{"id":3398,"date":"2020-11-10T12:16:53","date_gmt":"2020-11-10T03:16:53","guid":{"rendered":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/?page_id=3398"},"modified":"2021-12-20T16:14:42","modified_gmt":"2021-12-20T07:14:42","slug":"results2019","status":"publish","type":"page","link":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/results-final\/results2019\/","title":{"rendered":"Research Results\uff5cin 2019"},"content":{"rendered":"<p><a href=\"#paper\">Paper Presentation[icon name=&#8221;arrow-circle-right&#8221; class=&#8221;&#8221; unprefixed_class=&#8221;&#8221;]<\/a>\u3000\u3000<a href=\"#presentation\">Conference Presentation[icon name=&#8221;arrow-circle-right&#8221; class=&#8221;&#8221; unprefixed_class=&#8221;&#8221;]<\/a>\u3000<a id=\"paper\"><\/a><\/p>\n<h2>Paper Presentation<\/h2>\n<h4>Collaborative Papers with Japan &#8211; India research team<\/h4>\n<table style=\"width: 100%;border-style: solid;border-color: #ababab;height: 443px\" border=\"1px\" cellspacing=\"0px\" cellpadding=\"0px\">\n<thead>\n<tr style=\"background-color: #e5e5e5\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;height: 87px\">Author<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;height: 87px\">Title<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;height: 87px\">Publisher<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;height: 87px\">Volume<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;height: 87px\">Number<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;height: 87px\">Page<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;height: 87px\">Publish year<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;height: 87px\">Publish month<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr style=\"height: 47px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 108px\">Sandeep Kumar,<br \/>\nDiksha Moolchandani,<br \/>\nTakatsugu Ono,<br \/>\nSmruti Ranjan Sarangi,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 108px\">F-LaaS: A Control-Flow-Attack Immune License-as-a-Service Model<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 108px\">IEEE International Conference on Services Computing (SCC)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top;height: 108px\">2019<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top;height: 108px\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top;height: 108px\">80-89<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top;height: 108px\">2019<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top;height: 108px\">Jul<\/td>\n<\/tr>\n<tr style=\"height: 47px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 47px\">Wei Shi,<br \/>\nTianhao Gao,<br \/>\nSrishti Kulshrestha,<br \/>\nRanjan Bose,<br \/>\nAkira Haga,<br \/>\nYoshihiro Okada,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 47px\">A Framework for Automatically Generating IoT Security Quizzes in 360VR Images\/Videos Based on Linked Data<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 47px\">Lecture Notes on Data Engineering and Communications Technologies (LNDECT)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top;height: 47px\">47<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top;height: 47px\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top;height: 47px\">259-267<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top;height: 47px\">2020<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top;height: 47px\"><\/td>\n<\/tr>\n<tr style=\"height: 47px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\">Limao Ma,<br \/>\nKosuke Kaneko,<br \/>\nSubodh Sharma,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\">Reliable Decentralized Oracle with Mechanisms for Verification and Disputation<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\">International Symposium on Computing and Networking Workshops (CANDARW)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\"><\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\">346-352<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\">2019<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\">Nov<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Kosuke Kaneko,<br \/>\nYusuke Tsutsumi,<br \/>\nSubodh Sharma,<br \/>\nYoshihiro Okada,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">PACKUARIUM: Network Packet Visualization Using Mixed Reality for Detecting Bot IoT Device of DDoS Attack<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Lecture Notes on Data Engineering and Communications Technologies (LNDECT)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">47<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">361-372<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2020<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">Jan<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4>Single-Authored Papers of Japan research team<\/h4>\n<table style=\"width: 99.8927%;border-style: solid;border-color: #ababab;height: 1773px\" border=\"1px\" cellspacing=\"0px\" cellpadding=\"0px\">\n<thead>\n<tr style=\"background-color: #e5e5e5\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;height: 87px\">Author<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;height: 87px\">Title<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;height: 87px\">Publisher<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;height: 87px\">Volume<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;height: 87px\">Number<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;height: 87px\">Page<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;height: 87px\">Publish year<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;height: 87px\">Publish month<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr style=\"height: 127px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Wei Shi,<br \/>\nKosuke Kaneko,<br \/>\nChenguang Ma,<br \/>\nHikaru Yamamura,<br \/>\nYoshihiro Okada,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">An Integrated Framework of Generating Quizzes Based on Linked Data and Its Application on Medical Education Field<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Journal of Grid and Utility Computing<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">9<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">250-256<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">Jan<\/td>\n<\/tr>\n<tr style=\"height: 87px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Wai Kyi Kyi Oo,<br \/>\nHiroshi Koide,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Analyzing the Effect of Moving Target Defense for a Web System<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">International Journal of Networking and