Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Hajime Shimada
@article{DBLP:journals/access/HuHYS24, author = {Zhenguo Hu and Hirokazu Hasegawa and Yukiko Yamaguchi and Hajime Shimada}, title = {Enhancing Detection of Malicious Traffic Through FPGA-Based Frequency Transformation and Machine Learning}, journal = {{IEEE} Access}, volume = {12}, pages = {2648--2659}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2023.3348234}, doi = {10.1109/ACCESS.2023.3348234}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/HuHYS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HuHYS23, author = {Zhenguo Hu and Hirokazu Hasegawa and Yukiko Yamaguchi and Hajime Shimada}, title = {Realtime Malicious Traffic Detection Targeted for {TCP} Out-of-Order Packets Based on {FPGA}}, journal = {{IEEE} Access}, volume = {11}, pages = {112212--112222}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3323853}, doi = {10.1109/ACCESS.2023.3323853}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HuHYS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GaoHYS22, author = {Yun Gao and Hirokazu Hasegawa and Yukiko Yamaguchi and Hajime Shimada}, title = {Malware Detection Using LightGBM With a Custom Logistic Loss Function}, journal = {{IEEE} Access}, volume = {10}, pages = {47792--47804}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3171912}, doi = {10.1109/ACCESS.2022.3171912}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/GaoHYS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GaoHYS22a, author = {Yun Gao and Hirokazu Hasegawa and Yukiko Yamaguchi and Hajime Shimada}, title = {Malware Detection by Control-Flow Graph Level Representation Learning With Graph Isomorphism Network}, journal = {{IEEE} Access}, volume = {10}, pages = {111830--111841}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3215267}, doi = {10.1109/ACCESS.2022.3215267}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/GaoHYS22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/GaoHYS22, author = {Yun Gao and Hirokazu Hasegawa and Yukiko Yamaguchi and Hajime Shimada}, editor = {Hong Va Leong and Sahra Sedigh Sarvestani and Yuuichi Teranishi and Alfredo Cuzzocrea and Hiroki Kashiwazaki and Dave Towey and Ji{-}Jiang Yang and Hossain Shahriar}, title = {Malware Detection using Attributed {CFG} Generated by Pre-trained Language Model with Graph Isomorphism Network}, booktitle = {46th {IEEE} Annual Computers, Software, and Applications Conferenc, {COMPSAC} 2022, Los Alamitos, CA, USA, June 27 - July 1, 2022}, pages = {1495--1501}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/COMPSAC54236.2022.00237}, doi = {10.1109/COMPSAC54236.2022.00237}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/compsac/GaoHYS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KumazakiHYST22, author = {Masahito Kumazaki and Hirokazu Hasegawa and Yukiko Yamaguchi and Hajime Shimada and Hiroki Takakura}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Cyber Attack Stage Tracing System based on Attack Scenario Comparison}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {587--594}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010918200003120}, doi = {10.5220/0010918200003120}, timestamp = {Tue, 06 Jun 2023 14:58:01 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KumazakiHYST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/ShirakuraHYS21, author = {Taiga Shirakura and Hirokazu Hasegawa and Yukiko Yamaguchi and Hajime Shimada}, title = {Potential Security Risks of Internationalized Domain Name Processing for Hyperlink}, booktitle = {{IEEE} 45th Annual Computers, Software, and Applications Conference, {COMPSAC} 2021, Madrid, Spain, July 12-16, 2021}, pages = {1092--1098}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/COMPSAC51774.2021.00149}, doi = {10.1109/COMPSAC51774.2021.00149}, timestamp = {Thu, 23 Sep 2021 08:33:11 +0200}, biburl = {https://dblp.org/rec/conf/compsac/ShirakuraHYS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss2/KumazakiHYST21, author = {Masahito Kumazaki and Hirokazu Hasegawa and Yukiko Yamaguchi and Hajime Shimada and Hiroki Takakura}, title = {Incident Response Support System