Hiroyuki Sato

Orcid: 0000-0002-2891-3835

Affiliations:
  • University of Tokyo, Tokyo, Japan
  • National Institute of Informatics, Tokyo, Japan


According to our database1, Hiroyuki Sato authored at least 98 papers between 2004 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
DynTaskMAS: A Dynamic Task Graph-driven Framework for Asynchronous and Parallel LLM-based Multi-Agent Systems.
CoRR, March, 2025

Spectrum-Adaptive Distribution of 2D Gaussians for Image Representation and Compression.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2025

2024
Data Aggregation Management With Self-Sovereign Identity in Decentralized Networks.
IEEE Trans. Netw. Serv. Manag., December, 2024

BlockFusion: Expandable 3D Scene Generation using Latent Tri-plane Extrapolation.
ACM Trans. Graph., July, 2024

Hand Gesture Classification Using sEMG Signals: Nearest-Centroid-Based Methodology With DBA.
IEEE Access, 2024

Accelerating Decision Diagram-based Multi-node Quantum Simulation with Ring Communication and Automatic SWAP Insertion.
Proceedings of the IEEE International Conference on Quantum Software, 2024

Decision Diagram vs. State Vector: A Comparative Study on Quantum Computing Simulation Efficiency.
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2024

Hand Gesture Classification Using Nearest Centroid with Soft-DTW Loss on sEMG Signals.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2024

Hunting DeFi Vulnerabilities via Context-Sensitive Concolic Verification.
Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings, 2024

On-Chain Dynamic Policy Evaluation for Decentralized Access Control.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2024

Textual Differential Privacy for Context-Aware Reasoning with Large Language Model.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024

Emer: Reputation-Based Event Consumer for Event-Driven Decentralized Systems.
Proceedings of the International Conference on Communications, 2024

2023
Optimal Federation Method for Embedding Internet of Things in Software-Defined Perimeter.
IEEE Consumer Electron. Mag., September, 2023

Bloccess: Enabling Fine-Grained Access Control Based on Blockchain.
J. Netw. Syst. Manag., 2023

1-D CNN-Based Online Signature Verification with Federated Learning.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Inj-Kyber: Enhancing CRYSTALS-Kyber with Information Injection within a Bio-KEM Framework.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Model-Driven Security Analysis of Self-Sovereign Identity Systems.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Operation Management Method of Software Defined Perimeter for Promoting Zero-Trust Model.
Proceedings of the 21st IEEE/ACIS International Conference on Software Engineering Research, 2023

Parallelizing quantum simulation with decision diagrams.
Proceedings of the IEEE International Conference on Quantum Software, 2023

Security Policy Matching Model between Mobile IoT and Public Fog Computing.
Proceedings of the 14th IIAI International Congress on Advanced Applied Informatics, 2023

W-Kernel: An OS Kernel Architecture Designed With Isolation and Customizability.
Proceedings of the 2023 5th International Conference on Software Engineering and Development, 2023

3D Segmenter: 3D Transformer based Semantic Segmentation via 2D Panoramic Distillation.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

Digital Twin Configuration Method for Public Services by Citizens.
Proceedings of the IEEE International Conference on Consumer Electronics, 2023

Decentralized Self-sovereign Identity Management System: Empowering Datacenters Through Compact Cancelable Template Generation.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

VeriAnon: an Anonymous, Verifiable, and Tamper-proof Commenting System Based on Ring Signature and Clustering Merkle Tree for Decentralized Trading.
Proceedings of the 4th Asia Service Sciences and Software Engineering Conference, 2023

Dimension-Wise Feature Selection of Deep Learning Models for In-Air Signature Time Series Analysis Based on Shapley Values.
Proceedings of the 4th Asia Service Sciences and Software Engineering Conference, 2023

2022
Sensing In-Air Signature Motions Using Smartwatch: A High-Precision Approach of Behavioral Authentication.
IEEE Access, 2022

Leveraging Self-Sovereign Identity in Decentralized Data Aggregation.
Proceedings of the Ninth International Conference on Software Defined Systems, 2022

A Mobile Cloud-based Access Control with Efficiently Outsourced Decryption.
Proceedings of the 10th IEEE International Conference on Mobile Cloud Computing, 2022

