Get my own profile
Public access
View all5 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Nei Kato(IEEE Fellow, IEICE Fellow)Professor and Dean, Graduate School of Information Sciences, Tohoku University, JapanVerified email at it.is.tohoku.ac.jp
Katsuya SutoThe University of Electro-CommunicationsVerified email at ieee.org
Hiroki NishiyamaTohoku University, JAPANVerified email at ieee.org
jiajia liuProfessor, School of Cybersecurity, Northwestern Polytechnical UniversityVerified email at nwpu.edu.cn
Fengxiao Tangtohoku university, central south universityVerified email at it.is.tohoku.ac.jp
Yuichi KawamotoTohoku UniversityVerified email at ieee.org
Mostafa M. FoudaIdaho State University, USAVerified email at isu.edu
Sai XuUniversity of SheffieldVerified email at ieee.org
Shikhar VermaAssistant Professor at Graduate School of Information Science, Tohoku University, JapanVerified email at it.is.tohoku.ac.jp
QI GUOTohoku UniversityVerified email at tohoku.ac.jp
Won Joon YunKorea UniversityVerified email at korea.ac.kr
Soyi JungAssistant Professor, Department of Electrical and Computer Engineering, Ajou UniversityVerified email at ajou.ac.kr
Soohyun ParkSookmyung Women's UniversityVerified email at sookmyung.ac.kr
Joongheon KimKorea University Professor (Electrical Engineering) | USC PhD (Computer Science)Verified email at korea.ac.kr
Muhammad IsmailDirector of CEROC and Associate Professor of Computer Science, Tennessee Tech UniversityVerified email at tntech.edu
Shangwei ZhangNorthwestern Polytechnical UniversityVerified email at nwpu.edu.cn
Takeru InoueNTT Network Innovation Labs.Verified email at ieee.org
Kimihiro MizutaniKindai UniversityVerified email at info.kindai.ac.jp
Osamu AkashiNational Institute of InformaticsVerified email at nii.ac.jp
Takuo SuganumaCyberscience Center, Tohoku UniversityVerified email at tohoku.ac.jp