Publications
143 results
RAG Certainty: Quantifying the Certainty of Context-Based Responses by LLMs
Kento Hasegawa, Seira Hidano, Kazuhide Fukushima
The 23rd International Conference on Machine Learning and Applications (ICMLA 2024)
December 2024
Solving McEliece-1409 in One Day—Cryptanalysis with the Improved BJMM Algorithm
Shintaro Narisada, Shusaku Uemura, Hiroki Okada, Hiroki Furue, Yusuke Aikawa, Kazuhide Fukushima
The 27th International Conference (ISC 2024)
October 2024
Time-Memory Trade-off Algorithms for Homomorphically Evaluating Look-up Table in TFHE
Shintaro Narisada, Hiroki Okada, Kazuhide Fukushima, Takashi Nishide(University of Tsukuba)
The 12th Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC '24:)
October 2024
Unsupervised Contextual Anomalous Communication Detection Using VQ Tokenization with Flow Data
Norihiro Okui , Shotaro Fukushima (ARISE analytics inc.), Ayumu Kubota, Takuya Yoshida (Toyota Motor Corporation)
The 25th World Conference on Information Security Applications (WISA 2024)
August 2024
A High Coverage Cybersecurity Scale Predictive of User Behavior
Yukiko Sawaya, Sarah Lu(MIT), Takamasa Isohara, Mahmood Sharif(Tel Aviv University)
The 33rd USENIX Secutity Sumposium
August 2024
A Fault-Tolerant Content Moderation Mechanism for Secure Messaging Systems
Tuong Ngoc Nguyen(University of Wollongong), Willy Susilo(University of Wollongong), Dung Hoang Duong
The 29th Australasian Conference on Information Security and Privacy (ACISP 2024)
July 2024
Faster Verifications and Smaller Signatures: Trade-Offs for ALTEQ Using Rejections
Arnaud Sipasseuth
The 29th Australasian Conference on Information Security and Privacy (ACISP 2024)
July 2024
Threshold Ring Signatures with Accountability
Xuan Thanh Khuc(University of Wollongong), Willy Susilo(University of Wollongong), Dung Hoang Duong(University of Wollongong), Fuchun Guo(University of Wollongong), Kazuhide Fukushima, Shinsaku Kiyomoto
The 29th Australasian Conference on Information Security and Privacy (ACISP 2024)
July 2024
Differential Distinguishing Attacks on SNOW-V, SNOW-Vi and KCipher-2
Rikuto Kurahara(University of Hyogo), Kosei Sakamoto(Mitsubishi Electric Corporation), Yuto Nakano, and Takanori Isobe(University of Hyogo)
The 29th Australasian Conference on Information Security and Privacy (ACISP 2024)
July 2024
Linkage Between CVE and ATT&CK with PublicInformation
Tomoaki Mimoto, Yuta Gempei1, Kentaro Kita1Takamasa Isohara, Shinsaku Kiyomoto, Toshiaki Tanaka(University of Hyogo)
The 21st International Conference on Security and Cryptography (SECRYPT 2024)
July 2024
Perception of Privacy Tools for Social Media: A Qualitative Analysis Among Japanese
Vanessa Bracamonte, Yohko Orito(Ehime University), Yasunori Fukuta(Meiji University), Kiyoshi Murata(Meiji University), Takamasa Isohara
The 21st International Conference on Security and Cryptography (SECRYPT 2024)
July 2024
signBEER: Decentralized Optimization with Improved Communication by Signs
Le Trieu Phong(NICT), Tran Thi Phuong(NICT), Kazuhide Fukushima
The 13th Conference on Information Technology and Its Applications (CITA 2024)
July 2024
Survey and Experimentation to Compare IoT Device Model Identification Methods
Norihiro Okui, Masataka Nakahara, Ayumu Kubota
IEEE 25th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2024)
June 2024
AutoRed: Automating Red Team Assessment via Strategic Thinking Using Reinforcement Learning
Kento Hasegawa, Seira Hidano, Kazuhide Fukushima
14th ACM Conference on Data and Application Security and Privacy
June 2024
EdgePruner: Poisoned Edge Pruning in Graph Contrastive Learning
Hiroya Kato , Kento Hasegawa, Seira Hidano, Kazuhide Fukushima
IEEE Conference on Secure and Trustworthy Machine Learning (IEEE SaTML 2024)
April 2024
Messages and Incentives to Promote Updating of Software on Smartphones
Ayane Sano, Yukiko Sawaya, Takamasa Isohara, Masakatsu Nishigaki
The 38th International Conference on Advanced Information Networking and Applications (AINA2024)
April 2024
Extension of Resource Authorization Method with SSI in Edge Computing
Ryu Watanabe, Ayumu Kubota, Jun Kurihara(University of Hyogo), Kouichi Sakurai(Kyushu University)
The 38th International Conference on Advanced Information Networking and Applications (AINA2024)
April 2024
Enhancing Smishing Detection in AR Environments: Cross-Device Solutions for Seamless Reality
Akira Kanaoka (Toho University), Takamasa Isohara
The 1st Workshop on Seamless Reality: AR Technologies for Seamless Perception and Cognition between Cyber and Physical Spaces
March 2024
Verification Protocol for Stable Matching from Conditional Disclosure of Secrets
Kittiphop Phalakarn, Toru Nakamura
The 22nd International Conference on Applied Cryptography and Network Security (ACNS 2024)
March 2024
Towards Practical Doubly-Efficient Private Information Retrieval
Hiroki Okada, Rachel Player (University of London), Simon Pohmann (University of London), Christian Weinert (University of London)