Computing<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">9<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">2<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">188-200<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<\/tr>\n<tr style=\"height: 87px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Katsumi Nagai,<br \/>\nHiroshi Koide,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Proposal and evaluation of a security incident response training method using programming<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Special Interest Group on Information Technology Education (SIGITE)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">165<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<\/tr>\n<tr style=\"height: 127px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 127px\">Ye Longjian,<br \/>\nHiroshi Koide,<br \/>\nDirceu Cavendish,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Efficient shortest path routing algorithms for distributed XML processing<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">14th International Conference on Web Information Systems and Technologies (WEBIST 2019)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">1<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">265-272<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<\/tr>\n<tr style=\"height: 87px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Daiki Hirayama,<br \/>\nWei Shi,<br \/>\nYoshihiro Okada,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Web-Based Interactive 3D Educational Material Development Framework and Its Authoring Functionalities<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Advances in Networked-based Information Systems (NBiS)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">1036<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">258-269<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">Aug<\/td>\n<\/tr>\n<tr style=\"height: 107px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\">Jiawei Su,<br \/>\nDanilo Vargas Vasconcellos,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\">Attacking convolutional neural network using differential evolution<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">IPSJ Transactions on Computer Vision and Applications<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\">2019<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\"><\/td>\n<\/tr>\n<tr style=\"height: 107px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\">Jiawei Su,<br \/>\nDanilo Vargas Vasconcellos,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\">One Pixel Attack for Fooling Deep Neural Networks<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\">IEEE Transactions on Evolutionary Computation<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\">23<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\">5<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\">828-841<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\">2019<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\"><\/td>\n<\/tr>\n<tr style=\"height: 87px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Haibo Zhang,<br \/>\nToru Nakamura,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Security and Trust Issues on Digital Supply Chain<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">The 4th IEEE Cyber Science and Technology Congress (CyberSciTech 2019)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">338-343<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">Nov<\/td>\n<\/tr>\n<tr style=\"height: 127px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 127px\">Yan Naung Soe,<br \/>\nYaokai Feng,<br \/>\nPaulus Insap Santosa,<br \/>\nRudy Hartanto,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 127px\">A Sequential Scheme for Detecting Cyber Attacks in IoT Environment<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">The 4th IEEE Cyber Science and Technology Congress (CyberSciTech 2019)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top;height: 127px\">238-244<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top;height: 127px\">2019<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top;height: 127px\">Nov<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Yan Naung Soe,<br \/>\nYaokai Feng,<br \/>\nPaulus Insap Santosa,<br \/>\nRudy Hartanto,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">International Conference on Advanced Information Networking and Applications(AINA)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">926<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">458-469<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<\/tr>\n<tr style=\"height: 107px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\">Hao Zhao,<br \/>\nYaokai Feng,<br \/>\nHiroshi Koide,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\">An ANN Based Sequential Detection Method for Balancing Performance Indicators of IDS<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">International Symposium on Computing and Networking (CANDAR)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\">239-244<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\">2019<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\"><\/td>\n<\/tr>\n<tr style=\"height: 107px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\">Wentao Tang,<br \/>\nHao Feng,<br \/>\nKenji Hisazumi,<br \/>\nAkira Fukuda,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\">A Verification Method for Security and Safety of IoT Applications Through DSM Language and Lustre<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">International Conference on Information Science and Systems (ICISS)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\">166-170<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\">2020<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\"><\/td>\n<\/tr>\n<tr style=\"height: 127px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 127px\">Yan Naung Soe,<br \/>\nYaokai Feng,<br \/>\nPaulus Insap Santosa,<br \/>\nRudy Hartanto,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 127px\">Towards a Lightweight Detection System for Cyber Attacks in the IoT Environment Using Corresponding Features<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 127px\">Electronics 2020<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top;height: 127px\">9<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top;height: 127px\">1<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top;height: 127px\">144-162<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top;height: 127px\">2020<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top;height: 127px\">Jan<\/td>\n<\/tr>\n<tr style=\"height: 107px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\">Haibo