Kyushu University Academic Staff Educational and Research Activities Database
Researcher information (To researchers) Need Help? How to update
Yaokai Feng Last modified date:2024.04.03



Graduate School
Undergraduate School


E-Mail *Since the e-mail address is not displayed in Internet Explorer, please use another web browser:Google Chrome, safari.
Homepage
https://kyushu-u.elsevierpure.com/en/persons/yaokai-feng
 Reseacher Profiling Tool Kyushu University Pure
Phone
092-802-3640
Fax
092-802-3640
Academic Degree
Ph.D
Country of degree conferring institution (Overseas)
Yes Bachelor Master
Field of Specialization
Network Security, Pattern Recognition, Database
Total Priod of education and research career in the foreign country
12years03months
Research
Research Interests
  • Network Security
    keyword : Cyberattack, Malware, Malware clustering, Malicious websites, multi stage detection, Encrypted traffic, IoT
    2010.04Multidimensional Indexing and Algorithms; OLAP; XML.
  • Blockchain Security, the application of blockchain in smart cars and smart transportation.
    keyword : Blockchain, Blockchain security, smart vehicle, smart transportation
    2015.04.
Academic Activities
Books
1. Yaokai Feng,
Book title: “Kansei Engineering and Soft Computing: Theory and Practice” (In English),
IGI Global, ISBN 978-1-61692-797-4(hardcover), ISBN 978-1-61692-799-8 (ebook), 2010.12, 第6章執筆 “Kansei databases and Kansei retrieval” (In English)
.
2. Computer Network and Communication
ISBN: 7-111-04991-8.
3. Questions and Answers of Network and Communication
ISBN: 7-111-05737-6.
Papers
1. Yiluo Liu, Yaokai Feng, Kouichi Sakurai , A Design of Internet of Vehicles System Incorporating Lightweight Roadside Units and Blockchain Strategy, The 18th International Conference on Ubiquitous Information Management and Communication, IEEE, 10.1109/IMCOM60618.2024.10418375, 1-8, 2024.01.
2. Pengju He, Haibo Zhang, Yaokai Feng, Kouichi Sakurai, A Design of Network Attack Detection Using Causal and Non-causal Temporal Convolutional, The 5th International Conference on Science of Cyber Security, LNCS,volume 14299, 513-523, Springer,, https://doi.org/10.1007/978-3-031-45933-7_30, 2023.07.
3. Yang Lyu, Yaokai Feng, Kouichi Sakurai, A Survey on Feature Selection Techniques Based on Filtering Methods for Cyber Attack Detection, Information, https://doi.org/10.3390/info14030191, 14, 3, 191, 2023.03.
4. Muyuan Niu, Yaokai Feng, Kouichi Sakurai, A two-stage detection system of DDoS attacks in SDN using a trigger with multiple features and self-adaptive thresholds, 17th International Conference on Ubiquitous Information Management and Communication, IEEE,, ISBN 978-1-6654-5348-6,, DOI: 10.1109/IMCOM56909.2023, 1-7, 2023.01.
5. Xiaojuan Cai, Yaokai Feng, Kouichi Sakurai, A Scheme Using a Classification Filter for the Sequential Detection of Cyber-attacks, Proc. the 6th IEEE CyberSciTech 2021, 2021.10.
6. Tao Wang, Yaokai Feng, Kouichi Sakurai, Improving the Two-stage Detection of Cyberattacks in SDN Environment Using Dynamic Thresholding, 15th International Conference on Ubiquitous Information Management and Communication, IEEE, , 10.1109/IMCOM51814.2021.9377395, ISBN 978-1-6654-2318-2, 1-7, 2021.01.
7. Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai, Machine Learning-Based IoT-Botnet Attacks Detection with Sequential
Architecture, Sensors 20(16), 2020, doi.org/10.3390/s20164372, 2020.09.
8. Hao Zhao, Yaokai Feng, Hiroshi Koide, Kouichi Sakurai, A Sequential Detection Method for Intrusion Detection System Based on Artificial Neural Networks, Int. J. Netw. Comput. 10(2): 213-226 (2020), doi.org/10.15803/ijnc.10.2_213, 2020.08.
9. Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai, Towards a Lightweight Detection System for Cyber Attacks in the IoT Environment Using Corresponding Features, Electronics 2020, 9(1), 144 (19 pages), doi.org/10.3390/electronics9010144, 9, 2020.01.
10. Hao Zhao, Yaokai Feng, Kouichi Sakurai,, An ANN Based Sequential Detection Method for Balancing Performance Indicators of IDS, The 7th International Symposium on Computing and Networking, CANDAR 2019, 10.1109/CANDAR.2019.00039, 239-244, 2019.11.
11. Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai, A Sequential Scheme for Detecting Cyber Attacks in IoT Enviornment, The 4th IEEE CyberSciTech2019, August 2019, 10.1109/DASC/PiCom/CBDCom/ CyberSciTech.2019.00051, 238-244, 2019.08.
12. Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai, Rule Generation for Signature Based Detection Systems of Cyber Attacks for IoT Environments, The Symposium MiniCandar 2019 , 2019.06.
13. Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai, Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-based Feature Selection and Its Performance Evaluation, The 33rd International Conference on Advanced Information Networking and Applications (AINA-2019)  , 2019.03.
