
Yusuke Kawamoto
(川本 裕輔)
Modified on: 2024/06/03
Profile Information
- Affiliation
- Senior Research Scientist, Digital Architecture Research Center (DigiARC), National Institute of Advanced Industrial Science and Technology (AIST)
- Degree
-
PhD in Computer Science(Mar, 2010, University of Tokyo)
- Researcher number
- 60760006
- ORCID iD
https://orcid.org/0000-0002-2151-9560
- J-GLOBAL ID
- 201201089843679034
- researchmap Member ID
- B000220015
Yusuke Kawamoto is a senior research scientist working on the foundation of information security and software science, especially the modeling and verification of probabilistic programs, protocols, and systems by using the following approaches and their integration:
- symbolic approach (e.g., formal methods, programming languages, and mathematical logic);
- probabilistic approach (e.g., information theory, inferential statistics, and machine learning).
Examples of my recent research interests
- Formal methods for probabilistic systems and quantitative properties
- Formal specification and quality management of machine learning and artificial intelligence
- Logic for statistics and machine learning [JELIA23] [AI23] [KR21] [SoSyM20]
- Taxonomy for machine learning security [preprint23a]
- Foundation of privacy protection mechanisms
- Game theory for information leakage (QIF/DP) [ACM TOPS22] [Entropy18]
- Extension of differential privacy (DP) [ESORICS21] [Allerton19] [ESORICS19] [USENIX Sec19]
Previous research topics
- Formal methods for cryptographic protocols [CompSoft16] [handbook13] [ISPEC12]
- Attacks on RSA PKCS#1 v1.5 on cryptographic device [CRYPTO12]
- Attacks on the privacy of deep transfer learning [IJCNN21]
Open positions
- Reynald Affeldt and Yusuke Kawamoto jointly supervise master's and Ph.D. students at NAIST (Nara Institute of Science and Technology) officially.
- Unlike AIST (our primary affiliation), NAIST is a national university that can grant academic degrees.
E-mail: yusuke000kawamoto AT aist000go000jp (Please replace 000 with . and AT with @)
- Research discussion and suggestions from researchers would be greatly appreciated.
- Currently, no applications of interships can be accepted.
- Owing to my limited capacity, I may not be able to reply to all emails. Thank you for your understanding.
Research Areas
3Research Interests
1Major Papers
35-
arXiv:2405.17492, 2024
-
Artificial Intelligence, 326 104045, Nov, 2023 Peer-reviewed
-
14281 681-696, Sep, 2023 Peer-reviewed
-
arXiv:2301.07474, Jan, 2023
-
ACM Transactions on Privacy and Security (TOPS), 25(3:20) 1-36, Apr, 2022 Peer-reviewed
-
Proceedings of the 18th International Conference on Principles of Knowledge Representation and Reasoning (KR 2021), 411-421, Nov, 2021 Peer-reviewed
-
Proc. of the 26th European Symposium on Research in Computer Security (ESORICS 2021), Part II, Lecture Notes in Computer Science, 12973 563-583, Oct, 2021 Peer-reviewed
-
Proc. of the 2021 International Joint Conference on Neural Networks (IJCNN 2021), Jul, 2021 Peer-reviewed
-
Software and Systems Modeling, 20(2) 293-310, Sep 19, 2020 Peer-reviewed
-
Proceedings on Privacy Enhancing Technologies (PoPETs), 2021(2) 5-26, 2020 Peer-reviewed
-
The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy, Lecture Notes in Computer Science, 11760 344-362, Nov, 2019 Peer-reviewed
