Publications

Journal

](https://rgmining.github.io/) * Hiroaki Anada, Junpei Kawamoto, Chenyutao Ke, Kirill Morozov, Kouichi Sakurai, “[

springer

Cross-Group Secret Sharing Scheme for Secure Usage of Cloud Storage over Different Providers and Regions](https://link.springer.com/article/10.1007/s11227-017-2009-7)," The Journal of Supercomputing, 73(10), pp.4275-4301, 2017. [

](https://itslab-kyushu.github.io/cgss/) * Chunlu Chen, Hiroaki Anada, Junpei Kawamoto, and Kouichi Sakurai, “[

qir

A Hybrid Encryption Scheme with Key-cloning Protection: User / Terminal Double Authentication via Attributes and Fingerprints](http://hdl.handle.net/2324/1657553)," Journal of Internet Services and Information Security, vol.6, issue 2, pp.23-36, May 2016. * Kazumasa Yamauchi, Junpei Kawamoto, Yoshiaki Hori, and Kouichi Sakurai, “[

qir

Evaluation of Machine Learning Techniques for C&C Traffic Classification](http://hdl.handle.net/2324/1525466)," IPSJ Journal, Vol.56, No.9, pp.1745-1753, 2015. (in Japanese) [

CiNii

](http://ci.nii.ac.jp/naid/120005651849) * Can Wang, Yaokai Feng, Junpei Kawamoto, Yoshiaki Hori, and Kouichi Sakurai, “[

qir

A Learning Algorithm for Behavior-based PortScan Automatic Detection and Its Evaluation](http://hdl.handle.net/2324/1525467)," IPSJ Journal, Vol.56, No.9, pp.1770-1781, 2015. (in Japanese) [

CiNii

](http://ci.nii.ac.jp/naid/120005651850) * Junpei Kawamoto, “[

qir

A Locality Sensitive Hashing Filter for Encrypted Vector Databases](http://hdl.handle.net/2324/1498219)," Fundamenta Informaticae, Vol.137, No.2, pp.291-304, 2015. * Junpei Kawamoto, Patricia L. Gillett, and Jun Sakuma, “[

tulips

Frequency-based Constraint Relaxation for Private Query](http://hdl.handle.net/2241/119458)," IPSJ Transactions on Databases (TOD), Vol.6, No.3, pp.50-60, June, 2013. (in Japanese) [

CiNii

](http://ci.nii.ac.jp/naid/110009579665) * Junpei Kawamoto and Masatoshi Yoshikawa, “[

kurenai

Private Range Query in Key-Value Databases](http://hdl.handle.net/2433/147391)," IPSJ Transactions on Databases (TOD), Vol.4, No.3, pp.33-44, October, 2011. (in Japanese) [

CiNii

](http://ci.nii.ac.jp/naid/40019257549) * Junpei Kawamoto and Masatoshi Yoshikawa, “[

kurenai

Privacy Protection of Data Shared on Web Applications Using Broadcast Encryption and Clustering](http://hdl.handle.net/2433/147390)," IPSJ Transactions on Databases (TOD), Vol.1, No.1, pp.79-87, June, 2008. (in Japanese) [

CiNii

](http://ci.nii.ac.jp/naid/110007990003)

Conference/Workshop

acm

Improving the accuracy of signature authentication using the Eight Principles of Yong](http://dl.acm.org/citation.cfm?id=3022258)," Proc. of the 11th International Conference on Ubiquitous Information Management and Communication (IMCOM 2017), No.32, Oita, Japan, 2017. * Ryosuke Miyazaki, Junpei Kawamoto, Shinichi Matsumoto, and Kouichi Sakurai, “[

ieee

Host Independent and Distributed Detection System of the Network Attack by Using OpenFlow](http://ieeexplore.ieee.org/document/7899511/)," Proc. of the 31st International Conference on Information Networking (ICOIN 2017), pp.236-241, Vietnam, 2017. * Ziyi Li, Junpei Kawamoto, Yaokai Feng, and Kouichi Sakurai, “[

acm

Cyberbullying Detection Using Parent-Child Relationship between Comments](http://dl.acm.org/citation.cfm?id=3011182)," Proc. of the 18th International Conference on Information Integration and Web-based Applications & Services (iiWAS2016), pp.325-334, Singapore, Nov. 23-30, 2016. * Yuxuan Gao, Yaokai Feng, Junpei Kawamoto, and Kouichi Sakurai, “[

qir

A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation](http://hdl.handle.net/2324/1661854)," Proc. of the 11th Asia Joint Conference on Information Security, pp.80-86, Fukuoka, Japan, Aug.4-5, 2016. * Longzhu Cai, Yaokai Feng, Junpei Kawamoto, and Kouichi Sakurai, “[

