Masayuki Hisada

According to our database1, Masayuki Hisada authored at least 21 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Hybrid Clustered Approach for Enhanced Communication and Model Performance in Blockchain-Based Collaborative Learning.
IEEE Access, 2024

2021
Smart Energy Management System based on Reconfigurable AI Chip and Electrical Vehicles.
Proceedings of the IEEE International Conference on Big Data and Smart Computing, 2021

2020
AEBIS: AI-Enabled Blockchain-Based Electric Vehicle Integration System for Power Management in Smart Grid Platform.
IEEE Access, 2020

2013
A novel network-centric infrastructure for social networking services using a messaging network.
Proceedings of the 15th Asia-Pacific Network Operations and Management Symposium, 2013

2012
Coping with the Complexity of SOA Systems with Message Forensics.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Classification of malicious web code by machine learning.
Proceedings of the 3rd International Conference on Awareness Science and Technology, 2011

2010
The architecture and industry applications of web security in static and dynamic analysis.
J. Syst. Inf. Technol., 2010

SOA Web Security and Applications.
J. Object Technol., 2010

Static and dynamic analysis for web security in industry applications.
Int. J. Electron. Secur. Digit. Forensics, 2010

Incremental linear discriminant analysis for evolving feature spaces in multitask pattern recognition problems.
Evol. Syst., 2010

Knowledge-Base Semantic Gap Analysis for the Vulnerability Detection.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

A New Security Testing Method for Detecting Flash Vulnerabilities by Generating Test Patterns.
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010

Metadata Driven Approaches for Web Security of New age Computing.
Proceedings of the 2010 International Conference on Internet Computing, 2010

Event Capture Approaches for Vulnerability Detection.
Proceedings of the 2010 International Conference on Security & Management, 2010

2009
Static Analysis for Web Security in Abstract Syntax Format.
Proceedings of the 2009 International Conference on Internet Computing, 2009

2008
A Novel Incremental Linear Discriminant Analysis for Multitask Pattern Recognition Problems.
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008

2002
Towards a singularity-based shape language: ridges, ravines, and skeletons for polygonal surfaces.
Soft Comput., 2002

A Skeleton-based Approach for Detection of Perceptually Salient Features on Polygonal Surfaces.
Comput. Graph. Forum, 2002

2001
A 3D Voronoi-Based Skeleton and Associated Surface Features.
Proceedings of the 9th Pacific Conference on Computer Graphics and Applications, 2001

Implementation of Object Attachments by Cellular Modeling.
Proceedings of the Computer Graphics International 2001 (CGI'01), 2001

2000
Overcoming Software Complexity by Constructing Abstraction Hierarchies - The Principles and Applications.
Proceedings of the 6th International Conference on Engineering of Complex Computer Systems (ICECCS 2000), 2000


  Loading...