Publications
Journal
- Hiroaki Anada, Takanori Yasuda, Junpei Kawamoto, Jian Weng, KouichiSakurai, “RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust,” Journal of Information Security and Applications, vol.45, pp.10-19, April 2019.
- Yasuhito Asano, Junpei Kawamoto, “Detecting Anomalous Reviewers and Estimating Summaries from Early Reviews Considering Heterogeneity,” IEICE Transactions, 101-D(4), pp.1003-1011, April 2018. [
](https://rgmining.github.io/) * Hiroaki Anada, Junpei Kawamoto, Chenyutao Ke, Kirill Morozov, Kouichi Sakurai, “[
Cross-Group Secret Sharing Scheme for Secure Usage of Cloud Storage over Different Providers and Regions](https://link.springer.com/article/10.1007/s11227-017-2009-7)," The Journal of Supercomputing, 73(10), pp.4275-4301, 2017. [
](https://itslab-kyushu.github.io/cgss/) * Chunlu Chen, Hiroaki Anada, Junpei Kawamoto, and Kouichi Sakurai, “[
A Hybrid Encryption Scheme with Key-cloning Protection: User / Terminal Double Authentication via Attributes and Fingerprints](http://hdl.handle.net/2324/1657553)," Journal of Internet Services and Information Security, vol.6, issue 2, pp.23-36, May 2016. * Kazumasa Yamauchi, Junpei Kawamoto, Yoshiaki Hori, and Kouichi Sakurai, “[
Evaluation of Machine Learning Techniques for C&C Traffic Classification](http://hdl.handle.net/2324/1525466)," IPSJ Journal, Vol.56, No.9, pp.1745-1753, 2015. (in Japanese) [
](http://ci.nii.ac.jp/naid/120005651849) * Can Wang, Yaokai Feng, Junpei Kawamoto, Yoshiaki Hori, and Kouichi Sakurai, “[
A Learning Algorithm for Behavior-based PortScan Automatic Detection and Its Evaluation](http://hdl.handle.net/2324/1525467)," IPSJ Journal, Vol.56, No.9, pp.1770-1781, 2015. (in Japanese) [
](http://ci.nii.ac.jp/naid/120005651850) * Junpei Kawamoto, “[
A Locality Sensitive Hashing Filter for Encrypted Vector Databases](http://hdl.handle.net/2324/1498219)," Fundamenta Informaticae, Vol.137, No.2, pp.291-304, 2015. * Junpei Kawamoto, Patricia L. Gillett, and Jun Sakuma, “[
Frequency-based Constraint Relaxation for Private Query](http://hdl.handle.net/2241/119458)," IPSJ Transactions on Databases (TOD), Vol.6, No.3, pp.50-60, June, 2013. (in Japanese) [
](http://ci.nii.ac.jp/naid/110009579665) * Junpei Kawamoto and Masatoshi Yoshikawa, “[
Private Range Query in Key-Value Databases](http://hdl.handle.net/2433/147391)," IPSJ Transactions on Databases (TOD), Vol.4, No.3, pp.33-44, October, 2011. (in Japanese) [
](http://ci.nii.ac.jp/naid/40019257549) * Junpei Kawamoto and Masatoshi Yoshikawa, “[
Privacy Protection of Data Shared on Web Applications Using Broadcast Encryption and Clustering](http://hdl.handle.net/2433/147390)," IPSJ Transactions on Databases (TOD), Vol.1, No.1, pp.79-87, June, 2008. (in Japanese) [
](http://ci.nii.ac.jp/naid/110007990003)
Conference/Workshop
- Hiroaki Anada, Tomohiro Matsushima, Chunhua Su, Weizhi Meng, Junpei Kawamoto, Samiran Bag, and Kouichi Sakurai, “Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work,” Proc. of the 14th International Conference on Information Security and Cryptology (Inscrypt 2018), Fuzhou, China, 2018.