qir

A Behavior-based Method for Detecting DNS Amplification Attacks](http://hdl.handle.net/2324/1657554)," Proc. of the 10th International Workshop on Advances in Information Security, pp.608-613, Fukuoka, Japan, July 6, 2016. * Pengfei Li, Yaokai Feng, Junpei Kawamoto, and Kouichi Sakurai, “[

qir

A Proposal for Cyber-Attack Trace-back Using Packet Marking and Logging](http://hdl.handle.net/2324/1657555)," Proc. of the 10th International Workshop on Advances in Information Security, pp.603-607, Fukuoka, Japan, July 6, 2016. * Misni Harjo Suwito, Shinchi Matsumoto, Junpei Kawamoto, Dieter Gollmann, and Kouichi Sakurai, “[

qir

An Analysis of IT Assessment Security Maturity in Higher Education Institution](http://hdl.handle.net/2324/1566107)," Proc. of the International Conference on Information Science and Applications, pp.701-713, Vietnam, Feb. 15-18, 2016. [

Springer

](http://www.anrdoezrs.net/links/8186671/type/dlg/http://link.springer.com/chapter/10.1007%2F978-981-10-0557-2_69) * Junpei Kawamoto, “[

ieee

An Implementation of Privacy Preserving Stream Integration System](http://ieeexplore.ieee.org/document/7427088/)", Proc. of the 30th International Conference on Information Networking (ICOIN 2016), pp.57-62, Malaysia, Jan. 13-15, 2016. [

](https://jkawamoto.github.io/psi/) * Chenyutao Ke, Hiroaki Anada, Junpei Kawamoto, Kirill Morozov, and Kouichi Sakurai, “[

qir

Cross-group Secret Sharing for Secure Cloud Storage Service](http://hdl.handle.net/2324/1563374)," Proc. of the Annual International Conference on Ubiquitous Information Management and Communication (IMCOM 2016), pp.63:1-63:8, Vietnam, Jan.4-6, 2016. [

](https://itslab-kyushu.github.io/cgss/) * Chunlu Chen, Hiroaki Anada, Junpei Kawamoto, and Kouichi Sakurai, “[

qir

Hybrid Encryption Scheme using Terminal Fingerprint and its Application to Attribute-based Encryption without Key Misuse](http://hdl.handle.net/2324/1544167)," Proc. of the 2015 Asian Conference on Availability, Reliability and Security, pp.255-264, Korea, Oct. 4-7, 2015. [

Springer

](http://www.anrdoezrs.net/links/8186671/type/dlg/http://link.springer.com/chapter/10.1007%2F978-3-319-24315-3_26) * Zhongqiang Zhang, Hiroaki Anada, Junpei Kawamoto, and Kouichi Sakurai, “[

qir

Detection of Illegal Players in MMORPG by Classification Algorithms](http://hdl.handle.net/2324/1498305)," Proc. of the 29th IEEE International Conference on Advanced Information Networking and Applications (AINA 2015), Korea, March 25-27, 2015. * Naoya Kajiwara, Junpei Kawamoto, Shinichi Matsumoto, Yoshiaki Hori, and Kouichi Sakurai, “[

qir

Detection of Android Ad Library Focusing on HTTP Connections and View Object Redraw Behaviors](http://hdl.handle.net/2324/1498304)," Proc. of the 29th International Conference on Information Networking (ICOIN 2015), pp.104-109, Cambodia, January12-14, 2015. * Hiroaki Anada, Junpei Kawamoto, Jian Weng, and Kouichi Sakurai, “[

qir

Identity-Embedding Method for Decentralized Public-Key Infrastructure](http://hdl.handle.net/2324/1498306)," Proc. of the 6th International Conference on Trustworthy Systems (InTrust 2014), Beijing, China, December 16-17, 2014. [

Springer

](http://www.anrdoezrs.net/links/8186671/type/dlg/http://link.springer.com/chapter/10.1007%2F978-3-319-27998-5_1) * Junpei Kawamoto, and Kouichi Sakurai, “[

qir

Privacy-Aware Cloud-based Input Method Editor](http://hdl.handle.net/2324/1498307)," Proc. of the IEEE/CIC ICCC 2014 Symposium on Privacy and Security in Commutations (ICCC 2014 PSC), pp.209-213, Shanghai, China, October 14-16, 2014.
* Can Wang, Yaokai Feng, Junpei Kawamoto, Yoshiaki Hori and Kouichi Sakurai, “[

qir

A Parameterless Learning Algorithm for Behavior-based Detection](http://hdl.handle.net/2324/1498300)," Proc. of the 9th Asia Joint Conference on Information Security (AsiaJCIS 2014), pp.11-18, Wuhan, China, Semptember 3-5, 2014. * Shinichi Matsumoto, Yuya Onitsuka, Junpei Kawamoto, and Kouichi Sakurai, “[

qir

Reconstructing and Visualizing Evidence of Artifact from Firefox SessionStorage](http://hdl.handle.net/2324/1498290)," Proc. of the 15th International Workshop on Information Security Applications, pp. 83-94, Jeju Island, Korea, August 25-27, 2014. [