14. Yaokai Feng, Hitoshi Akiyama,Liang Lu,Kouichi, Sakurai, Feature Selection For Machine Learning-Based Early Detection of Distributed Cyber-Attacks, The 4th IEEE Cyber Science and Technology Conference, 173-180, 2018.08.
15. Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai, A Detection System for Distributed DoS Attacks Based on Automatic Extraction of Normal Mode and Its Performance Evaluation, the 10th  International Conference on Security, Privacy and Anonymity (SpaCCS2017) LNCS 10656,  2017.12, 2017.12.
16. Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai, A Behavior-based Online Engine for Detecting Distributed Cyber Attacks, the 17th World Conference on Information Security Applications,, 2016.08.
17. Yaokai Feng, How to fight against Botnets in IoT, The 3rd International Workshop on Cybersecurity, 2016.01.
18. Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai, A Proposal for Detecting Distributed Cyber-Attacks Using Automatic Thresholding, the 10th Asia Conference on information security, IEEE CPS, DOI 10.1109/AsiaJCIS.2015.22, 152-159, 2015.05.
19. Rong Huang, Palaiahnakote Shivakumara, Yaokai Feng, Seiichi Uchida, Scene Character Detection and Recognition with Cooperative Multiple-Hypothesis Framework, IEICE Transactions on Information & Systems, 10.1587/transinf.E96.D.2235, Vol.E96-D, No.10, Page 2235-2244 , 2013.10.
20. Koichi Ogawara, Masahiro Fukutomi, Seiichi Uchida, Yaokai Feng, A Voting-Based Sequential Pattern Recognition Method, PLOS ONE , Vol.8, No.10, 2013.10.
21. Soma Shiraishi, Yaokai Feng, Seiichi Uchida, Skew Estimation by Parts, IEICE Transactions on Information & Systems, 10.1587/transinf.E96.D.1503, Vol.E96-D, No.7, page 1503-1512, 2013.07.
22. Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai, Jun'ichi Takeuchi,
A Behavior-Based Method for Detecting Distributed Scan Attacks in Darknets, Journal of Information Processing, 10.22197/ipsjjip.21.527, Vol.21, No.3, page 527-538, 2013.07.
23. Song Wang, Seiichi Uchida, Marcus Liwicki, Yaokai Feng, Part-Based Methods for Handwritten Digit Recognition, Frontiers of Computer Science , 10.1007/s11704-013-2297-x , Vol. 7, No. 4, page 514-525, 2013.03.
24. Yaokai Feng, Akifumi Makinouchi, Ag+-tree: an Index Structure for Range-aggregation Queries in Data Warehouse Environments, International Journal of Database Theory and Application, Vol. 4, No. 2, page 51-64, 2011.08.
25. Yaokai Feng, Akifumi Makinouchi, A New Structure for Accelerating Xpath Location Steps, International Journal of Computer Science, Vol.38, No.2, page 113-121, 2011.06.
26. Yaokai Feng, kunihiko kaneko, Akifumi Makinouchi, Efficient Evaluation of Partially-dimensional Range Queries in Large OLAP Datasets, International Journal of Data Mining, Modelling and Management, DOI: 10.1504/IJDMMM.2011.041493, Vol.3, No.2, page 150-171, 2011.06.
27. Yaokai Feng, Seiichi Uchida, How to Design Kansei Retrieval Systems?, The 11th International Conference on Web-Age Information Management (WAIM2010), Lecture Note on Computer Science, LNCS 6184, Springer-Verlag, , 405-416, 2010.07.
28. Yaokai Feng, To Reveal the Performance secrets of Nearest Neighbor Searching, International Journal of Software Engineering and Its Applications (SELECTED from International Conference IPC 2007), Vol.2, No. 1, page 55-72, 2008.01.
29. Yaokai Feng, Akifumi Makinouchi, Efficient Evaluation of Partially-dimensional Range Queries Using Adaptive R*-tree, 17th International Conference on Database and Expert Systems Applications (DEXA 2006),, LNCS 4080, pp. 687-696, Springer-Verlag, (Acceptance Rate: 23%), 2006.09.
30. Yaokai Feng, Akifumi Makinouchi, A New Structure for Accelerating XPath Location Steps, The Seventh International Conference on Web-Age Information Management(WAIM), LNCS 4016, pp. 49-60, Springer-Verlag, (Acceptance Rate: 17%), 2006.06.
31. Yaokai Feng, Akifumi Makinouchi, Ag-Tree: A Novel Structure for Range Queries in Datawarehouse Environments, Proc. the 11th International Conference on Database Systems for Adavanced Applications (DASFAA),, LNCS 3882, pp. 498-512, Springer-Verlag, (Acceptance Rate: 25%), 2006.04.
32. Yaokai Feng, Akifumi Makinouchi, Batch-Incremental Nearest Neighbor Search Algorithm and Its Performance Evaluation, IEICE Transaction on Information and Systems, E86-D, 9, 1856-1867, 2003.09.
Membership in Academic Society
  • Information Processing Society of Japan
  • IPSJ Database Society
  • Database Society of Japan
Educational
Educational Activities
Educational Activities:
Other Educational Activities
  • 2010.12.