Masakatu Morii
Orcid: 0000-0001-7942-5914
According to our database1,
Masakatu Morii
authored at least 135 papers
between 1989 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Early mitigation of CPU-optimized ransomware using monitoring encryption instructions.
Int. J. Inf. Sec., October, 2024
IACR Cryptol. ePrint Arch., 2024
Personalized federated learning-based intrusion detection system: Poisoning attack and defense.
Future Gener. Comput. Syst., 2024
2023
IEICE Trans. Inf. Syst., September, 2023
Few-Shot Learning-Based Malicious IoT Traffic Detection with Prototypical Graph Neural Networks.
IEICE Trans. Inf. Syst., September, 2023
IEICE Trans. Inf. Syst., September, 2023
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, Matsue, Japan, November 28, 2023
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, Matsue, Japan, November 28, 2023
Proceedings of the 24st Asia-Pacific Network Operations and Management Symposium, 2023
2022
DOC-IDS: A Deep Learning-Based Method for Feature Extraction and Anomaly Detection in Network Traffic.
Sensors, 2022
A Construction of Binary Punctured Linear Codes and A Supporting Method for Best Code Search.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022
Three Layered Architecture for Driver Behavior Analysis and Personalized Assistance with Alert Message Dissemination in 5G Envisioned Fog-IoCV.
Future Internet, 2022
Ann. des Télécommunications, 2022
Proceedings of the 2022 IEEE 33rd Annual International Symposium on Personal, 2022
Proceedings of the Tenth International Symposium on Computing and Networking, 2022
2021
Partition-then-Overlap Method for Labeling Cyber Threat Intelligence Reports by Topics over Time.
IEICE Trans. Inf. Syst., 2021
Proceedings of the WI-IAT '21: IEEE/WIC/ACM International Conference on Web Intelligence, Melbourne VIC Australia, December 14, 2021
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
2020
A Spatial-Temporal Subspace-Based Compressive Channel Estimation Technique in Unknown Interference MIMO Channels.
IEEE Trans. Signal Process., 2020
Paragraph-based Estimation of Cyber Kill Chain Phase from Threat Intelligence Reports.
J. Inf. Process., 2020
A novel software-defined networking controlled vehicular named-data networking for trustworthy emergency data dissemination and content retrieval assisted by evolved interest packet.
Int. J. Distributed Sens. Networks, 2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
Secure Association Rule Mining on Vertically Partitioned Data Using Private-Set Intersection.
IEEE Access, 2020
Stabilized Clustering Enabled V2V Communication in an NDN-SDVN Environment for Content Retrieval.
IEEE Access, 2020
2019
J. Inf. Process., 2019
IEICE Trans. Inf. Syst., 2019
CCN-Based Vehicle-to-Vehicle Communication in DSRC for Content Distribution in Urban Environments.
IEICE Trans. Inf. Syst., 2019
Character-Level Convolutional Neural Network for Predicting Severity of Software Vulnerability from Vulnerability Description.
IEICE Trans. Inf. Syst., 2019
IEICE Trans. Inf. Syst., 2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
Proceedings of the 14th Asia Joint Conference on Information Security, 2019
Proceedings of the 14th Asia Joint Conference on Information Security, 2019
Proceedings of the 14th Asia Joint Conference on Information Security, 2019
2018
Recognition Accuracy Improvement of Obfuscated QR Code by Using Reliability Information and GMD Decoding.
J. Inf. Process., 2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
IEICE Trans. Inf. Syst., 2018
IEICE Trans. Inf. Syst., 2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Further Results on the Error Correction Capability of Irregular LDPC Codes under the Gallager A Algorithm.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018
Proceedings of the Sixth International Symposium on Computing and Networking, 2018
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018
2017
J. Inf. Process., 2017
J. Commun., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data.
IEICE Trans. Inf. Syst., 2017
Attribute Revocable Multi-Authority Attribute-Based Encryption with Forward Secrecy for Cloud Storage.
