Find Research Outputs

Search in all content

Filters for Research Output

Search concepts
Selected filters

Publication Year

  • 2020
  • 2019
  • 2018
  • 2017
  • 2016

Author

  • Kouichi Sakurai
2020

Classification of Malicious Domains by Their LIFETIME

Hara, D., Sakurai, K. & Musashi, Y., Jan 1 2020, Lecture Notes on Data Engineering and Communications Technologies. Springer, p. 334-341 8 p. (Lecture Notes on Data Engineering and Communications Technologies; vol. 47).

Research output: Chapter in Book/Report/Conference proceedingChapter

2016

CCA-secure keyed-fully homomorphic encryption

Lai, J., Deng, R. H., Ma, C., Sakurai, K. & Weng, J., Jan 1 2016, Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Persiano, G., Cheng, C-M., Chung, K-M. & Yang, B-Y. (eds.). Springer Verlag, p. 70-98 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9614).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)
2018

Neural Cryptography Based on the Topology Evolving Neural Networks

Zhu, Y., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 472-478 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2019
2017

A detection system for distributed DoS attacks based on automatic extraction of normal mode and its performance evaluation

Feng, Y., Hori, Y. & Sakurai, K., Jan 1 2017, Security, Privacy, and Anonymity in Computation, Communication, and Storage - 10th International Conference, SpaCCS 2017, Proceedings. Atiquzzaman, M., Yan, Z., Choo, K-K. R. & Wang, G. (eds.). Springer Verlag, p. 461-473 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10656 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2016

A behavior-based method for detecting DNS amplification attacks

Cai, L., Feng, Y., Kawamoto, J. & Sakurai, K., Dec 21 2016, Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016. Xhafa, F., Barolli, L. & Uchida, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 608-613 6 p. 7794541. (Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)
2017

Host independent and distributed detection system of the network attack by using OpenFlow

Miyazaki, R., Kawamoto, J., Matsumoto, S. & Sakurai, K., Apr 13 2017, 31st International Conference on Information Networking, ICOIN 2017. IEEE Computer Society, p. 236-241 6 p. 7899511. (International Conference on Information Networking).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2016

A study of security management with cyber insurance

Ishikawa, T. & Sakurai, K., Jan 4 2016, ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication. Association for Computing Machinery, Inc, a68. (ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
2019

Proposal and evaluation of a security incident response training method using programming

Nagai, K., Koide, H. & Sakurai, K., Sep 26 2019, SIGITE 2019 - Proceedings of the 20th Annual Conference on Information Technology Education. Association for Computing Machinery, Inc, 1 p. (SIGITE 2019 - Proceedings of the 20th Annual Conference on Information Technology Education).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
2017

Effectively Protect Your Privacy: Enabling Flexible Privacy Control on Web Tracking

Yu, S., Vargas, D. V. & Sakurai, K., 2017, 2017 Fifth International Symposium on Computing and Networking (CANDAR). p. 533-536 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2020

Simulation of Secure Volunteer Computing by Using Blockchain

Shota, J., Kosuke, K., Sharma, S. & Kouichi, S., Jan 1 2020, Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019. Enokido, T., Xhafa, F., Barolli, L. & Takizawa, M. (eds.). Springer Verlag, p. 883-894 12 p. (Advances in Intelligent Systems and Computing; vol. 926).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

Evasion attacks against statistical code obfuscation detectors

Su, J., Vargas, D. V. & Sakurai, K., Jan 1 2017, Advances in Information and Computer Security - 12th International Workshop on Security, IWSEC 2017, Proceedings. Obana, S. & Chida, K. (eds.). Springer Verlag, p. 121-137 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10418 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Improving the accuracy of signature authentication using the eight principles of yong

Nishigori, T., Kawamoto, J. & Sakurai, K., Jan 5 2017, Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017. Association for Computing Machinery, Inc, 32. (Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2019

Security and trust issues on digital supply chain

Zhang, H., Nakamura, T. & Sakurai, K., Aug 2019, Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019. Institute of Electrical and Electronics Engineers Inc., p. 338-343 6 p. 8890486. (Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2016

Evaluation of gamma ray durability of RF tag and application to the radiation environment

Teraura, N., Ito, K., Kobayashi, D. & Sakurai, K., Jan 12 2016, 2015 IEEE International Conference on RFID Technology and Applications, RFID-TA 2015. Institute of Electrical and Electronics Engineers Inc., p. 147-152 6 p. 7379809. (2015 IEEE International Conference on RFID Technology and Applications, RFID-TA 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing

Ahuja, R., Mohanty, S. K. & Sakurai, K., Dec 12 2016, Proceedings - 11th Asia Joint Conference on Information Security, AsiaJCIS 2016. Institute of Electrical and Electronics Engineers Inc., p. 39-47 9 p. 7782056. (Proceedings - 11th Asia Joint Conference on Information Security, AsiaJCIS 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Message from the STPA 2016 Workshop Organizers

Sakurai, K., Nayak, A., Ruj, S., Zhu, H. & Pal, A., May 17 2016, In : Proceedings - IEEE 30th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2016. p. lxviii 7471157.

