Yuji Watanabe
According to our database1,
Yuji Watanabe
authored at least 56 papers
between 1990 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A Secure Framework for Continuous Compliance across Heterogeneous Policy Validation Points.
Proceedings of the 17th IEEE International Conference on Cloud Computing, 2024
2023
Proceedings of the Intelligent Systems and Applications, 2023
Real-time Identification System Using YOLO and Isomorphic Object Identification for Visually Impaired People.
Proceedings of the 12th IEEE Global Conference on Consumer Electronics, 2023
2022
Application Integrity Protection on Kubernetes cluster based on Manifest Signature Verification.
J. Inf. Process., 2022
Tendency Analysis of Python Programming Classes for Junior and Senior High School Students.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022
2021
J. Inf. Process., 2021
Scalable Runtime Integrity Protection for Helm Based Applications on Kubernetes Cluster.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
Proceedings of the 14th IEEE International Conference on Cloud Computing, 2021
2020
Gait identification and authentication using LSTM based on 3-axis accelerations of smartphone.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, 2020
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
2019
Identification and features selection of elderly people based on accelerations of smartphone.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019
User Identification Using Neural Network Based on Japanese Flick Input on Smartphone.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019
2018
Villani at SemEval-2018 Task 8: Semantic Extraction from Cybersecurity Reports using Representation Learning.
Proceedings of The 12th International Workshop on Semantic Evaluation, 2018
2017
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 21st International Conference KES-2017, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017
2016
Toward an Immunity-based Gait Recognition on Smart Phone: A Study of Feature Selection and Walking State Classification.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 20th International Conference KES-2016, 2016
2015
Toward Application of Immunity-based Model to Gait Recognition Using Smart Phone Sensors: A Study of Various Walking States.
Proceedings of the 19th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, 2015
2014
Proceedings of 2014 IEEE International Conference on Service Operations and Logistics, 2014
Analogy between Immune System and Sensor Replacement Using Mobile Robots on Wireless Sensor Networks.
Proceedings of the 18th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, 2014
Proceedings of the Fifth International Conference on Emerging Security Technologies, 2014
2013
Toward Introduction of Immunity-based Model to Continuous Behavior-based User Authentication on Smart Phone.
Proceedings of the 17th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, 2013
2011
Performance evaluation of immunity-based statistical en-route filtering in wireless sensor networks.
Artif. Life Robotics, 2011
An analysis of immunity-based statistical en-route filtering in wireless sensor networks.
Proceedings of the MEDES '11: International ACM Conference on Management of Emergent Digital EcoSystems, 2011
2010
Artif. Life Robotics, 2010
An Immunity-Based Scheme for Statistical En-route Filtering in Wireless Sensor Networks.
Proceedings of the Knowledge-Based and Intelligent Information and Engineering Systems, 2010
2009
A Pluggable Domain Management Approach for Building Practical Distributed Coalitions.
Proceedings of the The Forth International Conference on Availability, 2009
2008
Proceedings of the 2nd International Conference on Theory and Practice of Electronic Governance, 2008
2007
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
Proceedings of the 23rd International Conference on Data Engineering, 2007
Development of communications protocols between manufacturing execution system and production equipment.
Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, 2007
Proceedings of the Computer Security, 2007
2006
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006
Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components.
Proceedings of the Computer Security, 2006
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, 2006
2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
2004
Mutual tests using immunity-based diagnostic mobile agents in distributed intrusion detection systems.
Artif. Life Robotics, 2004
An Approach for Self-repair in Distributed System Using Immunity-Based Diagnostic Mobile Agents.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004
2003
Syst. Comput. Jpn., 2003
Immunity-Based Approaches for Self-Monitoring in Distributed Intrusion Detection System.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2003
Proceedings of the Computer Security, 2003
2002
Proceedings of the Information Security, 5th International Conference, 2002
2001
Proceedings of the Public Key Cryptography, 2001
Proceedings of the Topics in Cryptology, 2001
2000
Proceedings of the CCS 2000, 2000
1999
Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret.
Proceedings of the Public Key Cryptography, 1999
Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks.
Proceedings of the Information Security, Second International Workshop, 1999
1998
J. Robotics Mechatronics, 1998
1997
Emergent construction of a behavior arbitration mechanism based on the immune system.
Adv. Robotics, 1997
Proceedings of the Third International Symposium on Autonomous Decentralized Systems, 1997
1996
Immunoid: An Immunological Approach to Decentralized Behavoir Arbitration of Autonomous Mobile Robots.
Proceedings of the Parallel Problem Solving from Nature, 1996
Decentralized Consensus-Making Mechanisms Based on Immune System. Application to a Behavior Arbitration of an Autonomous Mobile Robot.
Proceedings of 1996 IEEE International Conference on Evolutionary Computation, 1996
1995
Proceedings of IEEE/RSJ International Conference on Intelligent Robots and Systems, 1995
1990