{"id":3396,"date":"2020-11-10T12:11:23","date_gmt":"2020-11-10T03:11:23","guid":{"rendered":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/?page_id=3396"},"modified":"2021-12-20T16:04:35","modified_gmt":"2021-12-20T07:04:35","slug":"results2018","status":"publish","type":"page","link":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/results-final\/results2018\/","title":{"rendered":"Research Results\uff5cin 2018"},"content":{"rendered":"<p><a href=\"#paper\">Paper Presentation[icon name=&#8221;arrow-circle-right&#8221; class=&#8221;&#8221; unprefixed_class=&#8221;&#8221;]<\/a>\u3000\u3000<a href=\"#presentation\">Conference Presentation[icon name=&#8221;arrow-circle-right&#8221; class=&#8221;&#8221; unprefixed_class=&#8221;&#8221;]<\/a>\u3000<a id=\"paper\"><\/a><\/p>\n<h2>Paper Presentation<\/h2>\n<h4>Collaborative Papers with Japan &#8211; India research team<\/h4>\n<table style=\"width: 100%;border-style: solid;border-color: #ababab\" border=\"1px\" cellspacing=\"0px\" cellpadding=\"0px\">\n<thead>\n<tr style=\"background-color: #e5e5e5\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;height: 87px\">Author<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;height: 87px\">Title<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;height: 87px\">Publisher<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;height: 87px\">Volume<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;height: 87px\">Number<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;height: 87px\">Page<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;height: 87px\">Published year<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;height: 87px\">Published month<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab\">Jiawei Su,<br \/>\nDanilo Vargas Vasconcellos,<br \/>\nSanjiva Prasad,<br \/>\nDaniele Sgandurra,<br \/>\nYaokai Feng,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Lightweight Classification of IoT Malware based on Image Recognition<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">IEEE Annual International Computer Software and Applications Conference (COMPSAC)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">664-669<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2018<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">Jul<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Yuki Nishida,<br \/>\nKosuke Kaneko,<br \/>\nSubodh Sharma,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Suppressing Chain Size of Blockchain-Based Information Sharing for Swarm Robotic Systems<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">International Symposium on Computing and Networking (CANDAR)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">524-528<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2018<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">Nov<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Mihiro Sonoyama,<br \/>\nTakatsugu Ono,<br \/>\nHaruichi Kanaya,<br \/>\nOsamu Muta,<br \/>\nSmruti Ranjan Sarangi,<br \/>\nKoji Inoue,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Radio Propagation Characteristics-Based Spoofing Attack Prevention on Wireless Connected Devices<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Journal of Information Processing<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">27<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">322-334<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\" width=\"217\">Wei Shi,<br \/>\nChenguang Ma,<br \/>\nSrishti Kulshrestha,<br \/>\nRanjan Bose,<br \/>\nYoshihiro Okada,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">A Framework for Automatically Generating IoT Security Quizzes in a Virtual 3D Environment Based on Linked Data<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Lecture Notes on Data Engineering and Communications Technologies (LNDECT)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">103-113<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">Feb<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Yoshihiro Okada,<br \/>\nAkira Haga,<br \/>\nWei Shi,<br \/>\nChenguang Ma,<br \/>\nSrishti Kulshrestha,<br \/>\nRanjan Bose,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">E-Learning Material Development Framework Supporting 360VR Images\/Videos Based on Linked Data for IoT Security Education<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Lecture Notes on Data Engineering and Communications Technologies (LNDECT)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">29<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">148-160<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">Feb<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Shota Jojima,<br \/>\nKosuke Kaneko,<br \/>\nSubodh Sharma,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Simulation of Secure Volunteer Computing by Using Blockchain<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">International Conference on Advanced Information Networking and Applications (AINA)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">926<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">883-894<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">Mar<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4>Single-Authored Papers of Japan research team<\/h4>\n<table style=\"width: 100%;border-style: solid;border-color: #ababab\" border=\"1px\" cellspacing=\"0px\" cellpadding=\"0px\">\n<thead>\n<tr style=\"background-color: #e5e5e5\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;height: 87px\">Author<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;height: 87px\">Title<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;height: 87px\">Publisher<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;height: 87px\">Volume<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;height: 87px\">Number<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;height: 87px\">Page<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;height: 87px\">Published year<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;height: 87px\">Published month<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr style=\"height: 114px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Atsushi Shimada,<br \/>\nKaito Oka,<br \/>\nMasaki Igarashi,<br \/>\nRin-ichiro Taniguchi,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Congestion Analysis Across Locations Based on Wi-Fi Signal Sensing<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">International Conference on Pattern Recognition Applications and Methods(ICORAM)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">10857<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">204-221<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2018<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">Jun<\/td>\n<\/tr>\n<tr style=\"height: 93px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Sanouphab Phomkeona,<br \/>\nKento Kono,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">An Unknown Malware Detection Using Execution Registry Access<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">The 13th IEEE International Workshop on Security, Trust, and