Author of the publication

Customer Data Scanner for Hands-Free Mobile Payment.

, , , , , and . IEICE Trans. Commun., 98-B (11): 2291-2299 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

POSTER: Zero-Day Evasion Attack Analysis on Race between Attack and Defense., , and . AsiaCCS, page 805-807. ACM, (2018)Systematic Evaluation of Robustness Against Model Inversion Attacks on Split Learning., , , and . WISA, volume 14402 of Lecture Notes in Computer Science, page 107-118. Springer, (2023)Extracting a Minimal Trigger for an Efficient Backdoor Poisoning Attack Using the Activation Values of a Deep Neural Network., and . WDC@AsiaCCS, page 3-6. ACM, (2022)A Study on the Interoperability Technology of Digital Identification Based on WACI Protocol with Multiparty Distributed Signature., , , and . Sensors, 23 (8): 4061 (2023)Eavesdropping One-Time Tokens Over Magnetic Secure Transmission in Samsung Pay., and . WOOT, USENIX Association, (2016)Adversarial Attack Based on Perturbation of Contour Region to Evade Steganalysis-Based Detection., , and . IEEE Access, (2021)Accurate Indoor Proximity Zone Detection Based on Time Window and Frequency with Bluetooth Low Energy., , , and . FNC/MobiSPC, volume 56 of Procedia Computer Science, page 88-95. Elsevier, (2015)Robust Authenticated Key Exchange Using Passwords and Identity-Based Signatures., , , , and . SSR, volume 9497 of Lecture Notes in Computer Science, page 43-69. Springer, (2015)Fooling a Neural Network in Military Environments: Random Untargeted Adversarial Example., , , and . MILCOM, page 456-461. IEEE, (2018)Digital ID Wallet: Provide Selective Disclosure and Users Control of Identity Information., , and . Security and Management, page 457-462. CSREA Press, (2009)