NameYoshiaki Hori
DepartmentComputer and Network Center
Job TitleProfessor Degree Obtained
  • Doctor of Engineering
  • Master of Engineering
  • Bachelor of Engineering
E-mailhoriyocc.saga-u.ac.jp
Homepage

Detailed Information

Research Field/Keywords for Research Field

  • computer science and engineering, computer network, network security, information security, social systems engineering, opendata

Education

  • 1992/03, Department of Computer Science and Electronics, Graduated
  • 1994/03, Department of Information Systems, Master Course, Completed

Employment Experience

  • 1994/04 - 2003/09 Research Associate Faculty of Design, Kyushu Institute of Design
  • 2003/10 - 2004/02 Research Associate Faculty of Design, Kyushu University
  • 2004/03 - 2007/03 Associate Professor Faculty of Information Science and Electrical Engineering, Kyushu University
  • 2007/04 - 2013/03 Associate Professor Faculty of Information Science and Electrical Engineering, Kyushu University
  • 2013/04 - 2021/03 Professor, Organization for General Education, Organization for General Education, Saga University
  • 2016/04 - 2021/04 Deputy Director, Computer and Network Center, Saga University
  • 2017/04 - 2021/03 Deputy Director, Organization for General Education, Saga University
  • 2021/04 - 2024/05 Professor, Computer and Network Center, Saga University
  • 2021/05 -  *  Director, Computer and Network Center, Saga University
  • 2024/06 -  *  Professor, Department of Mathematics, Information Science and Engineering, Faculty of Science and Engineering, Saga University

Field of Specialization

  • Information network, Information security, Communication/Network engineering

Membership in Academic Societies

  • IEICE, Information Processing Society of Japan, ACM, IEEE, IEEE Computer Society, Internet Technology Research Consortium (ITRC)

Themes for Ongoing Research

  • Reliability Availability and Security on Information Systems and Networking
  • Peformance Evaluation of Computer Network
  • open data and its utilization

Research Topics and Results

  • Detection of Proxy Examination Takers on an Online Examination System by Deep Learning of Face Images 2023/03
  • Development of Fraud Deterrence Function in Online Test 2022/03
  • Named Entities Extraction by Citizen Participation and Machine Learning for Making Machine-readable Old Records of the Edo Period Remaining in Local Communities 2022/02
  • Practice and Evaluation of Faculty Development Activities to Promote Online Class as a Measure Against COVID-19 2021/03
  • Named Entity Extraction Based on Character Level Embeddings for Understanding Japanese Historical Business Records 2021/02
  • Implementation of Extended Static GTFS in Database 2020/09
  • Transforming Unstructured Data into Linked Data and Constructing a Prototype of FIWARE-ready API for Hyper-local Disaster Information 2020/03
  • Storage and Distribution System of River Level Information Using Linked Data for Disaster Prevention 2019/09
  • Detection of new cyber attack trend change using darknet 2019/03
  • A Detection System for Distributed DoS Attacks Based on Automatic Extraction of Normal Mode and Its Performance Evaluation 2017/12
  • Student Design Project with Scratch and Picoboard 2017/08
  • A Comprehensive Security Analysis Checksheet for OpenFlow Networks 2016/11
  • A Behavior-Based Online Engine for Detecting Distributed Cyber-Attacks 2016/08
  • Development of Web system with fault tolerance based on P2P architecture 2016/03
  • System Security Evalution of OpenFlow Network 2016/01
  • Detection and Blocking of a host behind NAT in the User Authentication Network 2015/09
  • A Learning Algorithm for Behavior-based PortScan Automatic Detection and Its Evaluation 2015/09
  • Evaluation of Machine Learning Techniques for C&C Traffic Classification 2015/09
  • A Proposal for Detecting Distributed Cyber-Attacks Using Automatic Thresholding 2015/05
  • A Proposal for Detecting Distributed Cyber-Attacks Using Automatic Thresholding 2015/05
  • Development of Function to Forbid Access of Terminals via NAT in the Web Authentication Network 2015/03
  • The Mediating Role of Co-creative Design Thinking : The Interface between Multi-Disciplinary, International and University-Industry Programs 2015/03
  • 近年のハニーポット取得データ解析によるC&Cトラフィック分類評価 2015/01
  • 通信と描画挙動の動的解析を用いたAndroid広告ライブラリの検知手法 2015/01
  • A Behavior-based Engine for Detecting Distributed Internet Attacks and its Performance Investigation 2015/01
  • 挙動に基づくポートスキャン検知手法に向けたパラメータなしの学習アルゴリズムの提案とその性能評価 2015/01
  • SDN Security Research - Recent Activity and Challenge - 2015/01
  • Detection of Android ad library focusing on HTTP connections and view object redraw behaviors 2015/01
  • Detection of Privacy Sensitive Information Retrieval Using API Call Logging Mechanism within Android Framework 2014/11
  • An NMF-Based Traffic Classification Approach towards Anomaly Detection for Massive Sensors 2014/09
  • A Parameterless Learning Algorithm for Behavior-Based Detection 2014/09
  • Behavioral Anomaly Detection System on Network Application Traffic from Many Sensors 2014/07
  • 佐賀大学におけるmoodle と連携した講義自動収録視聴システムの構築 2014/07
  • Detection and Blocking of a host behind NAT in the User Authentication Network 2014/05
  • Android Advertisement Detection Focusing on Behavior Characteristics 2014/01
  • Development of Lecture Videos Delivery System using HTML5 Video Element 2013/10
  • Development of Network User Authentication System Using OpenFlow 2013/10
  • Performance Evaluation of Information Theoretic Secure Multi-channel Transmission on Multihop Wireless Network 2013/10
  • Detection of Android API Call Using Logging Mechanism within Android Framework 2013/09
  • A Behavior-based Method for Detecting Distributed Scan Attacks in Darknets 2013/07
  • Detecting HTTP-Based Botnet Based on Characteristic of the C& C Session Using by SVM 2013/07
  • A Behavior-based Method for Detecting Distributed Scan Attacks in Darknets 2013/07

