Filter
Chapter

Search results

  • 2024

    Design and Performance Evaluation of a Two-Stage Detection of DDoS Attacks Using a Trigger with a Feature on Riemannian Manifolds

    Lyu, Y., Feng, Y. & Sakurai, K., 2024, Lecture Notes on Data Engineering and Communications Technologies. Springer Science and Business Media Deutschland GmbH, p. 133-144 12 p. (Lecture Notes on Data Engineering and Communications Technologies; vol. 202).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Enhancing Security and Efficiency: A Lightweight Federated Learning Approach

    Chen, C., Wang, K. I. K., Li, P. & Sakurai, K., 2024, Lecture Notes on Data Engineering and Communications Technologies. Springer Science and Business Media Deutschland GmbH, p. 349-359 11 p. (Lecture Notes on Data Engineering and Communications Technologies; vol. 202).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Citation (Scopus)
  • SoK: Directions and Issues in Formal Verification of Payment Protocols

    Sakurada, H. & Sakurai, K., 2024, Lecture Notes on Data Engineering and Communications Technologies. Springer Science and Business Media Deutschland GmbH, p. 111-119 9 p. (Lecture Notes on Data Engineering and Communications Technologies; vol. 202).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2022

    Deep Learning–Based Advances In Protein Posttranslational Modification Site and Protein Cleavage Prediction

    Pakhrin, S. C., Pokharel, S., Saigo, H. & Kc, D. B., 2022, Methods in Molecular Biology. Humana Press Inc., p. 285-322 38 p. (Methods in Molecular Biology; vol. 2499).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    11 Citations (Scopus)
  • 2021

    Challenges for and with Autonomous Vehicles: An Introduction

    Van Uytsel, S. & Vasconcellos Vargas, D., 2021, Perspectives in Law, Business and Innovation. Springer, p. 1-17 17 p. (Perspectives in Law, Business and Innovation).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Learning Systems Under Attack—Adversarial Attacks, Defenses and Beyond

    Vasconcellos Vargas, D., 2021, Perspectives in Law, Business and Innovation. Springer, p. 147-161 15 p. (Perspectives in Law, Business and Innovation).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2020

    3-Party Adversarial Cryptography

    Meraouche, I., Dutta, S. & Sakurai, K., 2020, Lecture Notes on Data Engineering and Communications Technologies. Springer Science and Business Media Deutschland GmbH, p. 247-258 12 p. (Lecture Notes on Data Engineering and Communications Technologies; vol. 47).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    7 Citations (Scopus)
  • Adversarial Machine Learning: A Blow to the Transportation Sharing Economy

    Van Uytsel, S. & Vargas, D. V., 2020, Perspectives in Law, Business and Innovation. Springer, p. 179-208 30 p. (Perspectives in Law, Business and Innovation).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Citation (Scopus)
  • Blockchain for IoT-Based Digital Supply Chain: A Survey

    Zhang, H. & Sakurai, K., 2020, Lecture Notes on Data Engineering and Communications Technologies. Springer Science and Business Media Deutschland GmbH, p. 564-573 10 p. (Lecture Notes on Data Engineering and Communications Technologies; vol. 47).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    32 Citations (Scopus)
  • Classification of Malicious Domains by Their LIFETIME

    Hara, D., Sakurai, K. & Musashi, Y., 2020, Lecture Notes on Data Engineering and Communications Technologies. Springer Science and Business Media Deutschland GmbH, p. 334-341 8 p. (Lecture Notes on Data Engineering and Communications Technologies; vol. 47).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    2 Citations (Scopus)
  • One-Pixel Attack: Understanding and Improving Deep Neural Networks with Evolutionary Computation

    Vargas, D. V., 2020, Natural Computing Series. Springer, p. 401-430 30 p. (Natural Computing Series).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    3 Citations (Scopus)
  • 2019

    Direct Neural Interface

    Tashiro, H., Popovic, M. B., Iramina, K., Terasawa, Y. & Ohta, J., Jan 1 2019, Biomechatronics. Elsevier, p. 139-174 36 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Citation (Scopus)
  • Symmetry of anonymous Robots