for Multi-Located Network by Correlation Analysis of Individual Events}, booktitle = {{ICISS} 2021: The 4th International Conference on Information Science and Systems, Edinburgh, United Kingdom, March 17-19, 2021}, pages = {1--6}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3459955.3460592}, doi = {10.1145/3459955.3460592}, timestamp = {Tue, 10 Aug 2021 15:09:50 +0200}, biburl = {https://dblp.org/rec/conf/iciss2/KumazakiHYST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/GaoHYS21, author = {Yun Gao and Hirokazu Hasegawa and Yukiko Yamaguchi and Hajime Shimada}, title = {Malware Detection Using Gradient Boosting Decision Trees with Customized Log Loss Function}, booktitle = {International Conference on Information Networking, {ICOIN} 2021, Jeju Island, South Korea, January 13-16, 2021}, pages = {273--278}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICOIN50884.2021.9333999}, doi = {10.1109/ICOIN50884.2021.9333999}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icoin/GaoHYS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/siguccs/KashiwazakiOSKS21, author = {Hiroki Kashiwazaki and Takuro Ozaki and Hajime Shimada and Yusuke Komiya and Eisaku Sakane and Kazuhiro Mishima and Shiu Sakashita and Nariyoshi Yamai and Yoshiaki Kitaguchi and Kensuke Miyashita}, editor = {Scott Trimmer and Eric Handler and Tom Wilk}, title = {Japanese Activities to bring online academic meetings against {COVID-19:} How We Learned to Stop Worrying and Love the Online Meetings}, booktitle = {Proceedings of the 2021 {ACM} {SIGUCCS} Annual Conference, {SIGUCCS} '21, Virtual Event, USA, March 14 - April 30, 2021}, pages = {54--59}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3419944.3441174}, doi = {10.1145/3419944.3441174}, timestamp = {Tue, 15 Jun 2021 11:31:37 +0200}, biburl = {https://dblp.org/rec/conf/siguccs/KashiwazakiOSKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MendsaikhanHYS20, author = {Otgonpurev Mendsaikhan and Hirokazu Hasegawa and Yukiko Yamaguchi and Hajime Shimada}, title = {Quantifying the Significance and Relevance of Cyber-Security Text Through Textual Similarity and Cyber-Security Knowledge Graph}, journal = {{IEEE} Access}, volume = {8}, pages = {177041--177052}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3027321}, doi = {10.1109/ACCESS.2020.3027321}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MendsaikhanHYS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/MendsaikhanHYSB20, author = {Otgonpurev Mendsaikhan and Hirokazu Hasegawa and Yukiko Yamaguchi and Hajime Shimada and Enkhbold Bataa}, title = {Identification of Cybersecurity Specific Content Using Different Language Models}, journal = {J. Inf. Process.}, volume = {28}, pages = {623--632}, year = {2020}, url = {https://doi.org/10.2197/ipsjjip.28.623}, doi = {10.2197/IPSJJIP.28.623}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/MendsaikhanHYSB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MendsaikhanHYS20, author = {Otgonpurev Mendsaikhan and Hirokazu Hasegawa and Yukiko Yamaguchi and Hajime Shimada}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Quantifying the Significance of Cybersecurity Text through Semantic Similarity and Named Entity Recognition}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {325--332}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008913003250332}, doi = {10.5220/0008913003250332}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/MendsaikhanHYS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/ZhangHYS20, author = {Ziwei Zhang and Hirokazu Hasegawa and Yukiko Yamaguchi and Hajime Shimada}, title = {Rogue {AP} Detection using Similarity of Backbone Delay Fluctuation Histogram}, booktitle = {2020 International Conference on Information Networking, {ICOIN} 2020, Barcelona, Spain, January 7-10, 2020}, pages = {239--244}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICOIN48656.2020.9016480}, doi = {10.1109/ICOIN48656.2020.9016480}, timestamp = {Tue, 10 Mar 2020 14:04:26 +0100}, biburl = {https://dblp.org/rec/conf/icoin/ZhangHYS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/TobiyamaYHSAY19, author = {Shun Tobiyama and Yukiko Yamaguchi and Hirokazu Hasegawa and Hajime Shimada and Mitsuaki Akiyama and Takeshi Yagi}, title = {Using Seq2Seq Model to Detect Infection Focusing on Behavioral Features of Processes}, journal = {J. Inf. Process.