2024/08/08 更新

ジヤン ハイボ
張 海波
ZHANG Haibo
Scopus 論文情報  
総論文数: 0  総Citation: 0  h-index: 4

Citation Countは当該年に発表した論文の被引用数

所属
大学院情報工学研究院 知能情報工学研究系
職名
助教
外部リンク

研究キーワード

  • コンピュータビジョン

  • サイバーセキュリティ

  • 画像識別

取得学位

  • 九州大学  -  博士(情報科学)   2024年03月

学内職務経歴

  • 2024年04月 - 現在   九州工業大学   大学院情報工学研究院   知能情報工学研究系     助教

論文

  • Experimental Exploration of the Power of Conditional GAN in Image Reconstruction-Based Adversarial Attack Defense Strategies 査読有り

    Haibo Zhang, Kouichi Sakurai

    Advanced Information Networking and Applications, Lecture Notes on Data Engineering and Communications Technologies ( Springer, Cham. )   201   151 - 162   2024年04月

     詳細を見る

    担当区分:筆頭著者, 責任著者   記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)

    Adversarial attacks pose a significant threat to the reliability and security of deep learning models, particularly in image processing applications. Defending against these sophisticated manipulations requires innovative strategies, with Generative Adversarial Networks (GANs) emerging as a promising solution. This paper presents an experimental exploration of the power of conditional Generative Adversarial Networks (cGANs) in image reconstruction-based strategies for defending against adversarial attacks. Our study involves a comparative analysis of four distinct image reconstruction models: the traditional GAN-based Defense-GAN, the cGAN-based method exemplified by pix2pix, a hybrid approach combining pix2pix with perceptual loss, and a generator model centered around residual blocks. The results of our experiments demonstrate that cGAN models exhibit significantly enhanced efficacy in defending against adversarial attacks compared to other image reconstruction methods. This superiority is attributed to the inherent characteristics of cGANs, which we delve into in detail. The findings provide crucial insights for developing more robust defense strategies against adversarial attacks in diverse image processing and machine learning applications.

    DOI: 10.1007/978-3-031-57870-0_14

    DOI: 10.1007/978-3-031-57870-0_14

  • A Review on Machine Unlearning 査読有り 国際誌

    Zhang H., Nakamura T., Isohara T., Sakurai K.

    SN Computer Science   4 ( 4 )   2023年07月

     詳細を見る

    担当区分:筆頭著者, 責任著者   記述言語:英語   掲載種別:研究論文(学術雑誌)

    Recently, an increasing number of laws have governed the useability of users’ privacy. For example, Article 17 of the General Data Protection Regulation (GDPR), the right to be forgotten, requires machine learning applications to remove a portion of data from a dataset and retrain it if the user makes such a request. Furthermore, from the security perspective, training data for machine learning models, i.e., data that may contain user privacy, should be effectively protected, including appropriate erasure. Therefore, researchers propose various privacy-preserving methods to deal with such issues as machine unlearning. This paper provides an in-depth review of the security and privacy concerns in machine learning models. First, we present how machine learning can use users’ private data in daily life and the role that the GDPR plays in this problem. Then, we introduce the concept of machine unlearning by describing the security threats in machine learning models and how to protect users’ privacy from being violated using machine learning platforms. As the core content of the paper, we introduce and analyze current machine unlearning approaches and several representative results and discuss them in the context of the data lineage. Furthermore, we also discuss the future research challenges in this field.

    DOI: 10.1007/s42979-023-01767-4

    Kyutacar

    Scopus

    その他リンク: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85153474758&origin=inward

  • Eliminating Adversarial Perturbations Using Image-to-Image Translation Method 査読有り 国際誌

    Zhang H., Yao Z., Sakurai K.

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   13907 LNCS   601 - 620   2023年01月

     詳細を見る

    担当区分:筆頭著者, 責任著者   記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)

    Convolutional neural networks are widely used for image recognition tasks, but they are vulnerable to adversarial attacks that can cause the model to misclassify an image. Such attacks pose a significant security risk in safety-critical applications like facial recognition and autonomous driving. Researchers have made progress in defending against adversarial attacks through two approaches: enhancing the neural networks themselves to be more robust and removing the perturbation added to the image through pre-processing. This paper is based upon a recent defense model that belongs to the latter approach, which utilizes image-to-image translation to regenerate images perturbed by adversarial attacks. We optimized the training process of their model and tested the model performance against more recent and strong attacks. The results show that the model is able to regenerate images attacked by the state-of-the-art attack, the AutoAttack, and restores the classification accuracy to a level over 83% to that of the original images.

    DOI: 10.1007/978-3-031-41181-6_32

    Kyutacar

    Scopus

    その他リンク: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85174448356&origin=inward

  • POSTER: A Fine-Grained Metric for Evaluating the Performance of Adversarial Attacks and Defenses 査読有り 国際誌

    Zhang H., Yao Z., Sakurai K.

