Yasuyuki Tahara

Orcid: 0000-0002-1939-4455

According to our database1, Yasuyuki Tahara authored at least 134 papers between 1994 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Algorithm to satisfy <i>l</i>-diversity by combining dummy records and grouping.
Secur. Priv., 2024

YODA: Middleware for Improving Setup and Preprocessing in Static Analysis of IoT Firmware.
Proceedings of the 16th IIAI International Congress on Advanced Applied Informatics, 2024

Analysis of Conditional Image Generation Methods Using Color Palettes in Animal Personification Task.
Proceedings of the 7th International Conference on Information and Computer Technologies, 2024

Analysis of the Echo Chamber Caused by Unexpected Opinions.
Proceedings of the 7th International Conference on Information and Computer Technologies, 2024

Hollowed-Out Icon Colorization with Controllable Diffusion Model.
Proceedings of the 7th International Conference on Information and Computer Technologies, 2024

An Analysis of Knowledge Representation for Anime Recommendation Using Graph Neural Networks.
Proceedings of the 16th International Conference on Agents and Artificial Intelligence, 2024

Proposal of a Cosmetic Product Recommendation Method with Review Text that is Predicted to Be Write by Users.
Proceedings of the 16th International Conference on Agents and Artificial Intelligence, 2024

2023
Towards Scalable Model Checking of Reflective Systems via Labeled Transition Systems.
IEEE Trans. Software Eng., March, 2023

A Middleware to Improve Analysis Coverage in IoT Vulnerability Detection.
Proceedings of the IEEE International Conference on Internet of Things and Intelligence Systems, 2023

Federated Learning Algorithm Handling Missing Attributes.
Proceedings of the IEEE International Conference on Internet of Things and Intelligence Systems, 2023

A k-Anonymization Method for Social Network Data with Link Prediction.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Predicting Visual Importance of Mobile UI Using Semantic Segmentation.
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023

Rumor Detection in Tweets Using Graph Convolutional Networks.
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023

Diverse Level Generation for Tile-Based Video Game using Generative Adversarial Networks from Few Samples.
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023

Proposal of a Signal Control Method Using Deep Reinforcement Learning with Pedestrian Traffic Flow.
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023

Generation of Facial Images Reflecting Speaker Attributes and Emotions Based on Voice Input.
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023

Background Image Editing with HyperStyle and Semantic Segmentation.
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023

GAN Inversion with Editable StyleMap.
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023

Detection of Compound-Type Dark Jargons Using Similar Words.
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023

Estimation of Unmasked Face Images Based on Voice and 3DMM.
Proceedings of the AI 2023: Advances in Artificial Intelligence, 2023

2022
Proposal of a Middleware to Support Development of IoT Firmware Analysis Tools.
Proceedings of the Knowledge-Based Software Engineering: 2022, 2022

Detecting Hardcoded Login Information from User Input.
Proceedings of the IEEE International Conference on Consumer Electronics, 2022

Detection of Plaintext Login Information in Firmware.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2022

2021
A Countermeasure Method Using Poisonous Data Against Poisoning Attacks on IoT Machine Learning.
Int. J. Semantic Comput., 2021

Improvement of Legitimate Mail Server Detection Method using Sender Authentication.
Proceedings of the 19th IEEE/ACIS International Conference on Software Engineering Research, 2021

Classifying COVID-19 Conspiracy Tweets with Word Embedding and BERT.
Proceedings of the Working Notes Proceedings of the MediaEval 2021 Workshop, 2021

Acquisition of Cooperative Behavior in a Soccer Task Using Reward Shaping.
Proceedings of the ICIAI 2021: 2021 the 5th International Conference on Innovation in Artificial Intelligence, 2021

2020
Knowledge Graph Completion to Solve University Campus Issues.
J. Data Intell., 2020

Semantic diversity: Privacy considering distance between values of sensitive attribute.
Comput. Secur., 2020

Adaptation Plan Policy in Traffic Routing for Priority Vehicle.
Proceedings of the 2020 International Conference on Artificial Intelligence in Information and Communication, 2020

Model Smoothing using Virtual Adversarial Training for Speech Emotion Estimation using Spontaneity.
Proceedings of the 12th International Conference on Agents and Artificial Intelligence, 2020

Hair Shading Style Transfer for Manga with cGAN.
Proceedings of the 12th International Conference on Agents and Artificial Intelligence, 2020

Generating Cooking Recipes from Cooking Videos Using Deep Learning Considering Previous Process with Video Encoding.
Proceedings of the APPIS 2020: 3rd International Conference on Applications of Intelligent Systems, 2020

Ontology-Based Correlation Detection Among Heterogeneous Data Sets: A Case Study of University Campus Issues.
Proceedings of the 3rd IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2020