Privacy for Software Applications(STPSA 2018)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">487-491<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2018<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">Jul<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Chao Ma,<br \/>\nAtsushi Shimada,<br \/>\nHideaki Uchiyama,<br \/>\nHajime Nagahara,<br \/>\nRin-ichiro Taniguchi,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Fall detection using optical level anonymous image sensing system<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Optics &amp; Laser Technology<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">110<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">44-61<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2018<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">Jul<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Yaokai Feng,<br \/>\nHitoshi Akiyama,<br \/>\nLiang Lu,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Feature Selection For Machine Learning-Based Early Detection of Distributed Cyber-Attacks<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">IEEE Cyber Science and Technology Congress(CyberSciTech)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">173-180<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2018<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">Aug<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Ikuta Tanigawa,<br \/>\nKenji Hisazumi,<br \/>\nNobuhiko Ogura,<br \/>\nMidori Sugaya,<br \/>\nHarumi Watanabe,<br \/>\nAkira Fukuda,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">RTCOP: Context-Oriented Programming Framework for Applying to Embedded Software based on C++<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Asia Pacific Conference on Robot IoT System Development and Platform 2018(APRIS2018)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2018<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Ryosuke Komiya,<br \/>\nYaokai Feng,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Detecting Distributed Cyber Attacks in SDN Based on Automatic Thresholding<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">International Symposium on Computing and Networking Workshops (CANDARW)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">417-423<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2018<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">Nov<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Wai Kyi Kyi Oo,<br \/>\nHiroshi Koide,<br \/>\nDanilo Vargas Vasconcellos,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">An implementation of Moving Target Defense Technology on the Web System<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">International Workshop on Information Search, Integration, and Personalization(ISIP)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2018<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Jiawei Su,<br \/>\nDanilo Vargas Vasconcellos,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Empirical Evaluation on Robustness of Deep Convolutional Neural Networks Activation Functions Against Adversarial Perturbation<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">International Workshop on GPU Computing and AI(GCA)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">223-227<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2018<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">Nov<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Wai Kyi Kyi Oo,<br \/>\nHiroshi Koide,<br \/>\nDanilo Vargas Vasconcellos,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">A New Design for Evaluating Moving Target Defense System<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">International Symposium on Computing and Networking(CANDAR)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">561-563<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2018<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">Nov<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Yao Xu,<br \/>\nHiroshi Koide,<br \/>\nDanilo Vargas Vasconcellos,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Tracing MIRAI Malware in Networked System<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">International Symposium on Computing and Networking(CANDAR)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">534-538<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2018<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">Nov<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Fumiya Tanaka,<br \/>\nKenji Hisazumi,<br \/>\nAkira Fukuda,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">DFEAM: Dynamic Feature-oriented Energy-aware Adaptive Modeling<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">7th International Conference on Model-Driven Engineering and Software Development(MODELSWARD 2019)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">292-299<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">Feb<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4>Single-Authored Papers of India research team<\/h4>\n<table style=\"width: 100%;border-style: solid;border-color: #e5e5e5\" border=\"1px\" cellspacing=\"0px\" cellpadding=\"0px\">\n<thead>\n<tr style=\"background-color: #e5e5e5\">\n<td style=\"width: 20.0%;border-style: solid;border-color: #ababab\">Author<\/td>\n<td style=\"width: 34.0%;border-style: solid;border-color: #ababab\">Title<\/td>\n<td style=\"width: 20.0%;border-style: solid;border-color: #ababab\">Publisher<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab\">Volume<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab\">Number<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab\">Page<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab\">Published year<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab\">Published month<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Sanjiva Prasad,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Best-by-simulations: A framework for comparing efficiency of reconfigurable architectures on workloads with deadlines<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Journal of Logical and Algebraic Methods in Programming<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">100<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">1-15<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2018<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">Nov<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Sanjiva Prasad,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Only Connect, Securely<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">ArXiv<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h2>Conference Presentation<a id=\"presentation\"><\/a><\/h2>\n<h4>Collaborative Presentation with Japan &#8211; India research team<\/h4>\n<table style=\"width: 100%;border-style: solid;border-color: #e5e5e5\" border=\"1px\" cellspacing=\"0px\" cellpadding=\"0px\">\n<thead>\n<tr style=\"background-color: #e5e5e5\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;height: 47px\">Presenter<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;height: 