Springer

](http://www.anrdoezrs.net/links/8186671/type/dlg/http://link.springer.com/chapter/10.1007%2F978-3-319-15087-1_7) * Junpei Kawamoto and Patricia L. Gillett, “[

qir

Frequency-based Constraint Relaxation for Private Query Processing in Cloud Databases](http://hdl.handle.net/2324/1445771)," Proc. of the 27th Annual IEEE Canadian Conference on Electrical and Computer Engineering (CCECE 2014), pp.1275-1280, Toronto, Canada, May 4-7, 2014. [

SlideShare

](/slides/ccece2014/) * Junpei Kawamoto and Kouichi Sakurai, “Privacy for Continual Data Publishing,” Proc. of the Seventh Workshop among Asian Information Security Labs (WAIS 2014), Shanghai, China, January 10-11, 2014. [

SlideShare

](/slides/wais2014/) * Motoki Kitahara, Junpei Kawamoto, and Kouichi Sakurai, “[

qir

A Method of Digital Rights Management based on Electric Commerce Protocol](http://hdl.handle.net/2324/1498293)," Proc. of the 8th International Conference on Ubiquitous Information Management and Communication (IMCOM 2014), pp.84:1–84:6, Cambodia, January 9-11, 2014. (Acceptance rate 29%) * Junpei Kawamoto, “A Locality Sensitive Hashing Filter for Encrypted Vector Databases,” Proc. of International Workshop on Privacy-AwaRe Intelligent Systems (PARIS 2012), Macau, December, 2012. (Acceptance rate 15.8%) [

SlideShare

](/slides/paris2012/) * Junpei Kawamoto and Masatoshi Yoshikawa, “[

kurenai

Private Range Query by Perturbation and Matrix Based Encryption](http://hdl.handle.net/2433/147946)," Proc. of the Sixth IEEE International Conference on Digital Information Management (ICDIM 2011), pp.211-216, Melbourne, Australia, September, 2011. (Acceptance rate 32%) (Best paper award) [

SlideShare

](/slides/icdim2011/) * Kazuki Tawaramoto, Junpei Kawamoto, Yasuhito Asano, and Masatoshi Yoshikawa, “[

Springer

A Bipartite Graph Model and Mutually Reinforcing Analysis for Review Sites](http://www.anrdoezrs.net/links/8186671/type/dlg/http://link.springer.com/chapter/10.1007%2F978-3-642-23088-2_25)," Proc. of the 22nd International Conference on Database and Expert Systems Applications (DEXA 2011), pp.341-348, Toulouse, France, August 31, 2011. (Acceptance rate 25%) [

](https://rgmining.github.io/ria/)
* Junpei Kawamoto and Masatoshi Yoshikawa, “[

kurenai

Security of Social Information from Query Analysis in DaaS](http://hdl.handle.net/2433/148038)," Proc. of the 2009 EDBT/ICDT Workshops (PAIS 2009), pp.148-152, Saint-Petersburg, Russia, March 22, 2009. [

SlideShare

](/slides/pais2009/) * Junpei Kawamoto and Masatoshi Yoshikawa, “Protection of Social Information in Database Outsourcing,” Proc. of the Fourth Korea-Japan Database Workshop (KJDB 2008), Fukushima, Japan, September 20, 2008. * Junpei Kawamoto, Qiang Ma, and Masatoshi Yoshikawa, “[

kurenai

Reducing Data Decryption Cost by Broadcast Encryption and Account Assignment for Web Applications](http://hdl.handle.net/2433/147945)," Proc. of the Ninth International Conference on Web-Age Information Management (WAIM 2008), pp.449-454, Zhangjiajie, China, July 20-22, 2008. (Acceptance rate 33.5%) (Short Paper) [

SlideShare

](/slides/waim2008/) * Shun Hattori, Taro Tezuka, Hiroaki Ohshima, Satoshi Oyama, Junpei Kawamoto, Keishi Tajima, and Katsumi Tanaka, “[

Springer

ReCQ: Real-world Context-aware Querying](http://www.anrdoezrs.net/links/8186671/type/dlg/http://link.springer.com/chapter/10.1007%2F978-3-540-74255-5_19)," Proc. of the Sixth International and Interdisciplinary Conference on Modeling and Using Context (CONTEXT 2007), LNAI Vol.4635, pp.248-262, Roskilde University, Denmark, August 20-24, 2007. (Acceptance rate 35%) (Poster Paper)

Thesis

Doctoral Thesis

Master Thesis

Bachelor Thesis