Original Articles

  • Named Entities Extraction by Citizen Participation and Machine Learning for Making Machine-readable Old Records of the Edo Period Remaining in Local Communities; 2022/02
    ANNOUNCEMENT INFO.; , 63, 2, 310 - 323
    AUTHOR; Natsuko Yoshiga, Yoshiaki Hori, Shin-ichi Tadaki, Kiyonori Nagasaki, Akihiro Ito
  • A Detection System for Distributed DoS Attacks Based on Automatic Extraction of Normal Mode and Its Performance Evaluation; 2017/12
    ANNOUNCEMENT INFO.; Proc. of the 10th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2017), Lecture Notes in Computer Science, Springer, 10656, 461-473
    AUTHOR; Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai
  • A Comprehensive Security Analysis Checksheet for OpenFlow Networks; 2016/11
    ANNOUNCEMENT INFO.; Proc. of the 11th International Conference on Broad-Band Wireless Computing, Communication and Applications (BWCCA 2016), Lecture Notes on Data Engineering and Communications Technologies, Springer, 2, 231-242
    AUTHOR; Yoshiaki Hori, Seiichiro Mizoguchi, Ryosuke Miyazaki, Akira Yamada, Yaokai Feng, Ayumu Kubota, Kouichi Sakurai
  • A Behavior-Based Online Engine for Detecting Distributed Cyber-Attacks; 2016/08
    ANNOUNCEMENT INFO.; Proc. of the 17th International Workshop on Information Security Applications (WISA 2016), Lecture Notes in Computer Science, 10144, 79-89
    AUTHOR; Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai
  • Detection and Blocking of a host behind NAT in the User Authentication Network; 2015/09
    ANNOUNCEMENT INFO.; IPSJ Journal, 56, 9, 1782-1793
    AUTHOR; Mitsuhiro Suenaga, Hisaharu Tanaka, Makoto Otani, Yoshiaki Hori, Yasuhisa Okazaki, Kenzi Watanabe
  • A Learning Algorithm for Behavior-based PortScan Automatic Detection and Its Evaluation; 2015/09
    ANNOUNCEMENT INFO.; IPSJ Journal, 56, 9, 1770-1781
    AUTHOR; Can Wang, Yaokai Feng, Junpei Kawamoto, Yoshiaki Hori, Kouichi Sakurai
  • Evaluation of Machine Learning Techniques for C&C Traffic Classification; 2015/09
    ANNOUNCEMENT INFO.; IPSJ Journal, 56, 9, 1745-1753
    AUTHOR; Kazumasa Yamauchi, Junpei Kawamoto, Yoshiaki Hori, Kouichi Sakurai
  • A Proposal for Detecting Distributed Cyber-Attacks Using Automatic Thresholding; 2015/05
    ANNOUNCEMENT INFO.; Proc. of the10th Asia Joint Conference on Information Security (AsiaJCIS 2015), 152-159
    AUTHOR; Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai
  • A Proposal for Detecting Distributed Cyber-Attacks Using Automatic Thresholding; 2015/05
    ANNOUNCEMENT INFO.; Proc. of the 10th Asia Joint Conference on Information Security (AsiaJCIS 2015), 152-159
    AUTHOR; Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai
  • Development of Function to Forbid Access of Terminals via NAT in the Web Authentication Network; 2015/03
    ANNOUNCEMENT INFO.; IPSJ Journal, 56, 3, 798 - 807
    AUTHOR; Mitsuhiro Suenaga, Hisaharu Tanaka, Makoto Otani, Yoshiaki Hori, Yasuhisa Okazaki, Kenzi Watanabe
  • The Mediating Role of Co-creative Design Thinking : The Interface between Multi-Disciplinary, International and University-Industry Programs; 2015/03
    ANNOUNCEMENT INFO.; , 3, 137-153
    AUTHOR; Akane Matsumae, Takatosi Nakamura, Yoshiaki Hori, Susumu Matsumae
  • Detection of Android ad library focusing on HTTP connections and view object redraw behaviors; 2015/01