IEICE Trans. Inf. Syst., 2017
IEICE Trans. Inf. Syst., 2017
IEICE Trans. Inf. Syst., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Analysis of Multiple Darknet Focusing on Outbound Packets and its Application to Malware Analysis.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017
Proceedings of the Applications and Techniques in Information Security, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
Int. J. Distributed Sens. Networks, 2016
Algebraic Decoding of BCH Codes over Symbol-Pair Read Channels: Cases of Two-Pair and Three-Pair Error Correction.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
Efficient Implementations for Practical Linear Cryptanalysis and Its Application to FEAL-8X.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 7th IEEE Annual Ubiquitous Computing, 2016
Proceedings of the 9th International Symposium on Turbo Codes and Iterative Information Processing, 2016
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
New Conditional Differential Cryptanalysis for NLFSR-based Stream Ciphers and Application to Grain v1.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016
Proceedings of the 11th Asia Joint Conference on Information Security, 2016
2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015
LCE in-network caching on vehicular networks for content distribution in urban environments.
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015
Attribute Revocable Attribute-Based Encryption for Decentralized Disruption-Tolerant Military Networks.
Proceedings of the Third International Symposium on Computing and Networking, 2015
A Three-Party Optimistic Certified Email Protocol Using Verifiably Encrypted Signature Scheme for Line Topology.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
A Method for Computing the Weight Spectrum of LDPC Convolutional Codes Based on Circulant Matrices.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
On computing the weight distribution of non-binary ldpc codes using the probabilistic algorithm.
Proceedings of the International Symposium on Information Theory and its Applications, 2014
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014
Proceedings of the 1st international workshop on Information hiding and its criteria for evaluation, 2014
2013
J. Inf. Process., 2013
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013
2012
IEICE Trans. Inf. Syst., 2012
Anonymous Authentication Scheme without Verification Table for Wireless Environments.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
On the Probabilistic Computation Method with Reliability for the Weight Distribution of LDPC Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Proceedings of the Advances in Information and Computer Security, 2012
Proceedings of the International Symposium on Information Theory and its Applications, 2012
An efficient method for computing the weight spectrum of LDPC convolutional codes constructed from quasi-cyclic codes.
Proceedings of the International Symposium on Information Theory and its Applications, 2012
Proposal of a Secure WEP Operation against Existing Key Recovery Attacks and its Evaluation.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012
2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Irreducible <i>m</i>-Term Polynomial and Its Application to Multiplication over GF(2<sup><i>m</i></sup>).
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
AES Flow Interception: Key Snooping Method on Virtual Machine - Exception Handling Attack for AES-NI -.
IACR Cryptol. ePrint Arch., 2011
A reliability-based computation method for the weight distribution of LDPC codes using the probabilistic algorithm.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
Proceedings of the International Symposium on Information Theory and its Applications, 2010
Proceedings of the IEEE International Symposium on Information Theory, 2010
2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Proceedings of the IEEE International Symposium on Information Theory, 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the International Workshop on Multimedia Signal Processing, 2008
Proceedings of the 2008 IEEE Information Theory Workshop, 2008
On the probabilistic computation algorithm for the minimum-size stopping sets of LDPC codes.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008
Proceedings of the Information Hiding, 10th International Workshop, 2008
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008
Proceedings of the 2008 16th European Signal Processing Conference, 2008
2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
Proceedings of the Advances in Information and Computer Security, 2007
2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
2005
A probabilistic computation method for the weight distribution of low-density parity-check codes.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
2004
Proceedings of the 1st IEEE Consumer Communications and Networking Conference, 2004
2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
A Method for Improving Fast Correlation Attack Using Parity Check Equations Modifications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
Proceedings of the Information Security Applications, 4th International Workshop, 2003
1999
Feedback picture sequence control for real-time MPEG video transfer through ATM networks.
Proceedings of the 1999 IEEE International Conference on Communications: Global Convergence Through Communications, 1999
1993
IEEE Trans. Computers, 1993
1992
IEEE Trans. Inf. Theory, 1992
Inf. Process. Lett., 1992
Proceedings of the 22nd IEEE International Symposium on Multiple-Valued Logic, 1992
1990
Proceedings of the Applied Algebra, 1990
1989
Efficient bit-serial multiplication and the discrete-time Wiener-Hopf equation over finite fields.
IEEE Trans. Inf. Theory, 1989