Updated on 2024/08/08

 
ZHANG Haibo
 
Scopus Paper Info  
Total Paper Count: 0  Total Citation Count: 0  h-index: 4

Citation count denotes the number of citations in papers published for a particular year.

Affiliation
Faculty of Computer Science and Systems Engineering Department of Artificial Intelligence
Job
Assistant Professor
External link

Research Interests

  • Computer Vision

  • Cyber Security

  • Image Recognition

Degree

  • 九州大学  -  博士(情報科学)   2024.03

Biography in Kyutech

  • 2024.04
     

    Kyushu Institute of Technology   Faculty of Computer Science and Systems Engineering   Department of Artificial Intelligence   Assistant Professor  

Papers

  • Experimental Exploration of the Power of Conditional GAN in Image Reconstruction-Based Adversarial Attack Defense Strategies Reviewed

    Haibo Zhang, Kouichi Sakurai

    Advanced Information Networking and Applications, Lecture Notes on Data Engineering and Communications Technologies ( Springer, Cham. )   201   151 - 162   2024.04

     More details

    Authorship:Lead author, Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)

    Adversarial attacks pose a significant threat to the reliability and security of deep learning models, particularly in image processing applications. Defending against these sophisticated manipulations requires innovative strategies, with Generative Adversarial Networks (GANs) emerging as a promising solution. This paper presents an experimental exploration of the power of conditional Generative Adversarial Networks (cGANs) in image reconstruction-based strategies for defending against adversarial attacks. Our study involves a comparative analysis of four distinct image reconstruction models: the traditional GAN-based Defense-GAN, the cGAN-based method exemplified by pix2pix, a hybrid approach combining pix2pix with perceptual loss, and a generator model centered around residual blocks. The results of our experiments demonstrate that cGAN models exhibit significantly enhanced efficacy in defending against adversarial attacks compared to other image reconstruction methods. This superiority is attributed to the inherent characteristics of cGANs, which we delve into in detail. The findings provide crucial insights for developing more robust defense strategies against adversarial attacks in diverse image processing and machine learning applications.

    DOI: 10.1007/978-3-031-57870-0_14

    DOI: 10.1007/978-3-031-57870-0_14

  • A Review on Machine Unlearning Reviewed International journal

    Zhang H., Nakamura T., Isohara T., Sakurai K.

    SN Computer Science   4 ( 4 )   2023.07

     More details

    Authorship:Lead author, Corresponding author   Language:English   Publishing type:Research paper (scientific journal)

    DOI: 10.1007/s42979-023-01767-4

    Kyutacar

    Scopus

    Other Link: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85153474758&origin=inward

  • Eliminating Adversarial Perturbations Using Image-to-Image Translation Method Reviewed International journal

    Zhang H., Yao Z., Sakurai K.

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   13907 LNCS   601 - 620   2023.01

     More details

    Authorship:Lead author, Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)

    DOI: 10.1007/978-3-031-41181-6_32

    Kyutacar

    Scopus

    Other Link: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85174448356&origin=inward

  • POSTER: A Fine-Grained Metric for Evaluating the Performance of Adversarial Attacks and Defenses Reviewed International journal

    Zhang H., Yao Z., Sakurai K.

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   13907 LNCS   690 - 694   2023.01

     More details

    Authorship:Lead author, Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)

    DOI: 10.1007/978-3-031-41181-6_41

    Kyutacar

    Scopus

    Other Link: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85174449307&origin=inward

  • Conditional Generative Adversarial Network-Based Image Denoising for Defending Against Adversarial Attack Reviewed International journal

    Zhang H., Sakurai K.

    IEEE Access   9   169031 - 169043   2021.01

     More details

    Authorship:Lead author, Corresponding author   Language:English   Publishing type:Research paper (scientific journal)

    DOI: 10.1109/ACCESS.2021.3137637

    Kyutacar

    Scopus

    Other Link: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85122080076&origin=inward

  • A Survey of Software Clone Detection from Security Perspective Reviewed International journal

    Zhang H., Sakurai K.

    IEEE Access   9   48157 - 48173   2021.01

     More details

    Authorship:Lead author, Corresponding author   Language:English   Publishing type:Article, review, commentary, editorial, etc. (scientific journal)

    DOI: 10.1109/ACCESS.2021.3065872

    Kyutacar

    Scopus

    Other Link: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85103168898&origin=inward

  • Security and trust issues on digital supply chain Reviewed International journal

    Zhang H., Nakamura T., Sakurai K.

    Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019   338 - 343   2019.08

     More details

    Authorship:Lead author, Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)

    DOI: 10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00069

    Kyutacar

    Scopus

    Other Link: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85075142259&origin=inward

  • Current Status and Challenges in Research on Machine Unlearning

    Haibo Zhang, Kouichi Sakurai

    Artificial Intelligence ( The Japanese Society for Artificial Intelligence (General Incorporated Association) )   38 ( 2 )   197 - 205   2023.03

     More details

    Authorship:Lead author   Language:Japanese   Publishing type:Article, review, commentary, editorial, etc. (scientific journal)

    DOI: 10.11517/jjsai.38.2_197

    DOI: 10.11517/jjsai.38.2_197

  • A Design of Network Attack Detection Using Causal and Non-causal Temporal Convolutional Network Reviewed International journal

    He P., Zhang H., Feng Y., Sakurai K.

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   14299 LNCS   513 - 523   2023.01

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)

    DOI: 10.1007/978-3-031-45933-7_30

    Kyutacar

    Scopus

    Other Link: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85178520287&origin=inward

  • Blockchain for IoT-Based Digital Supply Chain: A Survey Reviewed

    Haibo Zhang, Kouichi Sakurai

    Advances in Internet, Data and Web Technologies, Lecture Notes on Data Engineering and Communications Technologies. ( Springer, Cham )   47   564 - 573   2020.01

     More details

    Authorship:Lead author, Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)

    Japan   Kitakyushu   2020.02.24  -  2020.02.26

    This exploratory investigation aims to discuss current network environment of digital supply chain system and security issues, especially from the Internet world, of digital supply chain management system with applying some advanced information technologies, such as Internet of Things and blockchain, for improving various system performance and properties. This paper introduces the general histories and backgrounds, in terms of information science, of the supply chain and relevant technologies which have been applied or are potential to be applied on supply chain with purpose of lowering cost, facilitating its security and convenience. It provides a comprehensive review of current relative research work and industrial cases from several famous companies. It also illustrates the IoT enablement and security issues of current digital supply chain system, and existing blockchain’s role in this kind of digital system. Finally, this paper concludes several potential or existing security issues and challenges which supply chain management is facing.

    DOI: 10.1007/978-3-030-39746-3_57

    DOI: 10.1007/978-3-030-39746-3_57

▼display all

Publications (Books)