    ANNOUNCEMENT INFO.; Proceedings of the 2015 International Conference on Information Networking (ICOIN 2015), 104-109
    AUTHOR; Naoya Kajiwara, Junpei Kawamoto, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai
  • Detection of Privacy Sensitive Information Retrieval Using API Call Logging Mechanism within Android Framework; 2014/11
    ANNOUNCEMENT INFO.; Journal of Networks, 9, 11, 2905-2913
    AUTHOR; Naoya Kajiwara, Shinichi Matsumoto, Yuuki Nishimoto, Yoshiaki Hori, Kouichi Sakurai
  • An NMF-Based Traffic Classification Approach towards Anomaly Detection for Massive Sensors; 2014/09
    ANNOUNCEMENT INFO.; Proceedings of 2014 International Conference on Intelligent Networking and Collaborative Systems (INCoS 2014), 396-399
    AUTHOR; Akira Nagata, Kohei Kotera, Katsuichi Nakamura, Yoshiaki Hori
  • A Parameterless Learning Algorithm for Behavior-Based Detection; 2014/09
    ANNOUNCEMENT INFO.; Proceedings of Ninth Asia Joint Conference on Information Security (AsiaJCIS 2014), 11-18
    AUTHOR; Can Wang, Yaokai Feng, Junpei Kawamoto, Yoshiaki Hori, Kouichi Sakurai
  • Behavioral Anomaly Detection System on Network Application Traffic from Many Sensors; 2014/07
    ANNOUNCEMENT INFO.; Proceedings of IEEE 38th Annual Computer Software and Applications Conference (COMPSAC 2014), 600-601
    AUTHOR; Akira Nagata, Kohei Kotera, Katsuichi Nakamura, Yoshiaki Hori
  • Development of Lecture Videos Delivery System using HTML5 Video Element; 2013/10
    ANNOUNCEMENT INFO.; , 557-559
    AUTHOR; Hiroki Mori, Hisaharu Tanaka, Yoshiaki Hori, Makoto Otani, Kenzi Watanabe
  • Development of Network User Authentication System Using OpenFlow; 2013/10
    ANNOUNCEMENT INFO.; Proceedings of 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA 2013), 566-569
    AUTHOR; Shohei Yamashita, Hisaharu Tanaka, Yoshiaki Hori, Makoto Otani, Kenzi Watanabe
  • Performance Evaluation of Information Theoretic Secure Multi-channel Transmission on Multihop Wireless Network; 2013/10
    ANNOUNCEMENT INFO.; Proceedings of 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA 2013), 570-574
    AUTHOR; Wataru Tsuda, Yoshiaki Hori, Kouichi Sakurai
  • Detection of Android API Call Using Logging Mechanism within Android Framework; 2013/09
    ANNOUNCEMENT INFO.; Proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2013), Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 127, 393-404
    AUTHOR; Yuuki Nishimoto, Naoya Kajiwara, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai
  • A Behavior-based Method for Detecting Distributed Scan Attacks in Darknets; 2013/07
    ANNOUNCEMENT INFO.; Journal of Information Processing, 21, 3, 527-538
    AUTHOR; Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai, Jun'ichi Takeuchi
  • Detecting HTTP-Based Botnet Based on Characteristic of the C& C Session Using by SVM; 2013/07
    ANNOUNCEMENT INFO.; Proceedings of the 2013 Eighth Asia Joint Conference on Information Security (Asia JCIS 2013),, 63-68
    AUTHOR; Kazumasa Yamauchi, Yoshiaki Hori, Kouichi Sakurai
  • A Behavior-based Method for Detecting Distributed Scan Attacks in Darknets; 2013/07
    ANNOUNCEMENT INFO.; Journal of Information Processing, 21, 3, 527-538
    AUTHOR; Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai, Jun-ichi Takeuchi