Financial Cryptography and Data Security 2024
March 2024
Feasibility of Random Forest with Fully Homomorphic Encryption Applied to Network Data
Shusaku Uemura, Kazuhide Fukushima
The 10th International Conference on Information Systems Security and Privacy (ICISSP 2024)
February 2024
Vulnerability Information Sharing Platform for Securing Hardware Supply Chains
Kento Hasegawa, Katsutoshi Hanahara(KDDI Foundation), Hiroshi Sugisaki, Minoru Kozu, Kazuhide Fukushima, Yosuke Murakami, Shinsaku Kiyomoto
The 10th International Conference on Information Systems Security and Privacy (ICISSP 2024)
February 2024
PenGym: Pentesting Training Framework for Reinforcement Learning Agents
Thanh Nguyen(Japan Advanced Institute of Science and Technology), Zhi Chen(Japan Advanced Institute of Science and Technology), Kento Hasegawa, Kazuhide Fukushima, Razvan Beuran(Japan Advanced Institute of Science and Technology)
The 10th International Conference on Information Systems Security and Privacy (ICISSP 2024)
February 2024
Gradient-Based Clean Label Backdoor Attack to Graph Neural Networks
Ryo Meguro(Tohoku University), Hiroya Kato, Shintaro Narisada, Seira Hidano, Kazuhide Fukushima, Takuo Suganuma(Tohoku University), Masahiro Hiji(Tohoku University)
The 10th International Conference on Information Systems Security and Privacy (ICISSP 2024)
February 2024
Compact Ring Signatures with Post-Quantum Security in Standard Model
Tuong Ngoc Nguyen(University of Wollongong), Willy Susilo(University of Wollongong), Dung Hoang Duong(University of Wollongong), Fuchun Guo(University of Wollongong), Kazuhide Fukushima, Shinsaku Kiyomoto
The 19th International Conference on Information Security and Cryptology (Inscrypt 2023)
December 2023
Logarithmic-Size (Linkable) Ring Signatures From Lattice Isomorphism Problems
Xuan Thanh Khuc(University of Wollongong), Anh The Ta(CSIRO), Willy Susilo(University of Wollongong), Dung Hoang Duong(University of Wollongong), Fuchun Guo(University of Wollongong), Kazuhide Fukushima, Shinsaku Kiyomoto
The 13th International Conference on Security, Privacy, and Applied Cryptographic Engineering 2023 (SPACE 2023)
December 2023
Does the Anchoring Effect Influence Individuals’ Anti-Phishing Behavior?
Yukiko Sawaya, Ayane Sano, Takamasa Isohara, Akira Yamada(Kobe University), Ayako Komatsu(Notre Dame Seishin University)
The 16th International Symposium on Foundations & Practice of Security (FPS2023)
December 2023
Homomorphic Polynomial Evaluation Using Galois Structure and Applications to BFV Bootstrapping
Hiroki Okada, Rachel Player(University of London), Simon Pohmann(University of London)
Asiacrypt 2023
December 2023
Compact Accountable Ring Signatures in the Plain Model
Xuan Thanh Khuc(University of Wollongong), Willy Susilo(University of Wollongong), Dung Hoang Duong(University of Wollongong), Fuchun Guo(University of Wollongong), Kazuhide Fukushima, Shinsaku Kiyomoto
The 19th International Conference on Information Security and Cryptology (Inscrypt 2023)
December 2023
Survey on Recognition of Privacy Risk from Responding on Twitter
Toru Nakamura, Yukiko Sawaya, Takamasa Isohara
The 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2023)
November 2023
Membership Inference Attacks against GNN-based Hardware Trojan Detection
Kento Hasegawa, Kazuki Yamashita(Waseda University), Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto(Waseda University), Nozomu Togawa(Waseda University)
The 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2023)
November 2023
Proposal for Approaches to Updating Software on Android Smartphone
Ayane Sano, Yukiko Sawaya, Takamasa Isohara, Masakatsu Nishigaki(Shizuoka University)
The 18th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA2023)
November 2023
Human Factors Impacting the Security Actions of Help Recipients
Ayane Sano, Yukiko Sawaya, Takamasa Isohara, Masakatsu Nishigaki(Shizuoka University)
The 18th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA2023)
November 2023
GPU Acceleration of High-Precision Homomorphic Computation Utilizing Redundant Representation
Shintaro Narisada, Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Takashi Nishide(University of Tsukuba)
The 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC 2023)
November 2023
A Client-Side Evil-Twin Attack Detection System with Threshold Considering Traffic Load
Tomoyuki Ueda(Shibaura Institute of Technology), Amgad Shaher Saif(KTH Royal Institute of Technology), Sumiko Miyata(Shibaura Institute of Technology), Masataka Nakahara, Ayumu Kubota
13th IEEE International Conference on Consumer Technology (ICCE 2023)
September 2023
An Ultra-High Throughput AES-based Authenticated Encryption Scheme for 6G: Design and Implementation