    Yamauchi, Y., 2019, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, p. 109-133 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11340 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    8 Citations (Scopus)
  • 2017

    A comprehensive security analysis checksheet for openflow networks

    Hori, Y., Mizoguchi, S., Miyazaki, R., Yamada, A., Feng, Y., Kubota, A. & Sakurai, K., 2017, Lecture Notes on Data Engineering and Communications Technologies. Springer Science and Business Media Deutschland GmbH, p. 231-242 12 p. (Lecture Notes on Data Engineering and Communications Technologies; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    4 Citations (Scopus)
  • 2016

    Enhancing privacy of universal re-encryption scheme for RFID tags

    Saito, J., Yeo, S. S., Sakurai, K., Kwak, J. & Ryou, J. C., Jan 1 2016, Handbook on Mobile and Ubiquitous Computing: Status and Perspective. CRC Press, p. 365-378 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2014

    An FPTAS for the Volume Computation of 0-1 Knapsack Polytopes Based on Approximate Convolution Integral

    Ando, E. & Kijima, S., 2014, Algorithms and Computation - 25th International Symposium, ISAAC 2014, Proceedings. Ahn, H.-K. & Shin, C.-S. (eds.). Springer Verlag, p. 376-386 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8889).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    2 Citations (Scopus)
  • Phylogenetic differential evolution

    de Melo, V. V., Vargas, D. V. & Crocomo, M. K., 2014, Natural Computing for Simulation and Knowledge Discovery. IGI Global, p. 22-40 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2012

    Workflow scheduling with fault tolerance

    Zhao, L. & Sakurai, K., 2012, Network and Traffic Engineering in Emerging Distributed Computing Applications. IGI Global, p. 94-123 30 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2009

    Toward a novel design of swarm robots based on the dynamic Bayesian network

    Suzuki, E., Hirai, H. & Takano, S., 2009, Advances in Data Management. Ras, Z. & Dardzinska, A. (eds.). p. 299-310 12 p. (Studies in Computational Intelligence; vol. 223).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Citation (Scopus)
  • 2008

    Pitfalls for categorizations of objective interestingness measures for rule discovery

    Suzuki, E., 2008, Statistical Implicative Analysis: Theory and Applications. Gras, R., Suzuki, E., Guillet, F. & Spagnolo, F. (eds.). p. 383-395 13 p. (Studies in Computational Intelligence; vol. 127).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    18 Citations (Scopus)
  • 2007

    Privacy-preservation techniques in data mining

    Su, C., Zhou, J., Bao, F., Wang, G. & Sakurai, K., Jan 1 2007, Digital Privacy: Theory, Technologies, and Practices. CRC Press, p. 187-226 40 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2004

    A distributed online certificate status protocol with a single public key

    Koga, S. & Sakurai, K., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Bao, F., Deng, R. & Zhou, J. (eds.). Springer Verlag, p. 389-401 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2947).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    7 Citations (Scopus)
  • A DRM framework for secure distribution of mobile contents

    Lee, K. I., Sakurai, K., Lee, J. S. & Ryou, J. C., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Kahng, H.-K. & Goto, S. (eds.). Springer Verlag, p. 905-914 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3090).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Citation (Scopus)
  • A generalization of PGV-hash functions and security analysis in black-box model

    Lee, W., Nandi, M., Sarkar, P., Chang, D., Lee, S. & Sakurai, K., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Wang, H., Pieprzyk, J. & Varadharajan, V. (eds.). Springer Verlag, p. 212-223 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3108).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    3 Citations (Scopus)
  • A new attack with side channel leakage during exponent recoding computations

    Sakai, Y. & Sakurai, K., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Joye, M. & Quisquater, J.-J. (eds.). Springer Verlag, p. 298-311 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3156).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    5 Citations (Scopus)
  • A software fingerprinting scheme for java using classfiles obfuscation

    Fukushima, K. & Sakurai, K., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Chae, K. & Yung, M. (eds.). Springer Verlag, p. 303-316 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2908).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    5 Citations (Scopus)
  • Enhancing privacy of universal re-encryption scheme for RFID tags