Material, Commentary, Editorials, Research Report, A Comprehensive Journal Articles

  • Practice and Evaluation of Faculty Development Activities to Promote Online Class as a Measure Against COVID-19; 2021/03
    ANNOUNCEMENT INFO.; 佐賀大学全学教育機構紀要, 9, 65-81
    AUTHOR; Kiyoshi Yonemitsu, Takaaki Koga, Koji Nagatani, Masanao Machida, Mitsuhiro Takasaki, Yoshiaki Hori, Kazuyoshi Yamauchi, Hiroshi Wakuya
  • Development of Web system with fault tolerance based on P2P architecture; 2016/03
    ANNOUNCEMENT INFO.; IPSJ SIG Technical Reports, 2016-IOT-32, 41, 1-6
    AUTHOR; Hidemaru Nakamura, Hisaharu Tanaka, Yoshiaki Hori, Makoto Otani
  • Detection and Blocking of a host behind NAT in the User Authentication Network; 2014/05
    ANNOUNCEMENT INFO.; IPSJ SIG Technical Reports, 2014-IOT-25(6), 1-6, 2014-05-15, 2014-IOT-25, 6, 1-6
    AUTHOR; Mitsuhiro Suenaga, Hisaharu Tanaka, Makoto Otani, Yoshiaki Hori, Yasuhisa Okazaki, Kenzi Watanabe
  • SecureComm2013・ATIS2013 Report; 2013/12
    ANNOUNCEMENT INFO.; IPSJ SIG Report,2013-CSEC-63(5), 1-7, 2013-12-02, 2013-CSEC-63, 5, 1-7
    AUTHOR; Naoya Kajiwara, Shin-ichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai
  • Application Analysis on Network Traffic from Many Sensors; 2013/10
    ANNOUNCEMENT INFO.; IEICE technical report, 113(256), 37-40, 2013-10-22, 113, 256, 37-40
    AUTHOR; Yoshiaki Hori, Yaokai Feng, Akira Nagata, Kohei Kotera, Katsuichi Nakamura
  • A Study of Behavioral Anomaly Detection System on Network Application Traffic from Many Sensors; 2013/10
    ANNOUNCEMENT INFO.; IEICE technical report, 113(256), 41-44, 2013-10-22, 113, 256, 41-44
    AUTHOR; Akira Nagata, Kohei Kotera, Katsuichi Nakamura, Yoshiaki Hori

