Noboru Babaguchi
Osaka University
H-index: 24
Asia-Japan
Top articles of Noboru Babaguchi
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Enhancing Fake News Detection in Social Media via Label Propagation on Cross-modal Tweet Graph | Wanqing Zhao Yuta Nakashima Haiyuan Chen Noboru Babaguchi | 2023/10/26 | |
Frontiers in Fake Media Generation and Detection | Mahdi Khosravy Isao Echizen Noboru Babaguchi | 2022/5/28 | |
単一クラスの情報のみを出力する顔画像認識器に対する効率的な Model Inversion Attack | 電子情報通信学会技術研究報告 (Web) | SHUNSUKE YOSHIMURA KAZUAKI NAKAMURA NAOKO NITTA NOBORU BABAGUCHI | 2023 |
An Experimental Consideration on Gait Spoofing. | Yuki Hirose Kazuaki Nakamura Naoko Nitta Noboru Babaguchi | 2023 | |
A QUERY PROCEDUREADVANCED FOR ALLOWING EXCEPTIONS IN LOGICAL DATABASE | Industrial and Engineering Applications or Artificial Intelligence and Expert Systems | Kouzou Ohara Noboru Babaguchi Tadahiro Kitahashi | 2022/4/19 |
When AI Facilitates Trust Violation: An Ethical Report on Deep Model Inversion Privacy Attack | Mahdi Khosravy Kazuaki Nakamura Antoine Pasquali Olaf Witkowski Naoko Nitta | 2022/12/14 | |
A query procedure for allowing exceptions in advanced logical database | Kouzou Ohara Noboru Babaguchi Tadahiro Kithahashi | 2022/4/19 | |
Social iot approach to cyber defense of a deep-learning-based recognition system in front of media clones generated by model inversion attack | IEEE Transactions on Systems, Man, and Cybernetics: Systems | Mahdi Khosravy Kazuaki Nakamura Naoko Nitta Nilanjan Dey Rubén González Crespo | 2022/11/17 |
多様な詳細概念の少数ショット認識のためのメタ学習における分類タスクの影響の検証 | 研究報告コンピュータビジョンとイメージメディア (CVIM) | 井上駿哉, 新田直子, 中村和晃, 馬場口登 | 2022/3/3 |
Anonymization of Human Gait in Video Based on Silhouette Deformation and Texture Transfer | IEEE Transactions on Information Forensics and Security | Yuki Hirose Kazuaki Nakamura Naoko Nitta Noboru Babaguchi | 2022/9/14 |
Anonymous identity sampling and reusable synthesis for face camouflage | Journal of Electronic Imaging | Zhenzhong Kuang Longbin Teng Xingchi He Jiajun Ding Yuta Nakashima | 2022/3/1 |
Spoofing Tweet Generator Considering Points of Interest of Target User | Jeongwoo Lim Masayuki Tamura Naoko Nitta Kazuaki Nakamura Noboru Babaguchi | 2022/5/29 | |
Model inversion attack by integration of deep generative models: Privacy-sensitive face generation from a face recognition system | IEEE Transactions on Information Forensics and Security | Mahdi Khosravy Kazuaki Nakamura Yuki Hirose Naoko Nitta Noboru Babaguchi | 2022/1/6 |
Recognizer Cloning Attack on Image Recognition Services and Its Defending Method | Kazuaki Nakamura Yuto Mori Naoko Nitta Noboru Babaguchi | 2022/5/29 | |
Model inversion attack against a face recognition system in a black-box setting | Shunsuke Yoshimura Kazuaki Nakamura Naoko Nitta Noboru Babaguchi | 2021/12/14 | |
Semi-supervised outdoor image generation conditioned on weather signals | Sota Kawakami Kei Okada Naoko Nitta Kazuaki Nakamura Noboru Babaguchi | 2021/1/10 | |
Effective de-identification generative adversarial network for face anonymization | Zhenzhong Kuang Huigui Liu Jun Yu Aikui Tian Lei Wang | 2021/10/17 | |
Model inversion attack: analysis under gray-box scenario on deep learning based face recognition system | KSII Transactions on Internet and Information Systems (TIIS) | Mahdi Khosravy Kazuaki Nakamura Yuki Hirose Naoko Nitta Noboru Babaguchi | 2021 |
Unnoticeable synthetic face replacement for image privacy protection | Neurocomputing | Zhenzhong Kuang Zhiqiang Guo Jinglong Fang Jun Yu Noboru Babaguchi | 2021/10/7 |
Preventing fake information generation against media clone attacks | IEICE TRANSACTIONS on Information and Systems | Noboru Babaguchi Isao Echizen Junichi Yamagishi Naoko Nitta Yuta Nakashima | 2021/1/1 |