Kentaro Aburada

According to our database1, Kentaro Aburada authored at least 58 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Tsunami evacuation simulation considering road width in Aoshima district.
Artif. Life Robotics, November, 2023

Development of keypads which use colors or shapes to prevent shoulder surfing.
Artif. Life Robotics, November, 2023

2022
Correction to: Proposal and evaluation for color constancy CAPTCHA.
Artif. Life Robotics, 2022

Proposal for a blockchain based agricultural input voucher system.
Artif. Life Robotics, 2022

2021
Measuring Test Suite Reusability Based on the Usage Frequency and Coverage of Reused Test Cases.
J. Robotics Netw. Artif. Life, 2021

Measuring Redundancy Score for Test Suite Evaluation by Using Test Cases Matching Approach.
J. Robotics Netw. Artif. Life, 2021

Utilizing the Similarity Meaning of Label in Class Cohesion Calculation.
J. Robotics Netw. Artif. Life, 2021

Proposal and evaluation for color constancy CAPTCHA.
Artif. Life Robotics, 2021

Development and Evaluation of Swahili Text Based CAPTCHA.
Proceedings of the 3rd IEEE Global Conference on Life Sciences and Technologies, 2021

Proposal of Jawi CAPTCHA Using Digraphia Feature of the Malay Language.
Proceedings of the Advances in Information and Computer Security, 2021

Proposal and Evaluation of a Gesture Authentication Method with Peep Resistance for Smartwatches.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021

Performance Evaluation of Blockchain Based Agricultural Input Voucher System.
Proceedings of the 10th IEEE Global Conference on Consumer Electronics, 2021

2020
Proposal of an Algorithm to Generate VDM++ Specification Based on its Grammar by Using Word Lists Extracted from the Natural Language Specification.
J. Robotics Netw. Artif. Life, 2020

On a user authentication method to realise an authentication system using s-EMG.
Int. J. Grid Util. Comput., 2020

Identification of Manual Alphabets Based Gestures Using s-EMG for Realizing User Authentication.
Proceedings of the Advances in Internet, 2020

Evaluation of Yubimoji Based Gestures for Realizing User Authentication Method Using s-EMG.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

2019
Implementation of Arduino Simulator ADVIS Visualizing the Value of Voltage on the Circuit.
J. Robotics Netw. Artif. Life, 2019

Implementation of Tamias to Check Production Rules for Parsing Expression Grammar.
J. Robotics Netw. Artif. Life, 2019

Application of Pairwise Testing into BWDM which is a Test Case Generation Tool for the VDM++ Specification.
J. Robotics Netw. Artif. Life, 2019

Evaluation of Ad-hoc Secure Device Pairing Method with Accelerometer and Camera Using Marker.
Int. J. Netw. Comput., 2019

Use of access characteristics to distinguish legitimate user traffic from DDoS attack traffic.
Artif. Life Robotics, 2019

Evaluation of Manual Alphabets Based Gestures for a User Authentication Method Using s-EMG.
Proceedings of the Advances in Networked-based Information Systems, 2019

Gait-Based Authentication for Smart Locks Using Accelerometers in Two Devices.
Proceedings of the Advances in Networked-based Information Systems, 2019

Proposal and Evaluation of Authentication Method Having Shoulder-Surfing Resistance for Smartwatches Using Shift Rule.
Proceedings of the Advances in Networked-based Information Systems, 2019

Blockchain-Based Malware Detection Method Using Shared Signatures of Suspected Malware Files.
Proceedings of the Advances in Networked-based Information Systems, 2019

Gait-Based Authentication Using Anomaly Detection with Acceleration of Two Devices in Smart Lock.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019

Introduction of Fingerspelling for Realizing a User Authentication Method Using s-EMG.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2019

Proposal of Ad-Hoc Secure Device Pairing Method Using Similarity Between Marker Movement and Acceleration.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2019

