Paper Presentation[icon name=”arrow-circle-right” class=”” unprefixed_class=””] Conference Presentation[icon name=”arrow-circle-right” class=”” unprefixed_class=””]
Paper Presentation
Collaborative Papers with Japan – India research team
Author | Title | Publisher | Volume | Number | Page | Published year | Published month |
Jiawei Su, Danilo Vargas Vasconcellos, Sanjiva Prasad, Daniele Sgandurra, Yaokai Feng, Koichi Sakurai, |
Lightweight Classification of IoT Malware based on Image Recognition | IEEE Annual International Computer Software and Applications Conference (COMPSAC) | 664-669 | 2018 | Jul | ||
Yuki Nishida, Kosuke Kaneko, Subodh Sharma, Koichi Sakurai, |
Suppressing Chain Size of Blockchain-Based Information Sharing for Swarm Robotic Systems | International Symposium on Computing and Networking (CANDAR) | 524-528 | 2018 | Nov | ||
Mihiro Sonoyama, Takatsugu Ono, Haruichi Kanaya, Osamu Muta, Smruti Ranjan Sarangi, Koji Inoue, |
Radio Propagation Characteristics-Based Spoofing Attack Prevention on Wireless Connected Devices | Journal of Information Processing | 27 | 322-334 | 2019 | ||
Wei Shi, Chenguang Ma, Srishti Kulshrestha, Ranjan Bose, Yoshihiro Okada, |
A Framework for Automatically Generating IoT Security Quizzes in a Virtual 3D Environment Based on Linked Data | Lecture Notes on Data Engineering and Communications Technologies (LNDECT) | 103-113 | 2019 | Feb | ||
Yoshihiro Okada, Akira Haga, Wei Shi, Chenguang Ma, Srishti Kulshrestha, Ranjan Bose, |
E-Learning Material Development Framework Supporting 360VR Images/Videos Based on Linked Data for IoT Security Education | Lecture Notes on Data Engineering and Communications Technologies (LNDECT) | 29 | 148-160 | 2019 | Feb | |
Shota Jojima, Kosuke Kaneko, Subodh Sharma, Koichi Sakurai, |
Simulation of Secure Volunteer Computing by Using Blockchain | International Conference on Advanced Information Networking and Applications (AINA) | 926 | 883-894 | 2019 | Mar |
Single-Authored Papers of Japan research team
Author | Title | Publisher | Volume | Number | Page | Published year | Published month |
Atsushi Shimada, Kaito Oka, Masaki Igarashi, Rin-ichiro Taniguchi, |
Congestion Analysis Across Locations Based on Wi-Fi Signal Sensing | International Conference on Pattern Recognition Applications and Methods(ICORAM) | 10857 | 204-221 | 2018 | Jun | |
Sanouphab Phomkeona, Kento Kono, Koji Okamura, |
An Unknown Malware Detection Using Execution Registry Access | The 13th IEEE International Workshop on Security, Trust, and Privacy for Software Applications(STPSA 2018) | 487-491 | 2018 | Jul | ||
Chao Ma, Atsushi Shimada, Hideaki Uchiyama, Hajime Nagahara, Rin-ichiro Taniguchi, |
Fall detection using optical level anonymous image sensing system | Optics & Laser Technology | 110 | 44-61 | 2018 | Jul | |
Yaokai Feng, Hitoshi Akiyama, Liang Lu, Koichi Sakurai, |
Feature Selection For Machine Learning-Based Early Detection of Distributed Cyber-Attacks | IEEE Cyber Science and Technology Congress(CyberSciTech) | 173-180 | 2018 | Aug | ||
Ikuta Tanigawa, Kenji Hisazumi, Nobuhiko Ogura, Midori Sugaya, Harumi Watanabe, Akira Fukuda, |
RTCOP: Context-Oriented Programming Framework for Applying to Embedded Software based on C++ | Asia Pacific Conference on Robot IoT System Development and Platform 2018(APRIS2018) | 2018 | ||||
Ryosuke Komiya, Yaokai Feng, Koichi Sakurai, |
Detecting Distributed Cyber Attacks in SDN Based on Automatic Thresholding | International Symposium on Computing and Networking Workshops (CANDARW) | 417-423 | 2018 | Nov | ||
