Yuji Waizumi

Orcid: 0000-0002-8791-8740

According to our database1, Yuji Waizumi authored at least 22 papers between 1997 and 2017.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
On-Demand Color Calibration for Pedestrian Tracking in Nonoverlapping Fields of View.
IEEE Internet Things J., 2017

Retinex-based signal enhancement for image dark regions.
Proceedings of the 2017 IEEE International Conference on Signal and Image Processing Applications, 2017

2014
Bayesian image segmentations by Potts prior and loopy belief propagation.
CoRR, 2014

2012
A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy.
J. Information Security, 2012

Composite likelihood estimation for restricted Boltzmann machines.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

2011
Development of a WLAN based monitoring system for group activity measurement in real-time.
J. Commun. Networks, 2011

2009
Combating against internet worms in large-scale networks: an autonomic signature-based solution.
Secur. Commun. Networks, 2009

A Prioritized Retransmission Mechanism for Reliable and Efficient Delivery of Syslog Messages.
Proceedings of the 7th Annual Conference on Communication Networks and Services Research, 2009

2008
Detecting DRDoS attacks by a simple response packet confirmation mechanism.
Comput. Commun., 2008

Network Application Identification Using Transition Pattern of Payload Length.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Detecting Pulsing Denial-of-Service Attacks Based on the Bandwidth Usage Condition.
Proceedings of IEEE International Conference on Communications, 2008

A Reliable Network Identification Method Based on Transition Pattern of Payload Length.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
Discrimination of similar characters with a nonlinear compound discriminant function.
Syst. Comput. Jpn., 2007

A Network-based Anomaly Detection System using Multiple Network Features.
Proceedings of the WEBIST 2007, 2007

A Low Cost Worm Detection Technique based on Flow Payload Similarity.
Proceedings of the WEBIST 2007, 2007

Distributed Early Worm Detection Based on Payload Histograms.
Proceedings of IEEE International Conference on Communications, 2007

2006
An Efficient Signature-Based Approach for Automatic Detection of Internet Worms over Large-Scale Networks.
Proceedings of IEEE International Conference on Communications, 2006

A Multi-level Security Based Autonomic Parameter Selection Approach for an Effective and Early Detection of Internet Worms.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Differencing Worm Flows and Normal Flows for Automatic Generation of Worm Signatures.
Proceedings of the Seventh IEEE International Symposium on Multimedia (ISM 2005), 2005

A New Network Anomaly Detection Technique Based on Per-Flow and Per-Service Statistics.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Detecting and Tracing DDoS Attacks in the Traffic Analysis Using Auto Regressive Model.
IEICE Trans. Inf. Syst., 2004

1997
High speed rough classification for handwritten characters using hierarchical learning vector quantization.
Proceedings of the 4th International Conference Document Analysis and Recognition (ICDAR '97), 1997


  Loading...