General Lectures

  • Detection of Proxy Examination Takers on an Online Examination System by Deep Learning of Face Images; 2023/03
    ANNOUNCEMENT INFO.; Proc. of Hinokuni Symposium, IPSJ Kyushu, A6-3, pp. 1-8
    AUTHOR; 
  • Development of Fraud Deterrence Function in Online Test; 2022/03
    ANNOUNCEMENT INFO.; , A22-1, pp.1-7
    AUTHOR; KIYOSHI YONEMITSU, TAKAAKI KOGA, KOJI NAGATANI, YOSHIYUKI YAMASHITA, YOSHIAKI HORI, DAI NISHIGOORI
  • Named Entity Extraction Based on Character Level Embeddings for Understanding Japanese Historical Business Records; 2021/02
    ANNOUNCEMENT INFO.; IPSJ SIG CH 125, 2021-CH-125, 4, 1-7
    AUTHOR; YOSHIGA Natsuko, HORI Yoshiaki, NAGASAKI Kiyonori
  • Implementation of Extended Static GTFS in Database; 2020/09
    ANNOUNCEMENT INFO.; JCEEE 2020, 347
    AUTHOR; KAJIHARA Sin, HORI Yoshiaki, NAKAYAMA Koichi
  • Transforming Unstructured Data into Linked Data and Constructing a Prototype of FIWARE-ready API for Hyper-local Disaster Information; 2020/03
    ANNOUNCEMENT INFO.; 2020 "Hinokuni - Land of Fire" Information Processing Symposium, C3-4, p.1
    AUTHOR; Natsuko Yoshiga, Yoshiaki Hori, Kiyohide Ushijima
  • Storage and Distribution System of River Level Information Using Linked Data for Disaster Prevention; 2019/09
    ANNOUNCEMENT INFO.; JCEEE2019, 11-2P-13, 591
    AUTHOR; Natsuko Yoshiga, Yoshiaki Hori, Kiyohide Ushijima
  • Detection of new cyber attack trend change using darknet; 2019/03
    ANNOUNCEMENT INFO.; HINOKUNI Symposium 2019, C2-2, 1-7
    AUTHOR; IMAMURA Tomoharu, OTANI Makoto, HORI Yoshiaki, TANAKA Hisaharu
  • Proposal of a regional information presentation system using voice recognition technology; 2018/03
    ANNOUNCEMENT INFO.; Proceedings of the 2018 Hinokuni Information Processing Symposium, A5-2, p.1-3
    AUTHOR; Yoshiaki Hori, Kiyohide Ushijima
  • Student Design Project with Scratch and Picoboard; 2017/08
    ANNOUNCEMENT INFO.; Proc. of JSiSE2017, G2-2, 173-174
    AUTHOR; Yoshiaki HORI, Akane MATSUMAE, Susumu MATSUMAE
  • Security Consideration for Multi-Domain SDN Application; 2016/03
    ANNOUNCEMENT INFO.; Proceedings of the 2016 IEICE General Conference, 情報・ システム講演論文集, 2, 187 (D-19-6)
    AUTHOR; Seiichiro Mizoguchi, Ryosuke Miyazaki, Takashi Matsunaka, Akira Yamada, Ayumu Kubota, Shin-ichi Matsumoto, Junpei Kawamoto, Yoshiaki Hori, Kouichi Sakurai
  • System Security Evalution of OpenFlow Network; 2016/01
    ANNOUNCEMENT INFO.; 2016 Symposium on Cryptography and Information Security, 3F1-1 (6 pages)
    AUTHOR; Yoshiaki Hori, Seiichiro Mizoguchi, Ayumu Kubota, Ryosuke Miyazaki, Junpei Kawamoto, Shin-ichi Matsumoto, Koichi Sakurai
  • 近年のハニーポット取得データ解析によるC&Cトラフィック分類評価; 2015/01
    ANNOUNCEMENT INFO.; 2015 Symposium on Cryptography and Information Security, 2A1-4
    AUTHOR; Kazumasa Yamauchi, Junpei Kawamoto, Yoshiaki Hori, Kouichi Sakurai
  • 通信と描画挙動の動的解析を用いたAndroid広告ライブラリの検知手法; 2015/01
    ANNOUNCEMENT INFO.; , 4A1-1
