Publications

129 results

EdgePruner: Poisoned Edge Pruning in Graph Contrastive Learning

Hiroya Kato , Kento Hasegawa, Seira Hidano, Kazuhide Fukushima

IEEE Conference on Secure and Trustworthy Machine Learning (IEEE SaTML 2024)

April 2024

Messages and Incentives to Promote Updating of Software on Smartphones

Ayane Sano, Yukiko Sawaya, Takamasa Isohara, Masakatsu Nishigaki

The 38th International Conference on Advanced Information Networking and Applications (AINA2024)

April 2024

Extension of Resource Authorization Method with SSI in Edge Computing

Ryu Watanabe, Ayumu Kubota, Jun Kurihara(University of Hyogo), Kouichi Sakurai(Kyushu University)

The 38th International Conference on Advanced Information Networking and Applications (AINA2024)

April 2024

Enhancing Smishing Detection in AR Environments: Cross-Device Solutions for Seamless Reality

Akira Kanaoka (Toho University), Takamasa Isohara

The 1st Workshop on Seamless Reality: AR Technologies for Seamless Perception and Cognition between Cyber and Physical Spaces

March 2024

Verification Protocol for Stable Matching from Conditional Disclosure of Secrets

Kittiphop Phalakarn, Toru Nakamura

The 22nd International Conference on Applied Cryptography and Network Security (ACNS 2024)

March 2024

Towards Practical Doubly-Efficient Private Information Retrieval

Hiroki Okada, Rachel Player (University of London), Simon Pohmann (University of London), Christian Weinert (University of London)

Financial Cryptography and Data Security 2024

March 2024

Feasibility of Random Forest with Fully Homomorphic Encryption Applied to Network Data

Shusaku Uemura, Kazuhide Fukushima

The 10th International Conference on Information Systems Security and Privacy (ICISSP 2024)

February 2024

Vulnerability Information Sharing Platform for Securing Hardware Supply Chains

Kento Hasegawa, Katsutoshi Hanahara(KDDI Foundation), Hiroshi Sugisaki, Minoru Kozu, Kazuhide Fukushima, Yosuke Murakami, Shinsaku Kiyomoto

The 10th International Conference on Information Systems Security and Privacy (ICISSP 2024)

February 2024

PenGym: Pentesting Training Framework for Reinforcement Learning Agents

Thanh Nguyen(Japan Advanced Institute of Science and Technology), Zhi Chen(Japan Advanced Institute of Science and Technology), Kento Hasegawa, Kazuhide Fukushima, Razvan Beuran(Japan Advanced Institute of Science and Technology)

The 10th International Conference on Information Systems Security and Privacy (ICISSP 2024)

February 2024

Gradient-Based Clean Label Backdoor Attack to Graph Neural Networks

Ryo Meguro(Tohoku University), Hiroya Kato, Shintaro Narisada, Seira Hidano, Kazuhide Fukushima, Takuo Suganuma(Tohoku University), Masahiro Hiji(Tohoku University)

The 10th International Conference on Information Systems Security and Privacy (ICISSP 2024)

February 2024

Compact Ring Signatures with Post-Quantum Security in Standard Model

Tuong Ngoc Nguyen(University of Wollongong), Willy Susilo(University of Wollongong), Dung Hoang Duong(University of Wollongong), Fuchun Guo(University of Wollongong), Kazuhide Fukushima, Shinsaku Kiyomoto

The 19th International Conference on Information Security and Cryptology (Inscrypt 2023)

December 2023

Logarithmic-Size (Linkable) Ring Signatures From Lattice Isomorphism Problems

Xuan Thanh Khuc(University of Wollongong), Anh The Ta(CSIRO), Willy Susilo(University of Wollongong), Dung Hoang Duong(University of Wollongong), Fuchun Guo(University of Wollongong), Kazuhide Fukushima, Shinsaku Kiyomoto

The 13th International Conference on Security, Privacy, and Applied Cryptographic Engineering 2023 (SPACE 2023)

December 2023

Does the Anchoring Effect Influence Individuals’ Anti-Phishing Behavior?

Yukiko Sawaya, Ayane Sano, Takamasa Isohara, Akira Yamada(Kobe University), Ayako Komatsu(Notre Dame Seishin University)

The 16th International Symposium on Foundations & Practice of Security (FPS2023)

December 2023

Homomorphic Polynomial Evaluation Using Galois Structure and Applications to BFV Bootstrapping

Hiroki Okada, Rachel Player(University of London), Simon Pohmann(University of London)

Asiacrypt 2023

December 2023

Compact Accountable Ring Signatures in the Plain Model

Xuan Thanh Khuc(University of Wollongong), Willy Susilo(University of Wollongong), Dung Hoang Duong(University of Wollongong), Fuchun Guo(University of Wollongong), Kazuhide Fukushima, Shinsaku Kiyomoto

The 19th International Conference on Information Security and Cryptology (Inscrypt 2023)

December 2023

Survey on Recognition of Privacy Risk from Responding on Twitter

Toru Nakamura, Yukiko Sawaya, Takamasa Isohara

The 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2023)

