{"id":3379,"date":"2020-11-10T12:01:21","date_gmt":"2020-11-10T03:01:21","guid":{"rendered":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/?page_id=3379"},"modified":"2021-12-21T10:33:26","modified_gmt":"2021-12-21T01:33:26","slug":"results2016","status":"publish","type":"page","link":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/results-final\/results2016\/","title":{"rendered":"Research Results\uff5cin 2016"},"content":{"rendered":"<p><a href=\"#paper\">Paper Presentation[icon name=&#8221;arrow-circle-right&#8221; class=&#8221;&#8221; unprefixed_class=&#8221;&#8221;]<\/a>\u3000\u3000<a href=\"#presentation\">Conference Presentation[icon name=&#8221;arrow-circle-right&#8221; class=&#8221;&#8221; unprefixed_class=&#8221;&#8221;]<\/a>\u3000<a id=\"paper\"><\/a><\/p>\n<h2>Paper Presentation<\/h2>\n<h4><span lang=\"en\">Single-authored Papers of the Japan research team<\/span><\/h4>\n<table style=\"width: 100%; border-style: solid; border-color: #ababab; height: 276px;\" border=\"1px\" cellspacing=\"0px\" cellpadding=\"0px\">\n<thead>\n<tr style=\"background-color: #e5e5e5;\">\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; height: 87px;\">Author<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; height: 87px;\">Title<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; height: 87px;\">Publisher<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; height: 87px;\">Volume<\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; height: 87px;\">Number<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; height: 87px;\">Page<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; height: 87px;\">Published year<\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; height: 87px;\">Published month<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr style=\"height: 63px;\">\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">Jiawei Su,<br \/>\nDanilo Vargas Vasconcellos,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">One Pixel Attack for Fooling Deep Neural Networks<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">ArXiv<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\"><\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\"><\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\"><\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">2017<\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\"><\/td>\n<\/tr>\n<tr style=\"height: 63px;\">\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">Jiawei Su,<br \/>\nDanilo Vargas Vasconcellos,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">Evasion Attacks Against Statistical Code Obfuscation Detectors<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">International Workshop on Security I (WSEC)<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">10418<\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\"><\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">121-137<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">2017<\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">Jul<\/td>\n<\/tr>\n<tr style=\"height: 63px;\">\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">Yaokai Feng,<br \/>\nYoshiaki Hori,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">A Detection System for Distributed DoS Attacks Based on Automatic Extraction of Normal Mode and Its Performance Evaluation<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">Lecture Notes in Computer Science (LNCS)<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">10656<\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\"><\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">461-473<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">2017<\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">Dec<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Masaki Igarashi,<br \/>\nAtsushi Shimada,<br \/>\nKaito Oka,<br \/>\nRin-ichiro Taniguchi,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">Analysis of Wi-Fi-Based and Perceptual Congestion<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Proceedings of The 6th International Conference on Pattern Recognition Applications and Methods (ICPRAM2017)<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\">225-232<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\">2017<\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4><span lang=\"en\">Single-authored Papers of the India research team<\/span><\/h4>\n<table style=\"width: 100%; border-style: solid; border-color: #e5e5e5;\" border=\"1px\" cellspacing=\"0px\" cellpadding=\"0px\">\n<thead>\n<tr style=\"background-color: #e5e5e5;\">\n<td style=\"width: 20.0%; border-style: solid; border-color: #ababab;\">Author<\/td>\n<td style=\"width: 34.0%; border-style: solid; border-color: #ababab;\">Title<\/td>\n<td style=\"width: 20.0%; border-style: solid; border-color: #ababab;\">Publisher<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab;\">Volume<\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab;\">Number<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab;\">Page<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab;\">Published year<\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab;\">Published month<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Khyati Chopra,<br \/>\nRanjan Bose,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">Secrecy Performance of Threshold-Based Decode-and-Forward Cooperative Cognitive Radio Network<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">The Institution of Engineering and Technology (IET) Communications<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\">11<\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top;\">9<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\">1396-1406<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\">2017<\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top;\">Feb<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Pallavi Sethi,<br \/>\nSmruti Ranjan Sarangi,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">Internet of Things: Architectures, Protocols, and Applications<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Journal of Electrical and Computer Engineering<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\">2017<\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\">2017<\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Nimish Joseph,<br \/>\nArpan Kumar Kar,<br \/>\nVigneswara Ilavarasan P,<br \/>\nShankar Ganesh,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">Review of discussions on Internet of Things (IoT): Insights from Twitter Analytics<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Journal of Global Information Management<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\">25<\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top;\">2<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\">38-51<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\">2017<\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h2>Conference Presentation<a id=\"presentation\"><\/a><\/h2>\n<h4>Presentation of Japan Research Team<\/h4>\n<table style=\"width: 100%; border-style: solid; border-color: #e5e5e5;\" border=\"1px\" cellspacing=\"0px\" cellpadding=\"0px\">\n<thead>\n<tr style=\"background-color: #e5e5e5;\">\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; height: 47px;\">Presenter<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; height: 47px;\">Title<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; height: 47px;\">Conference<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; height: 47px;\">Venue<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; height: 47px;\">Presented year<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; height: 47px;\">Presented month<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Yoshihiro Okada,<br \/>\nKosuke Kaneko,<br \/>\nAri Tanizawa,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">INTERACTIVE EDUCATIONAL CONTENTS DEVELOPMENT FRAMEWORK BASED ON LINKED OPEN DATA TECHNOLOGY<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">9th annual International Conference of Education, Research and Innovation (ICERI 2016)<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top;\">Seville, Spain,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">2016<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">11\/14-16<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Koji Okamura,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">Introduction of the Cybersecurity education in Kyushu University<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Academic eXchange for Information Environment and Strategy in 2016 (AXIES)<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top;\">Kyoto International Conference Center, Kyoto, Japan,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">2016<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">12\/14-16<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Liang Lu,<br \/>\nYaokai