Yuzo Taenaka

According to our database1, Yuzo Taenaka authored at least 63 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Content Search Method Utilizing the Metadata Matching Characteristics of Both Spatio-Temporal Content and User Request in the IoT Era.
IEICE Trans. Commun., January, 2024

Electricity Theft Detection for Smart Homes: Harnessing the Power of Machine Learning With Real and Synthetic Attacks.
IEEE Access, 2024

Banking Malware Detection: Leveraging Federated Learning with Conditional Model Updates and Client Data Heterogeneity.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

2023
Towards Autonomous Driving Model Resistant to Adversarial Attack.
Appl. Artif. Intell., December, 2023

Design and implementation of a sandbox for facilitating and automating IoT malware analysis with techniques to elicit malicious behavior: case studies of functionalities for dissecting IoT malware.
J. Comput. Virol. Hacking Tech., June, 2023

Smart home cybersecurity awareness and behavioral incentives.
Inf. Comput. Secur., 2023

Oblivious Statistic Collection With Local Differential Privacy in Mutual Distrust.
IEEE Access, 2023

Factor Analysis of Learning Motivation Difference on Cybersecurity Training With Zero Trust Architecture.
IEEE Access, 2023

Electricity Theft Detection for Smart Homes with Knowledge-Based Synthetic Attack Data.
Proceedings of the 19th IEEE International Conference on Factory Communication Systems, 2023

A Comparative Performance Analysis of Android Malware Classification Using Supervised and Semi-supervised Deep Learning.
Proceedings of the 16th International Conference on Security of Information and Networks, 2023

A Feature-Aware Semi-Supervised Learning Approach for Automotive Ethernet.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Federated Learning-Based Credit Card Fraud Detection: Performance Analysis with Sampling Methods and Deep Learning Algorithms.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

A Risk Assessment Study: Encircling Docker Container Assets on IaaS Cloud Computing Topology.
Proceedings of the 6th Conference on Cloud and Internet of Things, 2023

2022
A survey on blockchain, SDN and NFV for the smart-home security.
Internet Things, 2022

DPSD: Dynamic Private Spatial Decomposition Based on Spatial and Temporal Correlations.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022

Resource Allocation Method for Fairness and Efficient Utilization of Network and Computational Resources in Edge Networks.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2022

Tamer: A Sandbox for Facilitating and Automating IoT Malware Analysis with Techniques to Elicit Malicious Behavior.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

Autonomous Driving Model Defense Study on Hijacking Adversarial Attack.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2022, 2022

Personalized Federated Learning for Automotive Intrusion Detection Systems.
Proceedings of the 2022 IEEE Future Networks World Forum, 2022

Decoupling Statistical Trends from Data Volume on LDP-Based Spatio-Temporal Data Collection.
Proceedings of the 2022 IEEE Future Networks World Forum, 2022

Unauthorized Power Usage Detection Using Gradient Boosting Classifier in Disaggregated Smart Meter Home Network.
Proceedings of the 2022 IEEE Future Networks World Forum, 2022

2021
DeL-IoT: A deep ensemble learning approach to uncover anomalies in IoT.
Internet Things, 2021

Geolocation-Centric Information Platform for Resilient Spatio-temporal Content Management.
IEICE Trans. Commun., 2021

SDN Based in-Network Two-Staged Video QoE Estimation With Measurement Error Correction for Edge Network.
IEEE Access, 2021

Zero-Trust Access Control Focusing on Imbalanced Distribution in Browser Clickstreams.
Proceedings of the Eighth International Conference on Software Defined Systems, 2021

Loose Matching Approach Considering the Time Constraint for Spatio-Temporal Content Discovery.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2021

A 1D-CNN Based Deep Learning for Detecting VSI-DDoS Attacks in IoT Applications.
Proceedings of the Advances and Trends in Artificial Intelligence. Artificial Intelligence Practices, 2021

Differentially-Private Text Generation via Text Preprocessing to Reduce Utility Loss.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2021

D-LBAH: Dynamic Load Balancing Algorithm for HEC-SDN systems.
Proceedings of the 8th International Conference on Future Internet of Things and Cloud, 2021

Analyzing Cascading Effects of Spoofing Attacks on ADS-B Using a Discrete Model of Air Traffic Control Responses and AGMOD Dynamics.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