November 2023

Membership Inference Attacks against GNN-based Hardware Trojan Detection

Kento Hasegawa, Kazuki Yamashita(Waseda University), Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto(Waseda University), Nozomu Togawa(Waseda University)

The 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2023)

November 2023

Proposal for Approaches to Updating Software on Android Smartphone

Ayane Sano, Yukiko Sawaya, Takamasa Isohara, Masakatsu Nishigaki(Shizuoka University)

The 18th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA2023)

November 2023

Human Factors Impacting the Security Actions of Help Recipients

Ayane Sano, Yukiko Sawaya, Takamasa Isohara, Masakatsu Nishigaki(Shizuoka University)

The 18th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA2023)

November 2023

GPU Acceleration of High-Precision Homomorphic Computation Utilizing Redundant Representation

Shintaro Narisada, Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Takashi Nishide(University of Tsukuba)

The 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC 2023)

November 2023

A Client-Side Evil-Twin Attack Detection System with Threshold Considering Traffic Load

Tomoyuki Ueda(Shibaura Institute of Technology), Amgad Shaher Saif(KTH Royal Institute of Technology), Sumiko Miyata(Shibaura Institute of Technology), Masataka Nakahara, Ayumu Kubota

13th IEEE International Conference on Consumer Technology (ICCE 2023)

September 2023

An Ultra-High Throughput AES-based Authenticated Encryption Scheme for 6G: Design and Implementation

Ravi Anand(University of Hyogo), Subhadeep Banik(Universita della Svizzera Italiana), Andrea Caforio(Ecole Polytechnique Federale de Lausanne), Kazuhide Fukushima , Takanori Isobe (University of Hyogo), Shisaku Kiyomoto, Fukang Liu (University of Hyogo), Yuto Nakano , Kosei Sakamoto (University of Hyogo), Nobuyuki Takeuchi (University of Hyogo)

28th European Symposium on Research in Computer Security (ESORICS 2023)

September 2023

Effectiveness and Information Quality Perception of an AI Model Card: A Study Among Non-Experts

Vanessa Bracamonte, Sebastian Pape(Goethe University Frankfurt), Sascha Löbner(Goethe University Frankfurt), Frederic Tronnier(Goethe University Frankfurt)

The 20th Annual International Conference on Privacy, Security & Trust (PST2023)

August 2023

Privacy-Preserving Reputation System Against Dishonest Queries

Kittiphop Phalakarn, Toru Nakamura, Takamasa Isohara

The 20th Annual International Conference on Privacy, Security & Trust (PST2023)

August 2023

Systematizing the State of Knowledge in Detecting Privacy Sensitive Information Using Machine Learning

Sascha Löbner(Goethe University Frankfurt), Welderufael B. Tesfay(Goethe University Frankfurt), Vanessa Bracamonte, Toru Nakamura

The 20th Annual International Conference on Privacy, Security & Trust (PST2023)

August 2023

Beyond Mobile Devices: A Cross-Device Solution for Smishing Detection and Prevention

Akira Kanaoka (Toho University), Takamasa Isohara

The Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023)

August 2023

Group Oriented Attribute-Based Encryption Scheme from Lattices with the Employment of Shamir’s Secret Sharing Scheme

Maharage Perera(ATR), Toru Nakamura, Takashi Matsunaka(ATR), Hiroyuki Yokoyama(ATR), Kouichi Sakurai(Kyushu University)

17th International Conference on Network and System Security (NSS 2023)

August 2023

Beyond Mobile Devices: A Cross-Device Solution for Smishing Detection and Prevention

Akira Kanaoka (Toho University), Takamasa Isohara

The 18th Asia Joint Conference on Information Security (AsiaJCIS 2023)

August 2023

User Acceptance Criteria for Privacy Preserving Machine Learning Techniques

Sascha Löbner(Goethe University Frankfurt), Sebastian Pape(Goethe University Frankfurt), Vanessa Bracamonte

The 20th International Workshop on Trust, Privacy and Security in the Digital Society (Trustbus 2023)

August 2023

VoteTRANS: Detecting Adversarial Text without Training by Voting on Hard Labels of Transformations

Hoang-Quoc Nguyen-Son, Seira Hidano, Kazuhide Fukushima, Shinsaku Kiyomoto, Isao Echizen(NII)

The 61st Annual Meeting of the Association for Computational Linguistics (ACL 2023)

July 2023

SoK: Towards CCA secure Fully Homomorphic Encryption

Hiroki Okada, Kazuhide Fukushima

The 20th International Conference on Security and Cryptography (SECRYPT 2023)

July 2023

Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications

Masahito Ishizaka, Kazuhide Fukushima

The 28th Australasian Conference on Information Security and Privacy (ACISP 2023)

July 2023

A Graph Construction Method for Anomalous Traffic Detection with Graph Neural Networks Using Sets of Flow Data

Norihiro Okui, Yusuke Akimoto(ARISE analytics), Ayumu Kubota, Takuya Yoshida(Toyota motor corporation)

The 47th Annual International Computer Software and Applications Conference (COMPSAC 2023)

June 2023

Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence

Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi(The University of Tokyo)

The 21st International Conference on Applied Cryptography and Network Security (ACNS 2023)

