If you made any changes in Pure these will be visible here soon.

Research Output 1991 2020

2020

Deniable Secret Handshake Protocol - Revisited

Panja, S., Dutta, S. & Sakurai, K., Jan 1 2020, Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019. Barolli, L., Takizawa, M., Enokido, T. & Xhafa, F. (eds.). Springer Verlag, p. 1266-1278 13 p. (Advances in Intelligent Systems and Computing; vol. 926).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Defects

Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation

Soe, Y. N., Feng, Y., Santosa, P. I., Hartanto, R. & Sakurai, K., Jan 1 2020, Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019. Takizawa, M., Enokido, T., Barolli, L. & Xhafa, F. (eds.). Springer Verlag, p. 458-469 12 p. (Advances in Intelligent Systems and Computing; vol. 926).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Feature extraction
Intrusion detection
Learning systems
Classifiers
Internet of things

Simulation of Secure Volunteer Computing by Using Blockchain

Shota, J., Kaneko, K., Sharma, S. & Sakurai, K., Jan 1 2020, Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019. Enokido, T., Xhafa, F., Barolli, L. & Takizawa, M. (eds.). Springer Verlag, p. 883-894 12 p. (Advances in Intelligent Systems and Computing; vol. 926).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Distributed computer systems
2019

Analysis of variance of graph-clique mining for scalable proof of work

Anada, H., Matsushima, T., Su, C., Meng, W., Kawamoto, J., Bag, S. & Sakurai, K., Jan 1 2019, Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Revised Selected Papers. Yung, M., Huang, X. & Guo, F. (eds.). Springer Verlag, p. 101-114 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11449 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Clique Graphs
Analysis of variance
Analysis of variance (ANOVA)
Mining
Clique
2 Citations (Scopus)
Open Access
Pixels
Neural networks
Classifiers
Feedback

Proposal and evaluation of a security incident response training method using programming

Nagai, K., Koide, H. & Sakurai, K., Sep 26 2019, SIGITE 2019 - Proceedings of the 20th Annual Conference on Information Technology Education. Association for Computing Machinery, Inc, 1 p. (SIGITE 2019 - Proceedings of the 20th Annual Conference on Information Technology Education).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
training method
incident
programming
evaluation
questionnaire

RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust

Anada, H., Yasuda, T., Kawamoto, J., Weng, J. & Sakurai, K., Apr 1 2019, In : Journal of Information Security and Applications. 45, p. 10-19 10 p.

Research output: Contribution to journalArticle

Cryptography
Peer to peer networks

Universal Rules for Fooling Deep Neural Networks based Text Classification

Li, D., Vargas, D. V. & Sakurai, K., Jun 1 2019, 2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 2221-2228 8 p. 8790213. (2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Text Classification
Neural Networks
Gradient methods
Information use
Attack
2018

Active attack against oblivious RAM

Nakano, Y., Hidano, S., Kiyomoto, S. & Sakurai, K., Aug 9 2018, Proceedings - 32nd IEEE International Conference on Advanced Information Networking and Applications, AINA 2018. Barolli, L., Enokido, T., Ogiela, M. R., Ogiela, L., Javaid, N. & Takizawa, M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 744-751 8 p. 8432314. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 2018-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Random access storage

A new design for evaluating moving target defense system

Oo, W. K. K., Koide, H., Vargas, D. V. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 561-563 3 p. 8590965. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Moving Target
Information systems
Servers
Attack
Evaluation Method

A New Design for Evaluating Moving Target Defense System

Oo, W. K. K., Koide, H., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 561-563 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Detecting distributed cyber attacks in SDN based on automatic thresholding

Komiya, R., Feng, Y. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 417-423 7 p. 8590937. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Thresholding
Networking
Attack
Software
Historical Data

Effectively Protect Your Privacy: Enabling Flexible Privacy Control on Web Tracking

Yu, S., Vargas, D. V. & Sakurai, K., Apr 23 2018, Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017. Institute of Electrical and Electronics Engineers Inc., p. 533-536 4 p. (Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Websites
Blood
Internet

Empirical evaluation on robustness of deep convolutional neural networks activation functions against adversarial perturbation

Su, J., Vargas, D. V. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 223-227 5 p. 8590903. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Activation Function
Chemical activation
Neural Networks
Robustness
Neural networks

Empirical Evaluation on Robustness of Deep Convolutional Neural Networks Activation Functions Against Adversarial Perturbation

Su, J., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 223-227 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Feature selection for machine learning-based early detection of distributed cyber attacks

Feng, Y., Akiyama, H., Lu, L. & Sakurai, K., Oct 26 2018, Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018. Institute of Electrical and Electronics Engineers Inc., p. 181-186 6 p. 8511883. (Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Feature Selection
Support vector machines
Learning systems
Feature extraction
Machine Learning

