@inproceedings{HataMK08, title = {An extension of fault-prone filtering using precise training and a dynamic threshold}, author = {Hideaki Hata and Osamu Mizuno and Tohru Kikuno}, year = {2008}, doi = {10.1145/1370750.1370772}, url = {http://doi.acm.org/10.1145/1370750.1370772}, researchr = {https://researchr.org/publication/HataMK08}, cites = {0}, citedby = {0}, pages = {89-98}, booktitle = {msr}, } @inproceedings{NakasaiHOM17, title = {Analysis of Donations in the Eclipse Project}, author = {Keitaro Nakasai and Hideaki Hata and Saya Onoue and Kenichi Matsumoto}, year = {2017}, doi = {10.1109/IWESEP.2017.19}, url = {https://doi.org/10.1109/IWESEP.2017.19}, researchr = {https://researchr.org/publication/NakasaiHOM17}, cites = {0}, citedby = {0}, pages = {18-22}, booktitle = {iwesep}, } @inproceedings{MizunoH10-0, title = {An Empirical Comparison of Fault-Prone Module Detection Approaches: Complexity Metrics and Text Feature Metrics}, author = {Osamu Mizuno and Hideaki Hata}, year = {2010}, doi = {10.1109/COMPSAC.2010.30}, url = {http://dx.doi.org/10.1109/COMPSAC.2010.30}, tags = {empirical, systematic-approach}, researchr = {https://researchr.org/publication/MizunoH10-0}, cites = {0}, citedby = {0}, pages = {248-249}, booktitle = {compsac}, } @inproceedings{YongpisanpopHM14, title = {Bugarium: 3d interaction for supporting large-scale bug repositories analysis}, author = {Papon Yongpisanpop and Hideaki Hata and Ken-ichi Matsumoto}, year = {2014}, doi = {10.1145/2591062.2591125}, url = {http://doi.acm.org/10.1145/2591062.2591125}, researchr = {https://researchr.org/publication/YongpisanpopHM14}, cites = {0}, citedby = {0}, pages = {500-503}, booktitle = {ICSE}, } @article{MizunoH10-1, title = {A Hybrid Fault-Proneness Detection Approach Using Text Filtering and Static Code Analysis}, author = {Osamu Mizuno and Hideaki Hata}, year = {2010}, url = {http://www.aicit.org/ijact/ppl/01_IJACTS3-207002.pdf}, tags = {analysis, static analysis, systematic-approach}, researchr = {https://researchr.org/publication/MizunoH10-1}, cites = {0}, citedby = {0}, journal = {ijact-aicit}, volume = {2}, number = {5}, pages = {1-12}, } @inproceedings{OdaFNHSTN15, title = {Learning to Generate Pseudo-Code from Source Code Using Statistical Machine Translation (T)}, author = {Yusuke Oda and Hiroyuki Fudaba and Graham Neubig and Hideaki Hata and Sakriani Sakti and Tomoki Toda and Satoshi Nakamura}, year = {2015}, doi = {10.1109/ASE.2015.36}, url = {http://dx.doi.org/10.1109/ASE.2015.36}, researchr = {https://researchr.org/publication/OdaFNHSTN15}, cites = {0}, citedby = {0}, pages = {574-584}, booktitle = {ASE}, } @inproceedings{Tantithamthavorn14, title = {Impact Analysis of Granularity Levels on Feature Location Technique}, author = {Chakkrit Tantithamthavorn and Akinori Ihara and Hideaki Hata and Kenichi Matsumoto}, year = {2014}, doi = {10.1007/978-3-662-43610-3_11}, url = {http://dx.doi.org/10.1007/978-3-662-43610-3_11}, researchr = {https://researchr.org/publication/Tantithamthavorn14}, cites = {0}, citedby = {0}, pages = {135-149}, booktitle = {apres}, } @inproceedings{TerdchanakulHPM17, title = {Bug or Not? Bug Report Classification Using N-Gram IDF}, author = {Pannavat Terdchanakul and Hideaki Hata and Passakorn Phannachitta and Kenichi Matsumoto}, year = {2017}, doi = {10.1109/ICSME.2017.14}, url = {http://doi.ieeecomputersociety.org/10.1109/ICSME.2017.14}, researchr = {https://researchr.org/publication/TerdchanakulHPM17}, cites = {0}, citedby = {0}, pages = {534-538}, booktitle = {ICSM}, } @inproceedings{OhiraKYYMLFHIM15, title = {A Dataset of High Impact Bugs: Manually-Classified Issue Reports}, author = {Masao Ohira and Yutaro Kashiwa and Yosuke Yamatani and Hayato Yoshiyuki and Yoshiya Maeda and Nachai Limsettho and Keisuke Fujino and Hideaki Hata and Akinori Ihara and Ken-ichi Matsumoto}, year = {2015}, doi = {10.1109/MSR.2015.78}, url = {http://dx.doi.org/10.1109/MSR.2015.78}, researchr = {https://researchr.org/publication/OhiraKYYMLFHIM15}, cites = {0}, citedby = {0}, pages = {518-521}, booktitle = {msr}, } @inproceedings{HigoOHHK15, title = {Toward Reusing Code Changes}, author = {Yoshiki Higo and Akio Ohtani and Shinpei Hayashi and Hideaki Hata and Shinji Kusumoto}, year = {2015}, doi = {10.1109/MSR.2015.43}, url = {http://dx.doi.org/10.1109/MSR.2015.43}, researchr = {https://researchr.org/publication/HigoOHHK15}, cites = {0}, citedby = {0}, pages = {372-376}, booktitle = {msr}, } @inproceedings{FujiwaraHMM15, title = {Bug report recommendation for code inspection}, author = {Shin Fujiwara and Hideaki Hata and Akito Monden and Ken-ichi Matsumoto}, year = {2015}, doi = {10.1109/SWAN.2015.7070481}, url = {http://dx.doi.org/10.1109/SWAN.2015.7070481}, researchr = {https://researchr.org/publication/FujiwaraHMM15}, cites = {0}, citedby = {0}, pages = {9-12}, booktitle = {WCRE}, } @inproceedings{NakasaiTHM18, title = {Identifying Spoofing Accounts on Twitter Based on Relationships of Accounts}, author = {Keitaro Nakasai and Masateru Tsunoda and Hideaki Hata and Kenichi Matsumoto}, year = {2018}, doi = {10.1109/BCD2018.2018.00021}, url = {http://doi.ieeecomputersociety.org/10.1109/BCD2018.2018.00021}, researchr = {https://researchr.org/publication/NakasaiTHM18}, cites = {0}, citedby = {0}, pages = {85-90}, booktitle = {bcd}, } @inproceedings{OgamiKHIM17, title = {Using High-Rising Cities to Visualize Performance in Real-Time}, author = {Katsuya Ogami and Raula Gaikovina Kula and Hideaki Hata and Takashi Ishio and Kenichi Matsumoto}, year = {2017}, doi = {10.1109/VISSOFT.2017.25}, url = {http://doi.ieeecomputersociety.org/10.1109/VISSOFT.2017.25}, researchr = {https://researchr.org/publication/OgamiKHIM17}, cites = {0}, citedby = {0}, pages = {33-42}, booktitle = {vissoft}, } @inproceedings{HataMK12, title = {Bug prediction based on fine-grained module histories}, author = {Hideaki Hata and Osamu Mizuno and Tohru Kikuno}, year = {2012}, doi = {10.1109/ICSE.2012.6227193}, url = {http://dx.doi.org/10.1109/ICSE.2012.6227193}, researchr = {https://researchr.org/publication/HataMK12}, cites = {0}, citedby = {0}, pages = {200-210}, booktitle = {ICSE}, } @inproceedings{Lertwittayatrai17, title = {Extracting Insights from the Topology of the JavaScript Package Ecosystem}, author = {Nuttapon Lertwittayatrai and Raula Gaikovina Kula and Saya Onoue and Hideaki Hata and Arnon Rungsawang and Pattara Leelaprute and Kenichi Matsumoto}, year = {2017}, doi = {10.1109/APSEC.2017.36}, url = {http://doi.ieeecomputersociety.org/10.1109/APSEC.2017.36}, researchr = {https://researchr.org/publication/Lertwittayatrai17}, cites = {0}, citedby = {0}, pages = {298-307}, booktitle = {apsec}, } @article{OnoueHMM16, title = {Investigating and Projecting Population Structures in Open Source Software Projects: A Case Study of Projects in GitHub}, author = {Saya Onoue and Hideaki Hata and Akito Monden and Ken-ichi Matsumoto}, year = {2016}, url = {http://search.ieice.org/bin/summary.php?id=e99-d_5_1304}, researchr = {https://researchr.org/publication/OnoueHMM16}, cites = {0}, citedby = {0}, journal = {ieicet}, volume = {99-D}, number = {5}, pages = {1304-1315}, } @inproceedings{OnoueHM14, title = {Software population pyramids: the current and the future of OSS development communities}, author = {Saya Onoue and Hideaki Hata and Ken-ichi Matsumoto}, year = {2014}, doi = {10.1145/2652524.2652565}, url = {http://doi.acm.org/10.1145/2652524.2652565}, researchr = {https://researchr.org/publication/OnoueHM14}, cites = {0}, citedby = {0}, pages = {34}, booktitle = {esem}, } @inproceedings{KitagawaGKH17, title = {Utility design for two-player normal-form games}, author = {Koji Kitagawa and Mingyu Guo and Kiminao Kogiso and Hideaki Hata}, year = {2017}, doi = {10.1109/ASCC.2017.8287495}, url = {https://doi.org/10.1109/ASCC.2017.8287495}, researchr = {https://researchr.org/publication/KitagawaGKH17}, cites = {0}, citedby = {0}, pages = {2077-2082}, booktitle = {ascc}, } @inproceedings{OnoueHM13, title = {A Study of the Characteristics of Developers' Activities in GitHub}, author = {Saya Onoue and Hideaki Hata and Ken-ichi Matsumoto}, year = {2013}, doi = {10.1109/APSEC.2013.104}, url = {http://dx.doi.org/10.1109/APSEC.2013.104}, researchr = {https://researchr.org/publication/OnoueHM13}, cites = {0}, citedby = {0}, pages = {7-12}, booktitle = {apsec}, } @inproceedings{RadevskiHM16-0, title = {EyeNav: Gaze-Based Code Navigation}, author = {Stevche Radevski and Hideaki Hata and Ken-ichi Matsumoto}, year = {2016}, doi = {10.1145/2971485.2996724}, url = {http://doi.acm.org/10.1145/2971485.2996724}, researchr = {https://researchr.org/publication/RadevskiHM16-0}, cites = {0}, citedby = {0}, pages = {89}, booktitle = {nordichi}, } @inproceedings{HataMK08:0, title = {Comparative Study of Fault-Proneness Filtering with PMD}, author = {Hideaki Hata and Osamu Mizuno and Tohru Kikuno}, year = {2008}, doi = {10.1109/ISSRE.2008.49}, url = {http://dx.doi.org/10.1109/ISSRE.2008.49}, researchr = {https://researchr.org/publication/HataMK08%3A0}, cites = {0}, citedby = {0}, pages = {317-318}, booktitle = {issre}, } @article{HataMK10, title = {Fault-prone module detection using large-scale text features based on spam filtering}, author = {Hideaki Hata and Osamu Mizuno and Tohru Kikuno}, year = {2010}, doi = {10.1007/s10664-009-9117-9}, url = {http://dx.doi.org/10.1007/s10664-009-9117-9}, tags = {rule-based}, researchr = {https://researchr.org/publication/HataMK10}, cites = {0}, citedby = {0}, journal = {ese}, volume = {15}, number = {2}, pages = {147-165}, } @inproceedings{HataMK11, title = {Historage: fine-grained version control system for Java}, author = {Hideaki Hata and Osamu Mizuno and Tohru Kikuno}, year = {2011}, doi = {10.1145/2024445.2024463}, url = {http://doi.acm.org/10.1145/2024445.2024463}, researchr = {https://researchr.org/publication/HataMK11}, cites = {0}, citedby = {0}, pages = {96-100}, booktitle = {iwpse}, } @inproceedings{ArakawaYMHSIF16, title = {Project IS^3: Incentive-Based Intelligent Intervention for Smart and Sustainable Society}, author = {Yutaka Arakawa and Keiichi Yasumoto and Kenichi Matsumoto and Hideaki Hata and Hirohiko Suwa and Akinori Ihara and Manato Fujimoto}, year = {2016}, doi = {10.1109/IIAI-AAI.2016.97}, url = {http://doi.ieeecomputersociety.org/10.1109/IIAI-AAI.2016.97}, researchr = {https://researchr.org/publication/ArakawaYMHSIF16}, cites = {0}, citedby = {0}, pages = {215-218}, booktitle = {iiaiaai}, } @article{KashiwabaraIHI15, title = {Method Verb Recommendation Using Association Rule Mining in a Set of Existing Projects}, author = {Yuki Kashiwabara and Takashi Ishio and Hideaki Hata and Katsuro Inoue}, year = {2015}, url = {http://search.ieice.org/bin/summary.php?id=e98-d_3_627}, researchr = {https://researchr.org/publication/KashiwabaraIHI15}, cites = {0}, citedby = {0}, journal = {ieicet}, volume = {98-D}, number = {3}, pages = {627-636}, } @inproceedings{FudabaOANHSTN15, title = {Pseudogen: A Tool to Automatically Generate Pseudo-Code from Source Code}, author = {Hiroyuki Fudaba and Yusuke Oda and Koichi Akabe and Graham Neubig and Hideaki Hata and Sakriani Sakti and Tomoki Toda and Satoshi Nakamura}, year = {2015}, doi = {10.1109/ASE.2015.107}, url = {http://dx.doi.org/10.1109/ASE.2015.107}, researchr = {https://researchr.org/publication/FudabaOANHSTN15}, cites = {0}, citedby = {0}, pages = {824-829}, booktitle = {ASE}, } @inproceedings{HataTOM15, title = {Characteristics of Sustainable OSS Projects: A Theoretical and Empirical Study}, author = {Hideaki Hata and Taiki Todo and Saya Onoue and Ken-ichi Matsumoto}, year = {2015}, doi = {10.1109/CHASE.2015.9}, url = {http://dx.doi.org/10.1109/CHASE.2015.9}, researchr = {https://researchr.org/publication/HataTOM15}, cites = {0}, citedby = {0}, pages = {15-21}, booktitle = {ICSE}, } @article{LimsetthoHMM16, title = {Unsupervised Bug Report Categorization Using Clustering and Labeling Algorithm}, author = {Nachai Limsettho and Hideaki Hata and Akito Monden and Kenichi Matsumoto}, year = {2016}, doi = {10.1142/S0218194016500352}, url = {http://dx.doi.org/10.1142/S0218194016500352}, researchr = {https://researchr.org/publication/LimsetthoHMM16}, cites = {0}, citedby = {0}, journal = {ijseke}, volume = {26}, number = {7}, pages = {1027-1054}, } @inproceedings{KandaGHM17, title = {Towards understanding an open-source bounty: Analysis of Bountysource}, author = {Tetsuya Kanda and Mingyu Guo and Hideaki Hata and Ken-ichi Matsumoto}, year = {2017}, doi = {10.1109/SANER.2017.7884685}, url = {http://doi.ieeecomputersociety.org/10.1109/SANER.2017.7884685}, researchr = {https://researchr.org/publication/KandaGHM17}, cites = {0}, citedby = {0}, pages = {577-578}, booktitle = {WCRE}, } @inproceedings{RadevskiHM15, title = {Real-Time Monitoring of Neural State in Assessing and Improving Software Developers' Productivity}, author = {Stevche Radevski and Hideaki Hata and Ken-ichi Matsumoto}, year = {2015}, doi = {10.1109/CHASE.2015.28}, url = {http://dx.doi.org/10.1109/CHASE.2015.28}, researchr = {https://researchr.org/publication/RadevskiHM15}, cites = {0}, citedby = {0}, pages = {93-96}, booktitle = {ICSE}, } @inproceedings{SunHTY15, title = {Exchange of Indivisible Objects with Asymmetry}, author = {Zhaohong Sun and Hideaki Hata and Taiki Todo and Makoto Yokoo}, year = {2015}, url = {http://ijcai.org/papers15/Abstracts/IJCAI15-021.html}, researchr = {https://researchr.org/publication/SunHTY15}, cites = {0}, citedby = {0}, pages = {97-103}, booktitle = {IJCAI}, } @inproceedings{GuoHB17, title = {Optimizing Affine Maximizer Auctions via Linear Programming: An Application to Revenue Maximizing Mechanism Design for Zero-Day Exploits Markets}, author = {Mingyu Guo and Hideaki Hata and Ali Babar}, year = {2017}, doi = {10.1007/978-3-319-69131-2_17}, url = {https://doi.org/10.1007/978-3-319-69131-2_17}, researchr = {https://researchr.org/publication/GuoHB17}, cites = {0}, citedby = {0}, pages = {280-292}, booktitle = {prima}, } @inproceedings{KitagawaHIKM16, title = {Code review participation: game theoretical modeling of reviewers in gerrit datasets}, author = {Norihito Kitagawa and Hideaki Hata and Akinori Ihara and Kiminao Kogiso and Ken-ichi Matsumoto}, year = {2016}, doi = {10.1145/2897586.2897605}, url = {http://doi.acm.org/10.1145/2897586.2897605}, researchr = {https://researchr.org/publication/KitagawaHIKM16}, cites = {0}, citedby = {0}, pages = {64-67}, booktitle = {ICSE}, } @inproceedings{MizunoH10, title = {An Integrated Approach to Detect Fault-Prone Modules Using Complexity and Text Feature Metrics}, author = {Osamu Mizuno and Hideaki Hata}, year = {2010}, doi = {10.1007/978-3-642-13577-4_41}, url = {http://dx.doi.org/10.1007/978-3-642-13577-4_41}, tags = {systematic-approach}, researchr = {https://researchr.org/publication/MizunoH10}, cites = {0}, citedby = {0}, pages = {457-468}, booktitle = {sersc-isa}, } @inproceedings{FujiwaraHMFNIM14, title = {Kataribe: a hosting service of historage repositories}, author = {Kenji Fujiwara and Hideaki Hata and Erina Makihara and Yusuke Fujihara and Naoki Nakayama and Hajimu Iida and Ken-ichi Matsumoto}, year = {2014}, doi = {10.1145/2597073.2597125}, url = {http://doi.acm.org/10.1145/2597073.2597125}, researchr = {https://researchr.org/publication/FujiwaraHMFNIM14}, cites = {0}, citedby = {0}, pages = {380-383}, booktitle = {msr}, } @article{LimsetthoBKHM18, title = {Cross project defect prediction using class distribution estimation and oversampling}, author = {Nachai Limsettho and Kwabena Ebo Bennin and Jacky W. Keung and Hideaki Hata and Kenichi Matsumoto}, year = {2018}, doi = {10.1016/j.infsof.2018.04.001}, url = {https://doi.org/10.1016/j.infsof.2018.04.001}, researchr = {https://researchr.org/publication/LimsetthoBKHM18}, cites = {0}, citedby = {0}, journal = {INFSOF}, volume = {100}, pages = {87-102}, } @inproceedings{NakasaiTH16, title = {Web search behaviors for software development}, author = {Keitaro Nakasai and Masateru Tsunoda and Hideaki Hata}, year = {2016}, doi = {10.1145/2897586.2897614}, url = {http://doi.acm.org/10.1145/2897586.2897614}, researchr = {https://researchr.org/publication/NakasaiTH16}, cites = {0}, citedby = {0}, pages = {125-128}, booktitle = {ICSE}, } @inproceedings{YuzukiHM15, title = {How we resolve conflict: an empirical study of method-level conflict resolution}, author = {Ryohei Yuzuki and Hideaki Hata and Ken-ichi Matsumoto}, year = {2015}, doi = {10.1109/SWAN.2015.7070484}, url = {http://dx.doi.org/10.1109/SWAN.2015.7070484}, researchr = {https://researchr.org/publication/YuzukiHM15}, cites = {0}, citedby = {0}, pages = {21-24}, booktitle = {WCRE}, } @inproceedings{TakataARHDIM18, title = {Catalogen: Generating Catalogs of Code Examples Collected from OSS}, author = {Daiki Takata and Abdulaziz Alhefdhi and Maipradit Rungroj and Hideaki Hata and Hoa Khanh Dam and Takashi Ishio and Kenichi Matsumoto}, year = {2018}, doi = {10.1109/DySDoc3.2018.00012}, url = {https://doi.org/10.1109/DySDoc3.2018.00012}, researchr = {https://researchr.org/publication/TakataARHDIM18}, cites = {0}, citedby = {0}, pages = {11-12}, booktitle = {ICSM}, } @inproceedings{OguraMHK18, title = {Bring your own coding style}, author = {Naoto Ogura and Shinsuke Matsumoto and Hideaki Hata and Shinji Kusumoto}, year = {2018}, doi = {10.1109/SANER.2018.8330253}, url = {http://doi.ieeecomputersociety.org/10.1109/SANER.2018.8330253}, researchr = {https://researchr.org/publication/OguraMHK18}, cites = {0}, citedby = {0}, pages = {527-531}, booktitle = {WCRE}, } @inproceedings{RadevskiHM16, title = {Towards Building API Usage Example Metrics}, author = {Stevche Radevski and Hideaki Hata and Ken-ichi Matsumoto}, year = {2016}, doi = {10.1109/SANER.2016.79}, url = {http://doi.ieeecomputersociety.org/10.1109/SANER.2016.79}, researchr = {https://researchr.org/publication/RadevskiHM16}, cites = {0}, citedby = {0}, pages = {619-623}, booktitle = {WCRE}, } @inproceedings{LimsetthoHM14, title = {Comparing hierarchical dirichlet process with latent dirichlet allocation in bug report multiclass classification}, author = {Nachai Limsettho and Hideaki Hata and Ken-ichi Matsumoto}, year = {2014}, doi = {10.1109/SNPD.2014.6888695}, url = {http://dx.doi.org/10.1109/SNPD.2014.6888695}, researchr = {https://researchr.org/publication/LimsetthoHM14}, cites = {0}, citedby = {0}, pages = {1-6}, booktitle = {snpd}, } @inproceedings{GuoHB16, title = {Revenue Maximizing Markets for Zero-Day Exploits}, author = {Mingyu Guo and Hideaki Hata and Ali Babar}, year = {2016}, doi = {10.1007/978-3-319-44832-9_15}, url = {http://dx.doi.org/10.1007/978-3-319-44832-9_15}, researchr = {https://researchr.org/publication/GuoHB16}, cites = {0}, citedby = {0}, pages = {247-260}, booktitle = {prima}, } @inproceedings{KinaTHTI16, title = {Analyzing the Decision Criteria of Software Developers Based on Prospect Theory}, author = {Kanako Kina and Masateru Tsunoda and Hideaki Hata and Haruaki Tamada and Hiroshi Igaki}, year = {2016}, doi = {10.1109/SANER.2016.115}, url = {http://doi.ieeecomputersociety.org/10.1109/SANER.2016.115}, researchr = {https://researchr.org/publication/KinaTHTI16}, cites = {0}, citedby = {0}, pages = {644-648}, booktitle = {WCRE}, } @inproceedings{SasakiIHHHIK12, title = {Preprocessing of Metrics Measurement Based on Simplifying Program Structures}, author = {Yui Sasaki and Tomoya Ishihara and Keisuke Hotta and Hideaki Hata and Yoshiki Higo and Hiroshi Igaki and Shinji Kusumoto}, year = {2012}, doi = {10.1109/APSEC.2012.59}, url = {http://dx.doi.org/10.1109/APSEC.2012.59}, researchr = {https://researchr.org/publication/SasakiIHHHIK12}, cites = {0}, citedby = {0}, pages = {120-127}, booktitle = {apsec}, } @inproceedings{HataGB17, title = {Understanding the Heterogeneity of Contributors in Bug Bounty Programs}, author = {Hideaki Hata and Mingyu Guo and M. Ali Babar}, year = {2017}, doi = {10.1109/ESEM.2017.34}, url = {https://doi.org/10.1109/ESEM.2017.34}, researchr = {https://researchr.org/publication/HataGB17}, cites = {0}, citedby = {0}, pages = {223-228}, booktitle = {esem}, } @inproceedings{LimsetthoHMM14, title = {Automatic Unsupervised Bug Report Categorization}, author = {Nachai Limsettho and Hideaki Hata and Akito Monden and Ken-ichi Matsumoto}, year = {2014}, doi = {10.1109/IWESEP.2014.8}, url = {http://dx.doi.org/10.1109/IWESEP.2014.8}, researchr = {https://researchr.org/publication/LimsetthoHMM14}, cites = {0}, citedby = {0}, pages = {7-12}, booktitle = {iwesep}, } @inproceedings{PingclasaiHM13, title = {Classifying Bug Reports to Bugs and Other Requests Using Topic Modeling}, author = {Natthakul Pingclasai and Hideaki Hata and Ken-ichi Matsumoto}, year = {2013}, doi = {10.1109/APSEC.2013.105}, url = {http://dx.doi.org/10.1109/APSEC.2013.105}, researchr = {https://researchr.org/publication/PingclasaiHM13}, cites = {0}, citedby = {0}, pages = {13-18}, booktitle = {apsec}, }