}, volume = {27}, pages = {545--554}, year = {2019}, url = {https://doi.org/10.2197/ipsjjip.27.545}, doi = {10.2197/IPSJJIP.27.545}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/TobiyamaYHSAY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/MendsaikhanHYS19, author = {Otgonpurev Mendsaikhan and Hirokazu Hasegawa and Yukiko Yamaguchi and Hajime Shimada}, editor = {Vladimir Getov and Jean{-}Luc Gaudiot and Nariyoshi Yamai and Stelvio Cimato and J. Morris Chang and Yuuichi Teranishi and Ji{-}Jiang Yang and Hong Va Leong and Hossain Shahriar and Michiharu Takemoto and Dave Towey and Hiroki Takakura and Atilla El{\c{c}}i and Susumu Takeuchi and Satish Puri}, title = {Identification of Cybersecurity Specific Content Using the Doc2Vec Language Model}, booktitle = {43rd {IEEE} Annual Computer Software and Applications Conference, {COMPSAC} 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 1}, pages = {396--401}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/COMPSAC.2019.00064}, doi = {10.1109/COMPSAC.2019.00064}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/MendsaikhanHYS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/ZhangHYS19, author = {Ziwei Zhang and Hirokazu Hasegawa and Yukiko Yamaguchi and Hajime Shimada}, editor = {Vladimir Getov and Jean{-}Luc Gaudiot and Nariyoshi Yamai and Stelvio Cimato and J. Morris Chang and Yuuichi Teranishi and Ji{-}Jiang Yang and Hong Va Leong and Hossain Shahriar and Michiharu Takemoto and Dave Towey and Hiroki Takakura and Atilla El{\c{c}}i and Susumu Takeuchi and Satish Puri}, title = {Rogue Wireless {AP} Detection using Delay Fluctuation in Backbone Network}, booktitle = {43rd {IEEE} Annual Computer Software and Applications Conference, {COMPSAC} 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 1}, pages = {936--937}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/COMPSAC.2019.00149}, doi = {10.1109/COMPSAC.2019.00149}, timestamp = {Thu, 05 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/compsac/ZhangHYS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CalderonHYS18, author = {Paul Calderon and Hirokazu Hasegawa and Yukiko Yamaguchi and Hajime Shimada}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Malware Detection based on {HTTPS} Characteristic via Machine Learning}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {410--417}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006654604100417}, doi = {10.5220/0006654604100417}, timestamp = {Wed, 11 Apr 2018 15:27:25 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CalderonHYS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/TobiyamaYHSAY18, author = {Shun Tobiyama and Yukiko Yamaguchi and Hirokazu Hasegawa and Hajime Shimada and Mitsuaki Akiyama and Takeshi Yagi}, title = {A method for estimating process maliciousness with Seq2Seq model}, booktitle = {2018 International Conference on Information Networking, {ICOIN} 2018, Chiang Mai, Thailand, January 10-12, 2018}, pages = {255--260}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICOIN.2018.8343120}, doi = {10.1109/ICOIN.2018.8343120}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icoin/TobiyamaYHSAY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ItoHYS18, author = {Katsutaka Ito and Hirokazu Hasegawa and Yukiko Yamaguchi and Hajime Shimada}, editor = {Atsuo Inomata and Kan Yasuda}, title = {Detecting Privacy Information Abuse by Android Apps from {API} Call Logs}, booktitle = {Advances in Information and Computer Security - 13th International Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11049}, pages = {143--157}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-97916-8\_10}, doi = {10.1007/978-3-319-97916-8\_10}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ItoHYS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/OgawaYSTAY17, author = {Hideki Ogawa and Yukiko Yamaguchi and Hajime Shimada and Hiroki Takakura and Mitsuaki Akiyama