Hayato Yamana

Orcid: 0000-0001-7542-4826

According to our database1, Hayato Yamana authored at least 128 papers between 1988 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Sampling-based epoch differentiation calibrated graph convolution network for point-of-interest recommendation.
Neurocomputing, February, 2024

Traffic Jam Detection Using Real-Time Bus Operation Data Considering Timetable Information in Various Conditions.
Proceedings of the 18th International Conference on Ubiquitous Information Management and Communication, 2024

Prediction of Heart Disease Severity Using Hierarchically-Structured Machine-Learning Models with Feature Space Reduction.
Proceedings of the 17th International Joint Conference on Biomedical Engineering Systems and Technologies, 2024

Touch-Based Continuous Mobile Device Authentication Using One-vs-One Classification Approach.
Proceedings of the IEEE International Conference on Big Data and Smart Computing, 2024

PCPR: Plaintext Compression and Plaintext Reconstruction for Reducing Memory Consumption on Homomorphically Encrypted CNN.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
HPRoP: Hierarchical Privacy-preserving Route Planning for Smart Cities.
ACM Trans. Cyber Phys. Syst., October, 2023

EPT-GCN: Edge propagation-based time-aware graph convolution network for POI recommendation.
Neurocomputing, July, 2023

NER-to-MRC: Named-Entity Recognition Completely Solving as Machine Reading Comprehension.
CoRR, 2023

Fair and Robust Metric for Evaluating Touch-based Continuous Mobile Device Authentication.
Proceedings of the Companion Proceedings of the 28th International Conference on Intelligent User Interfaces, 2023

Estimating Answer Strategies using Online Handwritten Data: A Study using Geometry Problems.
Proceedings of the 15th International Conference on Education Technology and Computers, 2023

Why is the User Interface a Dark Pattern?: Explainable Auto-Detection and its Analysis.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Overfitting measurement of convolutional neural networks using trained network weights.
Int. J. Data Sci. Anal., 2022

A Survey on Explainable Fake News Detection.
IEICE Trans. Inf. Syst., 2022

Topological measurement of deep neural networks using persistent homology.
Ann. Math. Artif. Intell., 2022

CHE: Channel-Wise Homomorphic Encryption for Ciphertext Inference in Convolutional Neural Network.
IEEE Access, 2022

Look-Up Table based FHE System for Privacy Preserving Anomaly Detection in Smart Grids.
Proceedings of the 2022 IEEE International Conference on Smart Computing, 2022

Privacy-Preserving Data Falsification Detection in Smart Grids using Elliptic Curve Cryptography and Homomorphic Encryption.
Proceedings of the 2022 IEEE International Conference on Smart Computing, 2022

Decoy Effect of Recommendation Systems on Real E-commerce Websites.
Proceedings of the 9th Joint Workshop on Interfaces and Human Decision Making for Recommender Systems co-located with 16th ACM Conference on Recommender Systems (RecSys 2022), 2022

HRCA+: Advanced Multiple-choice Machine Reading Comprehension Method.
Proceedings of the Thirteenth Language Resources and Evaluation Conference, 2022

Comparing Augmented Reality-based Display Methods to Present Guiding Information.
Proceedings of the 4th IEEE Global Conference on Life Sciences and Technologies, 2022

GN-GCN: Combining Geographical Neighbor Concept with Graph Convolution Network for POI Recommendation.
Proceedings of the Information Integration and Web Intelligence, 2022

Latency-Aware Inference on Convolutional Neural Network Over Homomorphic Encryption.
Proceedings of the Information Integration and Web Intelligence, 2022

Hybrid Phishing URL Detection Using Segmented Word Embedding.
Proceedings of the Information Integration and Web Intelligence, 2022

Acceleration of Homomorphic Unrolled Trace-Type Function using AVX512 instructions.
Proceedings of the 10th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2022

Dark patterns in e-commerce: a dataset and its baseline evaluations.
Proceedings of the IEEE International Conference on Big Data, 2022

Homomorphic Encryption-Friendly Privacy-Preserving Partitioning Algorithm for Differential Privacy.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Faithful Post-hoc Explanation of Recommendation Using Optimally Selected Features.
Proceedings of the Engineering Artificially Intelligent Systems, 2021

Faster Homomorphic Trace-Type Function Evaluation.
IEEE Access, 2021

Segmentation-based Phishing URL Detection.
Proceedings of the WI-IAT '21: IEEE/WIC/ACM International Conference on Web Intelligence, Melbourne VIC Australia, December 14, 2021

