- Network Security and Intrusion Detection
- Internet Traffic Analysis and Secure E-voting
- Network Traffic and Congestion Control
- Caching and Content Delivery
- Opportunistic and Delay-Tolerant Networks
- Software-Defined Networks and 5G
- Mobile Ad Hoc Networks
- IPv6, Mobility, Handover, Networks, Security
- Energy Efficient Wireless Sensor Networks
- Privacy-Preserving Technologies in Data
- Vehicular Ad Hoc Networks (VANETs)
- Mobile Agent-Based Network Management
- Network Packet Processing and Optimization
- Anomaly Detection Techniques and Applications
- Advanced Malware Detection Techniques
- Interconnection Networks and Systems
- IoT and Edge/Fog Computing
- Peer-to-Peer Network Technologies
- Advanced Optical Network Technologies
- Software System Performance and Reliability
- Autonomous Vehicle Technology and Safety
- Multimedia Communication and Technology
- Cloud Computing and Resource Management
- Wireless Networks and Protocols
- IoT-based Smart Home Systems
The University of Tokyo
2016-2025
Tokyo University of Information Sciences
2024
Bunkyo University
2003-2022
Takenaka (Japan)
2019
Japan Graduate School of Education University
2017
Chulalongkorn University
2012
Central Region Agricultural Research Center
2007
Toshiba (Japan)
1995-2003
Columbia University
2003
Toshiba (South Korea)
1997
It has been reported worldwide that peer-to-peer traffic is taking up a significant portion of backbone networks. In particular, it prominent in Japan because the high penetration rate fiber-based broadband access. this paper, we first report aggregated measurements collected over 21 months from seven ISPs covering 42% Japanese traffic. The dominated by symmetric residential which increased 37%in 2005. We further investigate per-customer trafficc one comparing DSL and fiber users,...
For cooperative intelligent transport systems (C-ITS), vehicle-to-everything (V2X) communication is utilized to allow autonomous vehicles share critical information with each other. We propose AutowareV2X, an implementation of a V2X module that integrated into the driving (AD) software, Autoware. AutowareV2X provides external connectivity entire AD stack, enabling end-to-end (E2E) experimentation and evaluation connected (CAV). The Collective Perception Service was also implemented, allowing...
It has been reported worldwide that peer-to-peer traffic is taking up a significant portion of backbone networks. In particular, it prominent in Japan because the high penetration rate fiber-based broadband access. this paper, we first report aggregated measurements collected over 21 months from seven ISPs covering 42% Japanese traffic. The dominated by symmetric residential which increased 37%in 2005. We further investigate per-customer trafficc one comparing DSL and fiber users,...
It is often argued that rapidly increasing video content along with the penetration of high-speed access leading to explosive growth in Internet traffic. Contrary this popular claim, technically solid reports show only modest traffic worldwide. This paper sheds light on causes apparently slow trends by analyzing commercial residential Japan where fiber rate much higher than other countries. We first report Japanese also has rates using aggregated measurements from six ISPs. Then, we...
A typical large building contains thousands of sensors, monitoring the HVAC system, lighting, and other operational sub-systems. With increased push for efficiency, operators are relying more on historical data processing to uncover opportunities energy-savings. However, they overwhelmed with deluge seek efficient ways identify potential problems. In this paper, we present a new approach called Strip, Bind Search (SBS); method uncovering abnormal equipment behavior in-concert usage patterns....
Network log messages (e.g., syslog) are expected to be valuable and useful information detect unexpected or anomalous behavior in large scale networks. However, because of the huge amount system data collected daily operation, it is not easy extract pinpoint failures identify their causes. In this paper, we propose a method for extracting identifying causes from network syslog data. The methodology proposed paper relies on causal inference that reconstructs causality events set time series...
Vehicle-to-Everything (V2X) communication enhances the capability of autonomous driving through better safety, efficiency, and comfort. In particular, sensor data sharing, known as cooperative perception, is a crucial technique to accommodate vulnerable road users in intelligent transport system (ITS). this paper, we describe roadside perception unit (RSPU) that combines sensors units (RSUs) for infrastructure-based perception. We propose software called AutoC2X designed realize RSPUs...
Predominant network intrusion detection systems (NIDS) aim to identify malicious traffic patterns based on a handcrafted dataset of rules. Recently, the application machine learning in NIDS helps alleviate enormous effort human observation. Federated (FL) is collaborative scheme concerning distributed data. Instead sharing raw data, it allows participant share only trained local model. Despite success existing FL solutions, NIDS, network's data distribution does not always fit into single...
