Skip to main content

Showing 1–4 of 4 results for author: Oiwa, Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2301.07474  [pdf, other

    cs.CR cs.AI cs.LG cs.SE

    Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy

    Authors: Yusuke Kawamoto, Kazumasa Miyake, Koichi Konishi, Yutaka Oiwa

    Abstract: In this article, we propose the Artificial Intelligence Security Taxonomy to systematize the knowledge of threats, vulnerabilities, and security controls of machine-learning-based (ML-based) systems. We first classify the damage caused by attacks against ML-based systems, define ML-specific security, and discuss its characteristics. Next, we enumerate all relevant assets and stakeholders and provi… ▽ More

    Submitted 18 January, 2023; v1 submitted 18 January, 2023; originally announced January 2023.

  2. arXiv:2101.02494  [pdf, other

    cs.LG cs.AI cs.SE

    Corner case data description and detection

    Authors: Tinghui Ouyang, Vicent Sant Marco, Yoshinao Isobe, Hideki Asoh, Yutaka Oiwa, Yoshiki Seo

    Abstract: As the major factors affecting the safety of deep learning models, corner cases and related detection are crucial in AI quality assurance for constructing safety- and security-critical systems. The generic corner case researches involve two interesting topics. One is to enhance DL models robustness to corner case data via the adjustment on parameters/structure. The other is to generate new corner… ▽ More

    Submitted 11 March, 2021; v1 submitted 7 January, 2021; originally announced January 2021.

  3. arXiv:1405.1703  [pdf, ps, other

    cs.SE cs.LO math.PR

    Evaluation of A Resilience Embedded System Using Probabilistic Model-Checking

    Authors: Ling Fang, Yoriyuki Yamagata, Yutaka Oiwa

    Abstract: If a Micro Processor Unit (MPU) receives an external electric signal as noise, the system function will freeze or malfunction easily. A new resilience strategy is implemented in order to reset the MPU automatically and stop the MPU from freezing or malfunctioning. The technique is useful for embedded systems which work in non-human environments. However, evaluating resilience strategies is difficu… ▽ More

    Submitted 5 May, 2014; originally announced May 2014.

    Comments: In Proceedings ESSS 2014, arXiv:1405.0554

    Journal ref: EPTCS 150, 2014, pp. 35-49

  4. arXiv:0911.5230  [pdf, ps, other

    cs.CR cs.NI

    PAKE-based mutual HTTP authentication for preventing phishing attacks

    Authors: Yutaka Oiwa, Hajime Watanabe, Hiromitsu Takagi

    Abstract: This paper describes a new password-based mutual authentication protocol for Web systems which prevents various kinds of phishing attacks. This protocol provides a protection of user's passwords against any phishers even if dictionary attack is employed, and prevents phishers from imitating a false sense of successful authentication to users. The protocol is designed considering interoperability… ▽ More

    Submitted 27 November, 2009; originally announced November 2009.

    ACM Class: D.4.6