47px\">Title<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;height: 47px\">Conference<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;height: 47px\">Venue<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;height: 47px\">Presented year<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;height: 47px\">Presented month<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Ghadeer Almusaddar,<br \/>\nTakatsugu Ono,<br \/>\nSmruti Ranjan Sarangi,<br \/>\nKoji Inoue,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Whitelisting Approach Using Hardware Performance Counters in IoT Microprocessors<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">The Institute of Electronics, Information and Communication Engineers (IEICE) Technical Report<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2018<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">4\/6<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Yusuke Tsutsumi,<br \/>\nKosuke Kaneko,<br \/>\nYoshihiro Okada,<br \/>\nSubodh Sharma,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Hashgraph Based Network Communications for IoT Security in Smart Home<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">The 12th International Workshop on Information Search, Integration, and Personalization (ISIP2018)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Kyushu University, Fukuoka, Japan,<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2018<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">5\/14-15<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Kosuke Kaneko,<br \/>\nKazuya Nakayama,<br \/>\nYuki Nishida,<br \/>\nShota Jojima,<br \/>\nSubodh Sharma,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Proof-of-Intelligence: A New Consensus Algorithm Running on Blockchain Technology Aiming Effective Use of Computational Resources<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">The 12th International Workshop on Information Search, Integration, and Personalization (ISIP2018)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Kyushu University, Fukuoka, Japan,<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2018<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">5\/14-15<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Ghadeer Almusaddar,<br \/>\nTeruo Tanimoto,<br \/>\nTakatsugu Ono,<br \/>\nSmruti Ranjan Sarangi,<br \/>\nKoji Inoue,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Whitelisting Approach Using Hardware Performance Counters in IoT Microprocessors<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">4th Career Workshop for Women and Minorities in Computer Architecture<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Fukuoka, Japan,<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2018<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">10\/21<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Jiawei Su,<br \/>\nDanilo Vargas Vasconcellos,<br \/>\nSanjiva Prasad,<br \/>\nDaniele Sgandurra,<br \/>\nYaokai Feng,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Lightweight Classification of IoT Malware Based on Image Recognition<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Computer Security Symposium 2018 (CSS2018)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Hotel Metropolitan Nagano, Nagano, Japan,<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2018<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">10\/22-25<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Yuki Nishida,<br \/>\nKosuke Kaneko,<br \/>\nSubodh Sharma,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Suppressing Chain Size of Blockchain-Based Information Sharing for Swarm Robotic Systems<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">The 6th International Symposium on Computing and Networking(CANDAR2018)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Hida Takayama, Japan,<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2018<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">11\/27-30<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Yiyi Wang,<br \/>\nAlaa Allakany,<br \/>\nKulshrestha Srishti,<br \/>\nRanjan Bose,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Automatic Generation E-Learning contents Based on IoT Security Ontology<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">The 81st National Convention of Information Processing Society of Japan (IPS)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Fukuoka University, Fukuoka, Japan,<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">3\/14-16<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Alaa Allakany,<br \/>\nGeeta Yadav,<br \/>\nVijay Kumar,<br \/>\nKolin Paul,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">An Automated end-to-end penetration testing for the Internet of Thing<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">The 81st National Convention of Information Processing Society of Japan (IPS)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Fukuoka University, Fukuoka, Japan,<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">3\/14-16<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Shota Jojima,<br \/>\nKosuke Kaneko,<br \/>\nSubodh Sharma,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Simulation of Secure Volunteer Computing by Using Blockchain<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Proceedings of the 33th International Conference on Advanced Information Networking and Applications(AINA-2019)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Matsue, Japan,<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">3\/27-29<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4>Presentation of Japan research team<\/h4>\n<table style=\"width: 100%;border-style: solid;border-color: #e5e5e5\" border=\"1px\" cellspacing=\"0px\" cellpadding=\"0px\">\n<thead>\n<tr style=\"background-color: #e5e5e5\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;height: 47px\">Presenter<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;height: 47px\">Title<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;height: 47px\">Conference<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;height: 47px\">Venue<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;height: 47px\">Presented year<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;height: 47px\">Presented month<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Alaa Allakany,<br \/>\nToshihide Muto,<br \/>\nKoji Okamura,<br \/>\nSrishti Kulshrestha,<br \/>\nRanjan Bose,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Systematic building of E-Learning contents for secure IoT<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">The 12th International Workshop on Information Search, Integration, and Personalization (ISIP2018)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Kyushu University, Fukuoka, Japan,<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2018<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">5\/14-15<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Sanouphab Phomkeona,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">The design of an active method for spyware