Wai Kyi Kyi Oo, Hiroshi Koide, Danilo Vargas Vasconcellos, Koichi Sakurai, |
An implementation of Moving Target Defense Technology on the Web System | International Workshop on Information Search, Integration, and Personalization(ISIP) | 2018 | ||||
Jiawei Su, Danilo Vargas Vasconcellos, Koichi Sakurai, |
Empirical Evaluation on Robustness of Deep Convolutional Neural Networks Activation Functions Against Adversarial Perturbation | International Workshop on GPU Computing and AI(GCA) | 223-227 | 2018 | Nov | ||
Wai Kyi Kyi Oo, Hiroshi Koide, Danilo Vargas Vasconcellos, Koichi Sakurai, |
A New Design for Evaluating Moving Target Defense System | International Symposium on Computing and Networking(CANDAR) | 561-563 | 2018 | Nov | ||
Yao Xu, Hiroshi Koide, Danilo Vargas Vasconcellos, Koichi Sakurai, |
Tracing MIRAI Malware in Networked System | International Symposium on Computing and Networking(CANDAR) | 534-538 | 2018 | Nov | ||
Fumiya Tanaka, Kenji Hisazumi, Akira Fukuda, |
DFEAM: Dynamic Feature-oriented Energy-aware Adaptive Modeling | 7th International Conference on Model-Driven Engineering and Software Development(MODELSWARD 2019) | 292-299 | 2019 | Feb |
Single-Authored Papers of India research team
Author | Title | Publisher | Volume | Number | Page | Published year | Published month |
Sanjiva Prasad, | Best-by-simulations: A framework for comparing efficiency of reconfigurable architectures on workloads with deadlines | Journal of Logical and Algebraic Methods in Programming | 100 | 1-15 | 2018 | Nov | |
Sanjiva Prasad, | Only Connect, Securely | ArXiv | 2019 |
Conference Presentation
Collaborative Presentation with Japan – India research team
Presenter | Title | Conference | Venue | Presented year | Presented month |
Ghadeer Almusaddar, Takatsugu Ono, Smruti Ranjan Sarangi, Koji Inoue, |
Whitelisting Approach Using Hardware Performance Counters in IoT Microprocessors | The Institute of Electronics, Information and Communication Engineers (IEICE) Technical Report | 2018 | 4/6 | |
Yusuke Tsutsumi, Kosuke Kaneko, Yoshihiro Okada, Subodh Sharma, |
Hashgraph Based Network Communications for IoT Security in Smart Home | The 12th International Workshop on Information Search, Integration, and Personalization (ISIP2018) | Kyushu University, Fukuoka, Japan, | 2018 | 5/14-15 |
Kosuke Kaneko, Kazuya Nakayama, Yuki Nishida, Shota Jojima, Subodh Sharma, Koichi Sakurai, |
Proof-of-Intelligence: A New Consensus Algorithm Running on Blockchain Technology Aiming Effective Use of Computational Resources | The 12th International Workshop on Information Search, Integration, and Personalization (ISIP2018) | Kyushu University, Fukuoka, Japan, | 2018 | 5/14-15 |
Ghadeer Almusaddar, Teruo Tanimoto, Takatsugu Ono, Smruti Ranjan Sarangi, Koji Inoue, |
Whitelisting Approach Using Hardware Performance Counters in IoT Microprocessors | 4th Career Workshop for Women and Minorities in Computer Architecture | Fukuoka, Japan, | 2018 | 10/21 |
Jiawei Su, Danilo Vargas Vasconcellos, Sanjiva Prasad, Daniele Sgandurra, Yaokai Feng, Koichi Sakurai, |
Lightweight Classification of IoT Malware Based on Image Recognition | Computer Security Symposium 2018 (CSS2018) | Hotel Metropolitan Nagano, Nagano, Japan, | 2018 | 10/22-25 |
Yuki Nishida, Kosuke Kaneko, Subodh Sharma, Koichi Sakurai, |
Suppressing Chain Size of Blockchain-Based Information Sharing for Swarm Robotic Systems | The 6th International Symposium on Computing and Networking(CANDAR2018) | Hida Takayama, Japan, | 2018 | 11/27-30 |
