If you made any changes in Pure these will be visible here soon.

Research Output 1991 2020

Filter
Conference contribution
2018

How to sign multiple versions of digital documents

Syalim, A. & Sakurai, K., Jan 29 2018, Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 133-136 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Integrity
1 Citation (Scopus)

Improved proxy re-encryption scheme for symmetric key cryptography

Syalim, A., Nishide, T. & Sakurai, K., Jan 29 2018, Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security. Institute of Electrical and Electronics Engineers Inc., p. 105-111 7 p. (Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Encryption

Lightweight classification of IoT malware based on image recognition

Su, J., Vasconcellos, V. D., Prasad, S., Daniele, S., Feng, Y. & Sakurai, K., 2018, 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC). Vol. 2. p. 664-669 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Lightweight Classification of IoT Malware Based on Image Recognition

Su, J., Danilo Vasconcellos, V., Prasad, S., Daniele, S., Feng, Y. & Sakurai, K., Jun 8 2018, Proceedings - 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018. Demartini, C., Reisman, S., Liu, L., Tovar, E., Takakura, H., Yang, J-J., Lung, C-H., Ahamed, S. I., Hasan, K., Conte, T., Nakamura, M., Zhang, Z., Akiyama, T., Claycomb, W. & Cimato, S. (eds.). IEEE Computer Society, p. 664-669 6 p. 8377943. (Proceedings - International Computer Software and Applications Conference; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Image recognition
Internet
Domestic appliances
Cameras
Internet of things

Neural cryptography based on the topology evolving neural networks

Zhu, Y., Vargas, D. V. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 472-478 7 p. 8590945. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Topology
Neuroevolution
Neural Networks
Neural networks

Neural Cryptography Based on the Topology Evolving Neural Networks

Zhu, Y., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 472-478 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Packet in Message Based DDoS Attack Detection in SDN Network Using OpenFlow

You, X., Feng, Y. & Sakurai, K., Apr 23 2018, Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 522-528 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer networks
Controllers
Processing
Switches
Communication
2 Citations (Scopus)

Proof of disease: A blockchain consensus protocol for accurate medical decisions and reducing the disease burden

Talukder, A. K., Chaitanya, M., Arnold, D. & Sakurai, K., Dec 4 2018, Proceedings - 2018 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovations, SmartWorld/UIC/ATC/ScalCom/CBDCom/IoP/SCI 2018. Loulergue, F., Wang, G., Bhuiyan, M. Z. A., Ma, X., Li, P., Roveri, M., Han, Q. & Chen, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 257-262 6 p. 8560057. (Proceedings - 2018 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovations, SmartWorld/UIC/ATC/ScalCom/CBDCom/IoP/SCI 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Health
Electronic medical equipment
Public health
Medicine
Burden
2 Citations (Scopus)

Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters

Pramanik, J., Roy, P. S., Dutta, S., Adhikari, A. & Sakurai, K., Jan 1 2018, Information Systems Security - 14th International Conference, ICISS 2018, Proceedings. Ganapathy, V., Shyamasundar, R. K. & Jaeger, T. (eds.). Springer Verlag, p. 171-188 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11281 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access Structure
Secret Sharing Scheme
Secret Sharing
Efficient Solution
Robustness

Suppressing chain size of blockchain-based information sharing for swarm robotic systems

Nishida, Y., Kaneko, K., Sharma, S. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 524-528 5 p. 8590956. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Swarm Robotics
Information Sharing
Robotics
Robots
Autonomous Robots
1 Citation (Scopus)

Tracing MIRAI malware in networked system

Xu, Y., Koide, H., Vargas, D. V. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 534-538 5 p. 8590958. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet of Things
Malware
Tracing
Attack
Denial of Service

Tracing MIRAI Malware in Networked System

Xu, Y., Koide, H., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 534-538 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2019

Analysis of variance of graph-clique mining for scalable proof of work

Anada, H., Matsushima, T., Su, C., Meng, W., Kawamoto, J., Bag, S. & Sakurai, K., Jan 1 2019, Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Revised Selected Papers. Yung, M., Huang, X. & Guo, F. (eds.). Springer Verlag, p. 101-114 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11449 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Clique Graphs
Analysis of variance
Analysis of variance (ANOVA)
Mining
Clique

A sequential scheme for detecting cyber attacks in IoT environment

Soe, Y. N., Feng, Y., Santosa, P. I., Hartanto, R. & Sakurai, K., Aug 2019, Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019. Institute of Electrical and Electronics Engineers Inc., p. 238-244 7 p. 8890502. (Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet of Things
Attack
Classifiers
Chemical activation
Activation Function

Efficient shortest path routing algorithms for distributed XML processing

Longjian, Y., Koide, H., Cavendish, D. & Sakurai, K., Jan 1 2019, WEBIST 2019 - Proceedings of the 15th International Conference on Web Information Systems and Technologies. Bozzon, A., Mayo, F. J. D. & Filipe, J. (eds.). SciTePress, p. 265-272 8 p. (WEBIST 2019 - Proceedings of the 15th International Conference on Web Information Systems and Technologies).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Routing algorithms
XML
Processing
Internet

Proposal and evaluation of a security incident response training method using programming

Nagai, K., Koide, H. & Sakurai, K., Sep 26 2019, SIGITE 2019 - Proceedings of the 20th Annual Conference on Information Technology Education. Association for Computing Machinery, Inc, 1 p. (SIGITE 2019 - Proceedings of the 20th Annual Conference on Information Technology Education).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
training method
incident
programming
evaluation
questionnaire

Security and trust issues on digital supply chain

Zhang, H., Nakamura, T. & Sakurai, K., Aug 2019, Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019. Institute of Electrical and Electronics Engineers Inc., p. 338-343 6 p. 8890486. (Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Supply Chain
Supply chains
Supply chain management
Supply Chain Management
Information science

Universal Rules for Fooling Deep Neural Networks based Text Classification

Li, D., Vargas, D. V. & Kouichi, S., Jun 2019, 2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 2221-2228 8 p. 8790213. (2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Text Classification
Neural Networks
Gradient methods
Information use
Attack
2020

Deniable Secret Handshake Protocol - Revisited

Panja, S., Dutta, S. & Sakurai, K., Jan 1 2020, Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019. Barolli, L., Takizawa, M., Enokido, T. & Xhafa, F. (eds.). Springer Verlag, p. 1266-1278 13 p. (Advances in Intelligent Systems and Computing; vol. 926).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Defects

Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation

Soe, Y. N., Feng, Y., Santosa, P. I., Hartanto, R. & Sakurai, K., Jan 1 2020, Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019. Takizawa, M., Enokido, T., Barolli, L. & Xhafa, F. (eds.). Springer Verlag, p. 458-469 12 p. (Advances in Intelligent Systems and Computing; vol. 926).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Feature extraction
Intrusion detection
Learning systems
Classifiers
Internet of things

Simulation of Secure Volunteer Computing by Using Blockchain

Shota, J., Kaneko, K., Sharma, S. & Sakurai, K., Jan 1 2020, Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019. Enokido, T., Xhafa, F., Barolli, L. & Takizawa, M. (eds.). Springer Verlag, p. 883-894 12 p. (Advances in Intelligent Systems and Computing; vol. 926).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Distributed computer systems