Wider coverage and a better solution to latency reduction in 5G necessitate its combination with multi-access edge computing (MEC) technology. Decentralized deep learning (DDL) such as federated swarm promising privacy-preserving data processing for millions of smart devices, leverages distributed multi-layer neural networks within the networking local clients, whereas, without disclosing original training data. Notably, industries finance healthcare where sensitive transactions personal...
This paper investigates the effects of rapidly-growing residential broadband traffic on commercial ISP backbone networks. We collected month-long aggregated logs for different groups from seven major ISPs in Japan order to analyze macro-level impact broad-band traffic. These are carefully selected be summable, and not count same multiple times.Our results show that (1) customer our data exceeds 100Gbps average. Our is considered cover 41% total Japan, thus we can estimate currently about...
This paper presents our field experience in data collection from remote sensors. By letting tractors, farmers, and sensors have short-range radio communication devices with delay-disruption tolerant networking (DTN), we can collect those to central database. Although, several implementations been made cellular phones or mesh networks the past, DTN-based systems for such applications are still under explored. The main objective of this is present practical implementation experiences software,...
The realization of vehicle-to-everything (V2X) communication enhances the capabilities autonomous vehicles in terms safety efficiency and comfort. In particular, sensor data sharing, known as cooperative perception, is a crucial technique to accommodate vulnerable road users intelligent transport system (ITS). this regard, open-source software plays significant role prototyping, validation, deployment. Specifically, developer community, Autoware popular for self-driving vehicles, OpenC2X an...
The commercialization of 5G has been initiated for a while. Furthermore, millimeter wave (mmWave) introduced to small cells with coverage due its strong linearity and non-winding characteristics. On the other hand, in connected autonomous vehicles (CAV s), where various traffic systems can cooperatively perform recognition, decision-making, execution, communication is assumed be always connected. Therefore, use low latency mm Wave high-speed moving CAV, existing beamforming cannot follow...
System log from network equipment is one of the most important information for management. Sophisticated message mining could help in investigating a huge number messages trouble shooting, especially recent complicated structure (e.g., virtualized networks). However, generating templates (i.e., meta format) real (instances) still difficult problem terms accuracy. In this paper we propose Natural Language Processing (NLP) approach to generate produced by order overcome problem. The key idea...
Privacy-sensitive data is stored in autonomous vehicles, smart devices, or sensor nodes that can move around with making opportunistic contact each other. Federation among such was mainly discussed the context of federated learning a centralized mechanism many works. However, because multi-vendor issues, those do not want to rely on specific server operated by third party for this purpose. In paper, we propose wireless ad hoc (WAFL) -- fully distributed cooperative machine organized...
Abstract The increasing demand for remote collaboration and working has become crucial to daily life owing the Covid-19 pandemic development of internet-based video distribution services. Furthermore, low-latency collaboration, such as teleoperation support applications designed in-vehicle environments, gained considerable attention. 5 G technology is considered a key infrastructure collaboration. This study aimed evaluate actual capability achieve high quality service (QoS) We implemented...
Intelligent buildings are getting data-centric - they archive the historical records of motion detectors, power usages, HVAC statuses, weather, and any other information in order to improve their control strategies. The engineering cost installation maintenance such systems should be minimized as system owner has operate them for several decades: i.e., lifetime building. However, there design pitfalls that multiply costs, which make operation heavy burden. This paper identifies those...
Traditional approaches to cybersecurity issues usually protect users from attacks after the occurrence of specific types attacks. Besides, patterns recent cyberattacks tend be changeable, which add up unpredictability them. On other hand, machine learning, as a new method used detect intrusion, is attracting more and attention. Moreover, through sharing local training data, centralized learning approach has proven improve model's performance. In this research, segmented federated proposed,...
IPv6 has been designed, among other things, to provide an expanded address space satisfy the future networking requirements. In this article, we analyze and discuss important aspects of deployment scenarios, propose system architecture coexisting integrating with IPv4/MPLS networks. We investigate on various strategies along network design examples, comparing these techniques. Then in service provider environments is proposed.
Abstract A novel host behavior classification approach is proposed as a preliminary step toward traffic and anomaly detection in network communication. Although many attempts described the literature were devoted to flow or application classifications, these approaches are not always adaptable operational constraints of monitoring (expected work even without packet payload, bidirectionality, on high‐speed networks from reports only, etc.). Instead, here relies leading idea that relevantly...