Elastic Trust Management in Decentralized Computing Environments.
Proceedings of the Modern Management based on Big Data III, 2022

Formalism- Driven Development of Decentralized Systems.
Proceedings of the 26th International Conference on Engineering of Complex Computer Systems, 2022

Multilayer Defense Security Management in Consideration of TPO Conditions.
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022

An Extended Visualization Model for Silent Cyber Risks Considering Non-cyber Aspects.
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022

Self-Sovereign Identity as a Service: Architecture in Practice.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Two-Tier Trust Structure Model for Dynamic Supply Chain Formulation.
Proceedings of the Advanced Information Networking and Applications, 2022

2021
Complementary Methods of IoT Reliability for Embedding IoT Devices into SDP.
Proceedings of the 11th IEEE International Conference on Consumer Electronics, 2021

Sunspot: A Decentralized Framework Enabling Privacy for Authorizable Data Sharing on Transparent Public Blockchains.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

IoT Reliability Improvement Method for Secure Supply Chain Management.
Proceedings of the 10th IEEE Global Conference on Consumer Electronics, 2021

A Visualization Model for Silent Cyber Risks Contained in Emerging Risks.
Proceedings of the 10th IEEE Global Conference on Consumer Electronics, 2021

In-air Signature Authentication Using Smartwatch Motion Sensors.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

2020
Transition-Oriented Programming: Developing Verifiable Systems.
CoRR, 2020

Extending Concurrent Separation Logic to Enhance Modular Formalization.
CoRR, 2020

Risk Breakdown Structure and Security Space for Security Management.
Proceedings of the 14th IEEE International Conference on Service Oriented Systems Engineering, 2020

Service-Oriented Software Design Model for Communication Robot.
Proceedings of the 14th IEEE International Conference on Service Oriented Systems Engineering, 2020

Proposal of a Perimeter Line Management Method for Fog and Edge Computing with SDP Concept.
Proceedings of the Advances in Networked-Based Information Systems, 2020

Bloccess: Towards Fine-Grained Access Control Using Blockchain in a Distributed Untrustworthy Environment.
Proceedings of the 8th IEEE International Conference on Mobile Cloud Computing, 2020

A Study of Multi-viewpoint Risk Assessment of Internet of Things (IoT).
Proceedings of the 9th International Congress on Advanced Applied Informatics, 2020

Risk Management of Mobile Workers based on Multiple Viewpoints.
Proceedings of the 9th International Congress on Advanced Applied Informatics, 2020

Formalizing and Verifying Decentralized Systems with Extended Concurrent Separation Logic.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Automated Test Input Generation for Convolutional Neural Networks by Implementing Multi-objective Evolutionary Algorithms.
Proceedings of the Eighth International Symposium on Computing and Networking Workshops, 2020

Derepo: A Distributed Privacy-Preserving Data Repository with Decentralized Access Control for Smart Health.
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020

Dagbase: A Decentralized Database Platform Using DAG-Based Consensus.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

2019
Concept Proposal of Multi-layer Defense Security Countermeasures Based on Dynamic Reconfiguration Multi-perimeter Lines.
Proceedings of the Advances in Networked-based Information Systems, 2019

Edge Computing Platform Management: Design for F2C and F2F for Small Businesses to Reduce Costs.
Proceedings of the 8th International Congress on Advanced Applied Informatics, 2019

Data Management Portfolio for Improvement of Privacy in Fog-to-cloud Computing Systems.
Proceedings of the 8th International Congress on Advanced Applied Informatics, 2019

A Study of Risk Assessment for Sharing Economy based on a User's Viewpoint.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

Communication Robot for Elderly Based on Robotic Process Automation.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

2018
Adaptive Policy Evaluation Framework for Flexible Service Provision.
Proceedings of the IEEE Symposium on Service-Oriented System Engineering, 2018

2017
An empirical study on the effects of code visibility on program testability.
Softw. Qual. J., 2017

An Application Framework for Smart Education System Based on Mobile and Cloud Systems.
IEICE Trans. Inf. Syst., 2017

Risk Assessment for Privacy Protection of Information Literacy Beginners in Big Data Era.
Proceedings of the Advances in Network-Based Information Systems, 2017