Yiyi Wang, Alaa Allakany, Kulshrestha Srishti, Ranjan Bose, Koji Okamura, |
Automatic Generation E-Learning contents Based on IoT Security Ontology | The 81st National Convention of Information Processing Society of Japan (IPS) | Fukuoka University, Fukuoka, Japan, | 2019 | 3/14-16 |
Alaa Allakany, Geeta Yadav, Vijay Kumar, Kolin Paul, Koji Okamura, |
An Automated end-to-end penetration testing for the Internet of Thing | The 81st National Convention of Information Processing Society of Japan (IPS) | Fukuoka University, Fukuoka, Japan, | 2019 | 3/14-16 |
Shota Jojima, Kosuke Kaneko, Subodh Sharma, Koichi Sakurai, |
Simulation of Secure Volunteer Computing by Using Blockchain | Proceedings of the 33th International Conference on Advanced Information Networking and Applications(AINA-2019) | Matsue, Japan, | 2019 | 3/27-29 |
Presentation of Japan research team
Presenter | Title | Conference | Venue | Presented year | Presented month |
Alaa Allakany, Toshihide Muto, Koji Okamura, Srishti Kulshrestha, Ranjan Bose, |
Systematic building of E-Learning contents for secure IoT | The 12th International Workshop on Information Search, Integration, and Personalization (ISIP2018) | Kyushu University, Fukuoka, Japan, | 2018 | 5/14-15 |
Sanouphab Phomkeona, Koji Okamura, |
The design of an active method for spyware detection | The 12th International Workshop on Information Search, Integration, and Personalization (ISIP2018) | Kyushu University, Fukuoka, Japan, | 2018 | 5/14-15 |
Hiroki Nishida, Kosuke Kaneko, Shota Jojima, Koichi Sakurai, |
Proposal of Secure Information Sharing for Swarm Robot System using Blockchain Technology | Kyushu University-RIKEN-Fukuoka City Tripartite Collaboration Symposium “Future Solved by Mathematical Sciences and AI-Prospects and Expectations of Computational Sciences” | Kyushu University, Fukuoka, Japan, | 2018 | 5/15 |
Piyush Ghasiya, Koji Okamura, |
Perception & Vulnerability Towards Cybersecurity Among Elderly Citizen in Japan | Posters in World Social Science Forum2018 (WSSF2018) | Fukuoka, Japan, | 2018 | 9/25-28 |
Sanouphab Phomkeona, Koji Okamura, |
Zero-day Malicious Email Detection Using Email Header Information Analysis Combining with Deep-Learning Approach | Posters in World Social Science Forum2018 (WSSF2018) | Fukuoka, Japan, | 2018 | 9/28 |
Shota Jojima, Kosuke Kaneko, Hiroki Nishida, Yusuke Tsutsumi, Koichi Sakurai, |
The proposition of Framework to Achieve Secure Distributed Computing by Using Blockchain technology | Computer Security Symposium 2018 (CSS2018) | Hotel Metropolitan Nagano, Nagano, Japan, | 2018 | 10/22-25 |
Ariel Rodriguez, Koji Okamura, |
Generating security intelligence through social network sentiment analysis | Computer Security Symposium 2018 (CSS2018) | Hotel Metropolitan Nagano, Nagano, Japan, | 2018 | 10/22-25 |
Sanouphab Phomkeona, Koji Okamura, |
A Design Method for Zero-day Malicious Email Detection Using Email Header Information Analysis (EHIA) and Deep-Learning Approach | Computer Security Symposium 2018 (CSS2018) | Hotel Metropolitan Nagano, Nagano, Japan, | 2018 | 10/22-25 |
Koji Okamura, | Study on analysis of the equate in Cybersecurity education | Academic eXchange for Information Environment and Strategy (AXIES)2018 | Sapporo Convention Center, Hokkaido, Japan, | 2018 | 11/19-21 |
Piyush Ghasiya, Koji Okamura, |
How Japan’s Approach Towards Cybersecurity has Changed: Quantitative Content Analysis of Cybersecurity Strategy from 2013 to 2018 | Posters of Internet Conference 2018 (IC2018) | Tokyo, Japan, | 2018 | 11/26-27 |