Zhang,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\">Blockchain for IoT-Based Digital Supply Chain: A Survey<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\">Lecture Notes on Data Engineering and Communications Technologies (LNDECT)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\">47<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\">564-573<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\">2020<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top;height: 107px\">Mar<\/td>\n<\/tr>\n<tr style=\"height: 67px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 67px\">Ariel Rodriguez,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 67px\">Social media data mining for proactive cyber defense<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 67px\">Journal of Information Processing<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top;height: 67px\">28<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top;height: 67px\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top;height: 67px\">230-238<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top;height: 67px\">2020<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top;height: 67px\">Mar<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Motoyuki Ohmori,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">The Equal Deepest Vertex First Reboot: Rebooting Network Edge Switches in a Campus Network<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Journal of Information Processing<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">28<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">214-221<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2020<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">Mar<\/td>\n<\/tr>\n<tr style=\"height: 87px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Sanouphab Phomkeona,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Zero-day Malicious Email Investigation and Detection Using Features with Deep-learning Approach<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Journal of Information Processing<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">28<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">222-229<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2020<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">Mar<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4>Single-Authored Papers of India research team<\/h4>\n<table style=\"width: 100%;border-style: solid;border-color: #e5e5e5\" border=\"1px\" cellspacing=\"0px\" cellpadding=\"0px\">\n<thead>\n<tr style=\"background-color: #e5e5e5\">\n<td style=\"width: 20.0%;border-style: solid;border-color: #ababab\">Author<\/td>\n<td style=\"width: 34.0%;border-style: solid;border-color: #ababab\">Title<\/td>\n<td style=\"width: 20.0%;border-style: solid;border-color: #ababab\">Publisher<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab\">Volume<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab\">Number<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab\">Page<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab\">Publish year<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab\">Publish month<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Sanjiva Prasad,<br \/>\nChandrika Bhardwaj,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Only Connect, Securely<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">11535<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">75-92<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h2>Conference Presentation<a id=\"presentation\"><\/a><\/h2>\n<h4>Collaborative Presentation with Japan &#8211; India research team<\/h4>\n<table style=\"width: 100%;border-style: solid;border-color: #e5e5e5;height: 462px\" border=\"1px\" cellspacing=\"0px\" cellpadding=\"0px\">\n<thead>\n<tr style=\"background-color: #e5e5e5\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;height: 47px\">Author<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;height: 47px\">Title<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;height: 47px\">Conference<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;height: 47px\">Venue<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;height: 47px\">Presentation year<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;height: 47px\">Date<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr style=\"height: 107px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Sandeep Kumar,<br \/>\nDiksha Moolchandani,<br \/>\nTakatsugu Ono,<br \/>\nSmruti Ranjan Sarangi,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">F-LaaS: A Control-Flow-Attack Immune License-as-a-Service Model<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">IEEE International Conference on Services Computing (SCC 2019)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Milan, Italy<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">7\/8-13<\/td>\n<\/tr>\n<tr style=\"height: 107px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Limao Ma,<br \/>\nKosuke Kaneko,<br \/>\nSubodh Sharma,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Reliable Decentralized Oracle with Mechanisms for Verification and Disputation<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">The Seventh International Symposium on Computing and Networking (CANDAR 2019)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Nagasaki, Japan<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">11\/26-29<\/td>\n<\/tr>\n<tr style=\"height: 107px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Kosuke Kaneko,<br \/>\nYusuke Tsutsumi,<br \/>\nSubodh Sharma,<br \/>\nYoshihiro Okada,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">PACKUARIUM: Network Packet Visualization Using Mixed Reality for Detecting Bot IoT Device of DDoS Attack<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">The 8-th International Conference on Emerging Internet, Data &amp; Web Technologies (EIDWT-2020)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Kitakyushu, Japan<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2020<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2\/24-26<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Wei Shi,<br \/>\nTianhao Gao,<br \/>\nSrishti Kulshrestha,<br \/>\nRanjan Bose,<br \/>\nAkira Haga,<br \/>\nYoshihiro Okada,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">A Framework for Automatically Generating IoT Security Quizzes in 360VR Images\/Videos Based on Linked Data<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">The 8-th International Conference on Emerging Internet, Data &amp; Web Technologies (EIDWT-2020)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Kitakyushu International Conference