Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Masashi EtoNational Institute of Information and Communications TechnologyVerified email at nict.go.jp
- Tao BANNational Institute of Information and Communications Technology, JapanVerified email at nict.go.jp
- Katsunari YoshiokaYokohama National UniversityVerified email at ynu.ac.jp
- Takeshi TakahashiNational Institute of Information and Communications TechnologyVerified email at nict.go.jp
- Jungsuk SongKorea institute of science and technology informationVerified email at kisti.re.kr
- Abdolhossein SarrafzadehUniversity Distinguished Professor Director, Center of Excellence in Cybersecurity Research, North CVerified email at unitec.ac.nz
- Takahiro KasamaNICTVerified email at nict.go.jp
- Shanqing GuoVerified email at sdu.edu.cn
- Mio SUZUKITechnical Expert, National Institute of Information and Communications TechnologyVerified email at nict.go.jp
- Yasuo OkabeKyoto UniversityVerified email at i.kyoto-u.ac.jp
- Hiroki TakakuraNational Institute of InformaticsVerified email at nii.ac.jp
- Shin-Ming ChengProfessor, Dept. of CSIE, National Taiwan University of Science and TechnologyVerified email at mail.ntust.edu.tw
- Rui TanabeYokohama National UniversityVerified email at ynu.ac.jp
- Chansu HanNational Institute of Information and Communications Technology (NICT)Verified email at nict.go.jp
- Muhamad Erza AminantoMonash University IndonesiaVerified email at monash.edu
- Christian RossowCISPA – Helmholtz Center for Information SecurityVerified email at cispa.saarland
- Gang ChenVictoria University of WellingtonVerified email at ecs.vuw.ac.nz
- Orcun CetinSabancı University, University of KentVerified email at sabanciuniv.edu
- Seiichi OzawaKobe UniversityVerified email at kobe-u.ac.jp
- Runhe HuangProfessor, Faculty of Computer and Information Science, Hosei UniversityVerified email at hosei.ac.jp