Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Masayuki MurataProfessor, Graduate School of Information Science and Technology, Osaka UniversityVerified email at ist.osaka-u.ac.jp
- Kohei ShiomotoTokyo City UniversityVerified email at tcu.ac.jp
- Tatsuya OtoshiOsaka UniversityVerified email at econ.osaka-u.ac.jp
- Keisuke IshibashiInternational Christian UniversityVerified email at icu.ac.jp
- Takashi MiyamuraSenshu UniversityVerified email at ieee.org
- Shingo AtaOsaka Metropolitan UniversityVerified email at omu.ac.jp
- Noriaki KamiyamaFukuoka UniversityVerified email at fukuoka-u.ac.jp
- Eiji OkiKyoto UniversityVerified email at i.kyoto-u.ac.jp
- Tomoaki HashimotoOsaka Institute of TechnologyVerified email at oit.ac.jp
- Ali Kashif Bashir, PhD, SMIEEE.Professor at Manchester Metropolitan University, UK; Clarivate Highly Cited ResearcherVerified email at ieee.org
- Mitsuaki AkiyamaNTTVerified email at ieee.org
- Daiki ChibaNTT Security (Japan) KKVerified email at ieee.org
- Toshiki ShibaharaNTT Social Informatics LaboratoriesVerified email at hco.ntt.co.jp
- Yuki KoizumiOsaka UniversityVerified email at ist.osaka-u.ac.jp
- Yuta TAKATASecurity Researcher, Ph.D.Verified email at goto.info.waseda.ac.jp
- Shohei KamamuraSeikei UniversityVerified email at ieee.org
- Kozo SatodaNEC CorporationVerified email at cb.jp.nec.com