A Defense Method against Poisoning Attacks on IoT Machine Learning Using Poisonous Data.
Proceedings of the 3rd IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2020

2019
"Never fry carrots without chopping" Generating Cooking Recipes from Cooking Videos Using Deep Learning Considering Previous Process.
Int. J. Networked Distributed Comput., 2019

Do You Like Sclera? Sclera-region Detection and Colorization for Anime Character Line Drawings.
Int. J. Networked Distributed Comput., 2019

A Method for Goal Model Repair Based on Process Mining.
Proceedings of the 20th IEEE/ACIS International Conference on Software Engineering, 2019

Trajectory Anonymization: Balancing Usefulness about Position Information and Timestamp.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

Knowledge Graph of University Campus Issues and Application of Completion Methods.
Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services, 2019

Transforming the Emotion in Speech using a Generative Adversarial Network.
Proceedings of the 11th International Conference on Agents and Artificial Intelligence, 2019

Generation of Multiple Choice Questions Including Panoramic Information using Linked Data.
Proceedings of the 11th International Conference on Agents and Artificial Intelligence, 2019

New Indicator for Centrality Measurements in Passing-network Analysis of Soccer.
Proceedings of the 11th International Conference on Agents and Artificial Intelligence, 2019

Model Smoothing Using Virtual Adversarial Training for Speech Emotion Estimation.
Proceedings of the 2019 IEEE International Conference on Big Data, 2019

Multi-task Deep Reinforcement Learning with Evolutionary Algorithm and Policy Gradients Method in 3D Control Tasks.
Proceedings of the Big Data, 2019

"Never fry carrots without cutting." Cooking Recipe Generation from Videos Using Deep Learning Considering Previous Process.
Proceedings of the 2019 IEEE International Conference on Big Data, 2019

Do You Like the Sclera?: Sclera-Region Detection in Line Drawings for Automated Colorization.
Proceedings of the 2019 IEEE International Conference on Big Data, 2019

Mis.Config: Finding Misreferred Configuration Bugs in Web Application Using Thin Slicing.
Proceedings of the Computer and Information Science, 2019

Self-Adaptation for Heterogeneous Client-Server Online Games.
Proceedings of the Computer and Information Science, 2019

2018
Anonymization and Analysis of Horizontally and Vertically Divided User Profile Databases with Multiple Sensitive Attributes.
Proceedings of the 2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), Singpapore, Singapore, July 31, 2018

Factors Affecting Accuracy in Image Translation based on Generative Adversarial Network.
Proceedings of the 10th International Conference on Agents and Artificial Intelligence, 2018

Do Professional Football Players Follow the Optimal Strategies in Penalty Shootout?
Proceedings of the 10th International Conference on Agents and Artificial Intelligence, 2018

Agent-based Simulation Model Embedded Accounting's Purchase Method; Analysis on the Systemic Risk of Mergers and Acquisitions between Financial Institutions.
Proceedings of the 10th International Conference on Agents and Artificial Intelligence, 2018

2017
Proposal of l-diversity algorithm considering distance between sensitive attribute values.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

User Participatory Construction of Open Hazard Data for Preventing Bicycle Accidents.
Proceedings of the Semantic Technology - 7th Joint International Conference, 2017

Formal Verification of Dynamic Evolution Processes of UML Models Using Aspects.
Proceedings of the 12th IEEE/ACM International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2017

An Observation of Behavioral Changes of Indoor Dogs in Response to Caring Behavior by Humanoid Robots - Can Dogs and Robots Be Companions?.
Proceedings of the 9th International Conference on Agents and Artificial Intelligence, 2017

Sarcasm Detection Method to Improve Review Analysis.
Proceedings of the 9th International Conference on Agents and Artificial Intelligence, 2017

Fast Many-to-One Voice Conversion using Autoencoders.
Proceedings of the 9th International Conference on Agents and Artificial Intelligence, 2017

Text Classification and Transfer Learning Based on Character-Level Deep Convolutional Neural Networks.
Proceedings of the Agents and Artificial Intelligence - 9th International Conference, 2017

Japanese Text Classification by Character-level Deep ConvNets and Transfer Learning.
Proceedings of the 9th International Conference on Agents and Artificial Intelligence, 2017

2016
Sake Selection Support Application for Countryside Tourism.
Trans. Large Scale Data Knowl. Centered Syst., 2016

A Solution to Visualize Open Urban Data for Illegally Parked Bicycles.
Trans. Large Scale Data Knowl. Centered Syst., 2016

Iterative Improvement of Human Pose Classification Using Guide Ontology.
IEICE Trans. Inf. Syst., 2016