Center, Kitakyushu, Japan<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2020<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2\/24-26<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4>Presentation of Japan research team<\/h4>\n<table style=\"width: 100%;border-style: solid;border-color: #e5e5e5;height: 2139px\" border=\"1px\" cellspacing=\"0px\" cellpadding=\"0px\">\n<thead>\n<tr style=\"background-color: #e5e5e5\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;height: 47px\">Author<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;height: 47px\">Title<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;height: 47px\">Conference<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;height: 47px\">Venue<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;height: 47px\">Presentation year<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;height: 47px\">Date<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr style=\"height: 127px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 98px\">Yayoi Kamijyukkoku,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 98px\">The differential of cultural and institutional action on information society in India<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 98px\">The 33rd Research conference, Japan Society for Systems Audits<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 98px\">Machine Industry Hall, Tokyo, Japan<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 98px\">2019<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 98px\">6\/7<\/td>\n<\/tr>\n<tr style=\"height: 67px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">Gen Imamura,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">Analysis of UDP Reflectors per University by Kappa Index<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">Multimedia, Distributed, Cooperative, and Mobile Symposium (DICOMO 2019)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">Fukushima<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">2019<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">7\/3-5<\/td>\n<\/tr>\n<tr style=\"height: 107px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Piyush Ghasiya,<br \/>\nSachio Hirokawa,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">The Changing Cybersecurity Landscape in Japan and Quantitative Content Analysis of its Cybersecurity Strategies<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">The International Studies Association Asia-Pacific Conference 2019<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Nanyang Technological University, Singapore<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">2019<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">7\/4-6<\/td>\n<\/tr>\n<tr style=\"height: 105px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 105px\">Geeta Yadav,<br \/>\nAlaa Allakany,<br \/>\nVijay Kumar,<br \/>\nKolin Paul,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 105px\">Penetration Testing Framework for IoT<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 105px\">8th International Congress on Advanced Applied Informatics (IIAI-AAI 2019)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 105px\">Toyama, Japan<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 105px\">2019<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 105px\">7\/7-12<\/td>\n<\/tr>\n<tr style=\"height: 126px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 126px\">Yiyi Wang,<br \/>\nAlaa Allakany,<br \/>\nSrishti Kulshrestha,<br \/>\nWei Shi,<br \/>\nRanjan Bose,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 126px\">Automatically Generate E-Learning Quizzes from IoT Security Ontology<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 126px\">8th International Congress on Advanced Applied Informatics (IIAI-AAI 2019)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 126px\">Toyama, Japan<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 126px\">2019<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 126px\">7\/7-12<\/td>\n<\/tr>\n<tr style=\"height: 87px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Ariel Rodriguez,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Generating Real Time Cyber Situational Awareness Information Through Social Media Data Mining<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">IEEE Computer Society Signature Conference on Computers, Software and Applications (COMPSAC)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Marquette University, Milwaukee, Wisconsin, USA<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">2019<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">7\/15-19<\/td>\n<\/tr>\n<tr style=\"height: 107px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 78px\">Daiki Hirayama,<br \/>\nWei Shi,<br \/>\nYoshihiro Okada,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 78px\">Web-Based Interactive 3D Educational Material Development Framework and Its Authoring Functionalities<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 78px\">The 22nd International Conference on Network-Based Information Systems (NBiS-2019)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 78px\">Oita University, Japan<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 78px\">2019<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 78px\">9\/5-7<\/td>\n<\/tr>\n<tr style=\"height: 107px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 78px\">Yoshihiro Okada,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 78px\">3D Graphics Applications for Education and Visualization<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 78px\">The 22nd International Conference on Network-Based Information Systems (NBiS-2019)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 78px\">Oita University, Japan<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 78px\">2019<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 78px\">9\/5-7<\/td>\n<\/tr>\n<tr style=\"height: 67px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Yuki Uemoto,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Detection of Increase in Number of Communication Countries Using Entropy<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Computer Security Symposium 2019 (CSS2019)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Huistenbosch, Nagasaki<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">10\/21-24<\/td>\n<\/tr>\n<tr style=\"height: 84px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Koji Okamura,<br \/>\nKatsuhiro Hashiguchi,<br \/>\nYayo Kamijyukkoku,<br \/>\nAki Niisato,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Introduction of Cybersecurity Center, Kyushu University<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">AXIES FUKUOKA 2019<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Fukuoka