Ravi Anand(University of Hyogo), Subhadeep Banik(Universita della Svizzera Italiana), Andrea Caforio(Ecole Polytechnique Federale de Lausanne), Kazuhide Fukushima , Takanori Isobe (University of Hyogo), Shisaku Kiyomoto, Fukang Liu (University of Hyogo), Yuto Nakano , Kosei Sakamoto (University of Hyogo), Nobuyuki Takeuchi (University of Hyogo)
28th European Symposium on Research in Computer Security (ESORICS 2023)
September 2023
Effectiveness and Information Quality Perception of an AI Model Card: A Study Among Non-Experts
Vanessa Bracamonte, Sebastian Pape(Goethe University Frankfurt), Sascha Löbner(Goethe University Frankfurt), Frederic Tronnier(Goethe University Frankfurt)
The 20th Annual International Conference on Privacy, Security & Trust (PST2023)
August 2023
Privacy-Preserving Reputation System Against Dishonest Queries
Kittiphop Phalakarn, Toru Nakamura, Takamasa Isohara
The 20th Annual International Conference on Privacy, Security & Trust (PST2023)
August 2023
Sascha Löbner(Goethe University Frankfurt), Welderufael B. Tesfay(Goethe University Frankfurt), Vanessa Bracamonte, Toru Nakamura
The 20th Annual International Conference on Privacy, Security & Trust (PST2023)
August 2023
Beyond Mobile Devices: A Cross-Device Solution for Smishing Detection and Prevention
Akira Kanaoka (Toho University), Takamasa Isohara
The Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023)
August 2023
Maharage Perera(ATR), Toru Nakamura, Takashi Matsunaka(ATR), Hiroyuki Yokoyama(ATR), Kouichi Sakurai(Kyushu University)
17th International Conference on Network and System Security (NSS 2023)
August 2023
Beyond Mobile Devices: A Cross-Device Solution for Smishing Detection and Prevention
Akira Kanaoka (Toho University), Takamasa Isohara
The 18th Asia Joint Conference on Information Security (AsiaJCIS 2023)
August 2023
User Acceptance Criteria for Privacy Preserving Machine Learning Techniques
Sascha Löbner(Goethe University Frankfurt), Sebastian Pape(Goethe University Frankfurt), Vanessa Bracamonte
The 20th International Workshop on Trust, Privacy and Security in the Digital Society (Trustbus 2023)
August 2023
VoteTRANS: Detecting Adversarial Text without Training by Voting on Hard Labels of Transformations
Hoang-Quoc Nguyen-Son, Seira Hidano, Kazuhide Fukushima, Shinsaku Kiyomoto, Isao Echizen(NII)
The 61st Annual Meeting of the Association for Computational Linguistics (ACL 2023)
July 2023
SoK: Towards CCA secure Fully Homomorphic Encryption
Hiroki Okada, Kazuhide Fukushima
The 20th International Conference on Security and Cryptography (SECRYPT 2023)
July 2023
Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications
Masahito Ishizaka, Kazuhide Fukushima
The 28th Australasian Conference on Information Security and Privacy (ACISP 2023)
July 2023
Norihiro Okui, Yusuke Akimoto(ARISE analytics), Ayumu Kubota, Takuya Yoshida(Toyota motor corporation)
The 47th Annual International Computer Software and Applications Conference (COMPSAC 2023)
June 2023
Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence
Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi(The University of Tokyo)
The 21st International Conference on Applied Cryptography and Network Security (ACNS 2023)
June 2023
Vanessa Bracamonte, Sebastian Pape(Goethe University Frankfurt), Sascha Löbner(Goethe University Frankfurt)
38th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2023)
June 2023
Continual Pre-training of Language Models
Zixuan Ke(University of Illinois at Chicago), Yijia Shao(Peking University), Haowei Lin(Peking University), Tatsuya Konishi, Gyuhak Kim(University of Illinois at Chicago), Bing Liu(University of Illinois at Chicago)
2023 International Conference on Learning Representations (ICLR 2023)
May 2023
NetFlick: Adversarial Flickering Attacks on Deep Learning based Video Compression
Jung-Woo Chang(UC San Diego), Nojan Sheybani(UC San Diego), Shehzeen Samarah Hussain(UC San Diego), Mojan Javaheripi(UC San Diego), Seira Hidano, Farinaz Koushanfar(UC San Diego)
2023 International Conference on Learning Representations (ICLR 2023), Machine Learning for IoT: Datasets, Perception, and Understanding Workshop (ML4IoT Workshop)
May 2023
Achieving Private Verification in Multi-stakeholder Environment and Application to Stable Matching
Toru Nakamura, Hiroki Okada, Kazuhide Fukushima, Takamasa Isohara
The 25th International Conference on Enterprise Information System (ICEIS 2023)
April 2023
Application of Generalized Deduplication Techniques in Edge Computing Environments
Ryu Watanabe, Ayumu Kubota, Jun Kurihara(University of Hyogo)
The 37th International Conference on Advanced Information Networking and Applications (AINA-2023)
March 2023
Popularity Preserving Fair Matching
Toru Nakamura, Takamasa Isohara
The 5th International Conference on Emerging Smart Computing & Informatics (ESCI 2023)
March 2023
Machine Learning Based Prediction of Vulnerability Information Subject to a Security Alert
Ryu Watanabe, Takashi Matsunaka, Ayumu Kubota, Jumpei Urakawa(KDDI Digital Security)
