Hybrid Cloud and Security Research Group - Papers and Publications


Academic Papers and Publications

2020

2019

  • Towards Federated Graph Learning for Collaborative Financial Crimes Detection
    Toyotaro Suzumura, Yi Zhou, Natahalie Baracaldo, Guangnan Ye, Keith Houck, Ryo Kawahara, Ali Anwar, Lucia Larise Stavarache, Yuji Watanabe, Pablo Loyola, Daniel Klyashtorny, Heiko Ludwig, Kumar Bhaskaran
    arXiv e-prints, arXiv:1909.12946
  • An Edit-centric Approach for Wikipedia Article Quality Assessment
    Edison Marrese-Taylor, Pablo Loyola, Yutaka Matsuo
    Proceedings of the 5th Workshop on Noisy User-generated Text (W-NUT 2019), pp. 381-386.

2018

  • Villani at SemEval-2018 Task 8: Semantic Extraction from Cybersecurity Reports using Representation Learning
    Pablo Loyola, Kugamoorthy Gajananan, Yuji Watanabe, Fumiko Satoh

    Proceedings of The 12th International Workshop on Semantic Evaluation, pp. 885-889.
  • Modeling Sentiment Polarity in Support Ticket Data for Predicting Cloud Service Subscription Renewal
    Kugmoorthy Gajananan, Pablo Loyola, Yasuharu Katsuno, Asim Munawar, Trent Scott, Fumiko Satoh

    IEEE International Conference on Services Computing (SCC 2018), pp. 49-56. [Best Paper Award]
  • Bug Localization by Learning to Rank and Represent Bug Inducing Changes
    Pablo Loyola, Kugmoorthy Gajananan, Fumiko Satoh
    International Conference on Information and Knowledge Management (CIKM), pp. 657-665.
  • A Unified Framework for Specifying Cost Models of IT Service Offerings
    Kugamoorthy Gajananan, Aly Megahed, Shubhi Asthana and Taiga Nakamura
    INFORMS International Conference Service Science (CSS), pp. 151-160.
  • Generative Model of Combosquatting Domain Names and Evaluation
    (Combosquattingドメインネームの生成モデルとその評価)
    Hirokuni Kitahara, Yuji Watanabe
    Computer Security Symposium (CSS)
     
  • ChatBot System for Vulnerability Detecting using Environmental Metrics
    (環境情報を用いた脆弱性検出のチャットボット)

    Alisa Arno, Ai Ishida, Ruriko Kudo, Yuji Watanabe
    Computer Security Symposium (CSS)

2017

  • Leveraging the Serverless Architecture for Securing Linux Containers
    Nilton Bila, Paolo Dettori, Ali Kanso, Yuji Watanabe, Alaa Youssef
    IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 401-404.
  • A Method for Estimating Annual Cost Reduction of IT Service Deals
    Kugamoorthy Gajananan, Aly Megahed, Shubhi Asthana, Valeria Becker, Taiga Nakamura, Mark Smith
    IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), pp. 45-50.
  • A Method for Selecting Peer Deals in IT Service Contracts
    Aly Megahed, Shubhi Asthana, Valeria Becker, Taiga Nakamura, Kugamoorthy Gajananan

    IEEE International Conference on Artificial Intelligence and Mobile Services (AIMS), pp. 1-7.
  • A Cognitive Prioritization for Reports Generated in Resource Constrained Applications
    Shubhi Asthana, Aly Megahed, Valeria Becker, Taiga Nakamura, Kugamoorthy Gajananan

    IEEE International Conference on Services Computing (SCC), pp. 418-425.
  • Edge-side Security Event Management for Plug-and-Play IoT
    Fumiko Satoh, Takuya Mishina, Naoto Sato, Yoichi Hatsutori

    Symposium on Cryptography and Information Security (SCIS)
  • クラウド上での安全なコンテナー活用にむけたセキュリティ分析の自動化
    Yuji Watanabe, Ai Ishida
    Symposium on Cryptography and Information Security (SCIS)

2016

  • Vibration-base Key Exchange among Multiple Smart Devices on the Desk
    Alisa Arno, Kentaroh Toyoda, Yuji Watanabe, Iwao Sasase, P. Takis Mathiopoulos
    Image Processing and Communications 21(2), 33-42. 
  • Security, Compliance, and Agile Deployment of Personal Identifiable Information Solutions on a Public Cloud
    Katsuno Yasuharu, Kundu Ashish, Das Koushik K, Takahashi Hitomi, Schloss Robert, Dey Prasenjit, Mohania Mukesh
    IEEE 9th International Conference on Cloud Computing (CLOUD), pp. 359-366.
  • Optimizing Schedule for Parallel Software Deployments Based on Profiles of Network Activity and Installation Time in Cloud Environments
    Hitomi Takahashi,  Yasuharu Katsuno

    IEEE 9th International Conference on Cloud Computing (CLOUD), pp. 742-749.
  • Top-Down Pricing of IT Services Deals with Recommendation for Missing Values of Historical and Market Data
    Aly Megahed, Kugamoorthy Gajananan, Shubhi Asthana, Valeria Becker, Mark Smith, Taiga Nakamura
    International Conference on Service-Oriented Computing, pp. 745-760.
  • A Top-Down Pricing Algorithm for IT Service Contracts Using Lower Level Service Data
    Kugamoorthy Gajananan, Aly Megahed, Mari Abe, Taiga Nakamura, Mark Smith
    IEEE International Conference on Services Computing (SCC), pp. 720-727.
  • Threat Scenario Analysis of a SIEM System for IoT Devices
    (IoT向けSIEMシステム設計のための脅威シナリオ検討)
    Takuya Mishina, Kouichi Ono, Seiji Muntetoh, Naoto Sato, Yoichi Hatsutori, Fumiko Satoh
    第73回CSEC研究発表会
  • Automated Vulnerability Evaluation System for Containers on Cloud
    (クラウド上のコンテナサービスに対する パッケージ脆弱性自動評価システム)
    Ai Ishida, Yuji Watanabe
    Computer Security Symposium (CSS)

* Please refer the papers before 2015 in member's page.