Hajime Shimada
According to our database1,
Hajime Shimada
authored at least 45 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Enhancing Detection of Malicious Traffic Through FPGA-Based Frequency Transformation and Machine Learning.
IEEE Access, 2024
Localizing the Tag Comparisons in the Wakeup Logic to Reduce Energy Consumption of the Issue Queue.
Proceedings of the 57th IEEE/ACM International Symposium on Microarchitecture, 2024
2023
Realtime Malicious Traffic Detection Targeted for TCP Out-of-Order Packets Based on FPGA.
IEEE Access, 2023
2022
Malware Detection by Control-Flow Graph Level Representation Learning With Graph Isomorphism Network.
IEEE Access, 2022
IEEE Access, 2022
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Malware Detection using Attributed CFG Generated by Pre-trained Language Model with Graph Isomorphism Network.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
2021
Japanese Activities to bring online academic meetings against COVID-19: How We Learned to Stop Worrying and Love the Online Meetings.
Proceedings of the 2021 ACM SIGUCCS Annual Conference, 2021
Malware Detection Using Gradient Boosting Decision Trees with Customized Log Loss Function.
Proceedings of the International Conference on Information Networking, 2021
Incident Response Support System for Multi-Located Network by Correlation Analysis of Individual Events.
Proceedings of the ICISS 2021: The 4th International Conference on Information Science and Systems, 2021
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
2020
J. Inf. Process., 2020
Quantifying the Significance and Relevance of Cyber-Security Text Through Textual Similarity and Cyber-Security Knowledge Graph.
IEEE Access, 2020
Proceedings of the 2020 International Conference on Information Networking, 2020
Quantifying the Significance of Cybersecurity Text through Semantic Similarity and Named Entity Recognition.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
2019
Using Seq2Seq Model to Detect Infection Focusing on Behavioral Features of Processes.
J. Inf. Process., 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
2018
Proceedings of the Advances in Information and Computer Security, 2018
Proceedings of the 2018 International Conference on Information Networking, 2018
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
2017
Proceedings of the 2017 International Conference on Information Networking, 2017
2016
J. Inf. Process., 2016
Improvement of Data Utilization Efficiency for Cache Memory by Compressing Frequent Bit Sequences.
IEICE Trans. Electron., 2016
Proceedings of the 2016 International Conference on Information Networking, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
2015
Proceedings of the ICISSP 2015, 2015
Reliability-configurable mixed-grained reconfigurable array compatible with high-level synthesis.
Proceedings of the 20th Asia and South Pacific Design Automation Conference, 2015
2014
Reliability-Configurable Mixed-Grained Reconfigurable Array Supporting C-Based Design and Its Irradiation Testing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Unknown Attack Detection by Multistage One-Class SVM Focusing on Communication Interval.
Proceedings of the Neural Information Processing - 21st International Conference, 2014
Development of a Secure Traffic Analysis System to Trace Malicious Activities on Internal Networks.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014
A Countermeasure Recommendation System against Targeted Attacks with Preserving Continuity of Internal Networks.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014
2011
A Fine-Grained Runtime Power/Performance Optimization Method for Processors with Adaptive Pipeline Depth.
J. Comput. Sci. Technol., 2011
IEICE Trans. Inf. Syst., 2011
An efficient and reliable 1.5-way processor by fusion of space and time redundancies.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2011), 2011
2010
A Minimal Roll-Back Based Recovery Scheme for Fault Toleration in Pipeline Processors.
Proceedings of the 16th IEEE Pacific Rim International Symposium on Dependable Computing, 2010
Proceedings of the International Workshop on Innovative Architecture for Future Generation High Performance Processors and Systems, 2010
2009
Inf. Media Technol., 2009
2008
A Dynamic Control Mechanism for Pipeline Stage Unification by Identifying Program Phases.
IEICE Trans. Inf. Syst., 2008
2007
SIGARCH Comput. Archit. News, 2007
2005
Program Phase Detection Based Dynamic Control Mechanisms for Pipeline Stage Unification Adoption.
Proceedings of the High-Performance Computing - 6th International Symposium, 2005
2003
Pipeline stage unification: a low-energy consumption technique for future mobile processors.
Proceedings of the 2003 International Symposium on Low Power Electronics and Design, 2003