Sanouphab Phomkeona, Koji Okamura, |
An evaluation of method for zero-day malicious email detection using email header information analqaysis (EHIA) and deep-learning approach | Posters of Internet Conference 2018 (IC2018) | Tokyo, Japan, | 2018 | 11/26-27 |
Shota Jojima, Kosuke Kaneko, Koichi Sakurai, |
Simulation of secure volunteer computing with resistance to advanced Sybil Attack | 2020 Symposium on Cryptography and Information Security | Lake Biwa Otsu Prince Hotel, Shiga, Japan, | 2019 | 1/22-25 |
Yan Naung Soe, Yaokai Feng, Koichi Sakurai, |
Implementation of IDS for IoT Environments Based on Machine Learning | The 11th Workshop among Asian Information Security Labs (WAIS 2019) | Busan, South Korea, | 2019 | 2/11-12 |
Hao Zhao, Hiroshi Koide, Yaokai Feng, Koichi Sakurai, |
Performance Verification of Cyber-attack Detection using Artificial Neural Networks | 2019 “Hinokuni – Land of Fire” Information Processing Symposium | Kumamoto University, Kumamoto, Japan, | 2019 | 3/2-3 |
Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Koichi Sakurai, |
Towards a Lightweight Detection System for Cyber Security in IoT Environments using Feature Seletion | 2019 “Hinokuni – Land of Fire” Information Processing Symposium | Kumamoto University, Kumamoto, Japan, | 2019 | 3/2-3 |
Chenguang Ma, Kosuke Kaneko, Koichi Sakurai, |
Proposal of Trustful Method for Distributed Oracle for Smart Contract | 2019 “Hinokuni – Land of Fire” Information Processing Symposium | Kumamoto University, Kumamoto, Japan, | 2019 | 3/2-3 |
Sanouphab Phomkeona, Koji Okamura, |
Collecting useful features for zero-day malicious emails detection | The 81st National Convention of Information Processing Society of Japan (IPS) | Fukuoka University, Fukuoka, Japan, | 2019 | 3/14-16 |
Xie Wen, Alaa Allakany, Koji Okamura, |
A study on Zigbee security: Attacks and Mitigation | The 81st National Convention of Information Processing Society of Japan (IPS) | Fukuoka University, Fukuoka, Japan, | 2019 | 3/14-16 |
Piyush Ghasiya, Koji Okamura, |
Quantitative Content Analysis of Japan’s Cybersecurity Strategies and How the Cybersecurity Landscape has changed in Japan since 2013 | The 81st National Convention of Information Processing Society of Japan (IPS) | Fukuoka University, Fukuoka, Japan, | 2019 | 3/14-16 |
Shota Jojima, Kosuke Kaneko, Koichi Sakurai, |
Implementation of Secure Volunteer Computing Simulator Using Blockchain Technology | The 81st National Convention of Information Processing Society of Japan (IPS) | Fukuoka University, Fukuoka, Japan, | 2019 | 3/14-16 |
Koji Okamura, | An Introduction of Serious-Game for Cybersecurity Education | International Workshop on Cyber-Physical Systems andCyber-Resilience | USA | 2019 | 3/20 |
Ariel Rodriguez, Koji Okamura, |
End to End Real Time Cyber Situational Awareness System Design and Methodology | International Workshop on Cyber-Physical Systems and Cyber-Resilience (CPS-CR) |
University of Delaware, USA | 2019 | 3/20 |
Presentation of India research team
Presenter | Title | Conference | Venue | Presented year | Presented month |
Sanjiva Prasad, | From ABC of Networks to a LitTLe logic for mobility | The University of Manchester, UK, | 2018 | 5/30 | |
Sanjiva Prasad, | Lectures on “Algebraic Foundations of Network Routing” | Kyushu University, Fukuoka, Japan, | 2018 | 7/2-10 | |
Sanjiva Prasad, | Best-by-simulations | McGill University, Montreal, Canada, | 2018 | 10/19 |