- Taku Nishigori, Junpei Kawamoto, and Kouichi Sakurai, “[
Improving the accuracy of signature authentication using the Eight Principles of Yong](http://dl.acm.org/citation.cfm?id=3022258)," Proc. of the 11th International Conference on Ubiquitous Information Management and Communication (IMCOM 2017), No.32, Oita, Japan, 2017. * Ryosuke Miyazaki, Junpei Kawamoto, Shinichi Matsumoto, and Kouichi Sakurai, “[
Host Independent and Distributed Detection System of the Network Attack by Using OpenFlow](http://ieeexplore.ieee.org/document/7899511/)," Proc. of the 31st International Conference on Information Networking (ICOIN 2017), pp.236-241, Vietnam, 2017. * Ziyi Li, Junpei Kawamoto, Yaokai Feng, and Kouichi Sakurai, “[
Cyberbullying Detection Using Parent-Child Relationship between Comments](http://dl.acm.org/citation.cfm?id=3011182)," Proc. of the 18th International Conference on Information Integration and Web-based Applications & Services (iiWAS2016), pp.325-334, Singapore, Nov. 23-30, 2016. * Yuxuan Gao, Yaokai Feng, Junpei Kawamoto, and Kouichi Sakurai, “[
A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation](http://hdl.handle.net/2324/1661854)," Proc. of the 11th Asia Joint Conference on Information Security, pp.80-86, Fukuoka, Japan, Aug.4-5, 2016. * Longzhu Cai, Yaokai Feng, Junpei Kawamoto, and Kouichi Sakurai, “[
A Behavior-based Method for Detecting DNS Amplification Attacks](http://hdl.handle.net/2324/1657554)," Proc. of the 10th International Workshop on Advances in Information Security, pp.608-613, Fukuoka, Japan, July 6, 2016. * Pengfei Li, Yaokai Feng, Junpei Kawamoto, and Kouichi Sakurai, “[
A Proposal for Cyber-Attack Trace-back Using Packet Marking and Logging](http://hdl.handle.net/2324/1657555)," Proc. of the 10th International Workshop on Advances in Information Security, pp.603-607, Fukuoka, Japan, July 6, 2016. * Misni Harjo Suwito, Shinchi Matsumoto, Junpei Kawamoto, Dieter Gollmann, and Kouichi Sakurai, “[
An Analysis of IT Assessment Security Maturity in Higher Education Institution](http://hdl.handle.net/2324/1566107)," Proc. of the International Conference on Information Science and Applications, pp.701-713, Vietnam, Feb. 15-18, 2016. [
](http://www.anrdoezrs.net/links/8186671/type/dlg/http://link.springer.com/chapter/10.1007%2F978-981-10-0557-2_69) * Junpei Kawamoto, “[
An Implementation of Privacy Preserving Stream Integration System](http://ieeexplore.ieee.org/document/7427088/)", Proc. of the 30th International Conference on Information Networking (ICOIN 2016), pp.57-62, Malaysia, Jan. 13-15, 2016. [
](https://jkawamoto.github.io/psi/) * Chenyutao Ke, Hiroaki Anada, Junpei Kawamoto, Kirill Morozov, and Kouichi Sakurai, “[
Cross-group Secret Sharing for Secure Cloud Storage Service](http://hdl.handle.net/2324/1563374)," Proc. of the Annual International Conference on Ubiquitous Information Management and Communication (IMCOM 2016), pp.63:1-63:8, Vietnam, Jan.4-6, 2016. [
](https://itslab-kyushu.github.io/cgss/) * Chunlu Chen, Hiroaki Anada, Junpei Kawamoto, and Kouichi Sakurai, “[
Hybrid Encryption Scheme using Terminal Fingerprint and its Application to Attribute-based Encryption without Key Misuse](http://hdl.handle.net/2324/1544167)," Proc. of the 2015 Asian Conference on Availability, Reliability and Security, pp.255-264, Korea, Oct. 4-7, 2015. [
](http://www.anrdoezrs.net/links/8186671/type/dlg/http://link.springer.com/chapter/10.1007%2F978-3-319-24315-3_26) * Zhongqiang Zhang, Hiroaki Anada, Junpei Kawamoto, and Kouichi Sakurai, “[
Detection of Illegal Players in MMORPG by Classification Algorithms](http://hdl.handle.net/2324/1498305)," Proc. of the 29th IEEE International Conference on Advanced Information Networking and Applications (AINA 2015), Korea, March 25-27, 2015. * Naoya Kajiwara, Junpei Kawamoto, Shinichi Matsumoto, Yoshiaki Hori, and Kouichi Sakurai, “[
Detection of Android Ad Library Focusing on HTTP Connections and View Object Redraw Behaviors](http://hdl.handle.net/2324/1498304)," Proc. of the 29th International Conference on Information Networking (ICOIN 2015), pp.104-109, Cambodia, January12-14, 2015. * Hiroaki Anada, Junpei Kawamoto, Jian Weng, and Kouichi Sakurai, “[
Identity-Embedding Method for Decentralized Public-Key Infrastructure](http://hdl.handle.net/2324/1498306)," Proc. of the 6th International Conference on Trustworthy Systems (InTrust 2014), Beijing, China, December 16-17, 2014. [
](http://www.anrdoezrs.net/links/8186671/type/dlg/http://link.springer.com/chapter/10.1007%2F978-3-319-27998-5_1) * Junpei Kawamoto, and Kouichi Sakurai, “[
Privacy-Aware Cloud-based Input Method Editor](http://hdl.handle.net/2324/1498307),"
Proc. of the IEEE/CIC ICCC 2014 Symposium on Privacy and Security in Commutations (ICCC 2014 PSC),
pp.209-213, Shanghai, China, October 14-16, 2014.