A Performance Evaluation of Data Storage Approach for High Availability and Confidentiality on Multi-cloud.
Proceedings of the Advances in Network-Based Information Systems, 2017

2016
Establishing Trust in the Emerging Era of IoT.
Proceedings of the 2016 IEEE Symposium on Service-Oriented System Engineering, 2016

Risk Assessment Based on User's Viewpoint for Mobile Ad Hoc Network.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

Risk Assessment of Home Gateway/Smart Meter in Smart Grid Service.
Proceedings of the 5th IIAI International Congress on Advanced Applied Informatics, 2016

Performance evaluation on data management approach for multiple clouds using secret sharing scheme.
Proceedings of the IEEE International Conference on Consumer Electronics, 2016

Risk assessment of BYOD: Bring your own device.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Temporary grouping method using smartphones.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Automatic LOD conversion system of tweet data associated with tourist spots.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Risk assessment quantification of social-media utilization in enterprise.
Proceedings of the 15th IEEE/ACIS International Conference on Computer and Information Science, 2016

2015
Risk assessment of social-media utilization in an enterprise.
Proceedings of the 16th IEEE/ACIS International Conference on Software Engineering, 2015

Improvement of multiple CP/CPS based on level of assurance for campus PKI deployment.
Proceedings of the 16th IEEE/ACIS International Conference on Software Engineering, 2015

A Practical Trust Framework: Assurance Levels Repackaged Through Analysis of Business Scenarios and Related Risks.
Proceedings of the Security Standardisation Research - Second International Conference, 2015

Risk Assessment in Cyber-Physical System in Office Environment.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

GRT: An Automated Test Generator Using Orchestrated Program Analysis.
Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, 2015

GRT: Program-Analysis-Guided Random Testing (T).
Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, 2015

An Approach to Selecting Cloud Services for Data Storage in Heterogneous-Multicloud Environment with High Availability and Confidentiality.
Proceedings of the Twelfth IEEE International Symposium on Autonomous Decentralized Systems, 2015

CLOUD-CAT: A collaborative access control tool for data outsourced in cloud computing.
Proceedings of the Tenth International Conference on Digital Information Management, 2015

Cost reduction effect on running costs in ISMS based on sensors.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015

Secure protocol with variable security level using secret sharing scheme.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015

Dynamic risk evaluation model as a security field.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015

A Study of Cost Structure Visualization for Digital Forensics Deployment.
Proceedings of the 3rd International Conference on Applied Computing and Information Technology, 2015

2014
Risk assessment quantification in life log service.
Proceedings of the 15th IEEE/ACIS International Conference on Software Engineering, 2014

Project centralization based on graph coloring.
Proceedings of the Symposium on Applied Computing, 2014

A Study of Risk Assessment Quantification in Cloud Computing.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

Data Management Approach for Multiple Clouds Using Secret Sharing Scheme.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

Efficient testing of software product lines via centralization (short paper).
Proceedings of the Generative Programming: Concepts and Experiences, 2014

2013
A Study of Data Management in Hybrid Cloud Configuration.
Proceedings of the 14th ACIS International Conference on Software Engineering, 2013

A File-Distribution Approach to Achieve High Availability and Confidentiality for Data Storage on Multi-cloud.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

2012
Quantifying Cost Structure of Campus PKI Based on Estimation and Actual Measurement.
Inf. Media Technol., 2012

Risk Management to User Perception of Insecurity in Ambient Service.
Proceedings of the 13th ACIS International Conference on Software Engineering, 2012

Analysis of Security of PKI Operation with Multiple CP/CPS Based on Level of Assurance.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

2011
Quantifying Cost Structure of Campus PKI.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

Building a Security Aware Cloud by Extending Internal Control to Cloud.
Proceedings of the 10th International Symposium on Autonomous Decentralized Systems, 2011

2010
A Cloud Trust Model in a Security Aware Cloud.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

Design of Graded Trusts by Using Dynamic Path Validation.
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010

2009
<i>N</i>+/-<i>epsilon</i>: Reflecting Local Risk Assessment in LoA.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009

2004
A Technical Survey of Data Integration and Information Sharing Using Knowledge Representation on the Web.
IEICE Trans. Inf. Syst., 2004


  Loading...