International Congress Center, Fukuoka<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">2019<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">12\/12-14<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Geeta Yadav,<br \/>\nAlaa Allakany,<br \/>\nKolin Paul,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">IoT-PEN: A Penetration Testing Framework for IoT<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">The 34th International Conference on Information Networking (ICOIN 2020)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Barcelona, Spain<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2020<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">1\/7-10<\/td>\n<\/tr>\n<tr style=\"height: 47px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">Kosuke Kaneko,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">Possibilities of Cryptocurrency and Blockchain Technology<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">The 67th Leading IT seminar<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">University of Miyazaki, Miyazaki<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">2020<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">1\/16<\/td>\n<\/tr>\n<tr style=\"height: 87px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 58px\">Takaomi Ono,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 58px\">Study on Performance of Blockchain Application over 5G Network<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 58px\">IEICE, Internet Architecture Research Society<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 58px\">Kwansei Gakuin University,Tokyo<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 58px\">2020<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 58px\">1\/24<\/td>\n<\/tr>\n<tr style=\"height: 87px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 58px\">Yuki Uemoto,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 58px\">Study on enhancing the charge of situation based on number of accessing countries<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 58px\">IEICE, Internet Architecture Research Society<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 58px\">Kwansei Gakuin University,Tokyo<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 58px\">2020<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 58px\">1\/24<\/td>\n<\/tr>\n<tr style=\"height: 67px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 42px\">Hirotaka Kitagawa,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 42px\">Study on anomaly detection based on log of one-way communication<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 42px\">IEICE, Internet Architecture Research Society<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 42px\">Kwansei Gakuin University,Tokyo<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 42px\">2020<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 42px\">1\/24<\/td>\n<\/tr>\n<tr style=\"height: 84px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Haibo Zhang,<br \/>\nToru Nakamura,<br \/>\nYuto Nakano,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">IoT Supply Chain: Safety Challenges and Blockchain Attempts<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Symposium on Cryptography and Information Security(SCIS2020)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Kouchi<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">2020<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">1\/28-31<\/td>\n<\/tr>\n<tr style=\"height: 87px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">Katsumi Nagai,<br \/>\nHiroshi Koide,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">Proposal and evaluation of training aimed at improving non-technical capabilities<br \/>\nin incident response<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">Symposium on Cryptography and Information Security(SCIS2020)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">Kouchi<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">2020<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">1\/28-31<\/td>\n<\/tr>\n<tr style=\"height: 87px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">Koichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">Power and Limitation of Cyber Attack with Adversarial examples<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">The 12th Workshop among Asian Information Security Labs (WAIS 2020)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">Tokyo University, Tokyo, Japan<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">2020<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">2\/21<\/td>\n<\/tr>\n<tr style=\"height: 107px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 126px\">Yiyi Wang,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 126px\">Automatic Generation of E-Learning Contents Based on Deep Learning and Natural Language Processing Techniques<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 126px\">The 8-th International Conference on Emerging Internet, Data &amp; Web Technologies (EIDWT-2020)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 126px\">Kitakyushu International Conference Center, Kitakyushu, Japan<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 126px\">2020<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 126px\">2\/24-26<\/td>\n<\/tr>\n<tr style=\"height: 87px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Takeshi Masumoto,<br \/>\nHiroshi Koide,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Protecting Web Applications from Cyber Attacks<br \/>\nwith Network Level MTD<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">2020 &#8220;Hinokuni &#8211; Land of Fire&#8221; Information Processing Symposium<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Kyushu Institute of Technology, Fukuoka<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">2020<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">3\/9-10<\/td>\n<\/tr>\n<tr style=\"height: 67px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Yuya Tajima,<br \/>\nHiroshi Koide,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">IoT bots detection based on stealth-behavior<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">2020 &#8220;Hinokuni &#8211; Land of Fire&#8221; Information Processing Symposium<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Kyushu Institute of Technology, Fukuoka<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">2020<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">3\/9-10<\/td>\n<\/tr>\n<tr style=\"height: 87px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Yuya Terashima,<br \/>\nHiroshi Koide,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Proposal and evaluation of an