* Can Wang, Yaokai Feng, Junpei Kawamoto, Yoshiaki Hori and Kouichi Sakurai,
“[
A Parameterless Learning Algorithm for Behavior-based Detection](http://hdl.handle.net/2324/1498300)," Proc. of the 9th Asia Joint Conference on Information Security (AsiaJCIS 2014), pp.11-18, Wuhan, China, Semptember 3-5, 2014. * Shinichi Matsumoto, Yuya Onitsuka, Junpei Kawamoto, and Kouichi Sakurai, “[
Reconstructing and Visualizing Evidence of Artifact from Firefox SessionStorage](http://hdl.handle.net/2324/1498290)," Proc. of the 15th International Workshop on Information Security Applications, pp. 83-94, Jeju Island, Korea, August 25-27, 2014. [
](http://www.anrdoezrs.net/links/8186671/type/dlg/http://link.springer.com/chapter/10.1007%2F978-3-319-15087-1_7) * Junpei Kawamoto and Patricia L. Gillett, “[
Frequency-based Constraint Relaxation for Private Query Processing in Cloud Databases](http://hdl.handle.net/2324/1445771)," Proc. of the 27th Annual IEEE Canadian Conference on Electrical and Computer Engineering (CCECE 2014), pp.1275-1280, Toronto, Canada, May 4-7, 2014. [
](/slides/ccece2014/) * Junpei Kawamoto and Kouichi Sakurai, “Privacy for Continual Data Publishing,” Proc. of the Seventh Workshop among Asian Information Security Labs (WAIS 2014), Shanghai, China, January 10-11, 2014. [
](/slides/wais2014/) * Motoki Kitahara, Junpei Kawamoto, and Kouichi Sakurai, “[
A Method of Digital Rights Management based on Electric Commerce Protocol](http://hdl.handle.net/2324/1498293)," Proc. of the 8th International Conference on Ubiquitous Information Management and Communication (IMCOM 2014), pp.84:1–84:6, Cambodia, January 9-11, 2014. (Acceptance rate 29%) * Junpei Kawamoto, “A Locality Sensitive Hashing Filter for Encrypted Vector Databases,” Proc. of International Workshop on Privacy-AwaRe Intelligent Systems (PARIS 2012), Macau, December, 2012. (Acceptance rate 15.8%) [
](/slides/paris2012/) * Junpei Kawamoto and Masatoshi Yoshikawa, “[
Private Range Query by Perturbation and Matrix Based Encryption](http://hdl.handle.net/2433/147946)," Proc. of the Sixth IEEE International Conference on Digital Information Management (ICDIM 2011), pp.211-216, Melbourne, Australia, September, 2011. (Acceptance rate 32%) (Best paper award) [
](/slides/icdim2011/) * Kazuki Tawaramoto, Junpei Kawamoto, Yasuhito Asano, and Masatoshi Yoshikawa, “[
A Bipartite Graph Model and Mutually Reinforcing Analysis for Review Sites](http://www.anrdoezrs.net/links/8186671/type/dlg/http://link.springer.com/chapter/10.1007%2F978-3-642-23088-2_25)," Proc. of the 22nd International Conference on Database and Expert Systems Applications (DEXA 2011), pp.341-348, Toulouse, France, August 31, 2011. (Acceptance rate 25%) [
](https://rgmining.github.io/ria/)
* Junpei Kawamoto and Masatoshi Yoshikawa,
“[
Security of Social Information from Query Analysis in DaaS](http://hdl.handle.net/2433/148038)," Proc. of the 2009 EDBT/ICDT Workshops (PAIS 2009), pp.148-152, Saint-Petersburg, Russia, March 22, 2009. [
](/slides/pais2009/) * Junpei Kawamoto and Masatoshi Yoshikawa, “Protection of Social Information in Database Outsourcing,” Proc. of the Fourth Korea-Japan Database Workshop (KJDB 2008), Fukushima, Japan, September 20, 2008. * Junpei Kawamoto, Qiang Ma, and Masatoshi Yoshikawa, “[
Reducing Data Decryption Cost by Broadcast Encryption and Account Assignment for Web Applications](http://hdl.handle.net/2433/147945)," Proc. of the Ninth International Conference on Web-Age Information Management (WAIM 2008), pp.449-454, Zhangjiajie, China, July 20-22, 2008. (Acceptance rate 33.5%) (Short Paper) [
](/slides/waim2008/) * Shun Hattori, Taro Tezuka, Hiroaki Ohshima, Satoshi Oyama, Junpei Kawamoto, Keishi Tajima, and Katsumi Tanaka, “[
ReCQ: Real-world Context-aware Querying](http://www.anrdoezrs.net/links/8186671/type/dlg/http://link.springer.com/chapter/10.1007%2F978-3-540-74255-5_19)," Proc. of the Sixth International and Interdisciplinary Conference on Modeling and Using Context (CONTEXT 2007), LNAI Vol.4635, pp.248-262, Roskilde University, Denmark, August 20-24, 2007. (Acceptance rate 35%) (Poster Paper)
Thesis
Doctoral Thesis
- Junpei Kawamoto, “A Study on User’s Privacy Protection against Query Analysis in Cloud Databases,” Department of Social Informatics, Graduate School of Informatics, Kyoto University, March, 2012.
Master Thesis
- Junpei Kawamoto, “Security of Social Information in Database As a Service Model,” Department of Social Informatics, Graduate School of Informatics, Kyoto University, August 22, 2008.
Bachelor Thesis
- Junpei Kawamoto, “Supporting of Group Search by Extracting Search Intention from the Query Log and the Navigation History,” School of Informatics and Mathematical Science, Faculty of Engineering, Kyoto University, February 16, 2007. (in Japanese)
Link