detection<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">The 12th International Workshop on Information Search, Integration, and Personalization (ISIP2018)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Kyushu University, Fukuoka, Japan,<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2018<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">5\/14-15<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Hiroki Nishida,<br \/>\nKosuke Kaneko,<br \/>\nShota Jojima,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Proposal of Secure Information Sharing for Swarm Robot System using Blockchain Technology<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Kyushu University-RIKEN-Fukuoka City Tripartite Collaboration Symposium &#8220;Future Solved by Mathematical Sciences and AI-Prospects and Expectations of Computational Sciences&#8221;<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">\u00a0Kyushu University, Fukuoka, Japan,<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2018<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">5\/15<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Piyush Ghasiya,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Perception &amp; Vulnerability Towards Cybersecurity Among Elderly Citizen in Japan<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Posters in World Social Science Forum2018 (WSSF2018)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Fukuoka, Japan,<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2018<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">9\/25-28<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Sanouphab Phomkeona,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Zero-day Malicious Email Detection Using Email Header Information Analysis Combining with Deep-Learning Approach<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Posters in World Social Science Forum2018 (WSSF2018)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Fukuoka, Japan,<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2018<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">9\/28<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Shota Jojima,<br \/>\nKosuke Kaneko,<br \/>\nHiroki Nishida,<br \/>\nYusuke Tsutsumi,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">The proposition of Framework to Achieve Secure Distributed Computing by Using Blockchain technology<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Computer Security Symposium 2018 (CSS2018)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Hotel Metropolitan Nagano, Nagano, Japan,<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2018<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">10\/22-25<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Ariel Rodriguez,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Generating security intelligence through social network sentiment analysis<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Computer Security Symposium 2018 (CSS2018)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Hotel Metropolitan Nagano, Nagano, Japan,<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2018<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">10\/22-25<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Sanouphab Phomkeona,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">A Design Method for Zero-day Malicious Email Detection Using Email Header Information Analysis (EHIA) and Deep-Learning Approach<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Computer Security Symposium 2018 (CSS2018)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Hotel Metropolitan Nagano, Nagano, Japan,<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2018<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">10\/22-25<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Koji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Study on analysis of the equate in Cybersecurity education<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Academic eXchange for Information Environment and Strategy (AXIES)2018<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Sapporo Convention Center, Hokkaido, Japan,<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2018<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">11\/19-21<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Piyush Ghasiya,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">How Japan&#8217;s Approach Towards Cybersecurity has Changed: Quantitative Content Analysis of Cybersecurity Strategy from 2013 to 2018<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Posters of Internet Conference 2018 (IC2018)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Tokyo, Japan,<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2018<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">11\/26-27<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Sanouphab Phomkeona,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">An evaluation of method for zero-day malicious email detection using email header information analqaysis (EHIA) and deep-learning approach<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Posters of Internet Conference 2018 (IC2018)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Tokyo, Japan,<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2018<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">11\/26-27<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Shota Jojima,<br \/>\nKosuke Kaneko,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Simulation of secure volunteer computing with resistance to advanced Sybil Attack<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">2020 Symposium on Cryptography and Information Security<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Lake Biwa Otsu Prince Hotel, Shiga, Japan,<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">1\/22-25<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Yan Naung Soe,<br \/>\nYaokai Feng,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Implementation of IDS for IoT Environments Based on Machine Learning<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">The 11th Workshop among Asian Information Security Labs (WAIS 2019)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Busan, South Korea,<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2\/11-12<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Hao Zhao,<br \/>\nHiroshi Koide,<br \/>\nYaokai Feng,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Performance Verification of  Cyber-attack Detection using Artificial Neural Networks<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">2019 \u201cHinokuni \u2013 Land of Fire\u201d Information Processing Symposium<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Kumamoto University, Kumamoto, Japan,<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">3\/2-3<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Yan Naung Soe,<br \/>\nYaokai Feng,<br \/>\nPaulus Insap Santosa,<br \/>\nRudy Hartanto,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Towards a Lightweight Detection System for Cyber Security in IoT Environments using Feature