Privacy-preservation for Stochastic Gradient Descent Application to Secure Logistic Regression S Wu, T Teruya, J Kawamoto, J Sakuma, H Kikuchi The 27th Annual Conference of the Japanese Society for Artificial Intelligence, 2013 | 45 | 2013 |
A machine learning based approach for detecting DRDoS attacks and its performance evaluation Y Gao, Y Feng, J Kawamoto, K Sakurai 2016 11th Asia joint conference on information security (AsiaJCIS), 80-86, 2016 | 27 | 2016 |
An analysis of IT assessment security maturity in higher education institution MH Suwito, S Matsumoto, J Kawamoto, D Gollmann, K Sakurai Information Science and Applications (ICISA) 2016, 701-713, 2016 | 22 | 2016 |
Security of social information from query analysis in daas J Kawamoto, M Yoshikawa Proceedings of the 2009 EDBT/ICDT Workshops, 148-152, 2009 | 17 | 2009 |
RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust H Anada, T Yasuda, J Kawamoto, J Weng, K Sakurai Journal of information security and applications 45, 10-19, 2019 | 14 | 2019 |
Cyberbullying detection using parent-child relationship between comments Z Li, J Kawamoto, Y Feng, K Sakurai Proceedings of the 18th International Conference on Information Integration …, 2016 | 13 | 2016 |
A behavior-based method for detecting DNS amplification attacks L Cai, Y Feng, J Kawamoto, K Sakurai 2016 10th International Conference on Innovative Mobile and Internet …, 2016 | 11 | 2016 |
A method of digital rights management based on Bitcoin protocol M Kitahara, J Kawamoto, K Sakurai Proceedings of the 8th International Conference on Ubiquitous Information …, 2014 | 11 | 2014 |
A hybrid encryption scheme with key-cloning protection: user/terminal double authentication via attributes and fingerprints C Chen, H Anada, J Kawamoto, K Sakurai Journal of Internet Services and Information Security 6 (2), 23-36, 2016 | 10 | 2016 |
Identity-embedding method for decentralized public-key infrastructure H Anada, J Kawamoto, J Weng, K Sakurai International Conference on Trusted Systems, 1-14, 2014 | 10 | 2014 |
Evaluation of machine learning techniques for C&C traffic classification K Yamauchi, J Kawamoto, Y Hori, K Sakurai Information Processing Society of Japan 56 (9), 1745-1753, 2015 | 9 | 2015 |
Private Range Query by Perturbation and Matrix Based Encryption J Kawamoto, M Yoshikawa The Sixth IEEE International Conference on Digital Information Management …, 2011 | 9 | 2011 |
ReCQ: real-world context-aware querying S Hattori, T Tezuka, H Ohshima, S Oyama, J Kawamoto, K Tajima, ... The Sixth International and Interdisciplinary Conference on Modeling and …, 2007 | 9 | 2007 |
Detection of illegal players in massively multiplayer online role playing game by classification algorithms Z Zhang, H Anada, J Kawamoto, K Sakurai 2015 IEEE 29th International Conference on Advanced Information Networking …, 2015 | 8 | 2015 |
A proposal for cyber-attack trace-back using packet marking and logging P Li, Y Feng, J Kawamoto, K Sakurai 2016 10th International Conference on Innovative Mobile and Internet …, 2016 | 6 | 2016 |
Cross-group secret sharing for secure cloud storage service C Ke, H Anada, J Kawamoto, K Morozov, K Sakurai Proceedings of the 10th International Conference on Ubiquitous Information …, 2016 | 4 | 2016 |
Extracting C&C traffic by session classification using machine learning Y Yamauchi, J Kawamoto, Y Hori, K Sakurai 31st Symposium on Cryptography and Information Security, 2014 | 4 | 2014 |
Analysis of variance of graph-clique mining for scalable proof of work H Anada, T Matsushima, C Su, W Meng, J Kawamoto, S Bag, K Sakurai Information Security and Cryptology: 14th International Conference, Inscrypt …, 2019 | 3 | 2019 |
Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions H Anada, J Kawamoto, C Ke, K Morozov, K Sakurai The Journal of Supercomputing 73 (10), 4275-4301, 2017 | 3 | 2017 |
Privacy-preserving online logistic regression based on homomorphic encryption S Wu, J Kawamoto, H Kikuchi, J Sakuma IEICE Technical Report; IEICE Tech. Rep. 113 (139), 67-74, 2013 | 3 | 2013 |