Yutaka Oiwa

Orcid: 0000-0002-5742-1469

Affiliations:
  • National Institute of Advanced Industrial Science and Technology, AIST, Japan


According to our database1, Yutaka Oiwa authored at least 25 papers between 2000 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy.
CoRR, 2023

2022
Autonomous driving quality assurance with data uncertainty analysis.
Proceedings of the International Joint Conference on Neural Networks, 2022

Quality assurance study with mismatched data in sentiment analysis.
Proceedings of the 29th Asia-Pacific Software Engineering Conference, 2022

2021
Formal Modeling and Verification of Concurrent FSMs: Case Study on Event-Based Cooperative Transport Robots.
IEICE Trans. Inf. Syst., 2021

Corner case data description and detection.
CoRR, 2021

Corner Case Data Description and Detection.
Proceedings of the 1st IEEE/ACM Workshop on AI Engineering - Software Engineering for AI, 2021

AI robustness analysis with consideration of corner cases.
Proceedings of the 2021 IEEE International Conference on Artificial Intelligence Testing, 2021

2019
Automatic Generation of Train Timetables from Mesoscopic Railway Models by SMT-Solver.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

2017
Mutual Authentication Protocol for HTTP: Cryptographic Algorithms Based on the Key Agreement Mechanism 3 (KAM3).
RFC, April, 2017

Mutual Authentication Protocol for HTTP.
RFC, April, 2017

HTTP Authentication Extensions for Interactive Clients.
RFC, January, 2017

2015
Combinatorial Testing for Tree-Structured Test Models with Constraints.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

Optimization of Combinatorial Testing by Incremental SAT Solving.
Proceedings of the 8th IEEE International Conference on Software Testing, 2015

Priority Integration for Weighted Combinatorial Testing.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

2014
Evaluation of A Resilience Embedded System Using Probabilistic Model-Checking.
Proceedings of the Proceedings Third International Workshop on Engineering Safety and Security Systems, 2014

Rollback mechanism of nested virtual machines for protocol fuzz testing.
Proceedings of the Symposium on Applied Computing, 2014

Design of Prioritized N-Wise Testing.
Proceedings of the Testing Software and Systems, 2014

2012
Formal network packet processing with minimal fuss: invertible syntax descriptions at work.
Proceedings of the sixth workshop on Programming Languages meets Program Verification, 2012

2009
PAKE-based mutual HTTP authentication for preventing phishing attacks
CoRR, 2009

PAKE-based mutual HTTP authentication for preventing phishing attacks.
Proceedings of the 18th International Conference on World Wide Web, 2009

Implementation of the memory-safe full ANSI-C compiler.
Proceedings of the 2009 ACM SIGPLAN Conference on Programming Language Design and Implementation, 2009

2007
A New Variant for an Attack Against RSA Signature Verification Using Parameter Field.
Proceedings of the Public Key Infrastructure, 2007

2003
The Interface Definition Language for Fail-Safe C.
Proceedings of the Software Security, 2003

2002
Fail-Safe ANSI-C Compiler: An Approach to Making C Programs Secure: Progress Report.
Proceedings of the Software Security -- Theories and Systems, 2002

2000
Extending Java virtual machine with integer-reference conversion.
Concurr. Pract. Exp., 2000


  Loading...