Seletion<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">2019 \u201cHinokuni \u2013 Land of Fire\u201d Information Processing Symposium<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Kumamoto University, Kumamoto, Japan,<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">3\/2-3<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Chenguang Ma,<br \/>\nKosuke Kaneko,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Proposal of Trustful Method for Distributed Oracle for Smart Contract<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">2019 \u201cHinokuni \u2013 Land of Fire\u201d Information Processing Symposium<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Kumamoto University, Kumamoto, Japan,<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">3\/2-3<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Sanouphab Phomkeona,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Collecting useful features for zero-day malicious emails detection<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">The 81st National Convention of Information Processing Society of Japan (IPS)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Fukuoka University, Fukuoka, Japan,<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">3\/14-16<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Xie Wen,<br \/>\nAlaa Allakany,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">A study on Zigbee security: Attacks and Mitigation<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">The 81st National Convention of Information Processing Society of Japan (IPS)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Fukuoka University, Fukuoka, Japan,<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">3\/14-16<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Piyush Ghasiya,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Quantitative Content Analysis of Japan\u2019s Cybersecurity Strategies and How the Cybersecurity Landscape has changed in Japan since 2013<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">The 81st National Convention of Information Processing Society of Japan (IPS)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Fukuoka University, Fukuoka, Japan,<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">3\/14-16<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Shota Jojima,<br \/>\nKosuke Kaneko,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Implementation of Secure Volunteer Computing Simulator Using Blockchain Technology<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">The 81st National Convention of Information Processing Society of Japan (IPS)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Fukuoka University, Fukuoka, Japan,<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">3\/14-16<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Koji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">An Introduction of Serious-Game for Cybersecurity Education<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">International Workshop on Cyber-Physical Systems andCyber-Resilience<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">USA<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">3\/20<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">Ariel Rodriguez,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">End to End Real Time Cyber Situational Awareness System Design and Methodology<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">International Workshop on<br \/>\nCyber-Physical Systems and Cyber-Resilience (CPS-CR)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">University of Delaware, USA<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">2019<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">3\/20<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4>Presentation of India research team<\/h4>\n<table style=\"width: 100%;border-style: solid;border-color: #e5e5e5\" border=\"1px\" cellspacing=\"0px\" cellpadding=\"0px\">\n<thead>\n<tr style=\"background-color: #e5e5e5\">\n<td style=\"width: 20.0%;border-style: solid;border-color: #ababab\">Presenter<\/td>\n<td style=\"width: 34.0%;border-style: solid;border-color: #ababab\">Title<\/td>\n<td style=\"width: 20.0%;border-style: solid;border-color: #ababab\">Conference<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab\">Venue<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab\">Presented year <\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab\">Presented month<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Sanjiva Prasad,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">From ABC of Networks to a LitTLe logic for mobility<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">The University of Manchester, UK,<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2018<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">5\/30<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Sanjiva Prasad,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Lectures on &#8220;Algebraic Foundations of Network Routing&#8221;<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Kyushu University, Fukuoka, Japan,<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2018<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">7\/2-10<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Sanjiva Prasad,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Best-by-simulations<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">McGill University, Montreal, Canada,<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2018<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">10\/19<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Paper Presentation[icon name=&#8221;arrow-circle-right&#8221; class=&#8221;&#8221; unprefixed_class=&#8221;&#8221;]\u3000\u3000Conference Presentation[icon name=&#8221;arrow-circle-right&#8221; class=&#8221;&#8221; unprefixed_class=&#8221;&#8221;]\u3000 Paper Presentation Collaborative Papers with Japan &#8211; India research team Author Title Publisher Volume Number Page Published year Published month Jiawei Su, Danilo Vargas Vasconcellos, Sanjiva Prasad, Daniele Sgandurra, Yaokai Feng, Koichi Sakurai, Lightweight Classification of IoT Malware based on Image Recognition IEEE Annual International Computer [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":3270,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"_g2\/page-onecolumn.php","meta":{"_locale":"en_US","_original_post":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/?page_id=2432"},"_links":{"self":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/pages\/3396"}],"collection":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/comments?post=3396"}],"version-history":[{"count":18,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/pages\/3396\/revisions"}],"predecessor-version":[{"id":4000,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/pages\/3396\/revisions\/4000"}],"up":[{"embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/pages\/3270"}],"wp:attachment":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/media?parent=3396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}