and Takeshi Yagi}, title = {Malware originated {HTTP} traffic detection utilizing cluster appearance ratio}, booktitle = {2017 International Conference on Information Networking, {ICOIN} 2017, Da Nang, Vietnam, January 11-13, 2017}, pages = {248--253}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICOIN.2017.7899513}, doi = {10.1109/ICOIN.2017.7899513}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/icoin/OgawaYSTAY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KobayashiKS16, author = {Ryotaro Kobayashi and Ikumi Kaneko and Hajime Shimada}, title = {Improvement of Data Utilization Efficiency for Cache Memory by Compressing Frequent Bit Sequences}, journal = {{IEICE} Trans. Electron.}, volume = {99-C}, number = {8}, pages = {936--946}, year = {2016}, url = {https://doi.org/10.1587/transele.E99.C.936}, doi = {10.1587/TRANSELE.E99.C.936}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KobayashiKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/KobayashiSS16, author = {Ryotaro Kobayashi and Kaoru Saito and Hajime Shimada}, title = {Energy Reduction of {BTB} by Focusing on Number of Branches per Cache Line}, journal = {J. Inf. Process.}, volume = {24}, number = {3}, pages = {492--503}, year = {2016}, url = {https://doi.org/10.2197/ipsjjip.24.492}, doi = {10.2197/IPSJJIP.24.492}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/KobayashiSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/HirutaYSTYA16, author = {Shohei Hiruta and Yukiko Yamaguchi and Hajime Shimada and Hiroki Takakura and Takeshi Yagi and Mitsuaki Akiyama}, editor = {Sara Foresti and Giuseppe Persiano}, title = {Evaluation on Malware Classification by Session Sequence of Common Protocols}, booktitle = {Cryptology and Network Security - 15th International Conference, {CANS} 2016, Milan, Italy, November 14-16, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10052}, pages = {521--531}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48965-0\_31}, doi = {10.1007/978-3-319-48965-0\_31}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/HirutaYSTYA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/HasegawaYST16, author = {Hirokazu Hasegawa and Yukiko Yamaguchi and Hajime Shimada and Hiroki Takakura}, title = {An Automated {ACL} Generation System for Secure Internal Network}, booktitle = {40th {IEEE} Annual Computer Software and Applications Conference, {COMPSAC} Workshops 2016, Atlanta, GA, USA, June 10-14, 2016}, pages = {559--564}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/COMPSAC.2016.54}, doi = {10.1109/COMPSAC.2016.54}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/HasegawaYST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/TobiyamaYSIY16, author = {Shun Tobiyama and Yukiko Yamaguchi and Hajime Shimada and Tomonori Ikuse and Takeshi Yagi}, title = {Malware Detection with Deep Neural Network Using Process Behavior}, booktitle = {40th {IEEE} Annual Computer Software and Applications Conference, {COMPSAC} Workshops 2016, Atlanta, GA, USA, June 10-14, 2016}, pages = {577--582}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/COMPSAC.2016.151}, doi = {10.1109/COMPSAC.2016.151}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/TobiyamaYSIY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/HasegawaYST16, author = {Hirokazu Hasegawa and Yukiko Yamaguchi and Hajime Shimada and Hiroki Takakura}, title = {An incident response support system based on seriousness of infection}, booktitle = {2016 International Conference on Information Networking, {ICOIN} 2016, Kota Kinabalu, Malaysia, January 13-15, 2016}, pages = {69--74}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICOIN.2016.7427090}, doi = {10.1109/ICOIN.2016.7427090}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icoin/HasegawaYST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ShimomuraYUKS15, author = {Yoshio Shimomura and Hiroki Yamamoto and Hayato Usui and Ryotaro Kobayashi and Hajime Shimada}, title = {{BTB} Energy Reduction by Focusing on Useless Accesses}, journal = {{IEICE} Trans. Electron.