The 9th International Conference on Information System Decurity and Privacy (ICISSP 2023)
February 2023
Vanessa Bracamonte, Sebastian Pape(Goethe University Frankfurt), Sascha Loebner(Goethe University Frankfurt)
9th International Conference on Information Systems Security and Privacy(ICISSP2023)
February 2023
Automating XSS Vulnerability Testing Using Reinforcement Learning
Kento Hasegawa, Seira Hidano, Kazuhide Fukushima
9th International Conference on Information Systems Security and Privacy (ICISSP 2023)
February 2023
Concrete Quantum Circuits to Prepare Generalized Dicke States on a Quantum Machine
Shintaro Narisada, Shohei Beppu, Kazuhide Fukushima, Shinsaku Kiyomoto
The 9th International Conference on Information System Decurity and Privacy (ICISSP 2023)
February 2023
Revisiting the DFT Test in the NIST SP 800-22 Randomness Test Suite
Hiroki Okada, Kazuhide Fukushima
The 9th International Conference on Information System Decurity and Privacy (ICISSP 2023)
February 2023
Fully Hidden Dynamic Trigger Backdoor Attacks
Shintaro Narisada, Seira Hidano, Kazuhide Fukushima
The 15th International Conference on Agents and Artificial Intelligence (ICAART 2023)
February 2023
Jung-Woo Chang (UC San Diego), Mojan Javaheripi (UC San Diego), Seira Hidano, Farinaz Koushanfar (UC San Diego)
Network and Distributed System Security Symposium (NDSS) 2023
February 2023
Hoang-Quoc Nguyen-Son, Huy Quang Ung, Seira Hidano, Kazuhide Fukushima, Shinsaku Kiyomoto
The 2022 Conference on Empirical Methods in Natural Language Processing (EMNLP 2022)
December 2022
Anomaly Traffic Detection with Federated Learning toward Network-based Malware Detection in IoT
Takayuki Nishio(Tokyo Institute of Technology), Masataka Nakahara, Norihiro Okui, Ayumu Kubota, Yasuaki Kobayashi, Keizo Sugiyama, Ryoichi Shinkuma (Shibaura Institute of Technology)
IEEE Global Communications Conference 2022 (GLOBECOM 2022)
December 2022
Attribute based Tracing for Securing Group Signatures against Centralized Authorities
Maharage Nisansala Sevwandi Perera(ATR), Toru Nakamura, Takashi Matsunaka(ATR), Hiroyuki Yokoyama(ATR), Kouichi Sakurai(Kyushu University)
The 17th International Conference on Information Security Practice and Experience (ISPEC 2022)
November 2022
Zero-knowledge Range Arguments for Signed Fractional Numbers from Lattices
Priyanka Dutta(University of Wollongong), Dung Hoang Duong(University of Wollongong), Willy Susilo(University of Wollongong), Kazuhide Fukushima, Shinsaku Kiyomoto
The 16th International Conference on Provable and Practical Security (ProvSec 2022)
November 2022
Efficient Unique Ring Signatures From Lattices
Tuong Ngoc Nguyen(University of Wollongong), Anh The Ta(University of Wollongong), Huy Quoc Le(University of Wollongong), Dung Hoang Duong(University of Wollongong), Willy Susilo(University of Wollongong), Fuchun Guo(University of Wollongong), Kazuhide Fukushima, Shinsaku Kiyomoto
The 27th European Symposium on Research in Computer Security (ESORICS 2022)
September 2022
Generating Very Large RNS Bases
Jean-Claude Bajard(Sorbonne Université), Kazuhide Fukushima, Thomas Plantard, Arnaud Sipasseuth
29th IEEE Symposium on Computer Arithmetic ARITH 2022
September 2022
Effective Hardware-Trojan Feature Extraction Against Adversarial Attacks at Gate-Level Netlists
Kazuki Yamashita(Waseda University), Tomohiro Kato(Waseda University), Kento Hasegawa, Seira Hidano, Kazuhide Fukushima, Nozomu Togawa(Waseda University)
The 28th IEEE International Symposium on On-Line Testing and Robust System Design (IOLTS 2022)
September 2022
Analysis of Trust Factors in Children’s Abilities to Use Digital Devices
Yukiko Sawaya, Ayane Sano, Toru Nakamura, Takamasa Isohara
The 2022 ACM Conference on Information Technology for Social Good (GoodIT 2022)
September 2022
Covering Radius and First Minima Bound on Diagonally Dominant Lattices in the l∞-norm
Andrea Lesavourey(IRISA), Kazuhide Fukushima, Thomas Plantard, Arnaud Sipasseuth
Number-Theoretic Methods in Cryptology 2021 (NuT-MiC 2021)
August 2022
Design and Implementation of Symmetric Cryptosystem for 5G/B5G Communication Systems
Kazuhide Fukushima
The 17th Asia Joint Conference on Information Security (AsiaJCIS2022)
August 2022
On recruiting and retaining users for security-sensitive longitudinal measurement panels
Akira Yamada, Kyle Crichton(Carnegie Mellon University), Yukiko Sawaya, Jin-Dong Dong(Carnegie Mellon University), Sarah Pearman(Carnegie Mellon University), Ayumu Kubota, Nicolas Christin,(Carnegie Mellon University)
The 18th Symposium on Usable Privacy and Security (SOUPS 2022)
August 2022
Side-channel Analysis and Countermeasure for Implementation of Lattice-based Signature
Kazuhide Fukushima, Hiroki Okada, Sofiane Takarabt(Secure-IC), Amina Korchi(Secure-IC), Meziane Hamoud(Secure-IC), Khaled Karray(Secure-IC), Youssef Souissy(Secure-IC), Sylvain Guilley(Secure-IC)
