Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Mitsuaki AkiyamaNTTVerified email at ieee.org
- Noriaki KamiyamaFukuoka UniversityVerified email at fukuoka-u.ac.jp
- Shigeki GotoWaseda UniversityVerified email at goto.info.waseda.ac.jp
- Takuya WatanabeDeloitte Tohmatsu Cyber LLCVerified email at nsl.cs.waseda.ac.jp
- Keisuke IshibashiInternational Christian UniversityVerified email at icu.ac.jp
- Daiki ChibaNTT Security (Japan) KKVerified email at ieee.org
- Eitaro ShiojiNTTVerified email at lab.ntt.co.jp
- Masato UchidaWaseda UniversityVerified email at waseda.jp
- Mitsuhiro HatadaWaseda University and NTT CommunicationsVerified email at nsl.cs.waseda.ac.jp
- Tatsuaki KimuraOsaka UniversityVerified email at comm.eng.osaka-u.ac.jp
- Ryo IijimaNational Institute of Advanced Industrial Science and Technology, Waseda UniversityVerified email at nsl.cs.waseda.ac.jp
- Yuta TAKATASecurity Researcher, Ph.D.Verified email at goto.info.waseda.ac.jp
- Toshiki ShibaharaNTT Social Informatics LaboratoriesVerified email at hco.ntt.co.jp
- Takeru InoueNTT Network Innovation Labs.Verified email at ieee.org
- Ayako A. HasegawaNICTVerified email at nict.go.jp
- Tetsuya SakaiWaseda UniversityVerified email at waseda.jp
- Jianping PanUniversity of VictoriaVerified email at uvic.ca
- Aditya AkellaProfessor, Computer Science, UT AustinVerified email at cs.utexas.edu
- Takeshi TakahashiNational Institute of Information and Communications TechnologyVerified email at nict.go.jp
- Kohei ShiomotoTokyo City UniversityVerified email at tcu.ac.jp