Estimation of Interpersonal Relationships in Movies.
IEICE Trans. Inf. Syst., 2016

Goal achievement analysis based on LTL checking and decision tree for improvements of PAIS.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Linked Data Collection and Analysis Platform of Audio Features.
Proceedings of the Workshop and Poster Proceedings of the 6th Joint International Semantic Technology Conference co-located with the 6th Joint International Semantic Technology Conference (JIST 2016), 2016

Linked Data Collection and Analysis Platform for Music Information Retrieval.
Proceedings of the Semantic Technology - 6th Joint International Conference, 2016

Process Mining Approach Based on Partial Structures of Event Logs and Decision Tree Learning.
Proceedings of the 5th IIAI International Congress on Advanced Applied Informatics, 2016

Schema Design of Illegally Parked Bicycles LOD.
Proceedings of the 5th IIAI International Congress on Advanced Applied Informatics, 2016

2015
A Method for Efficient Extensibility Improvements in Embedded Software Evolution.
J. Softw., 2015

Estimation of character diagram from open-movie databases for cultural understanding.
Proceedings of the 9th IEEE International Conference on Semantic Computing, 2015

Towards Goal-Oriented Conformance Checking.
Proceedings of the 27th International Conference on Software Engineering and Knowledge Engineering, 2015

Activity Recognition for Dogs Based on Time-series Data Analysis.
Proceedings of the Agents and Artificial Intelligence - 7th International Conference, 2015

Activity Recognition for Dogs Using Off-the-Shelf Accelerometer.
Proceedings of the ICAART 2015, 2015

Towards the Elimination of the Miscommunication Between Users in Twitter - Tweet Classification Based on Expected Responses by User.
Proceedings of the AI 2015: Advances in Artificial Intelligence, 2015

Decision Making Strategy Based on Time Series Data of Voting Behavior.
Proceedings of the AI 2015: Advances in Artificial Intelligence, 2015

2014
Music Recommender Adapting Implicit Context Using 'renso' Relation among Linked Data.
J. Inf. Process., 2014

Refinement of Ontology-Constrained Human Pose Classification.
Proceedings of the 2014 IEEE International Conference on Semantic Computing, 2014

A MAPE Loop Control Pattern for Heterogeneous Client/Server Online Games.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

Towards Software Evolution for Embedded Systems Based on MAPE Loop Encapsulation.
Proceedings of the Eighth IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2014

Transformation approach from KAOS goal models to BPMN models using refinement patterns.
Proceedings of the Symposium on Applied Computing, 2014

News Recommendation based on Semantic Relations between Events.
Proceedings of the Workshop and Poster Proceedings of the 4th Joint International Semantic Technology Conference, 2014

Estimation of Character Diagram from Open Movie Database Using Markov Logic Network.
Proceedings of the Workshop and Poster Proceedings of the 4th Joint International Semantic Technology Conference, 2014

Evaluation of Flexibility to Changes Focusing on the Variable Structures in Legacy Software.
Proceedings of the Knowledge-Based Software Engineering, 2014

Software Development PBL Focusing on Communication Using Scrum.
Proceedings of the IIAI 3rd International Conference on Advanced Applied Informatics, 2014

Identification of Flaming and Its Applications in CGM - Case Studies toward Ultimate Prevention.
Proceedings of the ICAART 2014, 2014

Surprising Recipe Extraction based on Rarity and Generality of Ingredients.
Proceedings of the ICAART 2014, 2014

2013
Towards solving an obstacle problem by the cooperation of UAVs and UGVs.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Towards Semi-Automatic Identification of Functional Requirements in Legal Texts for Public Administration.
Proceedings of the Legal Knowledge and Information Systems, 2013

Context-Aware Music Recommendation with Serendipity Using Semantic Relations.
Proceedings of the Semantic Technology - Third Joint International Conference, 2013

2012
Self-supervised capturing of users' activities from weblogs.
Int. J. Intell. Inf. Database Syst., 2012

Support for Video Hosting Service Users Using Folksonomy and Social Annotation.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence, 2012

Dynamic reconfiguration in self-adaptive systems considering non-functional properties.
Proceedings of the ACM Symposium on Applied Computing, 2012

Goal-oriented approach to creating class diagrams with OCL constraints.
Proceedings of the ACM Symposium on Applied Computing, 2012

Goal-Oriented Robustness Analysis.
Proceedings of the Knowledge-Based Software Engineering, 2012

Toward Information Sharing of Natural Disaster: Proposal of Timeline Action Network.
Proceedings of the Agents and Artificial Intelligence - 4th International Conference, 2012