June 2023

Factors of Intention to Use a Photo Tool: Comparison between Privacy-enhancing and Non-privacy-enhancing Tools

Vanessa Bracamonte, Sebastian Pape(Goethe University Frankfurt), Sascha Löbner(Goethe University Frankfurt)

38th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2023)

June 2023

Continual Pre-training of Language Models

Zixuan Ke(University of Illinois at Chicago), Yijia Shao(Peking University), Haowei Lin(Peking University), Tatsuya Konishi, Gyuhak Kim(University of Illinois at Chicago), Bing Liu(University of Illinois at Chicago)

2023 International Conference on Learning Representations (ICLR 2023)

May 2023

NetFlick: Adversarial Flickering Attacks on Deep Learning based Video Compression

Jung-Woo Chang(UC San Diego), Nojan Sheybani(UC San Diego), Shehzeen Samarah Hussain(UC San Diego), Mojan Javaheripi(UC San Diego), Seira Hidano, Farinaz Koushanfar(UC San Diego)

2023 International Conference on Learning Representations (ICLR 2023), Machine Learning for IoT: Datasets, Perception, and Understanding Workshop (ML4IoT Workshop)

May 2023

Achieving Private Verification in Multi-stakeholder Environment and Application to Stable Matching

Toru Nakamura, Hiroki Okada, Kazuhide Fukushima, Takamasa Isohara

The 25th International Conference on Enterprise Information System (ICEIS 2023)

April 2023

Application of Generalized Deduplication Techniques in Edge Computing Environments

Ryu Watanabe, Ayumu Kubota, Jun Kurihara(University of Hyogo)

The 37th International Conference on Advanced Information Networking and Applications (AINA-2023)

March 2023

Popularity Preserving Fair Matching

Toru Nakamura, Takamasa Isohara

The 5th International Conference on Emerging Smart Computing & Informatics (ESCI 2023)

March 2023

Machine Learning Based Prediction of Vulnerability Information Subject to a Security Alert

Ryu Watanabe, Takashi Matsunaka, Ayumu Kubota, Jumpei Urakawa(KDDI Digital Security)

The 9th International Conference on Information System Decurity and Privacy (ICISSP 2023)

February 2023

Comparing the Effect of Privacy and Non-Privacy Social Media Photo Tools on Factors of Privacy Concern

Vanessa Bracamonte, Sebastian Pape(Goethe University Frankfurt), Sascha Loebner(Goethe University Frankfurt)

9th International Conference on Information Systems Security and Privacy(ICISSP2023)

February 2023

Automating XSS Vulnerability Testing Using Reinforcement Learning

Kento Hasegawa, Seira Hidano, Kazuhide Fukushima

9th International Conference on Information Systems Security and Privacy (ICISSP 2023)

February 2023

Concrete Quantum Circuits to Prepare Generalized Dicke States on a Quantum Machine

Shintaro Narisada, Shohei Beppu, Kazuhide Fukushima, Shinsaku Kiyomoto

The 9th International Conference on Information System Decurity and Privacy (ICISSP 2023)

February 2023

Revisiting the DFT Test in the NIST SP 800-22 Randomness Test Suite

Hiroki Okada, Kazuhide Fukushima

The 9th International Conference on Information System Decurity and Privacy (ICISSP 2023)

February 2023

Fully Hidden Dynamic Trigger Backdoor Attacks

Shintaro Narisada, Seira Hidano, Kazuhide Fukushima

The 15th International Conference on Agents and Artificial Intelligence (ICAART 2023)

February 2023

RoVISQ: Reduction of Video Service Quality via Adversarial Attacks on Deep Learning-based Video Compression

Jung-Woo Chang (UC San Diego), Mojan Javaheripi (UC San Diego), Seira Hidano, Farinaz Koushanfar (UC San Diego)

Network and Distributed System Security Symposium (NDSS) 2023

February 2023

CheckHARD: Checking Hard Labels for Adversarial Text Detection, Prediction Correction, and Perturbed Word Suggestion

Hoang-Quoc Nguyen-Son, Huy Quang Ung, Seira Hidano, Kazuhide Fukushima, Shinsaku Kiyomoto

The 2022 Conference on Empirical Methods in Natural Language Processing (EMNLP 2022)

December 2022

Anomaly Traffic Detection with Federated Learning toward Network-based Malware Detection in IoT

Takayuki Nishio(Tokyo Institute of Technology), Masataka Nakahara, Norihiro Okui, Ayumu Kubota, Yasuaki Kobayashi, Keizo Sugiyama, Ryoichi Shinkuma (Shibaura Institute of Technology)

IEEE Global Communications Conference 2022 (GLOBECOM 2022)

December 2022

Attribute based Tracing for Securing Group Signatures against Centralized Authorities

Maharage Nisansala Sevwandi Perera(ATR), Toru Nakamura, Takashi Matsunaka(ATR), Hiroyuki Yokoyama(ATR), Kouichi Sakurai(Kyushu University)

The 17th International Conference on Information Security Practice and Experience (ISPEC 2022)

