Yuichi Sei

Orcid: 0000-0002-2552-6717

According to our database1, Yuichi Sei authored at least 112 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An Analysis of Knowledge Representation for Anime Recommendation Using Graph Neural Networks.
Proceedings of the 16th International Conference on Agents and Artificial Intelligence, 2024

Proposal of a Cosmetic Product Recommendation Method with Review Text that is Predicted to Be Write by Users.
Proceedings of the 16th International Conference on Agents and Artificial Intelligence, 2024

2023
Automatic Tuning of Privacy Budgets in Input-Discriminative Local Differential Privacy.
IEEE Internet Things J., September, 2023

Blockchain for healthcare systems: Architecture, security challenges, trends and future directions.
J. Netw. Comput. Appl., June, 2023

Sign2Pose: A Pose-Based Approach for Gloss Prediction Using a Transformer Model.
Sensors, March, 2023

Privacy-Preserving Collaborative Data Collection and Analysis With Many Missing Values.
IEEE Trans. Dependable Secur. Comput., 2023

A Middleware to Improve Analysis Coverage in IoT Vulnerability Detection.
Proceedings of the IEEE International Conference on Internet of Things and Intelligence Systems, 2023

Federated Learning Algorithm Handling Missing Attributes.
Proceedings of the IEEE International Conference on Internet of Things and Intelligence Systems, 2023

A k-Anonymization Method for Social Network Data with Link Prediction.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Predicting Visual Importance of Mobile UI Using Semantic Segmentation.
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023

Rumor Detection in Tweets Using Graph Convolutional Networks.
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023

Diverse Level Generation for Tile-Based Video Game using Generative Adversarial Networks from Few Samples.
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023

Proposal of a Signal Control Method Using Deep Reinforcement Learning with Pedestrian Traffic Flow.
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023

Generation of Facial Images Reflecting Speaker Attributes and Emotions Based on Voice Input.
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023

Background Image Editing with HyperStyle and Semantic Segmentation.
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023

GAN Inversion with Editable StyleMap.
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023

Detection of Compound-Type Dark Jargons Using Similar Words.
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023

Estimation of Unmasked Face Images Based on Voice and 3DMM.
Proceedings of the AI 2023: Advances in Artificial Intelligence, 2023

2022
False Event Message Detection Robust to Burst Attacks in Wireless Sensor Networks.
IEEE Open J. Commun. Soc., 2022

Re-Identification in Differentially Private Incomplete Datasets.
IEEE Open J. Comput. Soc., 2022

Local Differential Privacy for Person-to-Person Interactions.
IEEE Open J. Comput. Soc., 2022

Machine Learning Model Generation With Copula-Based Synthetic Dataset for Local Differentially Private Numerical Data.
IEEE Access, 2022

Private True Data Mining: Differential Privacy Featuring Errors to Manage Internet-of-Things Data.
IEEE Access, 2022

Proposal of a Middleware to Support Development of IoT Firmware Analysis Tools.
Proceedings of the Knowledge-Based Software Engineering: 2022, 2022

Detecting Hardcoded Login Information from User Input.
Proceedings of the IEEE International Conference on Consumer Electronics, 2022

Detection of Plaintext Login Information in Firmware.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2022

2021
An efficient clustering-based anonymization scheme for privacy-preserving data collection in IoT based healthcare services.
Peer-to-Peer Netw. Appl., 2021

Count Estimation With a Low-Accuracy Machine Learning Model.
IEEE Internet Things J., 2021

A Countermeasure Method Using Poisonous Data Against Poisoning Attacks on IoT Machine Learning.
Int. J. Semantic Comput., 2021

Computed tomography image reconstruction using stacked U-Net.
Comput. Medical Imaging Graph., 2021

Privacy-preserving chi-squared test of independence for small samples.
BioData Min., 2021