Hardware trojan cyber-physical threats to supply chains

Sauer, K., David, M. & Sakurai, K., Jan 1 2018, Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018. Hurley, J. S. & Chen, J. Q. (eds.). Academic Conferences and Publishing International Limited, p. 448-455 8 p. (Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018; vol. 2018-March).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Supply chains
Risk management
Integrated circuits
Hardware security
Semiconductor materials

Hierarchical secret sharing schemes secure against rushing adversary: Cheater identification and robustness

Roy, P. S., Dutta, S., Morozov, K., Adhikari, A., Fukushima, K., Kiyomoto, S. & Sakurai, K., Jan 1 2018, Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Proceedings. Kikuchi, H. & Su, C. (eds.). Springer Verlag, p. 578-594 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11125 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access Structure
Secret Sharing Scheme
Secret Sharing
Robustness
Scenarios

How to sign multiple versions of digital documents

Syalim, A. & Sakurai, K., Jan 29 2018, Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 133-136 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Integrity
1 Citation (Scopus)

Improved proxy re-encryption scheme for symmetric key cryptography

Syalim, A., Nishide, T. & Sakurai, K., Jan 29 2018, Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security. Institute of Electrical and Electronics Engineers Inc., p. 105-111 7 p. (Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Encryption
1 Citation (Scopus)

Light weight and fine-grained access mechanism for secure access to outsourced data*

Jahan, M., Seneviratne, S., Roy, P. S., Sakurai, K., Seneviratne, A. & Jha, S., Jan 1 2018, (Accepted/In press) In : Concurrency Computation.

Research output: Contribution to journalArticle

Mobile devices
Cryptography
Network protocols
Testbeds
Access control

Lightweight classification of IoT malware based on image recognition

Su, J., Vasconcellos, V. D., Prasad, S., Daniele, S., Feng, Y. & Sakurai, K., 2018, 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC). Vol. 2. p. 664-669 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Lightweight Classification of IoT Malware Based on Image Recognition

Su, J., Vargas, D. V., Prasad, S., Daniele, S., Feng, Y. & Sakurai, K., Jun 8 2018, Proceedings - 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018. Demartini, C., Reisman, S., Liu, L., Tovar, E., Takakura, H., Yang, J-J., Lung, C-H., Ahamed, S. I., Hasan, K., Conte, T., Nakamura, M., Zhang, Z., Akiyama, T., Claycomb, W. & Cimato, S. (eds.). IEEE Computer Society, p. 664-669 6 p. 8377943. (Proceedings - International Computer Software and Applications Conference; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Image recognition
Internet
Domestic appliances
Cameras
Internet of things
2 Citations (Scopus)

Light Weight Write Mechanism for Cloud Data

Jahan, M., Rezvani, M., Zhao, Q., Roy, P. S., Sakurai, K., Seneviratne, A. & Jha, S., May 1 2018, In : IEEE Transactions on Parallel and Distributed Systems. 29, 5, p. 1131-1146 16 p.

Research output: Contribution to journalArticle

Mobile devices
Cryptography
Outsourcing
Processing
Access control

Neural cryptography based on the topology evolving neural networks

Zhu, Y., Vargas, D. V. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 472-478 7 p. 8590945. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Topology
Neuroevolution
Neural Networks
Neural networks

Neural Cryptography Based on the Topology Evolving Neural Networks

Zhu, Y., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 472-478 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Packet in Message Based DDoS Attack Detection in SDN Network Using OpenFlow

You, X., Feng, Y. & Sakurai, K., Apr 23 2018, Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 522-528 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer networks
Controllers
Processing
Switches
Communication

Preface

Ghosh, D., Giri, D., Mohapatra, R. N., Savas, E., Sakurai, K. & Singh, L. P., Jan 1 2018, In : Communications in Computer and Information Science. 834, p. IX-X

Research output: Contribution to journalEditorial

2 Citations (Scopus)

Proof of disease: A blockchain consensus protocol for accurate medical decisions and reducing the disease burden

Talukder, A. K., Chaitanya, M., Arnold, D. & Sakurai, K., Dec 4 2018, Proceedings - 2018 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovations, SmartWorld/UIC/ATC/ScalCom/CBDCom/IoP/SCI 2018. Loulergue, F., Wang, G., Bhuiyan, M. Z. A., Ma, X., Li, P., Roveri, M., Han, Q. & Chen, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 257-262 6 p. 8560057. (Proceedings - 2018 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovations, SmartWorld/UIC/ATC/ScalCom/CBDCom/IoP/SCI 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Health
Electronic medical equipment
Public health
Medicine
Burden
1 Citation (Scopus)

Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters

Pramanik, J., Roy, P. S., Dutta, S., Adhikari, A. & Sakurai, K., Jan 1 2018, Information Systems Security - 14th International Conference, ICISS 2018, Proceedings. Ganapathy, V., Shyamasundar, R. K. & Jaeger, T. (eds.). Springer Verlag, p. 171-188 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11281 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access Structure
Secret Sharing Scheme
Secret Sharing
Efficient Solution
Robustness

