Publications

  1. Sound and relatively complete belief Hoare logic for statistical hypothesis testing programs.
    Yusuke Kawamoto, Tetsuya Sato, and Kohei Suenaga.
    Artificial Intelligence, Vol. 326, 104045, November 2023.
  2. Formalizing Statistical Causality via Modal Logic.
    Yusuke Kawamoto, Tetsuya Sato, and Kohei Suenaga.
    Proc. of the 18th European Conference on Logics in Artificial Intelligence (JELIA 2023), Lecture Notes in Computer Science, Vol. 14281, pp.681-696, September 2023.
  3. Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy.
    Yusuke Kawamoto, Kazumasa Miyake, Koichi Konishi, and Yutaka Oiwa.
    arXiv:2301.07474, 2023.
  4. Information Leakage Games: Exploring Information as a Utility Function.
    Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, and Catuscia Palamidessi. [alphabetical authorship]
    ACM Transactions on Privacy and Security (TOPS), Vol.25, No.3:20, pp.1-36, April 2022.
  5. Formalizing Statistical Beliefs in Hypothesis Testing Using Program Logic.
    Yusuke Kawamoto, Tetsuya Sato, and Kohei Suenaga.
    Proc. of the 18th International Conference on Principles of Knowledge Representation and Reasoning (KR 2021), pp.411-421, November 2021.
    Extended version published in Artificial Intelligence.
  6. Locality Sensitive Hashing with Extended Differential Privacy.
    Natasha Fernandes, Yusuke Kawamoto, Takao Murakami. [alphabetical authorship]
    Proc. of the 26th European Symposium on Research in Computer Security (ESORICS 2021), Part II, Lecture Notes in Computer Science Vol. 12973, pp.563-583, October 2021.
  7. TransMIA: Membership Inference Attacks Using Transfer Shadow Training.
    Seira Hidano, Takao Murakami, Yusuke Kawamoto.
    Proc. of the 2021 International Joint Conference on Neural Networks (IJCNN 2021), pp.1-10, July 2021.
  8. Privacy-Preserving Multiple Tensor Factorization for Synthesizing Large-Scale Location Traces with Cluster-Specific Features.
    Takao Murakami, Koki Hamada, Yusuke Kawamoto, and Takuma Hatano.
    Proceedings on Privacy Enhancing Technologies (PoPETs), Vol.2021, No.2, pp.5-26, January 2021.
  9. An Epistemic Approach to the Formal Specification of Statistical Machine Learning.
    Yusuke Kawamoto.
    Software and Systems Modeling, Vol.20, No.2, pp.293-310, September 2020.
  10. Statistical Epistemic Logic.
    Yusuke Kawamoto.
    The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy, Lecture Notes in Computer Science, Vol.11760, pp.344-362, November 2019. .
  11. Towards Logical Specification of Statistical Machine Learning.
    Yusuke Kawamoto.
    Proc. of the 17th International Conference on Software Engineering and Formal Methods (SEFM 2019), Lecture Notes in Computer Science, Vol.11724, pp.293-311, September 2019.
    Extended version published in Software and Systems Modeling.
  12. Local Distribution Obfuscation via Probability Coupling.
    Yusuke Kawamoto and Takao Murakami.
    Proc. of the 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton 2019), pp.718-725, September, 2019.
  13. Local Obfuscation Mechanisms for Hiding Probability Distributions.
    Yusuke Kawamoto and Takao Murakami.
    Proc. of the 24th European Symposium on Research in Computer Security (ESORICS 2019), Part I, Lecture Notes in Computer Science, Vol.11735, pp.128-148, September 2019.
  14. Utility-Optimized Local Differential Privacy Mechanisms for Distribution Estimation.
    Takao Murakami and Yusuke Kawamoto.
    Proc. of the 28th USENIX Security Symposium (USENIX Security 2019), pp.1877-1894, August 2019.
  15. Hybrid Statistical Estimation of Mutual Information and its Application to Information Flow.
    Fabrizio Biondi, Yusuke Kawamoto, Axel Legay, and Louis-Marie Traonouez. [alphabetical authorship]
    Formal Aspects of Computing, 31(2), pp.165-206, April 2019.
  16. On the Anonymization of Differentially Private Location Obfuscation.
    Yusuke Kawamoto and Takao Murakami.
    Proc. of the 2018 International Symposium on Information Theory and Its Applications (ISITA 2018), pp.159-163, October 2018.
  17. A Game-Theoretic Approach to Information-Flow Control via Protocol Composition.
    Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, and Catuscia Palamidessi. [alphabetical authorship]
    Entropy, 20(5:382), pp.1-43, May 2018.
  18. Leakage and Protocol Composition in a Game-Theoretic Perspective.
    Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, and Catuscia Palamidessi. [alphabetical authorship]
    Proc. of the 7th International Conference on Principles of Security and Trust (POST 2018), Lecture Notes in Computer Science, Vol.10804, pp. 134-159, April 2018.
    Extended version published in Entropy.
  19. Information Leakage Games.
    Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, and Catuscia Palamidessi. [alphabetical authorship]
    Proc. of the 8th International Conference on Decision and Game Theory for Security (GameSec 2017), Lecture Notes in Computer Science, Vol.10575, pp.437-457, October 2017.
    Extended version published in ACM TOPS.