Improvement of Legitimate Mail Server Detection Method using Sender Authentication.
Proceedings of the 19th IEEE/ACIS International Conference on Software Engineering Research, 2021

Classifying COVID-19 Conspiracy Tweets with Word Embedding and BERT.
Proceedings of the Working Notes Proceedings of the MediaEval 2021 Workshop, 2021

Acquisition of Cooperative Behavior in a Soccer Task Using Reward Shaping.
Proceedings of the ICIAI 2021: 2021 the 5th International Conference on Innovation in Artificial Intelligence, 2021

2020
Differentially Private Mobile Crowd Sensing Considering Sensing Errors.
Sensors, 2020

Knowledge Graph Completion to Solve University Campus Issues.
J. Data Intell., 2020

Foreword.
IEICE Trans. Inf. Syst., 2020

Semantic diversity: Privacy considering distance between values of sensitive attribute.
Comput. Secur., 2020

Adaptation Plan Policy in Traffic Routing for Priority Vehicle.
Proceedings of the 2020 International Conference on Artificial Intelligence in Information and Communication, 2020

Model Smoothing using Virtual Adversarial Training for Speech Emotion Estimation using Spontaneity.
Proceedings of the 12th International Conference on Agents and Artificial Intelligence, 2020

Hair Shading Style Transfer for Manga with cGAN.
Proceedings of the 12th International Conference on Agents and Artificial Intelligence, 2020

Generating Cooking Recipes from Cooking Videos Using Deep Learning Considering Previous Process with Video Encoding.
Proceedings of the APPIS 2020: 3rd International Conference on Applications of Intelligent Systems, 2020

Ontology-Based Correlation Detection Among Heterogeneous Data Sets: A Case Study of University Campus Issues.
Proceedings of the 3rd IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2020

A Defense Method against Poisoning Attacks on IoT Machine Learning Using Poisonous Data.
Proceedings of the 3rd IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2020

2019
Anonymization of Sensitive Quasi-Identifiers for l-Diversity and t-Closeness.
IEEE Trans. Dependable Secur. Comput., 2019

"Never fry carrots without chopping" Generating Cooking Recipes from Cooking Videos Using Deep Learning Considering Previous Process.
Int. J. Networked Distributed Comput., 2019

Do You Like Sclera? Sclera-region Detection and Colorization for Anime Character Line Drawings.
Int. J. Networked Distributed Comput., 2019

Trajectory Anonymization: Balancing Usefulness about Position Information and Timestamp.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

Knowledge Graph of University Campus Issues and Application of Completion Methods.
Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services, 2019

Transforming the Emotion in Speech using a Generative Adversarial Network.
Proceedings of the 11th International Conference on Agents and Artificial Intelligence, 2019

Generation of Multiple Choice Questions Including Panoramic Information using Linked Data.
Proceedings of the 11th International Conference on Agents and Artificial Intelligence, 2019

New Indicator for Centrality Measurements in Passing-network Analysis of Soccer.
Proceedings of the 11th International Conference on Agents and Artificial Intelligence, 2019

Model Smoothing Using Virtual Adversarial Training for Speech Emotion Estimation.
Proceedings of the 2019 IEEE International Conference on Big Data, 2019

Multi-task Deep Reinforcement Learning with Evolutionary Algorithm and Policy Gradients Method in 3D Control Tasks.
Proceedings of the Big Data, 2019

"Never fry carrots without cutting." Cooking Recipe Generation from Videos Using Deep Learning Considering Previous Process.
Proceedings of the 2019 IEEE International Conference on Big Data, 2019

Do You Like the Sclera?: Sclera-Region Detection in Line Drawings for Automated Colorization.
Proceedings of the 2019 IEEE International Conference on Big Data, 2019

Mis.Config: Finding Misreferred Configuration Bugs in Web Application Using Thin Slicing.
Proceedings of the Computer and Information Science, 2019

Self-Adaptation for Heterogeneous Client-Server Online Games.
Proceedings of the Computer and Information Science, 2019