Suppressing chain size of blockchain-based information sharing for swarm robotic systems

Nishida, Y., Kaneko, K., Sharma, S. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 524-528 5 p. 8590956. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Swarm Robotics
Information Sharing
Robotics
Robots
Autonomous Robots

Tracing MIRAI malware in networked system

Xu, Y., Koide, H., Vargas, D. V. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 534-538 5 p. 8590958. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet of Things
Malware
Tracing
Attack
Denial of Service

Tracing MIRAI Malware in Networked System

Xu, Y., Koide, H., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 534-538 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017
2 Citations (Scopus)

A behavior-based online engine for detecting distributed cyber-attacks

Feng, Y., Hori, Y. & Sakurai, K., Jan 1 2017, Information Security Applications - 17th International Workshop, WISA 2016, Revised Selected Papers. Choi, D. & Guilley, S. (eds.). Springer Verlag, p. 79-89 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10144 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Engine
Attack
Engines
Information theory
Information Theory

A detection system for distributed DoS attacks based on automatic extraction of normal mode and its performance evaluation

Feng, Y., Hori, Y. & Sakurai, K., Jan 1 2017, Security, Privacy, and Anonymity in Computation, Communication, and Storage - 10th International Conference, SpaCCS 2017, Proceedings. Atiquzzaman, M., Yan, Z., Choo, K-K. R. & Wang, G. (eds.). Springer Verlag, p. 461-473 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10656 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Denial of Service
Normal Modes
Performance Evaluation
Attack
Information theory
6 Citations (Scopus)

A new security middleware architecture based on fog computing and cloud to support IoT constrained devices

Razouk, W., Sgandurra, D. & Sakurai, K., Oct 17 2017, Proceedings of the International Conference on Internet of Things and Machine Learning, IML 2017. Hamdan, H., Hidoussi, F. & Boubiche, D. E. (eds.). Association for Computing Machinery, a35. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fog
Middleware
Communication
Cloud computing
Radio frequency identification (RFID)

A proposal of Event Study Methodology with Twitter Sentimental Analysis for risk management

Ishikawa, T. & Sakurai, K., Jan 5 2017, Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017. Association for Computing Machinery, Inc, 14. (Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Risk management
Costs
4 Citations (Scopus)

A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing

Ahuja, R., Mohanty, S. K. & Sakurai, K., Jan 1 2017, In : Computers and Electrical Engineering. 57, p. 241-256 16 p.

Research output: Contribution to journalArticle

Cloud computing
Access control
Cryptography
Scalability
Industry

A traceable signcryption scheme for secure sharing of data in cloud storage

Ahuja, R., Mohanty, S. K. & Sakurai, K., Mar 10 2017, Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016. Institute of Electrical and Electronics Engineers Inc., p. 524-531 8 p. 7876382. (Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Cryptography
Access control
Labels
Costs
28 Citations (Scopus)

Bitcoin Block Withholding Attack: Analysis and Mitigation

Bag, S., Ruj, S. & Sakurai, K., Aug 1 2017, In : IEEE Transactions on Information Forensics and Security. 12, 8, p. 1967-1978 12 p., 7728010.

Research output: Contribution to journalArticle

Miners
Hash functions
Chemical analysis
4 Citations (Scopus)

C&C session detection using random forest

Lu, L., Feng, Y. & Sakurai, K., Jan 5 2017, Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017. Association for Computing Machinery, Inc, 34. (Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Classifiers
Telecommunication traffic
Denial-of-service attack
Botnet

Comments and improvements of 'HOTA: Handover optimized ticket-based authentication in network-based mobility management'

Alizadeh, M., Tadayon, M. H., Sakurai, K., Baharun, S., Anada, H., Zamani, M., Zeki, A., Chaudhry, S. A. & Khan, M. K., Apr 13 2017, Proceedings of the 2017 20th Conference on Innovations in Clouds, Internet and Networks, ICIN 2017. Secci, S., Crespi, N. & Manzalini, A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 112-116 5 p. 7899399

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Network protocols
Mobile devices
Synchronization
Internet

Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions

Anada, H., Kawamoto, J., Ke, C., Morozov, K. & Sakurai, K., Oct 1 2017, In : Journal of Supercomputing. 73, 10, p. 4275-4301 27 p.

Research output: Contribution to journalArticle

Secret Sharing Scheme
Group Scheme
Secret Sharing
Servers
Data privacy

Effectively Protect Your Privacy: Enabling Flexible Privacy Control on Web Tracking

Yu, S., Vargas, D. V. & Sakurai, K., 2017, 2017 Fifth International Symposium on Computing and Networking (CANDAR). p. 533-536 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution