Find Research Outputs

Search concepts
Selected filters

Publication Year

  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011

Author

  • Kouichi Sakurai
2020

3-Party Adversarial Cryptography

Meraouche, I., Dutta, S. & Sakurai, K., Jan 1 2020, Lecture Notes on Data Engineering and Communications Technologies. Springer, p. 247-258 12 p. (Lecture Notes on Data Engineering and Communications Technologies; vol. 47).

Research output: Chapter in Book/Report/Conference proceedingChapter

Blockchain for IoT-Based Digital Supply Chain: A Survey

Zhang, H. & Sakurai, K., Jan 1 2020, Lecture Notes on Data Engineering and Communications Technologies. Springer, p. 564-573 10 p. (Lecture Notes on Data Engineering and Communications Technologies; vol. 47).

Research output: Chapter in Book/Report/Conference proceedingChapter

Classification of Malicious Domains by Their LIFETIME

Hara, D., Sakurai, K. & Musashi, Y., Jan 1 2020, Lecture Notes on Data Engineering and Communications Technologies. Springer, p. 334-341 8 p. (Lecture Notes on Data Engineering and Communications Technologies; vol. 47).

Research output: Chapter in Book/Report/Conference proceedingChapter

Deniable Secret Handshake Protocol - Revisited

Panja, S., Dutta, S. & Sakurai, K., Jan 1 2020, Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019. Barolli, L., Takizawa, M., Enokido, T. & Xhafa, F. (eds.). Springer Verlag, p. 1266-1278 13 p. (Advances in Intelligent Systems and Computing; vol. 926).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation

Soe, Y. N., Feng, Y., Santosa, P. I., Hartanto, R. & Sakurai, K., Jan 1 2020, Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019. Takizawa, M., Enokido, T., Barolli, L. & Xhafa, F. (eds.). Springer Verlag, p. 458-469 12 p. (Advances in Intelligent Systems and Computing; vol. 926).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Secret Sharing on Evolving Multi-level Access Structure

Dutta, S., Roy, P. S., Fukushima, K., Kiyomoto, S. & Sakurai, K., Jan 1 2020, Information Security Applications - 20th International Conference, WISA 2019, Revised Selected Papers. You, I. (ed.). Springer, p. 180-191 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11897 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Simulation of Secure Volunteer Computing by Using Blockchain

Shota, J., Kosuke, K., Sharma, S. & Kouichi, S., Jan 1 2020, Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019. Enokido, T., Xhafa, F., Barolli, L. & Takizawa, M. (eds.). Springer Verlag, p. 883-894 12 p. (Advances in Intelligent Systems and Computing; vol. 926).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Towards a lightweight detection system for cyber attacks in the IoT environment using corresponding features

Soe, Y. N., Feng, Y., Santosa, P. I., Hartanto, R. & Sakurai, K., Jan 1 2020, In : Electronics (Switzerland). 9, 1, 144.

Research output: Contribution to journalArticle

Open Access
2019

Analysis of variance of graph-clique mining for scalable proof of work

Anada, H., Matsushima, T., Su, C., Meng, W., Kawamoto, J., Bag, S. & Sakurai, K., Jan 1 2019, Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Revised Selected Papers. Yung, M., Huang, X. & Guo, F. (eds.). Springer Verlag, p. 101-114 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11449 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

An ANN Based Sequential Detection Method for Balancing Performance Indicators of IDS

Zhao, H., Feng, Y., Koide, H. & Sakurai, K., Nov 2019, Proceedings - 2019 7th International Symposium on Computing and Networking, CANDAR 2019. Institute of Electrical and Electronics Engineers Inc., p. 239-244 6 p. 8958477. (Proceedings - 2019 7th International Symposium on Computing and Networking, CANDAR 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A sequential scheme for detecting cyber attacks in IoT environment

Soe, Y. N., Feng, Y., Santosa, P. I., Hartanto, R. & Sakurai, K., Aug 2019, Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019. Institute of Electrical and Electronics Engineers Inc., p. 238-244 7 p. 8890502. (Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
3 Citations (Scopus)

Efficient shortest path routing algorithms for distributed XML processing

Longjian, Y., Koide, H., Cavendish, D. & Sakurai, K., Jan 1 2019, WEBIST 2019 - Proceedings of the 15th International Conference on Web Information Systems and Technologies. Bozzon, A., Mayo, F. J. D. & Filipe, J. (eds.). SciTePress, p. 265-272 8 p. (WEBIST 2019 - Proceedings of the 15th International Conference on Web Information Systems and Technologies).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Frame difference generative adversarial networks: Clearer contour video generating

Qiu, R., Vargas, D. V. & Sakurai, K., Nov 2019, Proceedings - 2019 7th International Symposium on Computing and Networking Workshops, CANDARW 2019. Institute of Electrical and Electronics Engineers Inc., p. 169-175 7 p. 8951676. (Proceedings - 2019 7th International Symposium on Computing and Networking Workshops, CANDARW 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Light weight and fine-grained access mechanism for secure access to outsourced data*

Jahan, M., Seneviratne, S., Roy, P. S., Sakurai, K., Seneviratne, A. & Jha, S., Dec 10 2019, In : Concurrency Computation. 31, 23, e4736.

Research output: Contribution to journalArticle

1 Citation (Scopus)

One Pixel Attack for Fooling Deep Neural Networks

Su, J., Vargas, D. V. & Sakurai, K., Oct 2019, In : IEEE Transactions on Evolutionary Computation. 23, 5, p. 828-841 14 p., 8601309.

Research output: Contribution to journalArticle

74 Citations (Scopus)

Proposal and evaluation of a security incident response training method using programming

Nagai, K., Koide, H. & Sakurai, K., Sep 26 2019, SIGITE 2019 - Proceedings of the 20th Annual Conference on Information Technology Education. Association for Computing Machinery, Inc, 1 p. (SIGITE 2019 - Proceedings of the 20th Annual Conference on Information Technology Education).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

Reliable decentralized oracle with mechanisms for verification and disputation

Ma, L., Kaneko, K., Sharma, S. & Sakurai, K., Nov 2019, Proceedings - 2019 7th International Symposium on Computing and Networking Workshops, CANDARW 2019. Institute of Electrical and Electronics Engineers Inc., p. 346-352 7 p. 8951647. (Proceedings - 2019 7th International Symposium on Computing and Networking Workshops, CANDARW 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust

Anada, H., Yasuda, T., Kawamoto, J., Weng, J. & Sakurai, K., Apr 1 2019, In : Journal of Information Security and Applications. 45, p. 10-19 10 p.

Research output: Contribution to journalArticle

Security and trust issues on digital supply chain

Zhang, H., Nakamura, T. & Sakurai, K., Aug 2019, Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019. Institute of Electrical and Electronics Engineers Inc., p. 338-343 6 p. 8890486. (Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Universal Rules for Fooling Deep Neural Networks based Text Classification

Li, D., Vargas, D. V. & Kouichi, S., Jun 2019, 2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 2221-2228 8 p. 8790213. (2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

Active attack against oblivious RAM

Nakano, Y., Hidano, S., Kiyomoto, S. & Sakurai, K., Aug 9 2018, Proceedings - 32nd IEEE International Conference on Advanced Information Networking and Applications, AINA 2018. Barolli, L., Enokido, T., Ogiela, M. R., Ogiela, L., Javaid, N. & Takizawa, M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 744-751 8 p. 8432314. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 2018-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A new design for evaluating moving target defense system

Oo, W. K. K., Koide, H., Vargas, D. V. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 561-563 3 p. 8590965. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A New Design for Evaluating Moving Target Defense System

Oo, W. K. K., Koide, H., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 561-563 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Detecting distributed cyber attacks in SDN based on automatic thresholding

Komiya, R., Feng, Y. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 417-423 7 p. 8590937. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Effectively Protect Your Privacy: Enabling Flexible Privacy Control on Web Tracking

Yu, S., Vargas, D. V. & Sakurai, K., Apr 23 2018, Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017. Institute of Electrical and Electronics Engineers Inc., p. 533-536 4 p. (Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Empirical evaluation on robustness of deep convolutional neural networks activation functions against adversarial perturbation

Su, J., Vargas, D. V. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 223-227 5 p. 8590903. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Empirical Evaluation on Robustness of Deep Convolutional Neural Networks Activation Functions Against Adversarial Perturbation

Su, J., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 223-227 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Feature selection for machine learning-based early detection of distributed cyber attacks

Feng, Y., Akiyama, H., Lu, L. & Sakurai, K., Oct 26 2018, Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018. Institute of Electrical and Electronics Engineers Inc., p. 181-186 6 p. 8511883. (Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Hardware trojan cyber-physical threats to supply chains

Sauer, K., David, M. & Sakurai, K., Jan 1 2018, Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018. Hurley, J. S. & Chen, J. Q. (eds.). Academic Conferences and Publishing International Limited, p. 448-455 8 p. (Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018; vol. 2018-March).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hierarchical secret sharing schemes secure against rushing adversary: Cheater identification and robustness