-
Proc. of the 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton 2019), 718-725, Sep, 2019 Peer-reviewed
-
Proc. of the 17th International Conference on Software Engineering and Formal Methods (SEFM 2019), Lecture Notes in Computer Science, 11724 293-311, Sep, 2019 Peer-reviewed
-
Proc. of the 24th European Symposium on Research in Computer Security (ESORICS 2019), Part I, Lecture Notes in Computer Science, 11735 128-148, Sep, 2019 Peer-reviewed
-
Proc. of the 28th USENIX Security Symposium (USENIX Security 2019), 1877-1894, Aug, 2019 Peer-reviewed
-
Formal Aspects of Computing, 31(2) 165-206, Apr, 2019 Peer-reviewed
-
Proc. of the 2018 International Symposium on Information Theory and Its Applications (ISITA 2018), 159-163, Oct, 2018 Peer-reviewed
-
Entropy, 20(5:382) 1-43, May, 2018 Peer-reviewed
-
Proc. of the 7th International Conference on Principles of Security and Trust (POST 2018), Lecture Notes in Computer Science, 10804 134-159, Apr, 2018 Peer-reviewed
-
Proc. of the 15th International Symposium on Automated Technology for Verification and Analysis (ATVA 2017), Lecture Notes in Computer Science, 10482 156-163, Oct, 2017 Peer-reviewed
-
Proc. of the 8th International Conference on Decision and Game Theory for Security (GameSec 2017), Lecture Notes in Computer Science, 10575 437-457, Oct, 2017 Peer-reviewed
-
Logical Methods in Computer Science, 13(3:11) 1-31, Aug, 2017 Peer-reviewed
-
Proc. of the 21st International Symposium on Formal Methods (FM 2016), Lecture Notes in Computer Science, 9995 406-425, Nov, 2016 Peer-reviewed
-
Computer Software, 33(4) 67-83, Nov, 2016 Peer-reviewedInvited
-
Proc. of the 13th International Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL 2015), Electronic Proceedings in Theoretical Computer Science, 194 48-62, Sep, 2015 Peer-reviewed
-
Proc. of the 19th European Symposium on Research in Computer Security (ESORICS 2014), Part II, Lecture Notes in Computer Science, 8713 219-236, Sep, 2014 Peer-reviewed
-
Proc. of 11th International Conference on Quantitative Evaluation of SysTems (QEST'2014), Lecture Notes in Computer Science, 8657 368-383, Sep, 2014 Peer-reviewed
-
Proc. of 25th International Conference on Computer Aided Verification (CAV 2013), Lecture Notes in Computer Science, 8044 690-695, Jul, 2013 Peer-reviewed
-
Proc. of 26th IEEE Computer Security Foundations Symposium (CSF 2013), 193-205, Jun, 2013 Peer-reviewed
-
Advances in Cryptology - CRYPTO 2012, 7417 608-625, Aug, 2012 Peer-reviewed
-
Proc. of the 8th International Conference on Information Security Practice and Experience (ISPEC 2012), Lecture Notes in Computer Science, 7232 63-79, Apr, 2012 Peer-reviewed
-
Formal to Practical Security, Lecture Notes in Computer Science, 5458 158-180, May, 2009 Peer-reviewed
-
JSIAM Letters, 1 28-31, May, 2009 Peer-reviewed
-
Proc. of Joint Workshop on Foundations of Computer Security, Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (FCS-ARSPA-WITS'08), 161-175, Jun, 2008 Peer-reviewed
-
Transactions of the Japan Society for Industrial and Applied Mathematics, 17(4) 559-576, Dec, 2007 Peer-reviewed
Books and Other Publications
1-
Asakura Publishing, Nov, 2013 (ISBN: 9784254111415)
Misc.
