution Environment
White Box
Ciphertext
Leak Detection
Top Venues
ISCAS
ACNS Workshops
IACR Trans. Cryptogr. Hardw. Embed. Syst.
FormaliSE@ICSE
</>
Publications
</>
Tsunato Nakai
,
Ye Wang
,
Kota Yoshida
,
Takeshi Fujino
SEDMA: Self-Distillation with Model Aggregation for Membership Privacy.
Proc. Priv. Enhancing Technol.
2024 (1) (2024)
Tsunato Nakai
,
Ryo Yamamoto
Co-designing Trusted Execution Environment and Model Encryption for Secure High-Performance DNN Inference on FPGAs.
ISCAS
(2024)
Rei Ueda
,
Tsunato Nakai
,
Kota Yoshida
,
Takeshi Fujino
Evaluation of Membership Inference Attack Against Federated Learning With Differential Privacy on Edge Devices.
GCCE
(2023)
Tsunato Nakai
,
Daisuke Suzuki
,
Takeshi Fujino
Towards Isolated AI Accelerators with OP-TEE on SoC-FPGAs.
ACNS Workshops
(2022)
Tsunato Nakai
,
Daisuke Suzuki
,
Takeshi Fujino
Towards Trained Model Confidentiality and Integrity Using Trusted Execution Environments.
ACNS Workshops
(2021)
Tsunato Nakai
,
Daisuke Suzuki
,
Fumio Omatsu
,
Takeshi Fujino
Adversarial Black-Box Attacks with Timing Side-Channel Leakage.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(1) (2021)
Tsunato Nakai
,
Daisuke Suzuki
,
Takeshi Fujino
Timing Black-Box Attacks: Crafting Adversarial Examples through Timing Leaks against DNNs on Embedded Devices.
IACR Trans. Cryptogr. Hardw. Embed. Syst.
2021 (3) (2021)
Tsunato Nakai
,
Sachihiro Ichikawa
,
Nobuhiro Kobayashi
,
Kosuke Hata
,
Kenji Sawada
Whitelisting Cyber Attack Detection according to Estimated Operational States for CPS.
INDIN
(2019)
Nobuhiro Kobayashi
,
Koichi Shimizu
,
Tsunato Nakai
,
Teruyoshi Yamaguchi
,
Masakatsu Nishigaki
Intrusion Detection Method Using Enhanced Whitelist Based on Cooperation of System Development, System Deployment, and Device Development Domains in CPS.
NBiS
(2018)
Koichi Shimizu
,
Teruyoshi Yamaguchi
,
Tsunato Nakai
,
Takeshi Ueda
,
Nobuhiro Kobayashi
,
Benoît Boyer
A Trusted Approach to Design a Network Monitor.
FormaliSE@ICSE
(2017)
Mitsuru Shiozaki
,
Takaya Kubota
,
Tsunato Nakai
,
Akihiro Takeuchi
,
Takashi Nishimura
,
Takeshi Fujino
Tamper-resistant authentication system with side-channel attack resistant AES and PUF using MDR-ROM.
ISCAS
(2015)
Tsunato Nakai
,
Megumi Shibatani
,
Mitsuru Shiozaki
,
Takaya Kubota
,
Takeshi Fujino
Side-channel attack resistant AES cryptographic circuits with ROM reducing address-dependent EM leaks.
ISCAS
(2014)