2020
Hierarchical Load Balancing and Clustering Technique for Home Edge Computing.
IEEE Access, 2020

SDN-Based In-network Early QoE Prediction for Stable Route Selection on Multi-path Network.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems - The 12th International Conference on Intelligent Networking and Collaborative Systems (INCoS-2020), Victoria, BC, Canada, 31 August, 2020

Matching Based Content Discovery Method on Geo-Centric Information Platform.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems - The 12th International Conference on Intelligent Networking and Collaborative Systems (INCoS-2020), Victoria, BC, Canada, 31 August, 2020

Anonymizing Location Information in Unstructured Text Using Knowledge Graph.
Proceedings of the iiWAS '20: The 22nd International Conference on Information Integration and Web-based Applications & Services, Virtual Event / Chiang Mai, Thailand, November 30, 2020

SDN-Enabled IoT Anomaly Detection Using Ensemble Learning.
Proceedings of the Artificial Intelligence Applications and Innovations, 2020

Solving the Interdependency Problem: A Secure Virtual Machine Allocation Method Relying on the Attacker's Efficiency and Coverage.
Proceedings of the 20th IEEE/ACM International Symposium on Cluster, 2020

The Best of Both Worlds: A New Composite Framework Leveraging PoS and PoW for Blockchain Security and Governance.
Proceedings of the 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2020

2019
Conceptual experiment of geolocation-aware IoT data dissemination model.
Proceedings of the IEEE Pacific Rim Conference on Communications, 2019

Experimental Evaluation of Publish/Subscribe-Based Spatio-Temporal Contents Management on Geo-Centric Information Platform.
Proceedings of the Advances in Networked-based Information Systems, 2019

SDN-Based Time-Domain Error Correction for In-Network Video QoE Estimation in Wireless Networks.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2019

Towards Automated Characterization of Malware's High-level Mechanism using Virtual Machine Introspection.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

A Method for Designing Proximity-Aware Regular Graph-Based Structured Overlay Networks.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019

2018
Adaptive Bundle Flow Management for Reducing Control Traffic on SDN-Enabled Multi-Radio Wireless Networks.
IEICE Trans. Commun., 2018

Elastic Channel Utilization Against External Radio Interference on SDN-Enabled Multi-Radio Wireless Backhaul Networks.
Proceedings of the 7th IEEE International Conference on Cloud Networking, 2018

2017
Estimation based adaptable Flow Aggregation Method for reducing control traffic on Software Defined wireless Networks.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

2015
An Experimental Approach to Examine a Multi-Channel Multi-Hop Wireless Backbone Network.
Informatica (Slovenia), 2015

A Radio Interference Aware Dynamic Channel Utilization Method on Software Defined WMN.
Proceedings of the 10th International Conference on P2P, 2015

2014
The Distribution Method of the High Resolution Video for a Blackboard Based Lecture.
Int. J. Technol. Educ. Mark., 2014

An implementation design of a cross-layer handover method with multi-path transmission for VoIP communication.
Ad Hoc Networks, 2014

An Adaptive Channel Utilization Method with Traffic Balancing for Multi-hop Multi-channel Wireless Backbone Network.
Proceedings of the Internet of Things. IoT Infrastructures, 2014

Network capacity expansion methods based on efficient channel utilization for multi-channel wireless backbone network.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Surface weather observation via distributed devices.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2014

Battery-saving message collection method for disrupted communication service areas.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

Experimental Deployment of a Multi-channel Wireless Backbone Network Based on an Efficient Traffic Management Framework.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
An Implementation Design of a WLAN Handover Method Based on Cross-Layer Collaboration for TCP Communication.
IEICE Trans. Commun., 2013

An efficient handover decision method based on frame retransmission and data rate for multi-rate WLANs.
Ad Hoc Networks, 2013

PhishCage: reproduction of fraudulent websites in the emulated internet.
Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques, 2013

2011
Pro-Reactive Route Recovery with Automatic Route Shortening in Wireless Ad Hoc Networks.
Proceedings of the 10th International Symposium on Autonomous Decentralized Systems, 2011

2010
Seamless handover management scheme under multi-rate WLANs.
Proceedings of the MoMM'2010, 2010

2009
Proactive AP Selection Method Considering the Radio Interference Environment.
IEICE Trans. Inf. Syst., 2009

Wireless Measurement Framework to Survey an Area with Required Communication Quality.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

2007
Terminal-centric ap selection algorithm based on frame retransmissions.
Proceedings of the 2nd ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, 2007

Design and Implementation of Cross-layer Architecture for Seamless VoIP Handover.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007


  Loading...