5-
日本科学振興協会 年次大会2023「会いに行ける科学者フェス」, Oct 11, 2023
-
JSIAM Online Magazine 書評, J1706A, Jul, 2017 InvitedLead author
-
Manuscript available at http://www.cs.bham.ac.uk/research/projects/infotools/leakiest, Apr, 2014
-
東京大学大学院情報理工学系研究科「計算システム検証論」, Jan, 2014 Invited
-
東京大学大学院情報理工学系研究科「計算システム検証論」, Jan, 2014 InvitedLead author
Presentations
55-
第26回プログラミングおよびプログラミング言語ワークショップ(PPL 2024), Mar 7, 2024, 日本ソフトウェア科学会
-
日本科学哲学会第56回年次大会, Dec 2, 2023, 日本科学哲学会
-
8th Franco-Japanese Cybersecurity Workshop, WG1, Nov 29, 2023, Joint Collaboration between France and Japan on Cybersecurity Research Invited
-
日本ソフトウェア科学会第40回大会, Sep 12, 2023, 日本ソフトウェア科学会
-
2023年度統計関連学会連合大会, Sep 7, 2023, 統計関連学会連合
-
第25回プログラミングおよびプログラミング言語ワークショップ(PPL 2023), Mar 8, 2023
-
ERATO MMSD Project Colloquium, Feb 21, 2023 Invited
-
The 7th Franco-Japanese Cybersecurity Workshop, WG1, Oct 24, 2022 Invited
-
The 6th Franco-Japanese Cybersecurity Workshop, WG1, Apr 22, 2022 Invited
-
大岡山ロジックセミナー, Nov 19, 2021
-
French-Japanese Cybersecurity Intermediate Workshop 2021, Feb 26, 2021 Invited
-
ERATO MMSD Project Colloquium, Jul 22, 2019 Invited
-
5th France-Japan Cybersecurity Workshop, Apr 23, 2019 Invited
-
CRISES Research Group Seminar, Universitat Rovira i Virgili, Mar 18, 2019 Invited
-
ゲーム理論ワークショップ2019, Mar 2, 2019
-
4th Franco-Japanese Cybersecurity Workshop, May 16, 2018 Invited
-
NII Shonan Meeting Seminar 116, Mar 6, 2018 Invited
-
JSIAM 2017 Annual Meeting, Sep 6, 2017, The Japan Society for Industrial and Applied Mathematics Invited
-
ERATO MMSD Project Colloquium, Aug 25, 2017, ERATO MMSD Invited
-
Third French Japanese Meeting on Cybersecurity, Apr 24, 2017
Works
5-
2023 - Present Software
-
2022 - Present Software
-
Oct, 2012 - Present Software
-
2016 - 2017 Software
Industrial Property Rights
1Major Research Projects
13-
科学研究費助成事業, 基盤研究(B), 日本学術振興会, Apr, 2024 - Mar, 2027
-
戦略的基礎研究推進事業 個人型研究(さきがけ), 数学と情報科学で解き明かす多様な対象の数理構造と活用, 科学技術振興機構, Nov, 2020 - Mar, 2025
-
NEDO (New Energy and Industrial Technology Development Organization), Jul, 2019 - Mar, 2024
-
ERATO, Japan Science and Technology Agency (JST), Apr, 2020 - Mar, 2022
-
Quantitative Verification of Cyber-Physical Systems by Integrating Statistical and Formal ApproachesGrants-in-Aid for Scientific Research Grant-in-Aid for Young Scientists (B), Grant-in-Aid for Young Scientists (B), JSPS (Japan Society for the Promotion of Science), Apr, 2017 - Mar, 2020
-
Japan - France AYAME Program, JSPS and Inria, Apr, 2016 - Mar, 2019
-
Grants-in-Aid for Scientific Research Grant-in-Aid for Research Activity start-up (KAKENHI Grant Number JP15H06886), Grant-in-Aid for Research Activity start-up, JSPS (Japan Society for the Promotion of Science), Aug, 2015 - Mar, 2017
-
Excellent Young Researchers Overseas Visit Program, JSPS, Apr, 2010 - Jan, 2011
Major Research History
11-
Nov, 2020 - Present
Education
3-
- Mar, 2010
-
- Mar, 2007
Awards
3Other
4-
Apr, 2007 - Sep, 2007http://hagi.is.s.u-tokyo.ac.jp/~y_kwmt/course/logic_enshu07/
Social Activities
1