Building a Time Series Action Network for Earthquake Disaster.
Proceedings of the ICAART 2012 - Proceedings of the 4th International Conference on Agents and Artificial Intelligence, Volume 1, 2012

Building a Timeline Network for Evacuation in Earthquake Disaster.
Proceedings of the Semantic Cities, 2012

2011
Methods for Privacy Protection Considering Status of Service Provider and User Community.
Proceedings of the Information Security Technology for Applications, 2011

Building earthquake semantic network by mining human activity from Twitter.
Proceedings of the 2011 IEEE International Conference on Granular Computing, 2011

Building an earthquake evacuation ontology from twitter.
Proceedings of the 2011 IEEE International Conference on Granular Computing, 2011

2010
ONTOMO: web-based ontology building system: ---instance recommendation using bootstrapping---.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Self-supervised Mining of Human Activity from CGM.
Proceedings of the Knowledge Management and Acquisition for Smart Systems and Services, 2010

Automatic Mining of Human Activity and Its Relationships from CGM.
Proceedings of the ICSOFT 2010, 2010

Capturing Users' Buying Activity at Akihabara Electric Town from Twitter.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2010

NicoScene: Video Scene Search by Keywords Based on Social Annotation.
Proceedings of the Active Media Technology, 6th International Conference, 2010

Human Activity Mining Using Conditional Radom Fields and Self-Supervised Learning.
Proceedings of the Intelligent Information and Database Systems, 2010

Automatic Mining of Human Activity Attributes from Weblogs.
Proceedings of the 9th IEEE/ACIS International Conference on Computer and Information Science, 2010

2009
Evolution of a course on model checking for practical applications.
ACM SIGCSE Bull., 2009

ONTOMO: Development of Ontology Building Service.
Proceedings of the Principles of Practice in Multi-Agent Systems, 2009

2007
A hierarchical mobile agent framework and its application to multimedia contents.
Syst. Comput. Jpn., 2007

Top SE: Educating Superarchitects Who Can Apply Software Engineering Tools to Practical Development in Japan.
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007

2006
Formal model of mobile BPEL4WS process.
Int. J. Bus. Process. Integr. Manag., 2006

2005
A framework for synthesis of web services and mobile agents.
Int. J. Pervasive Comput. Commun., 2005

Framework for Hierarchical Mobile Agents: Toward Service-Oriented Agent Compound.
Proceedings of the ICEIS 2005, 2005

Agent synthesis: partnership and agreement in cooperative mobile agents.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

IOM/T: an interaction description language for multi-agent systems.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

Mobile and Cooperative Compounds of Multimedia Services.
Proceedings of the 2005 IEEE International Conference on Services Computing (SCC 2005), 2005

2004
Bridging the Gap Between AUML and Implementation Using IOM/T.
Proceedings of the Programming Multi-Agent Systems, 2004

Mobile Agent System for Web Services Integration in Pervasive Networks.
Proceedings of the Ubiquitous Computing, 2004

Behavior Descriptions of Mobile Agents for Web Services Integration.
Proceedings of the IEEE International Conference on Web Services (ICWS'04), 2004

Pigeon: A Specification Language for Mobile Agent Applications.
Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2004), 2004

2003
A Formal Model of Active Contents Based on the Ambient Calculus.
Proceedings of the Mobile Agents for Telecommunication Applications, 2003

2001
Secure and efficient mobile agent application reuse using patterns.
Proceedings of the ACM SIGSOFT Symposium on Software Reusability: Putting Software Reuse in Context, 2001

Behavior Patterns for Mobile Agent Systems from the Development Process Viewpoint.
Proceedings of the Fifth International Symposium on Autonomous Decentralized Systems, 2001

Mobile agent security with the IPEditor development tool and the mobile UNITY language.
Proceedings of the Fifth International Conference on Autonomous Agents, 2001

2000
Bee-gent: bonding and encapsulation enhancement agent framework for development of distributed systems.
Syst. Comput. Jpn., 2000

Security for Mobile Agents.
Proceedings of the Agent-Oriented Software Engineering, First International Workshop, 2000

1999
Agent System Development Method Based on Agent Patterns.
Proceedings of the 1999 International Conference on Software Engineering, 1999

1996
An Algebraic Semantics of Reflective Objects.
Proceedings of the Object Technologies for Advanced Software, 1996

1995
Formal Semantics of Agent Evolution in Language Flage.
Proceedings of the Object-Based Parallel and Distributed Computation, 1995

Evolutional Agents: Field Oriented Programming Language, Flage.
Proceedings of the 2nd Asia-Pacific Software Engineering Conference (APSEC '95), 1995

1994
Flage: field-oriented language for agents model.
Proceedings of 3rd International Conference on Software Reuse, 1994


  Loading...