Kazuo Hashimoto


  • Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
1980 …2021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Conference contribution

Search results

  • 2020

    Adversarial examples for hardware-trojan detection at gate-level netlists

    Nozawa, K., Hasegawa, K., Hidano, S., Kiyomoto, S., Hashimoto, K. & Togawa, N., 2020, Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Revised Selected Papers. Katsikas, S., Katsikas, S., Cuppens, F., Cuppens, N., Lambrinoudakis, C., Gritzalis, S., Kalloniatis, C., Mylopoulos, J., Antón, A., Pallas, F., Pohle, J., Sasse, A., Meng, W., Furnell, S. & Garcia-Alfaro, J. (eds.). Springer, p. 341-359 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11980 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)