The 19th International Conference on Security and Cryptography (SECRYPT 2022)
July 2022
Vanessa Bracamonte, Sebastian Pape(Goethe University Frankfurt), Sascha Loebner(Goethe University Frankfurt)
Privacy Enhancing Technologies Symposium 2022 (PETS 2022)
July 2022
Security Inspection Framework and its Application to Use Cases
Yuto Nakano, Yasuaki Kobayashi, Takao Kojima, Yutaka Miyake, Shinsaku Kiyomoto
The 28th IEEE ICE/ITMC & 31st IAMOT Conference IEEE
June 2022
Identification of an IoT Device Model in the Home Domain using IPFIX Records
Norihiro Okui, Masataka Nakahara, Yutaka Miyake, Ayumu Kubota
2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)
June 2022
Priyanka Dutta(University of Wollongong), Mei Jiang(University of Wollongong), Dung Hoang Duong(University of Wollongong), Willy Susilo(University of Wollongong), Kazuhide Fukushima, Shinsaku Kiyomoto
The 2022 ACM on Asia Conference on Computer and Communications Security (ASIA CCS 2022)
May 2022
Resource Authorization Methods for Edge Computing
Ryu Watanabe, Ayumu Kubota, Jun Kurihara(University of Hyogo)
The 36th International Conference on Advanced Information Networking and Applications (AINA-2022)
April 2022
Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G
Kosei Sakamoto(University of Hyogo), Fukang Liu(University of Hyogo), Yuto Nakano, Shinsaku Kiyomoto, Takanori Isobe(University of Hyogo)
The 28th International Conference on Fast Software Encryption (FSE 2022)
March 2022
Feature-level Approach for the Evaluation of Text Classification Models
Vanessa Bracamonte, Seira Hidano, Toru Nakamura, Shinsaku Kiyomoto
The 13th International Conference on Information Visualization Theory and Applications (IVAPP2022)
February 2022
Comparing Perception of Disclosure of Different Types of Information Related to Automated Tools
Vanessa Bracamonte, Takamasa Isohara
The 8th International Conference on Information Systems Security and Privacy (ICISSP 2022)
February 2022
Effect of Errors on the Evaluation of Machine Learning Systems
Vanessa Bracamonte, Seira Hidano, Shinsaku Kiyomoto
The 6th International Conference on Human Computer Interaction Theory and Applications (HUCAPP 2022)
February 2022
Differential Privacy under Incalculable Sensitivity
Tomoaki Mimoto(ATR), Masayuki Hashimoto(ATR), Hiroyuki Yokoyama(ATR), Toru Nakamura, Takamasa Isohara, Ryosuke Kojima(Kyoto University), Aki Hasegawa(Kyoto University), Yasushi Okuno(Kyoto University),
The 6th International Conference on Cryptography, Security and Privacy (CSP 2022)
January 2022
Designing Personalized OS Update Message based on Security Behavior Stage Model
Ayane Sano, Yukiko Sawaya, Akira Yamada, Ayumu Kubota, Takamasa Isohara
The 18th International Conference on Privacy, Security and Trust (PST 2021)
December 2021
Countermeasures Against Backdoor Attacks Towards Malware Detectors
Shintaro Narisada, Yuki Matsumoto(Tohoku University), Seira Hidano, Toshihiro Uchibayashi(Kyushu University), Takuo Suganuma(Tohoku University), Masahiro Hiji(Tohoku University), Shinsaku Kiyomoto
The 20th International Conference on Cryptology And Network Security (CANS 2021)
December 2021
Toward Learning Robust Detectors from Imbalanced Datasets Leveraging Weighted Adversarial Training
Kento Hasegawa, Seira Hidano, Shinsaku Kiyomoto, Nozomu Togawa(Waseda University)
The 20th International Conference on Cryptology And Network Security (CANS 2021)
December 2021
Efficient Unique Ring Signature for Blockchain Privacy Protection
Anh The Ta(FPT Software Ltd.), Thanh Xuan Khuc(Institute of Cryptography Science and Technology), Tuong Ngoc Nguyen(University of Wollongong), Huy Quoc Le(University of Wollongong), Dung Hoang Duong(University of Wollongong), Willy Susilo(University of Wollongong), Kazuhide Fukushima, Shinsaku Kiyomoto
The 26th Australasian Conference on Information Security and Privacy (ACISP 2021)
December 2021
Evaluation of the Robustness against Adversarial Examples in Hardware-Trojan Detection
Kazuki Yamashita(Waseda University), Kohei Nozawa, Seira Hidano, Shinsaku Kiyomoto, Nozomu Togawa(Waseda University)
2021 IEEE Asia Pacific Conference on Postgraduate Research in Microelectronics and Electronics (PrimeAsia)
November 2021
SEPP: Similarity Estimation of Predicted Probabilities for Defending and Detecting Adversarial Text
Hoang-Quoc Nguyen-Son, Seira Hidano, Kazuhide Fukushima, Shinsaku Kiyomoto
The 35th Pacific Asia Conference on Language, Information and Computation (PACLIC 2021)
October 2021
Inferring Connected IoT Devices from IPFIX Records in Residential ISP Networks
Arman Pashamokhtari(UNSW), Norihiro Okui, Yutaka Miyake, Masataka Nakahara, Hassan Habibi Gharakheili(UNSW)
2021 IEEE 46th Conference on Local Computer Networks (LCN)
October 2021
Fast GPU Implementation of Dumer’s Algorithm Solving the Syndrome Decoding Problem
Shintaro Narisada, Kazuhide Fukushima, Shinsaku Kiyomoto
2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)
September 2021
