Get my own profile
Public access
View all3 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Ryutaroh MatsumotoDepartment of Information and Communication Engineering, Institute of Science Tokyo, JapanVerified email at ict.e.titech.ac.jp
Ersin UzunGlobal Cybersecurity Institute, Rochester Institute of TechnologyVerified email at rit.edu
Christopher A. WoodRIT, UCI, Cloudflare, AppleVerified email at heapingbits.net
Kazuaki UedaKDDI Research, Inc.Verified email at kddi-research.jp
Carlos CidSimula UiB and Okinawa Institute of Science and TechnologyVerified email at simula.no
Anirban BasuHonorary Research Fellow (University of Sussex); Adjunct Professor (OntarioTech University); HitachiVerified email at sussex.ac.uk
J.J. Garcia-Luna-AcevesProfessor & CERC, University of Toronto; Distinguished Professor Emeritus, UC Santa CruzVerified email at soe.ucsc.edu
Hasegawa ToruOsaka UniversityVerified email at ist.osaka-u.ac.jp
Takanori IsobeUniversity of HyogoVerified email at ai.u-hyogo.ac.jp
K. K. RamakrishnanDistinguished Professor of Computer Science and Engineering, University of California, RiversideVerified email at cs.ucr.edu
Yuki KoizumiOsaka UniversityVerified email at ist.osaka-u.ac.jp
Junji TakemasaOsaka UniversityVerified email at ist.osaka-u.ac.jp
Timothy WoodProfessor, The George Washington UniversityVerified email at gwu.edu
Kalika SuksomboonNECTEC, Thailand