    Saito, J., Ryou, J. C. & Sakurai, K., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Yang, L. T., Guo, M., Gao, G. R. & Jha, N. K. (eds.). Springer Verlag, p. 879-890 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3207).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    69 Citations (Scopus)
  • Finding optimal pairs of cooperative and competing patterns with bounded distance

    Inenaga, S., Bannai, H., Hyyrö, H., Shinohara, A., Takeda, M., Nakai, K. & Miyano, S., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Suzuki, E. & Arikawa, S. (eds.). Springer Verlag, p. 32-46 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3245).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    11 Citations (Scopus)
  • Finding optimal pairs of patterns

    Bannai, H., Hyyrö, H., Shinohara, A., Takeda, M., Nakai, K. & Miyano, S., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Jonassen, I. & Kim, J. (eds.). Springer Verlag, p. 450-462 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3240).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    6 Citations (Scopus)
  • Neighborhood composition A -Parallelization of local search algorithms

    Handa, Y., Ono, H., Sadakane, K. & Yamashita, M., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Kranzlmuller, D., Kacsuk, P. & Dongarra, J. (eds.). Springer Verlag, p. 155-163 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3241).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    9 Citations (Scopus)
  • Pre-production methods of a response to certificates with the common status - Design and theoretical evaluation

    Koga, S., Ryou, J. C. & Sakurai, K., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Katsikas, S. K., Gritzalis, S. & Lopez, J. (eds.). Springer Verlag, p. 85-97 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3093).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    2 Citations (Scopus)
  • 2003

    A reject timing attack on an IND-CCA2 public-key cryptosystem

    Sakurai, K. & Takagi, T., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lee, P. J. & Lim, C. H. (eds.). Springer Verlag, p. 359-373 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2587).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    9 Citations (Scopus)
  • Impact of local topological information on random walks on finite graphs

    Ikeda, S., Kubo, I., Okumoto, N. & Yamashita, M., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Baeten, J. C. M., Lenstra, J. K., Parrow, J. & Woeginger, G. J. (eds.). Springer Verlag, p. 1054-1067 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2719).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    26 Citations (Scopus)
  • Inferring strings from graphs and arrays

    Bannai, H., Inenaga, S., Shinohara, A. & Takeda, M., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Rovan, B. & Vojtas, P. (eds.). Springer Verlag, p. 208-217 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2747).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    50 Citations (Scopus)
  • Linear-time off-line text compression by longest-first substitution

    Inenaga, S., Funamoto, T., Takeda, M. & Shinohara, A., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Nascimento, M. A., de Moura, E. S. & Oliveira, A. L. (eds.). Springer Verlag, p. 137-152 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2857).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    9 Citations (Scopus)
  • On the length of the minimum solution of word equations in one variable

    Baba, K., Tsuruta, S., Shinohara, A. & Takeda, M., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Rovan, B. & Vojtas, P. (eds.). Springer Verlag, p. 189-197 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2747).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
  • Single-path authenticated-encryption scheme based on universal hashing

    Furuya, S. & Sakurai, K., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Nyberg, K. & Heys, H. (eds.). Springer Verlag, p. 94-109 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2595).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    1 Citation (Scopus)
  • Ternary directed acyclic word graphs

    Miyamoto, S., Inenaga, S., Takeda, M. & Shinohara, A., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Ibarra, O. H. & Dang, Z. (eds.). Springer Verlag, p. 120-130 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2759).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    2 Citations (Scopus)
  • 2002

    Finding best patterns practically

    Shinohara, A., Takeda, M., Arikawa, S., Hirao, M., Hoshino, H. & Inenaga, S., 2002, Progress in Discovery Science. Springer Verlag, p. 307-317 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2281).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    11 Citations (Scopus)
  • Mining from literary texts: Pattern discovery and similarity computation

    Takeda, M., Fukuda, T. & Nanri, I., 2002, Progress in Discovery Science. Springer Verlag, p. 518-531 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2281).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Visualization and analysis of Web Graphs

    Hirokawa, S. & Ikeda, D., 2002, Progress in Discovery Science. Springer Verlag, p. 616-627 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2281).

    Research output: Chapter in Book/Report/Conference proceedingChapter