User-centric Distributed Route Planning in Smart Cities based on Multi-objective Optimization.
Proceedings of the IEEE International Conference on Smart Computing, 2021

Real-time Periodic Advertisement Recommendation Optimization under Delivery Constraint using Quantum-inspired Computer.
Proceedings of the 23rd International Conference on Enterprise Information Systems, 2021

Overfitting Measurement of Deep Neural Networks Using No Data.
Proceedings of the 8th IEEE International Conference on Data Science and Advanced Analytics, 2021

Construction of Differentially Private Summaries Over Fully Homomorphic Encryption.
Proceedings of the Database and Expert Systems Applications, 2021

First-Impression-Based Unreliable Web Pages Detection - Does First Impression Work?
Proceedings of the Advanced Information Networking and Applications, 2021

Fast and Accurate Function Evaluation with LUT over Integer-Based Fully Homomorphic Encryption.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
Geographic Diversification of Recommended POIs in Frequently Visited Areas.
ACM Trans. Inf. Syst., 2020

Towards Privacy-preserving Anomaly-based Attack Detection against Data Falsification in Smart Grid.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

DAMCREM: Dynamic Allocation Method of Computation REsource to Macro-Tasks for Fully Homomorphic Encryption Applications.
Proceedings of the IEEE International Conference on Smart Computing, 2020

WUY at SemEval-2020 Task 7: Combining BERT and Naive Bayes-SVM for Humor Assessment in Edited News Headlines.
Proceedings of the Fourteenth Workshop on Semantic Evaluation, 2020

Imitation-Resistant Passive Authentication Interface for Stroke-Based Touch Screen Devices.
Proceedings of the HCI International 2020 - Posters - 22nd International Conference, 2020

Smart SE: Smart Systems and Services Innovative Professional Education Program.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Real-Time Periodic Advertisement Recommendation Optimization using Ising Machine.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Highly Accurate CNN Inference Using Approximate Activation Functions over Homomorphic Encryption.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Deep Neural Network Pruning Using Persistent Homology.
Proceedings of the 3rd IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2020

2019
Fully Homomorphic Encryption with Table Lookup for Privacy-Preserving Smart Grid.
Proceedings of the IEEE International Conference on Smart Computing, 2019

Secure Naïve Bayes Classification Protocol over Encrypted Data Using Fully Homomorphic Encryption.
Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services, 2019

Outsourced Private Set Union on Multi-Attribute Datasets for Search Protocol using Fully Homomorphic Encryption.
Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services, 2019

A Privacy-Preserving Query System using Fully Homomorphic Encryption with Real-World Implementation for Medicine-Side Effect Search.
Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services, 2019

URL-based Phishing Detection using the Entropy of Non-Alphanumeric Characters.
Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services, 2019

Point of Interest Recommendation by Exploiting Geographical Weighted Center and Categorical Preference.
Proceedings of the 2019 International Conference on Data Mining Workshops, 2019

Two-Factor Authentication Using Leap Motion and Numeric Keypad.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2019

Effectiveness of Usability & Performance Features for Web Credibility Evaluation.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Efficient Topical Focused Crawling Through Neighborhood Feature.
New Gener. Comput., 2018

Editor's Message to Special Issue of Young Researchers' Papers.
J. Inf. Process., 2018

Active Authentication on Smartphone using Touch Pressure.
Proceedings of the 31st Annual ACM Symposium on User Interface Software and Technology Adjunct Proceedings, 2018

Non-Interactive and Fully Output Expressive Private Comparison.
Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018

History-enhanced focused website segment crawler.
Proceedings of the 2018 International Conference on Information Networking, 2018

Outsourced Private Set Intersection Cardinality with Fully Homomorphic Encryption.
Proceedings of the 6th International Conference on Multimedia Computing and Systems, 2018

External Content-dependent Features for Web Credibility Evaluation.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

Improving Recommendation Diversity Across Users by Reducing Frequently Recommended Items.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Familiarity-aware POI Recommendation in Urban Neighborhoods.
J. Inf. Process., 2017

Dynamic SAX parameter estimation for time series.
Int. J. Web Inf. Syst., 2017

A Survey on Recommendation Methods Beyond Accuracy.
IEICE Trans. Inf. Syst., 2017