Evidence Collection and Preservation System with Virtual Machine Monitoring
Toru Nakamura, Hiroshi Ito(Okayama University), Shinsaku Kiyomoto, Toshihiro Yamauchi(Okayama University)
The 16th International Workshop on Security (IWSEC 2021)
September 2021
Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem
Shusaku Uemura(University of Tokyo), Kazuhide Fukushima, Shinsaku Kiyomoto(University of Tokyo), Momonari Kudo(University of Tokyo), Tsuyoshi Takagi(University of Tokyo)
The 16th International Workshop on Security (IWSEC 2021)
September 2021
A Comparison of GKE Protocols based on SIDH
Hiroki Okada, Shinsaku Kiyomoto, Carlos Cid(University of London)
The 18th International Conference on Security and Cryptography (SECRYPT 2021)
July 2021
OPA2D: One-Pixel Attack, Detection, and Defense in Deep Neural Networks
Hoang-Quoc Nguyen-Son, Tran Phuong Thao(University of Tokyo), Seira Hidano, Vanessa Bracamonte, Shinsaku Kiyomoto, Rie Shigetomi Yamaguchi(University of Tokyo)
The International Joint Conference on Neural Networks (IJCNN 2021)
July 2021
TransMIA: Membership Inference Attacks Using Transfer Shadow Training
Seira Hidano, Takao Murakami(AIST), Yusuke Kawamoto(AIST)
The International Joint Conference on Neural Networks (IJCNN 2021)
July 2021
Machine Translated Text Detection Through Text Similarity with Round-Trip Translation
Hoang-Quoc Nguyen-Son, Tran Thao(The University of Tokyo), Seira Hidano, Ishita Gupta(Indian Institute of Technology Delhi), Shinsaku Kiyomoto
2021 Annual Conference of the North American Chapter of the Association for Computational Linguistics (NAACL)
June 2021
Automatic Security Inspection Framework for Trustworthy Supply Chain
Yuto Nakano, Toru Nakamura(ATR), Yasuaki Kobayashi, Takashi Ozu(ATR), Masahito Ishizaka, Masayuki Hashimoto(ATR), Hiroyuki Yokoyama(ATR), Yutaka Miyake and Shinsaku Kiyomoto
2021 IEEE/ACIS 19th International Conference on Software Engineering Research, Management and Applications (SERA)
June 2021
Generating Residue Number System Bases
Jean-Claude Bajard(Sorbonne Universit´e, CNRS, INRIA), Kazuhide Fukushima, Shinsaku Kiyomoto, Thomas Plantard(University of Wollongong), Arnaud Sipasseuth, Willy Susilo(University of Wollongong)
The 28th IEEE International Symposium on Computer Arithmetic (ARITH 2021)
June 2021
SeBeST: Security Behavior Stage Model and Its Application to OS Update
Ayane Sano, Yukiko Sawaya, Akira Yamada, Ayumu Kubota
The 35th International Conference on Advanced Information Networking and Applications (AINA-2021)
May 2021
Malware Detection for IoT Devices using Automatically Generated White List and Isolation Forest
Masataka Nakahara, Norihiro Okui, Yasuaki Kobayashi, Yutaka Miyake
The 6th International Conference on Internet of Things, Big Data and Security (IoTBDS 2021)
April 2021
Towards Exploring User Perception of a Privacy Sensitive Information Detection Tool
Vanessa Bracamonte, Welderufael B. Tesfay(Goethe University Frankfurt), Shinsaku Kiyomoto
The 7th International Conference on Information Systems Security and Privacy (ICISSP 2021)
February 2021
Phishing Site Detection Using Similarity of Website Structure
Shoma Tanaka, Takashi Matsunaka, Akira Yamada, Avumu Kubota
2021 IEEE Conference on Dependable and Secure Computing (DSC 2021)
January 2021
A Practical Privacy-Preserving Algorithm for Document Data
Tomoaki Mimoto, Shinsaku Kiyomoto, Koji Kitamura(AIST), Atsuko Miyaji(Osaka University)
The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2020)
December 2020
Boosting Homograph Attack Classification Using Ensemble Learning and N-gram Model
Tran Phuong Thao(The University of Tokyo), Hoang-Quoc Nguyen-Son, Rie Shigetomi Yamaguchi(The University of Tokyo), Toshiyuki Nakata(The University of Tokyo)
The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2020)
December 2020
Integerwise Functional Bootstrapping on TFHE
Hiroki Okada, Shinsaku Kiyomoto, Carlos Cid(University of London)
The 23rd Information Security Conference (ISC 2020)
December 2020
Masahito Ishizaka, Shinsaku Kiyomoto
The 23rd Information Security Conference (ISC 2020)
December 2020
Stronger Targeted Poisoning Attacks Against Malware Detection
Shintaro Narisada, Shoichiro Sasaki(Tohoku University), Seira Hidano, Toshihiro Uchibayashi(Kyushu University), Takuo Suganuma(Tohoku University), Masahiro Hiji(Tohoku University), Shinsaku Kiyomoto
The 19th International Conference on Cryptology and Network Security (CANS 2020)
December 2020
Enhanced Classification Method for Homograph Attack Detection
Zicong Zhu(The University of Tokyo), Tran Phuong Thao(The University of Tokyo), Hoang-Quoc Nguyen-Son; Rie Shigetomi Yamaguchi(The University of Tokyo), Toshiyuki Nakata(The University of Tokyo)
The 8th International Symposium on Computing and Networking Workshops (CANDARW 2020)
November 2020
Single-Trace Side-Channel Analysis on Polynomial-Based MAC Schemes
