Satoshi Okada

Orcid: 0000-0002-6601-5710

According to our database1, Satoshi Okada authored at least 24 papers between 1990 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Development and Application of Robotics for Decommissioning of Fukushima Daiichi NPS by IRID.
J. Robotics Mechatronics, February, 2024

Special Issue on Robotic, Mechatronic and Information Systems for Decommissioning.
J. Robotics Mechatronics, February, 2024

XAI-driven Adversarial Attacks on Network Intrusion Detectors.
Proceedings of the European Interdisciplinary Cybersecurity Conference, 2024

2023
Efficient Matching Algorithms between Logs and Indicators for Automatic Incident Response System.
J. Inf. Process., 2023

Memory-saving LDoS Attacker Detection Algorithms in Zigbee Network.
J. Inf. Process., 2023

The Attacker Might Also Do Next: ATT&CK Behavior Forecasting by Attacker-based Collaborative Filtering and Graph Databases.
J. Inf. Process., 2023

Automated Mapping Method for Sysmon Logs to ATT&CK Techniques by Leveraging Atomic Red Team.
Proceedings of the 6th International Conference on Signal Processing and Information Security, 2023

2021
New LDoS Attack in Zigbee Network and its Possible Countermeasures.
Proceedings of the IEEE International Conference on Smart Computing, 2021

Recovery Attack on Bob's Reused Randomness in CRYSTALS-KYBER and SABER.
Proceedings of the Provable and Practical Security, 2021

LDoS Attacker Detection Algorithms in Zigbee Network.
Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2021

2020
Development of Neutral pH-Responsive Microgels by Tuning Cross-Linking Conditions.
Sensors, 2020

Improving Key Mismatch Attack on NewHope with Fewer Queries.
IACR Cryptol. ePrint Arch., 2020

Key Recovery Attack on Bob's Secrets in CRYSTALS-KYBER and SABER.
IACR Cryptol. ePrint Arch., 2020

Maximum Credibility Voting (MCV) An Integrative Approach for Accurate Diagnosis of Major Depressive Disorder from Clinically Readily Available Data.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020

2013
Incremental Feature Location and Identification in Source Code.
Proceedings of the 17th European Conference on Software Maintenance and Reengineering, 2013

2012
Toward structured location of features.
Proceedings of the IEEE 20th International Conference on Program Comprehension, 2012

Feature Location for Multi-Layer System Based on Formal Concept Analysis.
Proceedings of the 16th European Conference on Software Maintenance and Reengineering, 2012

2005
An Application of Uplink Common Channel to Packet Relay in CDMA Radio Access Networks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

1996
Autonomous mobile patrol system for nuclear power plants: field test report of vehicle navigation and sensor positioning.
Proceedings of IEEE/RSJ International Conference on Intelligent Robots and Systems. IROS 1996, 1996

1995
Hierarchical Autonomous Mobile Control System of a Patrol Robot for Nuclear Power Plants.
Proceedings of the 1995 International Conference on Robotics and Automation, 1995

1993
Distributed Control System for Six-Legged Walking Robot.
J. Robotics Mechatronics, 1993

Fault tolerance of a functionally adaptive and robust manipulator.
Proceedings of 1993 IEEE/RSJ International Conference on Intelligent Robots and Systems, 1993

1991
Robot Vision Using a Feature Search Strategy Generated from a 3D Oobject Model.
IEEE Trans. Pattern Anal. Mach. Intell., 1991

1990
Object recognition using a feature search strategy generated from a 3D model.
Proceedings of the Third International Conference on Computer Vision, 1990


  Loading...