Private Substring Search on Homomorphically Encrypted Data.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

Geographical Diversification in POI Recommendation: Toward Improved Coverage on Interested Areas.
Proceedings of the Eleventh ACM Conference on Recommender Systems, 2017

Virtual Co-Eating: Making Solitary Eating Experience More Enjoyable.
Proceedings of the Entertainment Computing - ICEC 2017, 2017

A variable-length motifs discovery method in time series using hybrid approach.
Proceedings of the 19th International Conference on Information Integration and Web-based Applications & Services, 2017

Securing big data and IoT networks in smart cyber-physical environments.
Proceedings of the 2017 International Conference on Smart Digital Environment, 2017

Attribute-based proxy re-encryption method for revocation in cloud data storage.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

MCMalloc: A scalable memory allocator for multithreaded applications on a many-core shared-memory machine.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2016
A study on individual mobility patterns based on individuals' familiarity to visited areas.
Int. J. Pervasive Comput. Commun., 2016

Identifying Protein Short Linear Motifs by Position-Specific Scoring Matrix.
Proceedings of the Advances in Swarm Intelligence, 7th International Conference, 2016

Adaptive Focused Website Segment Crawler.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

An improved symbolic aggregate approximation distance measure based on its statistical features.
Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, 2016

Secure Frequent Pattern Mining by Fully Homomorphic Encryption with Ciphertext Packing.
Proceedings of the Data Privacy Management and Security Assurance, 2016

Privacy-preserving string search for genome sequences with FHE bootstrapping optimization.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

Fast and space-efficient secure frequent pattern mining by FHE.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

2015
Condensing position-specific scoring matrixs by the Kidera factors for ligand-binding site prediction.
Int. J. Data Min. Bioinform., 2015

Why people go to unfamiliar areas?: analysis of mobility pattern based on users' familiarity.
Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services, 2015

Detecting Learner's To-Be-Forgotten Items using Online Handwritten Data.
Proceedings of the 15th New Zealand Conference on Human-Computer Interaction, 2015

Predicting various types of user attributes in Twitter by using personalized pagerank.
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015

2014
Analysis of evolutionary conservation patterns and their influence on identifying protein functional sites.
J. Bioinform. Comput. Biol., 2014

Simplified sequence-based method for ATP-binding prediction using contextual local evolutionary conservation.
Algorithms Mol. Biol., 2014

Intelligent Ink Annotation Framework that uses User's Intention in Electronic Document Annotation.
Proceedings of the Ninth ACM International Conference on Interactive Tabletops and Surfaces, 2014

Image Annotation Fusing Content-Based and Tag-Based Technique Using Support Vector Machine and Vector Space Model.
Proceedings of the Tenth International Conference on Signal-Image Technology and Internet-Based Systems, 2014

EA Snippets: Generating Summarized View of Handwritten Documents Based on Emphasis Annotations.
Proceedings of the Human Interface and the Management of Information. Information and Knowledge in Applications and Services, 2014

A challenge of authorship identification for ten-thousand-scale microblog users.
Proceedings of the 2014 IEEE International Conference on Big Data (IEEE BigData 2014), 2014

2013
MFSPSSMpred: identifying short disorder-to-order binding regions in disordered proteins based on contextual local evolutionary conservation.
BMC Bioinform., 2013

Detecting student frustration based on handwriting behavior.
Proceedings of the 26th Annual ACM Symposium on User Interface Software and Technology, 2013

A Negative Sample Image Selection Method Referring to Semantic Hierarchical Structure for Image Annotation.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

WSD Team's Approaches for Textual Entailment Recognition at the NTCIR10 (RITE2).
Proceedings of the 10th NTCIR Conference on Evaluation of Information Access Technologies, 2013

IC-BIDE: Intensity Constraint-Based Closed Sequential Pattern Mining for Coding Pattern Extraction.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
Visual-attention-based thumbnail using two-stage GrabCut.
Proceedings of the 2012 International Conference on Multimedia Computing and Systems, 2012

Hit Count Reliability: How Much Can We Trust Hit Counts?
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012

2011
Time-weighted web authoritative ranking.
Inf. Retr., 2011

Legible thumbnail: summarizing on-line handwritten documents based on emphasized expressions.
Proceedings of the 13th Conference on Human-Computer Interaction with Mobile Devices and Services, 2011

Retweet Reputation: A Bias-Free Evaluation Method for Tweeted Contents.
Proceedings of the Social Innovation and Social Media, 2011