Rei Ueno(Tohoku University), Kazuhide Fukushima, Yuto Nakano, Shinsaku Kiyomoto, Naofumi Homma(Tohoku University)
The 11th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2020)
October 2020
Enhancing A New Classification for IDN Homograph Attack Detection
Zicong Zhu(The University of Tokyo). Tran Phuong Thao(The University of Tokyo), Hoang-Quoc Nguyen-Son, Rie Shigetomi Yamaguchi(The University of Tokyo), Toshiyuki Nakata(The University of Tokyo)
The 18th IEEE International Conference on Dependable, Autonomic, & Secure Computing (DASC 2020)
August 2020
Feasibility study of a camera-based PUF in a realistic scenario
Kazuihde Fukushima, Thomas Perianin(Secure-IC K.K), Victor Dyseryn(Secure-IC S.A.S.), Shinsaku Kiyomoto, Sylvain Guilley(Secure-IC S.A.S.), Adrien Facon(PSL Research University)
The 15th International Conference on Availability, Reliability and Security (ARES 2020)
August 2020
A Compact Digital Signature Scheme Based on the Module-LWR Problem
Hiroki Okada, Atsushi Takayasu(NICT), Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi(The University of Tokyo)
The 22nd International Conference Information and Communications Security (ICICS 2020)
August 2020
Exposing Private User Behaviors of Collaborative Filtering via Model Inversion Techniques
Seira Hidano, Takao Murakami (AIST), Shuichi Katsumata (AIST), Shinsaku Kiyomoto, Goichiro Hanaoka (AIST)
The 20th Privacy Enhancing Technologies Symposium (PETS 2020)
July 2020
Consideration on Data Conformance Toward Building Trust in Supply Chain
Yuto Nakano, Toru Nakamura(ATR), Yasuaki Kobayashi, Masahito Ishizaka, Masayuki Hashimoto(ATR), Hiroyuki Yokoyama(ATR), Yutaka Miyake, Shinsaku Kiyomoto
The 29th European Conference on Networks and Communications (EuCNC 2020)
June 2020
Machine Learning based Malware Traffic Detection on IoT Devices using Summarized Packet Data
Masataka Nakahara, Norihiro Okui, Yasuaki Kobayashi, Yutaka Miyake
The 5th International Conference on Internet of Things, Big Data and Security (IoTBDS 2020)
May 2020
Evaluation of Software PUF Based on Gyroscope
Kazuhide Fukushima, Ayumu Yoshimura(Tamagawa University), Shinsaku Kiyomoto, Norikazu Yamasaki(Tamagawa University)
The 15th International Conference on Information Security Practice and Experience (ISPEC 2019)
November 2019
Detecting Malicious Websites by Query Templates
Satomi Kaneko(University of Tsukuba), Akira Yamada, Yukiko Sawaya, Tran Phuong Thao(The University of Tokyo), Ayumu Kubota, Kazumasa Omote(University of Tsukuba)
The 12th International Conference on Information Technology and Communications Security (SecITC 2019)
November 2019
Detecting Machine-Translated Text using Back Translation
Hoang-Quoc Nguyen-Son, Tran Phuong Thao(University of Tokyo), Seira Hidano, Shinsaku Kiyomoto
The 12th International Conference on Natural Language Generation (INLG 2019)
October 2019
Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists
Kohei Nozawa(Waseda University), Kento Hasegawa(Waseda University), Seira Hidano, Shinsaku Kiyomoto, Kazuo Hashimoto(Waseda University), Nozomu Togawa(Waseda University)
The 24th European Symposium on Research in Computer Security (ESORICS 2019) Workshops
September 2019
On Embedding Backdoor in Malware Detectors Using Machine Learning
Shoichiro Sasaki(Tohoku University), Seira Hidano, Toshihiro Uchibayashi(Tohoku University), Takuo Suganuma(Tohoku University), Masahiro Hiji(Tohoku University), Shinsaku Kiyomoto
The 17th International Conference on Privacy, Security and Trust (PST 2019)
August 2019
A Framework for Secure and Trustworthy Data Management in Supply Chain
Shinsaku Kiyomoto, Yuto Nakano, Atsushi Waseda, Toru Nakamura(ATR), Masahito Ishizaka, Yasuaki Kobayashi
The 16th International Conference on Mobile Web and Intelligent Information Systems (MobiWIS 2019)
August 2019
Secret Sharing on Evolving Multi-level Access Structure
Sabyasachi Dutta(Kyushu University), Partha Sarathi Roy, Kazuhide Fukushima,Shinsaku Kiyomoto, Kouichi Sakurai(Kyushu University)
The 20th World Conference on Information Security Applications (WISA 2019)
August 2019
A framework for blockchain-based verification of integrity and authenticity
Anirban Basu, Theo Dimitrakos(Huawei Technologies Dusseldorf GmbH), Yuto Nakano, Shinsaku Kiyomoto
The 13th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2019)
July 2019
A lattice based public key encryption with equality test in standard model
Dung Hoang Duong(University of Wollongong), Kazuhide Fukushima, Shinsaku Kiyomoto, Partha Sarathi Roy, Willy Susilo(University of Wollongong)
The 24th Australasian Conference on Information Security and Privacy (ACISP 2019)
July 2019
User Study of the Effectiveness of a Privacy Policy Summarization Tool
Vanessa Bracamonte, Seira Hidano, Welderufael B. Tesfay(Goethe University Frankfurt), Shinsaku Kiyomoto
The 5th International Conference on Information Systems Security and Privacy (ICISSP 2019 )
February 2019