November 2022

Zero-knowledge Range Arguments for Signed Fractional Numbers from Lattices

Priyanka Dutta(University of Wollongong), Dung Hoang Duong(University of Wollongong), Willy Susilo(University of Wollongong), Kazuhide Fukushima, Shinsaku Kiyomoto

The 16th International Conference on Provable and Practical Security (ProvSec 2022)

November 2022

Efficient Unique Ring Signatures From Lattices

Tuong Ngoc Nguyen(University of Wollongong), Anh The Ta(University of Wollongong), Huy Quoc Le(University of Wollongong), Dung Hoang Duong(University of Wollongong), Willy Susilo(University of Wollongong), Fuchun Guo(University of Wollongong), Kazuhide Fukushima, Shinsaku Kiyomoto

The 27th European Symposium on Research in Computer Security (ESORICS 2022)

September 2022

Generating Very Large RNS Bases

Jean-Claude Bajard(Sorbonne Université), Kazuhide Fukushima, Thomas Plantard, Arnaud Sipasseuth

29th IEEE Symposium on Computer Arithmetic ARITH 2022

September 2022

Effective Hardware-Trojan Feature Extraction Against Adversarial Attacks at Gate-Level Netlists

Kazuki Yamashita(Waseda University), Tomohiro Kato(Waseda University), Kento Hasegawa, Seira Hidano, Kazuhide Fukushima, Nozomu Togawa(Waseda University)

The 28th IEEE International Symposium on On-Line Testing and Robust System Design (IOLTS 2022)

September 2022

Analysis of Trust Factors in Children’s Abilities to Use Digital Devices

Yukiko Sawaya, Ayane Sano, Toru Nakamura, Takamasa Isohara

The 2022 ACM Conference on Information Technology for Social Good (GoodIT 2022)

September 2022

Covering Radius and First Minima Bound on Diagonally Dominant Lattices in the l∞-norm

Andrea Lesavourey(IRISA), Kazuhide Fukushima, Thomas Plantard, Arnaud Sipasseuth

Number-Theoretic Methods in Cryptology 2021 (NuT-MiC 2021)

August 2022

Design and Implementation of Symmetric Cryptosystem for 5G/B5G Communication Systems

Kazuhide Fukushima

The 17th Asia Joint Conference on Information Security (AsiaJCIS2022)

August 2022

On recruiting and retaining users for security-sensitive longitudinal measurement panels

Akira Yamada, Kyle Crichton(Carnegie Mellon University), Yukiko Sawaya, Jin-Dong Dong(Carnegie Mellon University), Sarah Pearman(Carnegie Mellon University), Ayumu Kubota, Nicolas Christin,(Carnegie Mellon University)

The 18th Symposium on Usable Privacy and Security (SOUPS 2022)

August 2022

Side-channel Analysis and Countermeasure for Implementation of Lattice-based Signature

Kazuhide Fukushima, Hiroki Okada, Sofiane Takarabt(Secure-IC), Amina Korchi(Secure-IC), Meziane Hamoud(Secure-IC), Khaled Karray(Secure-IC), Youssef Souissy(Secure-IC), Sylvain Guilley(Secure-IC)

The 19th International Conference on Security and Cryptography (SECRYPT 2022)

July 2022

"All apps do this": Comparing Privacy Concerns Towards Privacy Tools and Non-Privacy Tools for Social Media Content

Vanessa Bracamonte, Sebastian Pape(Goethe University Frankfurt), Sascha Loebner(Goethe University Frankfurt)

Privacy Enhancing Technologies Symposium 2022 (PETS 2022)

July 2022

Security Inspection Framework and its Application to Use Cases

Yuto Nakano, Yasuaki Kobayashi, Takao Kojima, Yutaka Miyake, Shinsaku Kiyomoto

The 28th IEEE ICE/ITMC & 31st IAMOT Conference IEEE

June 2022

Identification of an IoT Device Model in the Home Domain using IPFIX Records

Norihiro Okui, Masataka Nakahara, Yutaka Miyake, Ayumu Kubota

2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)

June 2022

Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security

Priyanka Dutta(University of Wollongong), Mei Jiang(University of Wollongong), Dung Hoang Duong(University of Wollongong), Willy Susilo(University of Wollongong), Kazuhide Fukushima, Shinsaku Kiyomoto

The 2022 ACM on Asia Conference on Computer and Communications Security (ASIA CCS 2022)

May 2022

Resource Authorization Methods for Edge Computing

Ryu Watanabe, Ayumu Kubota, Jun Kurihara(University of Hyogo)

The 36th International Conference on Advanced Information Networking and Applications (AINA-2022)

April 2022

Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G

Kosei Sakamoto(University of Hyogo), Fukang Liu(University of Hyogo), Yuto Nakano, Shinsaku Kiyomoto, Takanori Isobe(University of Hyogo)

The 28th International Conference on Fast Software Encryption (FSE 2022)

March 2022

Feature-level Approach for the Evaluation of Text Classification Models

Vanessa Bracamonte, Seira Hidano, Toru Nakamura, Shinsaku Kiyomoto

The 13th International Conference on Information Visualization Theory and Applications (IVAPP2022)

February 2022

Comparing Perception of Disclosure of Different Types of Information Related to Automated Tools

