Yuji Watanabe

According to our database1, Yuji Watanabe authored at least 56 papers between 1990 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Secure Framework for Continuous Compliance across Heterogeneous Policy Validation Points.
Proceedings of the 17th IEEE International Conference on Cloud Computing, 2024

2023
NP4G: Network Programming for Generalization.
Proceedings of the Intelligent Systems and Applications, 2023

Real-time Identification System Using YOLO and Isomorphic Object Identification for Visually Impaired People.
Proceedings of the 12th IEEE Global Conference on Consumer Electronics, 2023

2022
Application Integrity Protection on Kubernetes cluster based on Manifest Signature Verification.
J. Inf. Process., 2022

Tendency Analysis of Python Programming Classes for Junior and Senior High School Students.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022

Motion Estimation by Deep Learnings Using Ambient Sensor Network.
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022

2021
Real-time Container Integrity Monitoring for Large-Scale Kubernetes Cluster.
J. Inf. Process., 2021

Scalable Runtime Integrity Protection for Helm Based Applications on Kubernetes Cluster.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Integrity Protection for Kubernetes Resource Based on Digital Signature.
Proceedings of the 14th IEEE International Conference on Cloud Computing, 2021

2020
Gait identification and authentication using LSTM based on 3-axis accelerations of smartphone.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, 2020

Automating Domain Squatting Detection Using Representation Learning.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Highly-Scalable Container Integrity Monitoring for Large-Scale Kubernetes Cluster.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
Identification and features selection of elderly people based on accelerations of smartphone.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

User Identification Using Neural Network Based on Japanese Flick Input on Smartphone.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

2018
Villani at SemEval-2018 Task 8: Semantic Extraction from Cybersecurity Reports using Representation Learning.
Proceedings of The 12th International Workshop on Semantic Evaluation, 2018

2017
Long-term influence of user identification based on touch operation on smart phone.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 21st International Conference KES-2017, 2017

Leveraging the Serverless Architecture for Securing Linux Containers.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

2016
Toward an Immunity-based Gait Recognition on Smart Phone: A Study of Feature Selection and Walking State Classification.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 20th International Conference KES-2016, 2016

2015
Toward Application of Immunity-based Model to Gait Recognition Using Smart Phone Sensors: A Study of Various Walking States.
Proceedings of the 19th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, 2015

2014
A financial risk evaluation service for integrating private portfolios securely.
Proceedings of 2014 IEEE International Conference on Service Operations and Logistics, 2014

Analogy between Immune System and Sensor Replacement Using Mobile Robots on Wireless Sensor Networks.
Proceedings of the 18th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, 2014

Influence of Holding Smart Phone for Acceleration-Based Gait Authentication.
Proceedings of the Fifth International Conference on Emerging Security Technologies, 2014

2013
Toward Introduction of Immunity-based Model to Continuous Behavior-based User Authentication on Smart Phone.
Proceedings of the 17th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, 2013

2011
Performance evaluation of immunity-based statistical en-route filtering in wireless sensor networks.
Artif. Life Robotics, 2011

An analysis of immunity-based statistical en-route filtering in wireless sensor networks.
Proceedings of the MEDES '11: International ACM Conference on Management of Emergent Digital EcoSystems, 2011

2010
A secure routing scheme for mobile wireless sensor networks.
Artif. Life Robotics, 2010

An Immunity-Based Scheme for Statistical En-route Filtering in Wireless Sensor Networks.
Proceedings of the Knowledge-Based and Intelligent Information and Engineering Systems, 2010

2009
A Pluggable Domain Management Approach for Building Practical Distributed Coalitions.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Checking assignments of controls to risks for internal control.
Proceedings of the 2nd International Conference on Theory and Practice of Electronic Governance, 2008

2007
Chinese-wall process confinement for practical distributed coalitions.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Performance Evaluation of Immunity-Based Diagnosis on Complex Networks.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

Parts Traceability for Manufacturers.
Proceedings of the 23rd International Conference on Data Engineering, 2007

Development of communications protocols between manufacturing execution system and production equipment.
Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, 2007

Dynamic Information Flow Control Architecture for Web Applications.
Proceedings of the Computer Security, 2007

2006
Migration Strategies of Immunity-Based Diagnostic Nodes for Wireless Sensor Network.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components.
Proceedings of the Computer Security, 2006

Layering negotiations for flexible attestation.
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, 2006

2005
Mutual Repairing System Using Immunity-Based Diagnostic Mobile Agent.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

2004
Mutual tests using immunity-based diagnostic mobile agents in distributed intrusion detection systems.
Artif. Life Robotics, 2004

An Approach for Self-repair in Distributed System Using Immunity-Based Diagnostic Mobile Agents.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004

2003
Distributed credibility evaluation of an information gathering mobile agent system.
Syst. Comput. Jpn., 2003

Immunity-Based Approaches for Self-Monitoring in Distributed Intrusion Detection System.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2003

Multi-round Secure-Light Broadcast Exclusion Protocol with Pre-processing.
Proceedings of the Computer Security, 2003

2002
Conditional Cryptographic Delegation for P2P Data Sharing.
Proceedings of the Information Security, 5th International Conference, 2002

2001
Efficient Asymmetric Self-Enforcement Scheme with Public Traceability.
Proceedings of the Public Key Cryptography, 2001

Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents.
Proceedings of the Topics in Cryptology, 2001

2000
Reducing the round complexity of a sealed-bid auction protocol with an off-line TTP.
Proceedings of the CCS 2000, 2000

1999
Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret.
Proceedings of the Public Key Cryptography, 1999

Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks.
Proceedings of the Information Security, Second International Workshop, 1999

1998
Autonomous Mobile Robot Behavior Control Using Immune Network.
J. Robotics Mechatronics, 1998

1997
Emergent construction of a behavior arbitration mechanism based on the immune system.
Adv. Robotics, 1997

A robot with a decentralized consensus-making mechanism based on the immune system.
Proceedings of the Third International Symposium on Autonomous Decentralized Systems, 1997

1996
Immunoid: An Immunological Approach to Decentralized Behavoir Arbitration of Autonomous Mobile Robots.
Proceedings of the Parallel Problem Solving from Nature, 1996

Decentralized Consensus-Making Mechanisms Based on Immune System. Application to a Behavior Arbitration of an Autonomous Mobile Robot.
Proceedings of 1996 IEEE International Conference on Evolutionary Computation, 1996

1995
An immunological approach to dynamic behavior control for autonomous mobile robots.
Proceedings of IEEE/RSJ International Conference on Intelligent Robots and Systems, 1995

1990
Gray Scale Judgement System.
J. Robotics Mechatronics, 1990


  Loading...