adaptable cyberrange construction method in a distributed environment<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">2020 &#8220;Hinokuni &#8211; Land of Fire&#8221; Information Processing Symposium<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Kyushu Institute of Technology, Fukuoka<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">2020<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">3\/9-10<\/td>\n<\/tr>\n<tr style=\"height: 87px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Zhuowei Deng,<br \/>\nKosuke Kaneko,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Proposal of Privacy Protection of Electricity Transactions Information on Blockchain<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">2020 &#8220;Hinokuni &#8211; Land of Fire&#8221; Information Processing Symposium<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Kyushu Institute of Technology, Fukuoka<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">2020<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">3\/9-10<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Li Heming,<br \/>\nKosuke Kaneko,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">A Proposal of Distributed Computing Method for Neural Network on Blockchain Network<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">2020 &#8220;Hinokuni &#8211; Land of Fire&#8221; Information Processing Symposium<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Kyushu Institute of Technology, Fukuoka<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2020<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">3\/9-10<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4>Presentation of India research team<\/h4>\n<table style=\"width: 100%;border-style: solid;border-color: #e5e5e5\" border=\"1px\" cellspacing=\"0px\" cellpadding=\"0px\">\n<thead>\n<tr style=\"background-color: #e5e5e5\">\n<td style=\"width: 20.0%;border-style: solid;border-color: #ababab\">Author<\/td>\n<td style=\"width: 34.0%;border-style: solid;border-color: #ababab\">Title<\/td>\n<td style=\"width: 20.0%;border-style: solid;border-color: #ababab\">Conference<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab\">Venue<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab\">Presentation year<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab\">Date<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Neetu Jindal,<br \/>\nSandeep Chandran,<br \/>\nPreeti Ranjan Panda,<br \/>\nSanjiva Prasad,<br \/>\nAbhay Mitra,<br \/>\nKunal Singhal,<br \/>\nShubham Gupta,<br \/>\nShikhar Tuli,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">DHOOM: Reusing Design-for-Debug Hardware for Online Monitoring<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">The 56th Annual Design Automation Conference (DAC 2019)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Las Vegas, NV, USA<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">6\/2-6<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Sanjiva Prasad,<br \/>\nChandrika Bhardwaj,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Only Connect, Securely<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">14th International Federated Conference on Distributed Computing Techniques (DisCoTec 2019)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Technical University of Denmark, Kongens Lyngby, Denmark<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">6\/17-21<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Sanjiva Prasad,<br \/>\nChandrika Bhardwaj,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Only Connect, Securely<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">University of Washington, Seattle, WA, USA<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">7\/8<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Sanjiva Prasad,<br \/>\nChandrika Bhardwaj,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Only Connect, Securely<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">Dartmouth College, NH, USA<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2019<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">7\/10<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Subodh Sharma,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Delivered a talk on &#8220;verification of smart contracts&#8221;<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">The Workshop on Democratizing Software Verification (DSV) with 31st International Conference on Computer-Aided Verification(CAV 2019)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\" width=\"107\">NY, USA<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\" width=\"72\">2019<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\" width=\"153\">7\/14<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Sanjiva Prasad,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Language Based Security: Lattices and Connections<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Academic Research Summit(Microsoft Research &amp; ACM India)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\">BITS Pilani Goa Campus, India<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2020<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">1\/30-31<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Paper Presentation[icon name=&#8221;arrow-circle-right&#8221; class=&#8221;&#8221; unprefixed_class=&#8221;&#8221;]\u3000\u3000Conference Presentation[icon name=&#8221;arrow-circle-right&#8221; class=&#8221;&#8221; unprefixed_class=&#8221;&#8221;]\u3000 Paper Presentation Collaborative Papers with Japan &#8211; India research team Author Title Publisher Volume Number Page Publish year Publish month Sandeep Kumar, Diksha Moolchandani, Takatsugu Ono, Smruti Ranjan Sarangi, F-LaaS: A Control-Flow-Attack Immune License-as-a-Service Model IEEE International Conference on Services Computing (SCC) 2019 80-89 2019 Jul [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":3270,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"_g2\/page-onecolumn.php","meta":{"_locale":"en_US","_original_post":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/?page_id=2050"},"_links":{"self":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/pages\/3398"}],"collection":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/comments?post=3398"}],"version-history":[{"count":21,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/pages\/3398\/revisions"}],"predecessor-version":[{"id":4001,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/pages\/3398\/revisions\/4001"}],"up":[{"embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/pages\/3270"}],"wp:attachment":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/media?parent=3398"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}