Vanessa Bracamonte, Takamasa Isohara

The 8th International Conference on Information Systems Security and Privacy (ICISSP 2022)

February 2022

Effect of Errors on the Evaluation of Machine Learning Systems

Vanessa Bracamonte, Seira Hidano, Shinsaku Kiyomoto

The 6th International Conference on Human Computer Interaction Theory and Applications (HUCAPP 2022)

February 2022

Differential Privacy under Incalculable Sensitivity

Tomoaki Mimoto(ATR), Masayuki Hashimoto(ATR), Hiroyuki Yokoyama(ATR), Toru Nakamura, Takamasa Isohara, Ryosuke Kojima(Kyoto University), Aki Hasegawa(Kyoto University), Yasushi Okuno(Kyoto University),

The 6th International Conference on Cryptography, Security and Privacy (CSP 2022)

January 2022

Designing Personalized OS Update Message based on Security Behavior Stage Model

Ayane Sano, Yukiko Sawaya, Akira Yamada, Ayumu Kubota, Takamasa Isohara

The 18th International Conference on Privacy, Security and Trust (PST 2021)

December 2021

Countermeasures Against Backdoor Attacks Towards Malware Detectors

Shintaro Narisada, Yuki Matsumoto(Tohoku University), Seira Hidano, Toshihiro Uchibayashi(Kyushu University), Takuo Suganuma(Tohoku University), Masahiro Hiji(Tohoku University), Shinsaku Kiyomoto

The 20th International Conference on Cryptology And Network Security (CANS 2021)

December 2021

Toward Learning Robust Detectors from Imbalanced Datasets Leveraging Weighted Adversarial Training

Kento Hasegawa, Seira Hidano, Shinsaku Kiyomoto, Nozomu Togawa(Waseda University)

The 20th International Conference on Cryptology And Network Security (CANS 2021)

December 2021

Efficient Unique Ring Signature for Blockchain Privacy Protection

Anh The Ta(FPT Software Ltd.), Thanh Xuan Khuc(Institute of Cryptography Science and Technology), Tuong Ngoc Nguyen(University of Wollongong), Huy Quoc Le(University of Wollongong), Dung Hoang Duong(University of Wollongong), Willy Susilo(University of Wollongong), Kazuhide Fukushima, Shinsaku Kiyomoto

The 26th Australasian Conference on Information Security and Privacy (ACISP 2021)

December 2021

Evaluation of the Robustness against Adversarial Examples in Hardware-Trojan Detection

Kazuki Yamashita(Waseda University), Kohei Nozawa, Seira Hidano, Shinsaku Kiyomoto, Nozomu Togawa(Waseda University)

2021 IEEE Asia Pacific Conference on Postgraduate Research in Microelectronics and Electronics (PrimeAsia)

November 2021

SEPP: Similarity Estimation of Predicted Probabilities for Defending and Detecting Adversarial Text

Hoang-Quoc Nguyen-Son, Seira Hidano, Kazuhide Fukushima, Shinsaku Kiyomoto

The 35th Pacific Asia Conference on Language, Information and Computation (PACLIC 2021)

October 2021

Inferring Connected IoT Devices from IPFIX Records in Residential ISP Networks

Arman Pashamokhtari(UNSW), Norihiro Okui, Yutaka Miyake, Masataka Nakahara, Hassan Habibi Gharakheili(UNSW)

2021 IEEE 46th Conference on Local Computer Networks (LCN)

October 2021

Fast GPU Implementation of Dumer’s Algorithm Solving the Syndrome Decoding Problem

Shintaro Narisada, Kazuhide Fukushima, Shinsaku Kiyomoto

2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)

September 2021

Evidence Collection and Preservation System with Virtual Machine Monitoring

Toru Nakamura, Hiroshi Ito(Okayama University), Shinsaku Kiyomoto, Toshihiro Yamauchi(Okayama University)

The 16th International Workshop on Security (IWSEC 2021)

September 2021

Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem

Shusaku Uemura(University of Tokyo), Kazuhide Fukushima, Shinsaku Kiyomoto(University of Tokyo), Momonari Kudo(University of Tokyo), Tsuyoshi Takagi(University of Tokyo)

The 16th International Workshop on Security (IWSEC 2021)

September 2021

A Comparison of GKE Protocols based on SIDH

Hiroki Okada, Shinsaku Kiyomoto, Carlos Cid(University of London)

The 18th International Conference on Security and Cryptography (SECRYPT 2021)

July 2021

OPA2D: One-Pixel Attack, Detection, and Defense in Deep Neural Networks

Hoang-Quoc Nguyen-Son, Tran Phuong Thao(University of Tokyo), Seira Hidano, Vanessa Bracamonte, Shinsaku Kiyomoto, Rie Shigetomi Yamaguchi(University of Tokyo)

The International Joint Conference on Neural Networks (IJCNN 2021)

July 2021

TransMIA: Membership Inference Attacks Using Transfer Shadow Training

Seira Hidano, Takao Murakami(AIST), Yusuke Kawamoto(AIST)

The International Joint Conference on Neural Networks (IJCNN 2021)