2018
RETUSS: Ensuring Traceability System between Class Diagram in UML and Java Source Code in Real Time.
J. Robotics Netw. Artif. Life, 2018

A Proposal of Highly Responsive Distributed Denial-of-Service Attacks Detection Using Real-Time Burst Detection Method.
J. Inf. Process., 2018

Evaluation of Farmers Market Information System to Connect with Some Social Stakeholders.
J. Inf. Process., 2018

On applying support vector machines to a user authentication method using surface electromyogram signals.
Artif. Life Robotics, 2018

Evaluation of User Identification Methods for Realizing an Authentication System Using s-EMG.
Proceedings of the Advances in Network-Based Information Systems, 2018

Interactive Video CAPTCHA for Better Resistance to Automated Attack.
Proceedings of the Eleventh International Conference on Mobile Computing and Ubiquitous Network, 2018

An Examination of Pairing Method with Camera and Acceleration Sensor.
Proceedings of the Eleventh International Conference on Mobile Computing and Ubiquitous Network, 2018

A Proposal of New Reading Text CAPTCHA using Random Dot Patterns.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

Proposal and Evaluation of Secure Device Pairing Method with Camera and Accelerometer.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

An Examination of CAPTCHA for Tolerance of Relay Attacks and Automated Attacks.
Proceedings of the Advances in Internet, 2018

Evaluation of Mouse Operation Authentication Method Having Shoulder Surfing Resistance.
Proceedings of the Advances in Internet, 2018

A Study on a User Identification Method Using Dynamic Time Warping to Realize an Authentication System by s-EMG.
Proceedings of the Advances in Internet, 2018

Evaluation of Index Poisoning Method in Large Scale Winny Network.
Proceedings of the Advances in Internet, 2018

2017
BWDM: Test Cases Automatic Generation Tool Based on Boundary Value Analysis with VDM++.
J. Robotics Netw. Artif. Life, 2017

Development of a Tool to Keep Consistency between a Model and a Source Code in Software Development Using MDA.
J. Robotics Netw. Artif. Life, 2017

Highly Responsive Distributed Denial-of-Service Attacks Detection by Using Real-Time Burst Detection Method.
Proceedings of the Advances in Network-Based Information Systems, 2017

Evaluation and Improvement of Farmers Market Information System to Connect with Some Social Stakeholders.
Proceedings of the Advances in Network-Based Information Systems, 2017

Development of a Monitoring System Based on Power Consumption.
Proceedings of the Advances in Network-Based Information Systems, 2017

2015
An Authentication Method Independent of Tap Operation on the Touchscreen of a Mobile Device.
J. Robotics Netw. Artif. Life, 2015

Security Evaluation System for Android Applications Using User's Reviews and Permissions.
J. Robotics Netw. Artif. Life, 2015

Prototype of a Supporting Tool to Generate Testing Communication Diagram.
J. Robotics Netw. Artif. Life, 2015

Prototype of a Decision Table Generation Tool from the Formal Specification.
J. Robotics Netw. Artif. Life, 2015

TFVIS: a Supporting Debugging Tool for Java Programs by Visualizing Data Transitions and Execution Flows.
J. Robotics Netw. Artif. Life, 2015

Proposal of a Testing Method Using Similarity of Interleaving for Java Multi-threaded Programs.
J. Robotics Netw. Artif. Life, 2015

Proposal of a Modification Method of a Source Code to Correspond with a Modified Model in MDA.
J. Robotics Netw. Artif. Life, 2015

Proposal and Its Evaluation of Neighbors Based Routing for ad hoc networks.
J. Robotics Netw. Artif. Life, 2015

Study of Filter Sharing Method Using Virtual Peers in P2P Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

Content Access Control Scheme for P2P Networks Using a Reputation Value.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
Proposal of a Puzzle Authentication Method with Shoulder-surfing Attack Resistance.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

Investigation of the routing method based on the number of neighbor nodes.
Proceedings of the Seventh International Conference on Mobile Computing and Ubiquitous Networking, 2014


  Loading...