Publications

You can also find my articles on my ResearchMap.

Journal Articles


[6] LGNMNet-RF: Micro-Expression Detection Using Motion History Images

Published in Algorithms, 2024

Recommended citation: Teng MKK, Zhang H, Saitoh T. LGNMNet-RF: Micro-Expression Detection Using Motion History Images. Algorithms. 2024; 17(11):491. https://doi.org/10.3390/a17110491.
Download Paper

[5] Versatile Defense Against Adversarial Attacks on Image Recognition

Published in arXiv, 2024

Recommended citation: Zhang, H., Yao, Z., & Sakurai, K. (2024). Versatile Defense Against Adversarial Attacks on Image Recognition. arXiv preprint arXiv:2403.08170.
Download Paper

[4] A Review on Machine Unlearning

Published in SN Computer Science, 2023

Recommended citation: Zhang, H., Nakamura, T., Isohara, T., & Sakurai, K. (2023). A Review on Machine Unlearning. SN Computer Science, 4(4), 337.
Download Paper

[3] 機械アンラーニングの研究に関する現状と課題

Published in 人工知能, 2023

Recommended citation: 張海波, & 櫻井幸一. (2023). 機械アンラーニングの研究に関する現状と課題. 人工知能, 38(2), 197-205.
Download Paper

[2] Conditional Generative Adversarial Network-Based Image Denoising for Defending Against Adversarial Attack

Published in IEEE Access, 2021

Recommended citation: Zhang, H., & Sakurai, K. (2021). Conditional Generative Adversarial Network-Based Image Denoising for Defending Against Adversarial Attack. IEEE Access, 9, 169031-169043.
Download Paper

[1] A Survey of Software Clone Detection From Security Perspective

Published in IEEE Access, 2021

Recommended citation: Zhang, H., & Sakurai, K. (2021). A Survey of Software Clone Detection From Security Perspective, in IEEE Access, vol. 9, pp. 48157-48173, doi: 10.1109/ACCESS.2021.3065872.
Download Paper

Conference Papers


[7] Experimental Exploration of the Power of Conditional GAN in Image Reconstruction-Based Adversarial Attack Defense Strategies

Published in Advanced Information Networking and Applications , 2024

Recommended citation: Zhang, H., Sakurai, K. (2024). Experimental Exploration of the Power of Conditional GAN in Image Reconstruction-Based Adversarial Attack Defense Strategies. In: Barolli, L. (eds) Advanced Information Networking and Applications. AINA 2024. Lecture Notes on Data Engineering and Communications Technologies, vol 201. Springer, Cham. (International)
Download Paper

[6] A Design of Network Attack Detection Using Causal and Non-Causal Temporal Convolutional

Published in The 5th International Conference on Science of Cyber Security (SciSec 2023) , 2023

Recommended citation: He, P., Zhang, H., Feng, Y. and Sakurai, K. (2023). A Design of Network Attack Detection Using Causal and Non-Causal Temporal Convolutional. The 5th International Conference on Science of Cyber Security (SciSec 2023). (International)
Download Paper

[5] POSTER: A Fine-Grained Metric for Evaluating the Performance of Adversarial Attacks and Defenses

Published in International Conference on Applied Cryptography and Network Security , 2023

Recommended citation: Zhang, H., Yao, Z., & Sakurai, K. (2023). POSTER: A Fine-Grained Metric for Evaluating the Performance of Adversarial Attacks and Defenses. In International Conference on Applied Cryptography and Network Security (pp. 690-694). Cham: Springer Nature Switzerland. (International)
Download Paper

[4] Eliminating Adversarial Perturbations Using Image-to-Image Translation Method

Published in International Conference on Applied Cryptography and Network Security , 2023

Recommended citation: Zhang, H., Yao, Z., & Sakurai, K. (2023). Eliminating Adversarial Perturbations Using Image-to-Image Translation Method. In International Conference on Applied Cryptography and Network Security (pp. 601-620). Cham: Springer Nature Switzerland. (International)
Download Paper

[3] Zero Trust for Supply Chain Security

Published in IEEE Conference on Dependable and Secure Computing , 2021

Recommended citation: Zhang, H., Sakurai, K. (2021). Zero Trust for Supply Chain Security. The 2021 IEEE Conference on Dependable and Secure Computing (poster). (International)
Download Paper

[2] Blockchain for IoT-Based Digital Supply Chain: A Survey

Published in International Conference on Emerging Internetworking, Data & Web Technologies , 2020

Recommended citation: Zhang, H., Sakurai, K. (2020).Blockchain for IoT-Based Digital Supply Chain: A Survey. The 8th International Conference on Emerging Internet, Data & Web Technologies (EIDWT-2020). (International)
Download Paper

[1] Security and Trust Issues on Digital Supply Chain

Published in IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), 2019

Recommended citation: Zhang, H., Nakamura, T. and Sakurai, K. (2019). Security and Trust Issues on Digital Supply Chain. The 4th IEEE Cyber Science and Technology Congress (CyberSciTech2019). (International)
Download Paper