July 2021

Machine Translated Text Detection Through Text Similarity with Round-Trip Translation

Hoang-Quoc Nguyen-Son, Tran Thao(The University of Tokyo), Seira Hidano, Ishita Gupta(Indian Institute of Technology Delhi), Shinsaku Kiyomoto

2021 Annual Conference of the North American Chapter of the Association for Computational Linguistics (NAACL)

June 2021

Automatic Security Inspection Framework for Trustworthy Supply Chain

Yuto Nakano, Toru Nakamura(ATR), Yasuaki Kobayashi, Takashi Ozu(ATR), Masahito Ishizaka, Masayuki Hashimoto(ATR), Hiroyuki Yokoyama(ATR), Yutaka Miyake and Shinsaku Kiyomoto

2021 IEEE/ACIS 19th International Conference on Software Engineering Research, Management and Applications (SERA)

June 2021

Generating Residue Number System Bases

Jean-Claude Bajard(Sorbonne Universit´e, CNRS, INRIA), Kazuhide Fukushima, Shinsaku Kiyomoto, Thomas Plantard(University of Wollongong), Arnaud Sipasseuth, Willy Susilo(University of Wollongong)

The 28th IEEE International Symposium on Computer Arithmetic (ARITH 2021)

June 2021

SeBeST: Security Behavior Stage Model and Its Application to OS Update

Ayane Sano, Yukiko Sawaya, Akira Yamada, Ayumu Kubota

The 35th International Conference on Advanced Information Networking and Applications (AINA-2021)

May 2021

Malware Detection for IoT Devices using Automatically Generated White List and Isolation Forest

Masataka Nakahara, Norihiro Okui, Yasuaki Kobayashi, Yutaka Miyake

The 6th International Conference on Internet of Things, Big Data and Security (IoTBDS 2021)

April 2021

Towards Exploring User Perception of a Privacy Sensitive Information Detection Tool

Vanessa Bracamonte, Welderufael B. Tesfay(Goethe University Frankfurt), Shinsaku Kiyomoto

The 7th International Conference on Information Systems Security and Privacy (ICISSP 2021)

February 2021

Phishing Site Detection Using Similarity of Website Structure

Shoma Tanaka, Takashi Matsunaka, Akira Yamada, Avumu Kubota

2021 IEEE Conference on Dependable and Secure Computing (DSC 2021)

January 2021

A Practical Privacy-Preserving Algorithm for Document Data

Tomoaki Mimoto, Shinsaku Kiyomoto, Koji Kitamura(AIST), Atsuko Miyaji(Osaka University)

The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2020)

December 2020

Boosting Homograph Attack Classification Using Ensemble Learning and N-gram Model

Tran Phuong Thao(The University of Tokyo), Hoang-Quoc Nguyen-Son, Rie Shigetomi Yamaguchi(The University of Tokyo), Toshiyuki Nakata(The University of Tokyo)

The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2020)

December 2020

Integerwise Functional Bootstrapping on TFHE

Hiroki Okada, Shinsaku Kiyomoto, Carlos Cid(University of London)

The 23rd Information Security Conference (ISC 2020)

December 2020

Time-Specific Signatures

Masahito Ishizaka, Shinsaku Kiyomoto

The 23rd Information Security Conference (ISC 2020)

December 2020

Stronger Targeted Poisoning Attacks Against Malware Detection

Shintaro Narisada, Shoichiro Sasaki(Tohoku University), Seira Hidano, Toshihiro Uchibayashi(Kyushu University), Takuo Suganuma(Tohoku University), Masahiro Hiji(Tohoku University), Shinsaku Kiyomoto

The 19th International Conference on Cryptology and Network Security (CANS 2020)

December 2020

Enhanced Classification Method for Homograph Attack Detection

Zicong Zhu(The University of Tokyo), Tran Phuong Thao(The University of Tokyo), Hoang-Quoc Nguyen-Son; Rie Shigetomi Yamaguchi(The University of Tokyo), Toshiyuki Nakata(The University of Tokyo)

The 8th International Symposium on Computing and Networking Workshops (CANDARW 2020)

November 2020

Single-Trace Side-Channel Analysis on Polynomial-Based MAC Schemes

Rei Ueno(Tohoku University), Kazuhide Fukushima, Yuto Nakano, Shinsaku Kiyomoto, Naofumi Homma(Tohoku University)

The 11th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2020)

October 2020

Enhancing A New Classification for IDN Homograph Attack Detection

Zicong Zhu(The University of Tokyo). Tran Phuong Thao(The University of Tokyo), Hoang-Quoc Nguyen-Son, Rie Shigetomi Yamaguchi(The University of Tokyo), Toshiyuki Nakata(The University of Tokyo)

The 18th IEEE International Conference on Dependable, Autonomic, & Secure Computing (DASC 2020)

August 2020

Feasibility study of a camera-based PUF in a realistic scenario

Kazuihde Fukushima, Thomas Perianin(Secure-IC K.K), Victor Dyseryn(Secure-IC S.A.S.), Shinsaku Kiyomoto, Sylvain Guilley(Secure-IC S.A.S.), Adrien Facon(PSL Research University)