Research output: Contribution to journalEditorial

2018

Lightweight classification of IoT malware based on image recognition

Su, J., Vasconcellos, V. D., Prasad, S., Daniele, S., Feng, Y. & Sakurai, K., 2018, 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC). Vol. 2. p. 664-669 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2016

Retricoin: Bitcoin based on compact proofs of retrievability

Sengupta, B., Bag, S., Sakurai, K. & Ruj, S., Jan 4 2016, Proceedings of the 17th International Conference on Distributed Computing and Networking, ICDCN 2016. Association for Computing Machinery, a14. (ACM International Conference Proceeding Series; vol. 04-07-January-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Citations (Scopus)
2017

Parameter manipulation attack prevention and detection by using web application deception proxy

Ishikawa, T. & Sakurai, K., Jan 5 2017, Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017. Association for Computing Machinery, Inc, 74. (Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)
2018

Effectively Protect Your Privacy: Enabling Flexible Privacy Control on Web Tracking

Yu, S., Vargas, D. V. & Sakurai, K., Apr 23 2018, Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017. Institute of Electrical and Electronics Engineers Inc., p. 533-536 4 p. (Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Light Weight Write Mechanism for Cloud Data

Jahan, M., Rezvani, M., Zhao, Q., Roy, P. S., Sakurai, K., Seneviratne, A. & Jha, S., May 1 2018, In : IEEE Transactions on Parallel and Distributed Systems. 29, 5, p. 1131-1146 16 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)
2019
Open Access
3 Citations (Scopus)
2018

Feature selection for machine learning-based early detection of distributed cyber attacks

Feng, Y., Akiyama, H., Lu, L. & Sakurai, K., Oct 26 2018, Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018. Institute of Electrical and Electronics Engineers Inc., p. 181-186 6 p. 8511883. (Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Detecting distributed cyber attacks in SDN based on automatic thresholding

Komiya, R., Feng, Y. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 417-423 7 p. 8590937. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2019

Universal Rules for Fooling Deep Neural Networks based Text Classification

Li, D., Vargas, D. V. & Kouichi, S., Jun 2019, 2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 2221-2228 8 p. 8790213. (2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2018

Neural cryptography based on the topology evolving neural networks

Zhu, Y., Vargas, D. V. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 472-478 7 p. 8590945. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2016

Character-based symmetric searchable encryption and its implementation and experiment on mobile devices

Suga, T., Nishide, T. & Sakurai, K., Aug 1 2016, In : Security and Communication Networks. 9, 12, p. 1717-1725 9 p.

Research output: Contribution to journalArticle

A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation

Gao, Y., Feng, Y., Kawamoto, J. & Sakurai, K., Dec 12 2016, Proceedings - 11th Asia Joint Conference on Information Security, AsiaJCIS 2016. Institute of Electrical and Electronics Engineers Inc., p. 80-86 7 p. 7782062. (Proceedings - 11th Asia Joint Conference on Information Security, AsiaJCIS 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)
2019

A sequential scheme for detecting cyber attacks in IoT environment

Soe, Y. N., Feng, Y., Santosa, P. I., Hartanto, R. & Sakurai, K., Aug 2019, Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019. Institute of Electrical and Electronics Engineers Inc., p. 238-244 7 p. 8890502. (Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

Comments and improvements of 'HOTA: Handover optimized ticket-based authentication in network-based mobility management'

Alizadeh, M., Tadayon, M. H., Sakurai, K., Baharun, S., Anada, H., Zamani, M., Zeki, A., Chaudhry, S. A. & Khan, M. K., Apr 13 2017, Proceedings of the 2017 20th Conference on Innovations in Clouds, Internet and Networks, ICIN 2017. Secci, S., Crespi, N. & Manzalini, A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 112-116 5 p. 7899399. (Proceedings of the 2017 20th Conference on Innovations in Clouds, Internet and Networks, ICIN 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

C&C session detection using random forest

Lu, L., Feng, Y. & Sakurai, K., Jan 5 2017, Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017. Association for Computing Machinery, Inc, 34. (Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)
2018

Lightweight Classification of IoT Malware Based on Image Recognition

Su, J., Danilo Vasconcellos, V., Prasad, S., Daniele, S., Feng, Y. & Sakurai, K., Jun 8 2018, Proceedings - 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018. Demartini, C., Reisman, S., Liu, L., Tovar, E., Takakura, H., Yang, J-J., Lung, C-H., Ahamed, S. I., Hasan, K., Conte, T., Nakamura, M., Zhang, Z., Akiyama, T., Claycomb, W. & Cimato, S. (eds.). IEEE Computer Society, p. 664-669 6 p. 8377943. (Proceedings - International Computer Software and Applications Conference; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