Roy, P. S., Dutta, S., Morozov, K., Adhikari, A., Fukushima, K., Kiyomoto, S. & Sakurai, K., Jan 1 2018, Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Proceedings. Kikuchi, H. & Su, C. (eds.). Springer Verlag, p. 578-594 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11125 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

How to sign multiple versions of digital documents

Syalim, A. & Sakurai, K., Jan 29 2018, Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security. Institute of Electrical and Electronics Engineers Inc., p. 133-136 4 p. (Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Improved proxy re-encryption scheme for symmetric key cryptography

Syalim, A., Nishide, T. & Sakurai, K., Jan 29 2018, Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security. Institute of Electrical and Electronics Engineers Inc., p. 105-111 7 p. (Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Lightweight classification of IoT malware based on image recognition

Su, J., Vasconcellos, V. D., Prasad, S., Daniele, S., Feng, Y. & Sakurai, K., 2018, 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC). Vol. 2. p. 664-669 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lightweight Classification of IoT Malware Based on Image Recognition

Su, J., Danilo Vasconcellos, V., Prasad, S., Daniele, S., Feng, Y. & Sakurai, K., Jun 8 2018, Proceedings - 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018. Demartini, C., Reisman, S., Liu, L., Tovar, E., Takakura, H., Yang, J-J., Lung, C-H., Ahamed, S. I., Hasan, K., Conte, T., Nakamura, M., Zhang, Z., Akiyama, T., Claycomb, W. & Cimato, S. (eds.). IEEE Computer Society, p. 664-669 6 p. 8377943. (Proceedings - International Computer Software and Applications Conference; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

26 Citations (Scopus)

Light Weight Write Mechanism for Cloud Data

Jahan, M., Rezvani, M., Zhao, Q., Roy, P. S., Sakurai, K., Seneviratne, A. & Jha, S., May 1 2018, In : IEEE Transactions on Parallel and Distributed Systems. 29, 5, p. 1131-1146 16 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Neural cryptography based on the topology evolving neural networks

Zhu, Y., Vargas, D. V. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 472-478 7 p. 8590945. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Neural Cryptography Based on the Topology Evolving Neural Networks

Zhu, Y., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 472-478 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Packet in Message Based DDoS Attack Detection in SDN Network Using OpenFlow

You, X., Feng, Y. & Sakurai, K., Apr 23 2018, Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 522-528 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Preface

Ghosh, D., Giri, D., Mohapatra, R. N., Savas, E., Sakurai, K. & Singh, L. P., Jan 1 2018, In : Communications in Computer and Information Science. 834, p. IX-X

Research output: Contribution to journalEditorial

Proof of disease: A blockchain consensus protocol for accurate medical decisions and reducing the disease burden

Talukder, A. K., Chaitanya, M., Arnold, D. & Sakurai, K., Dec 4 2018, Proceedings - 2018 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovations, SmartWorld/UIC/ATC/ScalCom/CBDCom/IoP/SCI 2018. Loulergue, F., Wang, G., Bhuiyan, M. Z. A., Ma, X., Li, P., Roveri, M., Han, Q. & Chen, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 257-262 6 p. 8560057. (Proceedings - 2018 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovations, SmartWorld/UIC/ATC/ScalCom/CBDCom/IoP/SCI 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters

Pramanik, J., Roy, P. S., Dutta, S., Adhikari, A. & Sakurai, K., Jan 1 2018, Information Systems Security - 14th International Conference, ICISS 2018, Proceedings. Ganapathy, V., Shyamasundar, R. K. & Jaeger, T. (eds.). Springer Verlag, p. 171-188 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11281 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Suppressing chain size of blockchain-based information sharing for swarm robotic systems

Nishida, Y., Kaneko, K., Sharma, S. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 524-528 5 p. 8590956. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Tracing MIRAI malware in networked system

Xu, Y., Koide, H., Vargas, D. V. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 534-538 5 p. 8590958. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Tracing MIRAI Malware in Networked System

Xu, Y., Koide, H., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 534-538 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

A behavior-based online engine for detecting distributed cyber-attacks

Feng, Y., Hori, Y. & Sakurai, K., Jan 1 2017, Information Security Applications - 17th International Workshop, WISA 2016, Revised Selected Papers. Choi, D. & Guilley, S. (eds.). Springer Verlag, p. 79-89 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10144 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)