  20. HyLeak: Hybrid Analysis Tool for Information Leakage.
    Fabrizio Biondi, Yusuke Kawamoto, Axel Legay, and Louis-Marie Traonouez. [alphabetical authorship]
    Proc. of the 15th International Symposium on Automated Technology for Verification and Analysis (ATVA 2017), Lecture Notes in Computer Science, Vol.10482, pp.156-163, October 2017.
    Extended version published in Formal Aspects of Computing.
    ▷ Software HyLeak.
  21. On the Compositionality of Quantitative Information Flow.
    Yusuke Kawamoto, Konstantinos Chatzikokolakis, and Catuscia Palamidessi.
    Logical Methods in Computer Science, Vol.13, No.3:11, pp.1-31, August 2017.
  22. 暗号系の安全性検証 — 入門から計算機による証明まで.
    川本 裕輔.
    コンピュータソフトウェア, Vol.33 No.4, pp.67-83, November 2016. (In Japanese)
  23. Hybrid Statistical Estimation of Mutual Information for Quantifying Information Flow.
    Yusuke Kawamoto, Fabrizio Biondi, and Axel Legay.
    In Proc. of 21st International Symposium on Formal Methods (FM 2016), Lecture Notes in Computer Science, Vol.9995, pp.406-425, November 2016.
    Extended version published in Formal Aspects of Computing.
  24. Quantitative Information Flow for Scheduler-Dependent Systems.
    Yusuke Kawamoto and Thomas Given-Wilson.
    In Proc. of 13th International Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL 2015), Electronic Proceedings in Theoretical Computer Science, Vol.194, pp.48-62, September 2015.
  25. LeakWatch: Estimating Information Leakage from Java Programs.
    Tom Chothia, Yusuke Kawamoto, and Chris Novakovic. [alphabetical authorship]
    In Proc. of 19th European Symposium on Research in Computer Security (ESORICS 2014) Part II, Lecture Notes in Computer Science, Vol.8713, pp.219-236, September 2014.
    ▷ Software LeakWatch.
  26. Compositionality Results for Quantitative Information Flow.
    Yusuke Kawamoto, Konstantinos Chatzikokolakis, and Catuscia Palamidessi.
    In Proc. of 11th International Conference on Quantitative Evaluation of SysTems (QEST 2014), Lecture Notes in Computer Science, Vol.8657, pp.368-383, September 2014.
    Extended version published in Logical Methods in Computer Science.
  27. 形式手法の計算論的健全性.
    川本 裕輔.
    応用数理ハンドブック, 朝倉書店, pp.262-263, November 2013.(In Japanese)
  28. A Tool for Estimating Information Leakage.
    Tom Chothia, Yusuke Kawamoto, and Chris Novakovic. [alphabetical authorship]
    In Proc. of 25th International Conference on Computer Aided Verification (CAV 2013), Lecture Notes in Computer Science, Vol.8044, pp.690-695, July 2013.
    ▷ Software leakiEst [user manual].
  29. Probabilistic Point-to-Point Information Leakage.
    Tom Chothia, Yusuke Kawamoto, Chris Novakovic, and David Parker. [alphabetical authorship]
    In Proc. of 26th IEEE Computer Security Foundations Symposium (CSF 2013), pp.193-205, June 2013.
    ▷ Software CH-IMP.
  30. Efficient padding oracle attacks on cryptographic hardware.
    Romain Bardou, Riccardo Focardi, Yusuke Kawamoto, Lorenzo Simionato, Graham Steel, and Joe-Kai Tsay. [alphabetical authorship]
    In Advances in Cryptology - 32nd International Cryptology Conference (CRYPTO 2012), Lecture Notes in Computer Science, Vol.7417, pp.608-625, August 2012.
  31. Computational soundness of indistinguishability properties without computable parsing.
    Hubert Comon-Lundh, Masami Hagiya, Yusuke Kawamoto, and Hideki Sakurada. [alphabetical authorship]
    In Proc. of the 8th International Conference on Information Security Practice and Experience (ISPEC 2012), Lecture Notes in Computer Science, Vol.7232, pp.63-79, April 2012.
  32. Computationally sound formalization of rerandomizable RCCA secure encryption.
    Yusuke Kawamoto, Hideki Sakurada, and Masami Hagiya.
    Formal to Practical Security, Lecture Notes in Computer Science, Vol.5458, pp.158-180, May 2009.
  33. Computational and Symbolic Anonymity in an Unbounded Network.
    Hubert Comon-Lundh, Yusuke Kawamoto, and Hideki Sakurada. [alphabetical authorship]
    JSIAM Letters, The Japan Society for Industrial and Applied Mathematics, Vol.1 (2009), pp.28-31, May 2009.
  34. Computationally sound symbolic anonymity of a ring signature.
    Yusuke Kawamoto, Hideki Sakurada, and Masami Hagiya.
    In Proc. of Joint Workshop on Foundations of Computer Security, Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (FCS-ARSPA-WITS 2008), pp.161-175, Pittsburgh, USA, June 2008.
  35. 関数部分知識と匿名性検証.
    川本 裕輔, 真野 健, 櫻田 英樹, 萩谷 昌己.
    <特集>平成19年研究部会連合発表会 数理的技法による情報セキュリティ, 日本応用数理学会論文誌, Vol.17, No.4(20071225), pp.559-576, December 2007. (In Japanese)

Misc