33 Citations (Scopus)
2016

Constructing Pairing-Friendly Elliptic Curves Using Global Number Fields

Yasuda, T., Takagi, T. & Sakurai, K., Mar 2 2016, Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015. Institute of Electrical and Electronics Engineers Inc., p. 477-483 7 p. 7424760. (Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Evaluation of Matching Accuracy of Template Matching Using a Steganography Algorithm

Ishizuka, H., Sakurai, K., Echizen, I. & Iwamura, K., Mar 2 2016, Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015. Institute of Electrical and Electronics Engineers Inc., p. 457-462 6 p. 7424757. (Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
2020

3-Party Adversarial Cryptography

Meraouche, I., Dutta, S. & Sakurai, K., Jan 1 2020, Lecture Notes on Data Engineering and Communications Technologies. Springer, p. 247-258 12 p. (Lecture Notes on Data Engineering and Communications Technologies; vol. 47).

Research output: Chapter in Book/Report/Conference proceedingChapter

2018

Hardware trojan cyber-physical threats to supply chains

Sauer, K., David, M. & Sakurai, K., Jan 1 2018, Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018. Hurley, J. S. & Chen, J. Q. (eds.). Academic Conferences and Publishing International Limited, p. 448-455 8 p. (Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018; vol. 2018-March).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017
2018

How to sign multiple versions of digital documents

Syalim, A. & Sakurai, K., Jan 29 2018, Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security. Institute of Electrical and Electronics Engineers Inc., p. 133-136 4 p. (Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2019

Efficient shortest path routing algorithms for distributed XML processing

Longjian, Y., Koide, H., Cavendish, D. & Sakurai, K., Jan 1 2019, WEBIST 2019 - Proceedings of the 15th International Conference on Web Information Systems and Technologies. Bozzon, A., Mayo, F. J. D. & Filipe, J. (eds.). SciTePress, p. 265-272 8 p. (WEBIST 2019 - Proceedings of the 15th International Conference on Web Information Systems and Technologies).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

A proposal of Event Study Methodology with Twitter Sentimental Analysis for risk management

Ishikawa, T. & Sakurai, K., Jan 5 2017, Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017. Association for Computing Machinery, Inc, 14. (Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2016

On the application of clique problem for proof-of-work in cryptocurrencies

Bag, S., Ruj, S. & Sakurai, K., Jan 1 2016, Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Revised Selected Papers. Lin, D., Wang, X. F. & Yung, M. (eds.). Springer Verlag, p. 260-279 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9589).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2019

An ANN Based Sequential Detection Method for Balancing Performance Indicators of IDS

Zhao, H., Feng, Y., Koide, H. & Sakurai, K., Nov 2019, Proceedings - 2019 7th International Symposium on Computing and Networking, CANDAR 2019. Institute of Electrical and Electronics Engineers Inc., p. 239-244 6 p. 8958477. (Proceedings - 2019 7th International Symposium on Computing and Networking, CANDAR 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions

Anada, H., Kawamoto, J., Ke, C., Morozov, K. & Sakurai, K., Oct 1 2017, In : Journal of Supercomputing. 73, 10, p. 4275-4301 27 p.

Research output: Contribution to journalArticle

2016

Expressive rating scheme by signatures with predications on ratees

Anada, H., Ruj, S. & Sakurai, K., 2016, Network and System Security - 10th International Conference, NSS 2016, Proceedings. Yung, M., Chen, J., Su, C. & Piuri, V. (eds.). Springer Verlag, p. 363-379 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9955 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

A traceable signcryption scheme for secure sharing of data in cloud storage

Ahuja, R., Mohanty, S. K. & Sakurai, K., Mar 10 2017, Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016. Institute of Electrical and Electronics Engineers Inc., p. 524-531 8 p. 7876382. (Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

On unconditionally binding code-based commitment schemes

Morozov, K., Roy, P. S. & Sakurai, K., Jan 5 2017, Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017. Association for Computing Machinery, Inc, 101. (Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

SQL injection attack detection method using expectation criterion

Xiao, L., Matsumoto, S., Ishikawa, T. & Sakurai, K., Jan 13 2017, Proceedings - 2016 4th International Symposium on Computing and Networking, CANDAR 2016. Institute of Electrical and Electronics Engineers Inc., p. 649-654 6 p. 7818686. (Proceedings - 2016 4th International Symposium on Computing and Networking, CANDAR 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)
2018

Proof of disease: A blockchain consensus protocol for accurate medical decisions and reducing the disease burden

Talukder, A. K., Chaitanya, M., Arnold, D. & Sakurai, K., Dec 4 2018, Proceedings - 2018 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovations, SmartWorld/UIC/ATC/ScalCom/CBDCom/IoP/SCI 2018. Loulergue, F., Wang, G., Bhuiyan, M. Z. A., Ma, X., Li, P., Roveri, M., Han, Q. & Chen, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 257-262 6 p. 8560057. (Proceedings - 2018 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovations, SmartWorld/UIC/ATC/ScalCom/CBDCom/IoP/SCI 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)