Evaluation of Side-Channel Key-Recovery Attacks on LoRaWAN End-Device
Kazuhide Fukushima, Damien Marion(Secure-IC S.A.S), Yuto Nakano, Adrien Facon(Secure-IC S.A.S),Shinsaku Kiyomoto, Sylvain Guilley(Secure-IC S.A.S)
The 5th International Conference on Information Systems Security and Privacy (ICISSP 2019)
February 2019
Security Analysis and Efficient Implementation of Code-Based Signature Schemes
Partha Sarathi Roy, Kirill Morozov(University of North Texas), Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi(The University of Tokyo)
The 5th International Conference on Information Systems Security and Privacy (ICISSP 2019)
February 2019
Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters
Jyotirmoy Pramanik(University of Calcutta), Partha Sarathi Roy, Sabyasachi Dutta(Kyushu University), Avishek Adhikari(University of Calcutta), Kouichi Sakurai(Kyushu University)
The 14th International Conference on Information Systems Security (ICISS 2018)
December 2018
On Consensus Protocols in Parallel-Blockchain Environment
Shinsaku Kiyomoto, Kazuhide Fukushima, Mohammad Shahriar Rahman(University of Liberal Arts Bangladesh), Anirban Basu(University of Sussex)
The 13th International Conference for Internet Technology and Secured Transactions (ICITST 2018)
December 2018
Linear Depth Integer-Wise Homomorphic Division
Hiroki Okada, Carlos Cid(Royal Holloway, University of London), Seira Hidano, Shinsaku Kiyomoto
The 12th IFIP International Conference on Information Security Theory and Practice (WISTP 2018)
December 2018
On the Complexity of the LWR-Solving BKW Algorithm
Hiroki Okada, Atsushi Takayasu(The The University of Tokyo), Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi(The University of Tokyo)
The 21st International Conference on Information Security and Cryptology (ICISC 2018)
November 2018
Vietnamese Paraphrase Identification Using Matching Duplicate Phrases and Similar Words
Hoang-Quoc Nguyen-Son, Nam-Phong Tran(VNUHCM-US), Ngoc-Vien Pham(VNUHCM-US), Minh-Triet Tran(VNUHCM-US), Isao Echizen(NII)
The 5th International Conference on Future Data and Security Engineering (FDSE 2018)
November 2018
Predicting Impending Exposure to Malicious Content from User Behavior
Mahmood Sharif(Carnegie Mellon University), Jumpei Urakawa, Nicolas Christin(Carnegie Mellon University), Ayumu Kubota, Akira Yamada
2018 ACM SIGSAC Conference on Computer and Communications Security (CCS)
October 2018
Partha Sarathi Roy, Sabyasachi Dutta(Indian Statistical Institute), Kirill Morozov(University of North Texas), Avishek Adhikari(University of Calcutta), Kazuhide Fukushima, Shinsaku Kiyomoto, Kouichi Sakurai(Kyushu University)
The 14th International Conference on Information Security Practice and Experience (ISPEC 2018)
September 2018
The Possibility of Matrix Decomposition as Anonymization and Evaluation for Time-sequence Data
Tomoaki Mimoto, Shinsaku Kiyomoto, Seira Hidano, Anirban Basu, Atsuko Miyaji(Osaka University)
The16th Annual Conference on Privacy, Security and Trust (PST 2018)
August 2018
Fair-Trading Protocol for Anonymised Datasets-Requirements and Solution
Shinsaku Kiyomoto, Kazuhide Fukushima
The 4th International Conference on Information Management (ICIM 2018)
May 2018
Active Attack against Oblivious RAM
Yuto Nakano, Seira Hidano, Shinsaku Kiyomoto, Kouichi Sakurai
The 32nd IEEE International Conference on Advanced Information Networking and Applications (IEEE AINA-2018)
May 2018
BlockStore: A Secure Decentralized Storage Framework On Blockchain
Sushmita Ruj(Indian Statistical Institute), Mohammad Shahriar Rahman(University of Liberal Arts), Anirban Basu(Indian Statistical Institute), Shinsaku Kiyomoto
The 32nd IEEE International Conference on Advanced Information Networking and Applications (IEEE AINA-2018)
May 2018
I Read but Don’t Agree: Privacy Policy Benchmarking usingMachine Learning and the EU GDPR
Welderufael Berhane Tesfay(Goethe University Frankfurt), Peter Hofmann(Goethe University Frankfurt), Toru Nakamura, Shinsaku Kiyomoto, Jetzabel Serna(Goethe University Frankfurt)
The Web Conference 2018 (WWW 2018)
April 2018
PrivacyGuide: Towards an Implementation of the EU GDPR on Internet Privacy Policy Evaluation
Welderufael Berhane Tesfay(Goethe University Frankfurt), Peter Hofmann(Goethe University Frankfurt), Toru Nakamura, Shinsaku Kiyomoto, Jetzabel Serna(Goethe University Frankfurt)
The 4th ACM International Workshop on Security and Privacy Analytics (IWSPA 2018)
March 2018
An Evaluation Framework for Fastest Oblivious RAM
Seira Hidano, Yuto Nakano, Shinsaku Kiyomoto
The 3rd International Conference on Internet of Things, Big Data and Security (IoTBDS 2018)
March 2018
Challenges in Classifying Privacy Policies by Machine Learning with Word-based Features
Keishiro Fukushima(Kyushu University), Toru Nakamura, Daisuke Ikeda(Kyushu University), Shinsaku Kiyomoto
The 2nd International Conference on Cryptography, Security and Privacy (ICCSP 2018)
March 2018