2018
Anonymization and Analysis of Horizontally and Vertically Divided User Profile Databases with Multiple Sensitive Attributes.
Proceedings of the 2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), Singpapore, Singapore, July 31, 2018

Factors Affecting Accuracy in Image Translation based on Generative Adversarial Network.
Proceedings of the 10th International Conference on Agents and Artificial Intelligence, 2018

Do Professional Football Players Follow the Optimal Strategies in Penalty Shootout?
Proceedings of the 10th International Conference on Agents and Artificial Intelligence, 2018

Agent-based Simulation Model Embedded Accounting's Purchase Method; Analysis on the Systemic Risk of Mergers and Acquisitions between Financial Institutions.
Proceedings of the 10th International Conference on Agents and Artificial Intelligence, 2018

2017
Location Anonymization With Considering Errors and Existence Probability.
IEEE Trans. Syst. Man Cybern. Syst., 2017

Differential Private Data Collection and Analysis Based on Randomized Multiple Dummies for Untrusted Mobile Crowdsensing.
IEEE Trans. Inf. Forensics Secur., 2017

Proposal of l-diversity algorithm considering distance between sensitive attribute values.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

User Participatory Construction of Open Hazard Data for Preventing Bicycle Accidents.
Proceedings of the Semantic Technology - 7th Joint International Conference, 2017

An Observation of Behavioral Changes of Indoor Dogs in Response to Caring Behavior by Humanoid Robots - Can Dogs and Robots Be Companions?.
Proceedings of the 9th International Conference on Agents and Artificial Intelligence, 2017

Sarcasm Detection Method to Improve Review Analysis.
Proceedings of the 9th International Conference on Agents and Artificial Intelligence, 2017

Fast Many-to-One Voice Conversion using Autoencoders.
Proceedings of the 9th International Conference on Agents and Artificial Intelligence, 2017

Text Classification and Transfer Learning Based on Character-Level Deep Convolutional Neural Networks.
Proceedings of the Agents and Artificial Intelligence - 9th International Conference, 2017

Japanese Text Classification by Character-level Deep ConvNets and Transfer Learning.
Proceedings of the 9th International Conference on Agents and Artificial Intelligence, 2017

Privacy-preserving Chi-squared testing for genome SNP databases.
Proceedings of the 2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 2017

2016
Sake Selection Support Application for Countryside Tourism.
Trans. Large Scale Data Knowl. Centered Syst., 2016

A Solution to Visualize Open Urban Data for Illegally Parked Bicycles.
Trans. Large Scale Data Knowl. Centered Syst., 2016

Iterative Improvement of Human Pose Classification Using Guide Ontology.
IEICE Trans. Inf. Syst., 2016

Estimation of Interpersonal Relationships in Movies.
IEICE Trans. Inf. Syst., 2016

Linked Data Collection and Analysis Platform of Audio Features.
Proceedings of the Workshop and Poster Proceedings of the 6th Joint International Semantic Technology Conference co-located with the 6th Joint International Semantic Technology Conference (JIST 2016), 2016

Linked Data Collection and Analysis Platform for Music Information Retrieval.
Proceedings of the Semantic Technology - 6th Joint International Conference, 2016

Schema Design of Illegally Parked Bicycles LOD.
Proceedings of the 5th IIAI International Congress on Advanced Applied Informatics, 2016

Privacy-Preserving Publication of Deep Neural Networks.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

Privacy Preservation for Participatory Sensing Applications.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
Malicious Node Detection in Mobile Wireless Sensor Networks.
J. Inf. Process., 2015

(l<sub>1</sub>, ..., l<sub>q</sub>)-diversity for Anonymizing Sensitive Quasi-Identifiers.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Estimation of character diagram from open-movie databases for cultural understanding.
Proceedings of the 9th IEEE International Conference on Semantic Computing, 2015