The 15th International Conference on Availability, Reliability and Security (ARES 2020)

August 2020

A Compact Digital Signature Scheme Based on the Module-LWR Problem

Hiroki Okada, Atsushi Takayasu(NICT), Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi(The University of Tokyo)

The 22nd International Conference Information and Communications Security (ICICS 2020)

August 2020

Exposing Private User Behaviors of Collaborative Filtering via Model Inversion Techniques

Seira Hidano, Takao Murakami (AIST), Shuichi Katsumata (AIST), Shinsaku Kiyomoto, Goichiro Hanaoka (AIST)

The 20th Privacy Enhancing Technologies Symposium (PETS 2020)

July 2020

Consideration on Data Conformance Toward Building Trust in Supply Chain

Yuto Nakano, Toru Nakamura(ATR), Yasuaki Kobayashi, Masahito Ishizaka, Masayuki Hashimoto(ATR), Hiroyuki Yokoyama(ATR), Yutaka Miyake, Shinsaku Kiyomoto

The 29th European Conference on Networks and Communications (EuCNC 2020)

June 2020

Machine Learning based Malware Traffic Detection on IoT Devices using Summarized Packet Data

Masataka Nakahara, Norihiro Okui, Yasuaki Kobayashi, Yutaka Miyake

The 5th International Conference on Internet of Things, Big Data and Security (IoTBDS 2020)

May 2020

Evaluation of Software PUF Based on Gyroscope

Kazuhide Fukushima, Ayumu Yoshimura(Tamagawa University), Shinsaku Kiyomoto, Norikazu Yamasaki(Tamagawa University)

The 15th International Conference on Information Security Practice and Experience (ISPEC 2019)

November 2019

Detecting Malicious Websites by Query Templates

Satomi Kaneko(University of Tsukuba), Akira Yamada, Yukiko Sawaya, Tran Phuong Thao(The University of Tokyo), Ayumu Kubota, Kazumasa Omote(University of Tsukuba)

The 12th International Conference on Information Technology and Communications Security (SecITC 2019)

November 2019

Detecting Machine-Translated Text using Back Translation

Hoang-Quoc Nguyen-Son, Tran Phuong Thao(University of Tokyo), Seira Hidano, Shinsaku Kiyomoto

The 12th International Conference on Natural Language Generation (INLG 2019)

October 2019

Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists

Kohei Nozawa(Waseda University), Kento Hasegawa(Waseda University), Seira Hidano, Shinsaku Kiyomoto, Kazuo Hashimoto(Waseda University), Nozomu Togawa(Waseda University)

The 24th European Symposium on Research in Computer Security (ESORICS 2019) Workshops

September 2019

On Embedding Backdoor in Malware Detectors Using Machine Learning

Shoichiro Sasaki(Tohoku University), Seira Hidano, Toshihiro Uchibayashi(Tohoku University), Takuo Suganuma(Tohoku University), Masahiro Hiji(Tohoku University), Shinsaku Kiyomoto

The 17th International Conference on Privacy, Security and Trust (PST 2019)

August 2019

A Framework for Secure and Trustworthy Data Management in Supply Chain

Shinsaku Kiyomoto, Yuto Nakano, Atsushi Waseda, Toru Nakamura(ATR), Masahito Ishizaka, Yasuaki Kobayashi

The 16th International Conference on Mobile Web and Intelligent Information Systems (MobiWIS 2019)

August 2019

Secret Sharing on Evolving Multi-level Access Structure

Sabyasachi Dutta(Kyushu University), Partha Sarathi Roy, Kazuhide Fukushima,Shinsaku Kiyomoto, Kouichi Sakurai(Kyushu University)

The 20th World Conference on Information Security Applications (WISA 2019)

August 2019

A framework for blockchain-based verification of integrity and authenticity

Anirban Basu, Theo Dimitrakos(Huawei Technologies Dusseldorf GmbH), Yuto Nakano, Shinsaku Kiyomoto

The 13th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2019)

July 2019

A lattice based public key encryption with equality test in standard model

Dung Hoang Duong(University of Wollongong), Kazuhide Fukushima, Shinsaku Kiyomoto, Partha Sarathi Roy, Willy Susilo(University of Wollongong)

The 24th Australasian Conference on Information Security and Privacy (ACISP 2019)

July 2019

User Study of the Effectiveness of a Privacy Policy Summarization Tool

Vanessa Bracamonte, Seira Hidano, Welderufael B. Tesfay(Goethe University Frankfurt), Shinsaku Kiyomoto

The 5th International Conference on Information Systems Security and Privacy (ICISSP 2019 )

February 2019

Evaluation of Side-Channel Key-Recovery Attacks on LoRaWAN End-Device

Kazuhide Fukushima, Damien Marion(Secure-IC S.A.S), Yuto Nakano, Adrien Facon(Secure-IC S.A.S),Shinsaku Kiyomoto, Sylvain Guilley(Secure-IC S.A.S)

The 5th International Conference on Information Systems Security and Privacy (ICISSP 2019)

February 2019

Security Analysis and Efficient Implementation of Code-Based Signature Schemes

Partha Sarathi Roy, Kirill Morozov(University of North Texas), Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi(The University of Tokyo)