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   13907 LNCS   690 - 694   2023年01月

     詳細を見る

    担当区分:筆頭著者, 責任著者   記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)

    Over the past decade, the development of both adversarial attack methods and defense strategies has accelerated rapidly. Classification accuracy has been predominantly used as the sole metric for assessing model performance. However, when the reported accuracy rates of two models are identical or very similar, it becomes challenging to determine which model is superior. To address this issue and offer more insights into model performance, this study introduces a novel classification performance metric: the confidence gap. This metric is defined as the difference in confidence level between the true label and either the top 1 prediction or the second-best prediction, depending on the accuracy of the image classification. The confidence level, as indicated by its sign, reflects the correctness of the classification and provides more detailed information on the robustness of the classification result. Recognizing that evaluation results may be inconsistent when employing different criteria, we recommend that future research in this field should report the confidence gap alongside accuracy rates.

    DOI: 10.1007/978-3-031-41181-6_41

    Kyutacar

    Scopus

    その他リンク: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85174449307&origin=inward

  • Conditional Generative Adversarial Network-Based Image Denoising for Defending Against Adversarial Attack 査読有り 国際誌

    Zhang H., Sakurai K.

    IEEE Access   9   169031 - 169043   2021年01月

     詳細を見る

    担当区分:筆頭著者, 責任著者   記述言語:英語   掲載種別:研究論文(学術雑誌)

    Deep learning has become one of the most popular research topics today. Researchers have developed cutting-edge learning algorithms and frameworks around deep learning, applying them to a wide range of fields to solve real-world problems. However, we are more concerned about the security risks associated with deep learning models, such as adversarial attacks, which this article will discuss. Attackers can use the deep learning model to create the conditions for an attack, maliciously manipulating the input images to deceive the classification model and produce false positives. This paper proposes a method of pre-denoising all input images to prevent adversarial attacks by adding a purification layer before the classification model. The method in this paper is proposed based on the basic architecture of Conditional Generative Adversarial Networks. It adds the image perception loss to the original algorithm Pix2pix to achieve more efficient image recovery. Our method can recover noise-attacked images to a level close to the actual image to ensure the correctness of the classification results. Experimental results show that our approach can quickly recover noisy images, and the recovery accuracy is 20.22% higher than the previous state-of-the-art.

    DOI: 10.1109/ACCESS.2021.3137637

    Kyutacar

    Scopus

    その他リンク: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85122080076&origin=inward

  • A Survey of Software Clone Detection from Security Perspective 査読有り 国際誌

    Zhang H., Sakurai K.

    IEEE Access   9   48157 - 48173   2021年01月

     詳細を見る

    担当区分:筆頭著者, 責任著者   記述言語:英語   掲載種別:記事・総説・解説・論説等(学術雑誌)

    For software engineering, if two code fragments are closely similar with minor modifications or even identical due to a copy-paste behavior, that is called software/code clone. Code clones can cause trouble in software maintenance and debugging process because identifying all copied compromised code fragments in other locations is time-consuming. Researchers have been working on code clone detection issues for a long time, and the discussion mainly focuses on software engineering management and system maintenance. Another considerable issue is that code cloning provides an easy way to attackers for malicious code injection. A thorough survey work of code clone identification/detection from the security perspective is indispensable for providing a comprehensive review of existing related works and proposing future potential research directions. This paper can satisfy above requirements. We review and introduce existing security-related works following three different classifications and various comparison criteria. We then discuss three further research directions, (i) deep learning-based code clone vulnerability detection, (ii) vulnerable code clone detection for 5G-Internet of Things devices, and (iii) real-time detection methods for more efficiently detecting clone attacks. These methods are more advanced and adaptive to technological development than current technologies, and still have enough research space for future studies.

    DOI: 10.1109/ACCESS.2021.3065872

    Kyutacar

    Scopus

    その他リンク: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85103168898&origin=inward

  • Security and trust issues on digital supply chain 査読有り 国際誌

    Zhang H., Nakamura T., Sakurai K.

    Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019   338 - 343   2019年08月

     詳細を見る

    担当区分:筆頭著者, 責任著者   記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)

    This exploratory investigation aims to discuss current status and challenges, especially in aspect of security and trust problems, of digital supply chain management system with applying some advanced information technologies, such as Internet of Things, cloud computing and blockchain, for improving various system performance and properties, i.e. transparency, visibility, accountability, traceability and reliability. This paper introduces the general histories and definitions, in terms of information science, of the supply chain and relevant technologies which have been applied or are potential to be applied on supply chain with purpose of lowering cost, facilitating its security and convenience. It provides a comprehensive review of current relative research work and industrial cases from several famous companies. It also illustrates requirements or performance of digital supply chain system, security management and trust issues. Finally, this paper concludes several potential or existing security issues and challenges which supply chain management is facing.