Activity Recognition for Dogs Based on Time-series Data Analysis.
Proceedings of the Agents and Artificial Intelligence - 7th International Conference, 2015

Activity Recognition for Dogs Using Off-the-Shelf Accelerometer.
Proceedings of the ICAART 2015, 2015

Towards the Elimination of the Miscommunication Between Users in Twitter - Tweet Classification Based on Expected Responses by User.
Proceedings of the AI 2015: Advances in Artificial Intelligence, 2015

Decision Making Strategy Based on Time Series Data of Voting Behavior.
Proceedings of the AI 2015: Advances in Artificial Intelligence, 2015

2014
Music Recommender Adapting Implicit Context Using 'renso' Relation among Linked Data.
J. Inf. Process., 2014

Refinement of Ontology-Constrained Human Pose Classification.
Proceedings of the 2014 IEEE International Conference on Semantic Computing, 2014

A MAPE Loop Control Pattern for Heterogeneous Client/Server Online Games.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

Randomized Addition of Sensitive Attributes for l-diversity.
Proceedings of the SECRYPT 2014, 2014

Towards Software Evolution for Embedded Systems Based on MAPE Loop Encapsulation.
Proceedings of the Eighth IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2014

Transformation approach from KAOS goal models to BPMN models using refinement patterns.
Proceedings of the Symposium on Applied Computing, 2014

Locating Malicious Agents in Mobile Wireless Sensor Networks.
Proceedings of the PRIMA 2014: Principles and Practice of Multi-Agent Systems, 2014

News Recommendation based on Semantic Relations between Events.
Proceedings of the Workshop and Poster Proceedings of the 4th Joint International Semantic Technology Conference, 2014

Estimation of Character Diagram from Open Movie Database Using Markov Logic Network.
Proceedings of the Workshop and Poster Proceedings of the 4th Joint International Semantic Technology Conference, 2014

Identification of Flaming and Its Applications in CGM - Case Studies toward Ultimate Prevention.
Proceedings of the ICAART 2014, 2014

Surprising Recipe Extraction based on Rarity and Generality of Ingredients.
Proceedings of the ICAART 2014, 2014

2013
Towards Semi-Automatic Identification of Functional Requirements in Legal Texts for Public Administration.
Proceedings of the Legal Knowledge and Information Systems, 2013

Context-Aware Music Recommendation with Serendipity Using Semantic Relations.
Proceedings of the Semantic Technology - Third Joint International Conference, 2013

False Event Detection for Mobile Sinks in Wireless Sensor Networks.
Proceedings of the 2013 European Intelligence and Security Informatics Conference, 2013

2009
Distributed Arrays: A P2P Data Structure for Efficient Logical Arrays.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Reporter node determination of replicated node detection in wireless sensor networks.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

2008
Distributed detection of node replication attacks resilient to many compromised nodes in wireless sensor networks.
Proceedings of the 4th Annual International Conference on Wireless Internet, 2008

Energy-efficient event detection in 3D wireless sensor networks.
Proceedings of the 1st IFIP Wireless Days, 2008

2007
Resilient Security for False Event Detection Without Loss of Legitimate Events in Wireless Sensor Networks.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Managing Difference-Based Objects with Sub-networks in Peer-to-Peer Environments.
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007

Ringed Filters for Peer-to-Peer Keyword Searching.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

Flexible Bloom Filters for Searching Textual Objects.
Proceedings of the Agents and Peer-to-Peer Computing, 6th International Workshop, 2007

2006
An Algorithm to Reduce the Communication Traffic for Multi-Word Searches in a Distributed Hash Table.
Proceedings of the Fourth IFIP International Conference on Theoretical Computer Science (TCS 2006), 2006

Reduction of the Communication Traffic for Multi-word Searches in DHTs.
Proceedings of the 2006 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2006), International Conference on Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC 2006), 29 November, 2006


  Loading...