default search action
14th AsiaJCIS 2019: Kobe, Japan
- 14th Asia Joint Conference on Information Security, AsiaJCIS 2019, Kobe, Japan, August 1-2, 2019. IEEE 2019
- Ryo Ito, Mamoru Mimura:
Detecting Unknown Malware from ASCII Strings with Natural Language Processing Techniques. 1-8 - Bing-Kai Hong, Jr-Wei Huang, Tao Ban, Ryoichi Isawa, Shin-Ming Cheng, Daisuke Inoue, Koji Nakao:
Measurement Study Towards a Unified Firmware Updating Scheme for Legacy IoT Devices. 9-15 - Nitesh Kumar, Subhasis Mukhopadhyay, Mugdha Gupta, Anand Handa, Sandeep K. Shukla:
Malware Classification using Early Stage Behavioral Analysis. 16-23 - Mamoru Mimura, Yuya Suga:
Filtering Malicious JavaScript Code with Doc2Vec on an Imbalanced Dataset. 24-31 - Hideaki Miyaji, Akinori Kawachi, Atsuko Miyaji:
String commitment scheme with low output locality. 32-39 - Yong Ding, Bingyao Wang, Yujue Wang, Kun Zhang, Huiyong Wang:
Privacy and Integrity Protection of Metering Data in Smart Grid. 40-47 - Hiroki Sato, Mamoru Mimura, Hidema Tanaka:
Analysis of Division Property using MILP Method for Lightweight Blockcipher Piccolo. 48-55 - Katsunari Shishido, Atsuko Miyaji:
Secure Online-Efficient Interval Test based on Empty-Set Check. 56-63 - Iksoo Shin, Yunsoo Choi, Taewoong Kwon, Hyeakro Lee, Jungsuk Song:
Platform Design and Implementation for Flexible Data Processing and Building ML Models of IDS Alerts. 64-71 - Chung-Yi Lin, Chun-Ying Huang, Chia-Wei Tien:
Boosting Fuzzing Performance with Differential Seed Scheduling. 72-79 - Shusuke Morimoto, Hajime Kawamukai, Kilho Shin:
Prediction of Crime Occurrence using Information Propagation Model and Gaussian Process. 80-87 - Bilhanan Silverajan, Petteri Vistiaho:
Enabling Cybersecurity Incident Reporting and Coordinated Handling for Maritime Sector. 88-95 - Masaru Takada, Yuki Osada, Masakatu Morii:
Counter Attack Against the Bus-Off Attack on CAN. 96-102 - Hiroki Inayoshi, Shohei Kakei, Eiji Takimoto, Koichi Mouri, Shoichi Saito:
Prevention of Data Leakage due to Implicit Information Flows in Android Applications. 103-110 - Yuki Ezawa, Makoto Takita, Yoshiaki Shiraishi, Shohei Kakei, Masanori Hirotomo, Youji Fukuta, Masami Mohri, Masakatu Morii:
Designing Authentication and Authorization System with Blockchain. 111-118 - Kuo-Lung Hung, Chih-Yu Yen:
Watermarking Technique Based on Harris-Laplace Feature Point Detector Capable of Resisting Geometric Attacks. 119-126 - Masanori Hirotomo, Haruka Ito, Youji Fukuta, Masami Mohri, Yoshiaki Shiraishi:
Identification Scheme Based on the Binary Syndrome Decoding Problem Using High-Density Parity-Check Matrices. 127-133 - Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng, Masahiro Mambo:
Signcryption from NTRU Lattices Without Random Oracles. 134-141 - Toshiki Tsuchida, Masanori Hirotomo, Haruka Ito, Makoto Takita, Yoshiaki Shiraishi, Kenta Nomura, Masami Mohri, Youji Fukuta, Masakatu Morii:
A Signature Scheme Based on the Syndrome Decoding Problem Using LDPC Codes. 142-145 - Bingsen Wang, Zhuoran Zhang, Fangguo Zhang:
Subliminal Channels in the Code-based Ring Signature Scheme. 146-150 - Po-Wen Chi, Pin-Hsin Hsiao:
Learnable Audio Encryption for Untrusted Outsourcing Machine Learning Services. 151-156 - Taku Sugai, Toshihiro Ohigashi, Yoshio Kakizaki, Akira Kanaoka:
Password Strength Measurement without Password Disclosure. 157-164 - Yuma Takeuchi, Shogo Kitajima, Kazuya Fukushima, Masahiro Mambo:
Privacy Risk Evaluation of Re-Identification of Pseudonyms. 165-172
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.