    DOI: 10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00069

    Kyutacar

    Scopus

    その他リンク: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85075142259&origin=inward

  • 機械アンラーニングの研究に関する現状と課題

    張海波, 櫻井幸一

    人工知能 ( 一般社団法人 人工知能学会 )   38 ( 2 )   197 - 205   2023年03月

     詳細を見る

    担当区分:筆頭著者   記述言語:日本語   掲載種別:記事・総説・解説・論説等(学術雑誌)

    DOI: 10.11517/jjsai.38.2_197

    DOI: 10.11517/jjsai.38.2_197

  • A Design of Network Attack Detection Using Causal and Non-causal Temporal Convolutional Network 査読有り 国際誌

    He P., Zhang H., Feng Y., Sakurai K.

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   14299 LNCS   513 - 523   2023年01月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)

    Temporal Convolution Network(TCN) has recently been introduced in the cybersecurity field, where two types of TCNs that consider causal relationships are used: causal TCN and non-causal TCN. Previous researchers have utilized causal and non-causal TCNs separately. Causal TCN can predict real-time outcomes, but it ignores traffic data from the time when the detection is activated. Non-causal TCNs can forecast results more globally, but they are less real-time. Employing either causal TCN or non-causal TCN individually has its drawbacks, and overcoming these shortcomings has become an important topic. In this research, we propose a method that combines causal and non-causal TCN in a contingent form to improve detection accuracy, maintain real-time performance, and prevent long detection time. Additionally, we use two datasets to evaluate the performance of the proposed method: NSL-KDD, a well-known dataset for evaluating network intrusion detection systems, and MQTT-IoT-2020, which simulates the MQTT protocol, a standard protocol for IoT machine-to-machine communication. The proposed method in this research increased the detection time by about 0.1ms compared to non-causal TCN when using NSL-KDD, but the accuracy improved by about 1.5%, and the recall improved by about 4%. For MQTT-IoT-2020, the accuracy improved by about 3%, and the recall improved by about 7% compared to causal TCN, but the accuracy decreased by about 1% compared to non-causal TCN. The required time was shortened by 30ms (around 30%), and the recall was improved by about 7%.

    DOI: 10.1007/978-3-031-45933-7_30

    Kyutacar

    Scopus

    その他リンク: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85178520287&origin=inward

  • Blockchain for IoT-Based Digital Supply Chain: A Survey 査読有り

    Haibo Zhang, Kouichi Sakurai

    Advances in Internet, Data and Web Technologies, Lecture Notes on Data Engineering and Communications Technologies. ( Springer, Cham )   47   564 - 573   2020年01月

     詳細を見る

    担当区分:筆頭著者, 責任著者   記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)

    Japan   Kitakyushu   2020年02月24日  -  2020年02月26日

    This exploratory investigation aims to discuss current network environment of digital supply chain system and security issues, especially from the Internet world, of digital supply chain management system with applying some advanced information technologies, such as Internet of Things and blockchain, for improving various system performance and properties. This paper introduces the general histories and backgrounds, in terms of information science, of the supply chain and relevant technologies which have been applied or are potential to be applied on supply chain with purpose of lowering cost, facilitating its security and convenience. It provides a comprehensive review of current relative research work and industrial cases from several famous companies. It also illustrates the IoT enablement and security issues of current digital supply chain system, and existing blockchain’s role in this kind of digital system. Finally, this paper concludes several potential or existing security issues and challenges which supply chain management is facing.

    DOI: 10.1007/978-3-030-39746-3_57

    DOI: 10.1007/978-3-030-39746-3_57

▼全件表示

著書

  • Blockchain for IoT-Based Digital Supply Chain: A Survey 査読有り

    Zhang H., Sakurai K.(共著)

    Lecture Notes on Data Engineering and Communications Technologies  2020年01月 

     詳細を見る

    記述言語:英語

    This exploratory investigation aims to discuss current network environment of digital supply chain system and security issues, especially from the Internet world, of digital supply chain management system with applying some advanced information technologies, such as Internet of Things and blockchain, for improving various system performance and properties. This paper introduces the general histories and backgrounds, in terms of information science, of the supply chain and relevant technologies which have been applied or are potential to be applied on supply chain with purpose of lowering cost, facilitating its security and convenience. It provides a comprehensive review of current relative research work and industrial cases from several famous companies. It also illustrates the IoT enablement and security issues of current digital supply chain system, and existing blockchain’s role in this kind of digital system. Finally, this paper concludes several potential or existing security issues and challenges which supply chain management is facing.

    DOI: 10.1007/978-3-030-39746-3_57

    Scopus