Feng,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">C&amp;C session detection using random forest<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">The 11th International Conference on Ubiquitous Information Management and Communication (ACM IMCOM 2017)<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top;\">Beppu, Japan,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">2017<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">1\/5-7<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Taku Nishigori,<br \/>\nJunpei Kawamoto,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">Improving the accuracy of signature authentication using the Eight Principles of Yong<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">The 11th International Conference on Ubiquitous Information Management and Communication (ACM IMCOM 2017)<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top;\">Beppu, Japan,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">2017<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">1\/5-7<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Tomohisa Ishikawa,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">A proposal of event study methodology with Twitter sentimental analysis for risk management<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">The 11th International Conference on Ubiquitous Information Management and Communication (ACM IMCOM 2017)<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top;\">Beppu, Japan,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">2017<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">1\/5-7<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Tomohisa Ishikawa,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">Parameter manipulation attack prevention and detection by using web application deception proxy<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">The 11th International Conference on Ubiquitous Information Management and Communication (ACM IMCOM 2017)<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top;\">Beppu, Japan,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">2017<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">1\/5-7<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Kirill Morozov,<br \/>\nPartha Sarathi Roy,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">On unconditionally binding code-based commitment schemes<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">The 11th International Conference on Ubiquitous Information Management and Communication (ACM IMCOM 2017)<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top;\">Beppu, Japan,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">2017<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">1\/5-7<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Tomohisa Ishikawa,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">A Study of Security Management with Cyber Insurance<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">The 11th International Conference on Ubiquitous Information Management and Communication (ACM IMCOM 2017)<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top;\">Beppu, Japan,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">2017<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">1\/5-7<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Jiawei Su,<br \/>\nDanilo Vargas Vasconcellos,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">An Introduction to Adversarial Machine Learning from Perspective of Information Security<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Symposium on Cryptography and Information Security (SCIS2017)<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top;\">Naha, Okinawa, Japan,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">2017<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">1\/24-27<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Masaki Igarashi,<br \/>\nAtsushi Shimada,<br \/>\nKaito Oka,<br \/>\nRin-ichiro Taniguchi,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">Analysis of Wi-Fi-Based and Perceptual Congestion<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">6th International Conference on Pattern Recognition Applications and Methods (ICPRAM2017)<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top;\">Porto, Portugal,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">2017<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">2\/24-26<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Mihiro Sonoyama,<br \/>\nTatsuya Fujii,<br \/>\nTakatsugu Ono,<br \/>\nOsamu Muta,<br \/>\nKoji Inoue,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">Effects of antenna directivity on received signal strength device authentication method<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">The 1st. cross-disciplinary Workshop on Computing Systems, Infrastructures, and Programming (xSIG 2017)<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top;\">Tokyo, Japan,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">2017<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">2\/24-26<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Xiang You,<br \/>\nYaokai Feng,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">A Proposal for Detecting DDoS Attacks in SDN Environments Based on Packet-In Messages<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">2017 \u201cHinokuni &#8211; Land of Fire\u201d Information Processing Symposium<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top;\">Kagoshima\u3000University, Kagoshima, Japan,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">2017<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">3\/1-2<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Shohei Nakamura,<br \/>\nYoshihiro Okada,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">LEARNING ANALYTICS USING BOOKLOOPER AND TIME-TUNNEL<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">11th annual Technology, Education and Development Conference (INTED2017)<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top;\">Valencia, Spain,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">2017<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">3\/6-8<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4>Presentation of India Research Side<\/h4>\n<table style=\"width: 100%; border-style: solid; border-color: #e5e5e5;\" border=\"1px\" cellspacing=\"0px\" cellpadding=\"0px\">\n<thead>\n<tr style=\"background-color: #e5e5e5;\">\n<td style=\"width: 20.0%; border-style: solid; border-color: #ababab;\">Presenter<\/td>\n<td style=\"width: 34.0%; border-style: solid; border-color: #ababab;\">Title<\/td>\n<td style=\"width: 20.0%; border-style: solid; border-color: #ababab;\">Conference<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab;\">Venue<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab;\">Presented year<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab;\">Presented month<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Khyati Chopra,<br \/>\nRanjan Bose,<br \/>\nAnupam Joshi,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">Secrecy Outage of Cooperative Relay Network with and Without Eavesdropper&#8217;s Direct Link<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">National Conference on Communications (NCC 2017)<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top;\">Chennai, India,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">2017<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">3\/2-4<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Paper Presentation[icon name=&#8221;arrow-circle-right&#8221; class=&#8221;&#8221; unprefixed_class=&#8221;&#8221;]\u3000\u3000Conference Presentation[icon name=&#8221;arrow-circle-right&#8221; class=&#8221;&#8221; unprefixed_class=&#8221;&#8221;]\u3000 Paper Presentation Single-authored Papers of the Japan research team Author Title Publisher Volume Number Page Published year Published month Jiawei Su, Danilo Vargas Vasconcellos, Koichi Sakurai, One Pixel Attack for Fooling Deep Neural Networks ArXiv 2017 Jiawei Su, Danilo Vargas Vasconcellos, Koichi Sakurai, Evasion Attacks Against [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":3270,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"_g2\/page-onecolumn.php","meta":{"_locale":"en_US","_original_post":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/?page_id=2495"},"_links":{"self":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/pages\/3379"}],"collection":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/comments?post=3379"}],"version-history":[{"count":27,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/pages\/3379\/revisions"}],"predecessor-version":[{"id":4017,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/pages\/3379\/revisions\/4017"}],"up":[{"embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/pages\/3270"}],"wp:attachment":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/media?parent=3379"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}