    AUTHOR; Naoya Kajiwara, Junpei Kawamoto, Shin-ichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai
  • A Behavior-based Engine for Detecting Distributed Internet Attacks and its Performance Investigation; 2015/01
    ANNOUNCEMENT INFO.; 2015 Symposium on Cryptography and Information Security, 4A1-1
    AUTHOR; Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai
  • 挙動に基づくポートスキャン検知手法に向けたパラメータなしの学習アルゴリズムの提案とその性能評価; 2015/01
    ANNOUNCEMENT INFO.; 2015 Symposium on Cryptography and Information Security, 1A1-2
    AUTHOR; Can Wang, Yaokai Feng, Junpei Kawamoto, Yoshiaki Hori, Kouichi Sakurai
  • SDN Security Research - Recent Activity and Challenge -; 2015/01
    ANNOUNCEMENT INFO.; 2015 Symposium on Cryptography and Information Security, 1A1-3
    AUTHOR; Yoshiaki Hori, Shin-ichi Matsumoto, Kazumasa Yamauchi, Naoya Kajiwara, Junpei Kawamoto, Koichi Sakurai
  • 佐賀大学におけるmoodle と連携した講義自動収録視聴システムの構築; 2014/07
    ANNOUNCEMENT INFO.; 
    AUTHOR; 
  • Traffic Anomaly Detection Supporting M2M Devices; 2014/06
    ANNOUNCEMENT INFO.; 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014) [Poster], poster
    AUTHOR; Yoshiaki Hori, Yaokai Feng, Akira Nagata, Kohei Kotera, Katsuichi Nakamura
  • Android Advertisement Detection Focusing on Behavior Characteristics; 2014/01
    ANNOUNCEMENT INFO.; The 31st Symposium on Cryptography and Information Security (SCIS 2014), 1B2-2, 4pages, 1B2-2, 1-4
    AUTHOR; Naoya Kajiwara, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai
  • Reconsidering the Behavior-based Method for Detecting Distributed Scan Attacks in Darknets; 2014/01
    ANNOUNCEMENT INFO.; The 31st Symposium on Cryptography and Information Security (SCIS 2014), 2C2-4, 5 pages, 2C2-4, 1-5
    AUTHOR; Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai
  • A Port Scan Detection Method by Analyzing the Distribution Diagram of Accessed Ports; 2014/01
    ANNOUNCEMENT INFO.; The 31st Symposium on Cryptography and Information Security (SCIS 2014), 3A5-4, 7 pages, 3A5, 1-5
    AUTHOR; Can Wang, Yaokai Feng, Junpei Kawamoto, Yoshiaki Hori, Kouichi Sakurai
  • Extracting C& C Traffic by Session Classification Using Machine Learning; 2014/01
    ANNOUNCEMENT INFO.; The 31st Symposium on Cryptography and Information Security (SCIS 2014), 4C1-5, 8 pages, 1-8
    AUTHOR; Kazumasa Yamauchi, Junpei Kawamoto, Yoshiaki Hori, Kouichi Sakurai
  • Design of Anomaly Detection for Sensors Supporting BigData Network; 2014/01
    ANNOUNCEMENT INFO.; The Seventh Workshop among Asian Information Security Research Labs (WAIS 2014)
    AUTHOR; Yoshiaki Hori, Yaokai Feng, Akira Nagata, Kohei Kotera, Katsuichi Nakamura
  • ビッグデータ時代を支える多数のセンサートラヒックに対する異常検知; 2013/11
    ANNOUNCEMENT INFO.; QBP Workshop 2014
    AUTHOR; Yoshiaki Hori, Yaokai Feng, Akira Nagata, Kohei Kotera, Katsuichi Nakamura
  • ダークネット観測における複数始点攻撃検知; 2013/11
    ANNOUNCEMENT INFO.; nicter workshop 2013
    AUTHOR; Yoshiaki Hori, Yaokai Feng


Copyright © MEDIA FUSION Co.,Ltd. All rights reserved.