2010
Data Access Pattern Analysis on Stream Mining Algorithms for Cloud Computation.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2010

Reliability Verification of Search Engines' Hit Counts: How to Select a Reliable Hit Count for a Query.
Proceedings of the Current Trends in Web Engineering, 2010

Nb-GCLOCK: A non-blocking buffer management based on the generalized CLOCK.
Proceedings of the 26th International Conference on Data Engineering, 2010

Cross-media impact on twitter in japan.
Proceedings of the 2nd International Workshop on Search and Mining User-Generated Contents, 2010

The Method of Improving the Specific Language Focused Crawler.
Proceedings of the CIPS-SIGHAN Joint Conference on Chinese Language Processing, 2010

2009
Exploiting idle CPU cores to improve file access performance.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

2008
Optimistic transactional active replication.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

What's Going on in Search Engine Rankings?
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
EPCI: extracting potentially copyright infringement texts from the web.
Proceedings of the 16th International Conference on World Wide Web, 2007

MathBox: interactive pen-based interface for inputting mathematical expressions.
Proceedings of the 12th International Conference on Intelligent User Interfaces, 2007

2006
Generalized Sequential Pattern Mining with Item Intervals.
J. Comput., 2006

Improvement in accuracy of multiple sequence alignment using novel group-to-group sequence alignment algorithm with piecewise linear gap cost.
BMC Bioinform., 2006

Web Structure in 2005.
Proceedings of the Algorithms and Models for the Web-Graph, Fourth International Workshop, 2006

Sequential Pattern Mining with Time Intervals.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2006

Text Mining using PrefixSpan constrained by Item Interval and Item Attribute.
Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006

2005
Overview of the NTCIR-5 WEB Navigational Retrieval Subtask 2 (Navi-2).
Proceedings of the Fifth NTCIR Workshop Meeting on Evaluation of Information Access Technologies: Information Retrieval, 2005

PlusDBG: Web Community Extraction Scheme Improving Both Precision and Pseudo-Recall.
Proceedings of the Web Technologies Research and Development - APWeb 2005, 7th Asia-Pacific Web Conference, Shanghai, China, March 29, 2005

2004
An Evaluation Method of Web Search Engines Based on Users' Sense.
Proceedings of the Fourth NTCIR Workshop on Research in Information Access Technologies Information Retrieval, 2004

1998
Experiments of Collecting WWW Information Using Distributed WWW Robots.
Proceedings of the SIGIR '98: Proceedings of the 21st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 1998

Fast Speculative Search Engine on the Highly Parallel Computer EM-X.
Proceedings of the SIGIR '98: Proceedings of the 21st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 1998

1997
Fine-Grain Multithreading with the EM-X Multiprocessor.
Proceedings of the 9th Annual ACM Symposium on Parallel Algorithms and Architectures, 1997

Experience with Fine-Grain Communication in EM-X Multiprocessor for Parallel Sparse Matrix Computation.
Proceedings of the 11th International Parallel Processing Symposium (IPPS '97), 1997

1996
Identifying the capability of overlapping computation with communication.
Proceedings of the Fifth International Conference on Parallel Architectures and Compilation Techniques, 1996

1995
A speculative execution scheme of macrotasks for parallel processing systems.
Syst. Comput. Jpn., 1995

The EM-X Parallel Computer: Architecture and Basic Performance.
Proceedings of the 22nd Annual International Symposium on Computer Architecture, 1995

A Macrotask-level Unlimited Speculative Execution on Multiprocessors.
Proceedings of the 9th international conference on Supercomputing, 1995

1993
A flow-executing scheme for DOACROSS loops on dynamic dataflow machines.
Syst. Comput. Jpn., 1993

1992
A FORTRAN Compiling Method for Dataflow Machines and Its Prototype Compiler for the Parallel Processing System -Harray-.
Proceedings of the Languages and Compilers for Parallel Computing, 1992

1989
Major Research Activities in Parallel Processing in Japan and an Example -Harray-.
Int. J. High Speed Comput., 1989

A preceding activation scheme with graph unfolding for the parallel processing system-array.
Proceedings of the Proceedings Supercomputing '89, Reno, NV, USA, November 12-17, 1989, 1989

1988
System architecture of parallel processing system -Harry-.
Proceedings of the 2nd international conference on Supercomputing, 1988


  Loading...