フォロー
Junpei Kawamoto
Junpei Kawamoto
StoreWise
確認したメール アドレス: kyoto-u.jp - ホームページ
タイトル
引用先
引用先
Privacy-preservation for Stochastic Gradient Descent Application to Secure Logistic Regression
S Wu, T Teruya, J Kawamoto, J Sakuma, H Kikuchi
The 27th Annual Conference of the Japanese Society for Artificial Intelligence, 2013
452013
A machine learning based approach for detecting DRDoS attacks and its performance evaluation
Y Gao, Y Feng, J Kawamoto, K Sakurai
2016 11th Asia joint conference on information security (AsiaJCIS), 80-86, 2016
272016
An analysis of IT assessment security maturity in higher education institution
MH Suwito, S Matsumoto, J Kawamoto, D Gollmann, K Sakurai
Information Science and Applications (ICISA) 2016, 701-713, 2016
222016
Security of social information from query analysis in daas
J Kawamoto, M Yoshikawa
Proceedings of the 2009 EDBT/ICDT Workshops, 148-152, 2009
172009
RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust
H Anada, T Yasuda, J Kawamoto, J Weng, K Sakurai
Journal of information security and applications 45, 10-19, 2019
142019
Cyberbullying detection using parent-child relationship between comments
Z Li, J Kawamoto, Y Feng, K Sakurai
Proceedings of the 18th International Conference on Information Integration …, 2016
132016
A behavior-based method for detecting DNS amplification attacks
L Cai, Y Feng, J Kawamoto, K Sakurai
2016 10th International Conference on Innovative Mobile and Internet …, 2016
112016
A method of digital rights management based on Bitcoin protocol
M Kitahara, J Kawamoto, K Sakurai
Proceedings of the 8th International Conference on Ubiquitous Information …, 2014
112014
A hybrid encryption scheme with key-cloning protection: user/terminal double authentication via attributes and fingerprints
C Chen, H Anada, J Kawamoto, K Sakurai
Journal of Internet Services and Information Security 6 (2), 23-36, 2016
102016
Identity-embedding method for decentralized public-key infrastructure
H Anada, J Kawamoto, J Weng, K Sakurai
International Conference on Trusted Systems, 1-14, 2014
102014
Evaluation of machine learning techniques for C&C traffic classification
K Yamauchi, J Kawamoto, Y Hori, K Sakurai
Information Processing Society of Japan 56 (9), 1745-1753, 2015
92015
Private Range Query by Perturbation and Matrix Based Encryption
J Kawamoto, M Yoshikawa
The Sixth IEEE International Conference on Digital Information Management …, 2011
92011
ReCQ: real-world context-aware querying
S Hattori, T Tezuka, H Ohshima, S Oyama, J Kawamoto, K Tajima, ...
The Sixth International and Interdisciplinary Conference on Modeling and …, 2007
92007
Detection of illegal players in massively multiplayer online role playing game by classification algorithms
Z Zhang, H Anada, J Kawamoto, K Sakurai
2015 IEEE 29th International Conference on Advanced Information Networking …, 2015
82015
A proposal for cyber-attack trace-back using packet marking and logging
P Li, Y Feng, J Kawamoto, K Sakurai
2016 10th International Conference on Innovative Mobile and Internet …, 2016
62016
Cross-group secret sharing for secure cloud storage service
C Ke, H Anada, J Kawamoto, K Morozov, K Sakurai
Proceedings of the 10th International Conference on Ubiquitous Information …, 2016
42016
Extracting C&C traffic by session classification using machine learning
Y Yamauchi, J Kawamoto, Y Hori, K Sakurai
31st Symposium on Cryptography and Information Security, 2014
42014
Analysis of variance of graph-clique mining for scalable proof of work
H Anada, T Matsushima, C Su, W Meng, J Kawamoto, S Bag, K Sakurai
Information Security and Cryptology: 14th International Conference, Inscrypt …, 2019
32019
Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions
H Anada, J Kawamoto, C Ke, K Morozov, K Sakurai
The Journal of Supercomputing 73 (10), 4275-4301, 2017
32017
Privacy-preserving online logistic regression based on homomorphic encryption
S Wu, J Kawamoto, H Kikuchi, J Sakuma
IEICE Technical Report; IEICE Tech. Rep. 113 (139), 67-74, 2013
32013
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20