The 5th International Conference on Information Systems Security and Privacy (ICISSP 2019)

February 2019

Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters

Jyotirmoy Pramanik(University of Calcutta), Partha Sarathi Roy, Sabyasachi Dutta(Kyushu University), Avishek Adhikari(University of Calcutta), Kouichi Sakurai(Kyushu University)

The 14th International Conference on Information Systems Security (ICISS 2018)

December 2018

On Consensus Protocols in Parallel-Blockchain Environment

Shinsaku Kiyomoto, Kazuhide Fukushima, Mohammad Shahriar Rahman(University of Liberal Arts Bangladesh), Anirban Basu(University of Sussex)

The 13th International Conference for Internet Technology and Secured Transactions (ICITST 2018)

December 2018

Linear Depth Integer-Wise Homomorphic Division

Hiroki Okada, Carlos Cid(Royal Holloway, University of London), Seira Hidano, Shinsaku Kiyomoto

The 12th IFIP International Conference on Information Security Theory and Practice (WISTP 2018)

December 2018

On the Complexity of the LWR-Solving BKW Algorithm

Hiroki Okada, Atsushi Takayasu(The The University of Tokyo), Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi(The University of Tokyo)

The 21st International Conference on Information Security and Cryptology (ICISC 2018)

November 2018

Vietnamese Paraphrase Identification Using Matching Duplicate Phrases and Similar Words

Hoang-Quoc Nguyen-Son, Nam-Phong Tran(VNUHCM-US), Ngoc-Vien Pham(VNUHCM-US), Minh-Triet Tran(VNUHCM-US), Isao Echizen(NII)

The 5th International Conference on Future Data and Security Engineering (FDSE 2018)

November 2018

Predicting Impending Exposure to Malicious Content from User Behavior

Mahmood Sharif(Carnegie Mellon University), Jumpei Urakawa, Nicolas Christin(Carnegie Mellon University), Ayumu Kubota, Akira Yamada

2018 ACM SIGSAC Conference on Computer and Communications Security (CCS)

October 2018

Hierarchical Secret Sharing Schemes Secure against Rushing Adversary: Cheater Identification and Robustness

Partha Sarathi Roy, Sabyasachi Dutta(Indian Statistical Institute), Kirill Morozov(University of North Texas), Avishek Adhikari(University of Calcutta), Kazuhide Fukushima, Shinsaku Kiyomoto, Kouichi Sakurai(Kyushu University)

The 14th International Conference on Information Security Practice and Experience (ISPEC 2018)

September 2018

The Possibility of Matrix Decomposition as Anonymization and Evaluation for Time-sequence Data

Tomoaki Mimoto, Shinsaku Kiyomoto, Seira Hidano, Anirban Basu, Atsuko Miyaji(Osaka University)

The16th Annual Conference on Privacy, Security and Trust (PST 2018)

August 2018

Fair-Trading Protocol for Anonymised Datasets-Requirements and Solution

Shinsaku Kiyomoto, Kazuhide Fukushima

The 4th International Conference on Information Management (ICIM 2018)

May 2018

Active Attack against Oblivious RAM

Yuto Nakano, Seira Hidano, Shinsaku Kiyomoto, Kouichi Sakurai

The 32nd IEEE International Conference on Advanced Information Networking and Applications (IEEE AINA-2018)

May 2018

BlockStore: A Secure Decentralized Storage Framework On Blockchain

Sushmita Ruj(Indian Statistical Institute), Mohammad Shahriar Rahman(University of Liberal Arts), Anirban Basu(Indian Statistical Institute), Shinsaku Kiyomoto

The 32nd IEEE International Conference on Advanced Information Networking and Applications (IEEE AINA-2018)

May 2018

I Read but Don’t Agree: Privacy Policy Benchmarking usingMachine Learning and the EU GDPR

Welderufael Berhane Tesfay(Goethe University Frankfurt), Peter Hofmann(Goethe University Frankfurt), Toru Nakamura, Shinsaku Kiyomoto, Jetzabel Serna(Goethe University Frankfurt)

The Web Conference 2018 (WWW 2018)

April 2018

PrivacyGuide: Towards an Implementation of the EU GDPR on Internet Privacy Policy Evaluation

Welderufael Berhane Tesfay(Goethe University Frankfurt), Peter Hofmann(Goethe University Frankfurt), Toru Nakamura, Shinsaku Kiyomoto, Jetzabel Serna(Goethe University Frankfurt)

The 4th ACM International Workshop on Security and Privacy Analytics (IWSPA 2018)

March 2018

An Evaluation Framework for Fastest Oblivious RAM

Seira Hidano, Yuto Nakano, Shinsaku Kiyomoto

The 3rd International Conference on Internet of Things, Big Data and Security (IoTBDS 2018)

March 2018

Challenges in Classifying Privacy Policies by Machine Learning with Word-based Features

Keishiro Fukushima(Kyushu University), Toru Nakamura, Daisuke Ikeda(Kyushu University), Shinsaku Kiyomoto

The 2nd International Conference on Cryptography, Security and Privacy (ICCSP 2018)

March 2018