}, volume = {98-C}, number = {7}, pages = {569--579}, year = {2015}, url = {https://doi.org/10.1587/transele.E98.C.569}, doi = {10.1587/TRANSELE.E98.C.569}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ShimomuraYUKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aspdac/HashimotoAKMSKK15, author = {Masanori Hashimoto and Dawood Alnajiar and Hiroaki Konoura and Yukio Mitsuyama and Hajime Shimada and Kazutoshi Kobayashi and Hiroyuki Kanbara and Hiroyuki Ochi and Takashi Imagawa and Kazutoshi Wakabayashi and Takao Onoye and Hidetoshi Onodera}, title = {Reliability-configurable mixed-grained reconfigurable array compatible with high-level synthesis}, booktitle = {The 20th Asia and South Pacific Design Automation Conference, {ASP-DAC} 2015, Chiba, Japan, January 19-22, 2015}, pages = {14--15}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ASPDAC.2015.7058923}, doi = {10.1109/ASPDAC.2015.7058923}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aspdac/HashimotoAKMSKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LimYST15, author = {Hyoyoung Lim and Yukiko Yamaguchi and Hajime Shimada and Hiroki Takakura}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Malware Classification Method Based on Sequence of Traffic Flow}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {230--237}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005235002300237}, doi = {10.5220/0005235002300237}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LimYST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KonouraAMSKKOIW14, author = {Hiroaki Konoura and Dawood Alnajiar and Yukio Mitsuyama and Hajime Shimada and Kazutoshi Kobayashi and Hiroyuki Kanbara and Hiroyuki Ochi and Takashi Imagawa and Kazutoshi Wakabayashi and Masanori Hashimoto and Takao Onoye and Hidetoshi Onodera}, title = {Reliability-Configurable Mixed-Grained Reconfigurable Array Supporting C-Based Design and Its Irradiation Testing}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {97-A}, number = {12}, pages = {2518--2529}, year = {2014}, url = {https://doi.org/10.1587/transfun.E97.A.2518}, doi = {10.1587/TRANSFUN.E97.A.2518}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/KonouraAMSKKOIW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/HironoYST14, author = {Soshi Hirono and Yukiko Yamaguchi and Hajime Shimada and Hiroki Takakura}, title = {Development of a Secure Traffic Analysis System to Trace Malicious Activities on Internal Networks}, booktitle = {{IEEE} 38th Annual Computer Software and Applications Conference, {COMPSAC} 2014, Vasteras, Sweden, July 21-25, 2014}, pages = {305--310}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/COMPSAC.2014.41}, doi = {10.1109/COMPSAC.2014.41}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/HironoYST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/HasegawaYST14, author = {Hirokazu Hasegawa and Yukiko Yamaguchi and Hajime Shimada and Hiroki Takakura}, title = {A Countermeasure Recommendation System against Targeted Attacks with Preserving Continuity of Internal Networks}, booktitle = {{IEEE} 38th Annual Computer Software and Applications Conference, {COMPSAC} 2014, Vasteras, Sweden, July 21-25, 2014}, pages = {400--405}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/COMPSAC.2014.63}, doi = {10.1109/COMPSAC.2014.63}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/HasegawaYST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iconip/ArakiYST14, author = {Shohei Araki and Yukiko Yamaguchi and Hajime Shimada and Hiroki Takakura}, editor = {Chu Kiong Loo and Keem Siah Yap and Kok Wai Wong and Andrew Teoh Beng Jin and Kaizhu Huang}, title = {Unknown Attack Detection by Multistage One-Class {SVM} Focusing on Communication Interval}, booktitle = {Neural Information Processing - 21st International Conference, {ICONIP} 2014, Kuching, Malaysia, November 3-6, 2014. Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {8836}, pages = {325--332}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12643-2\_40}, doi = {10.1007/978-3-319-12643-2\_40}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/iconip/ArakiYST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YoshimuraINYSN11, author = {Kazuhiro Yoshimura and Takuya Iwakami and Takashi Nakada and Jun Yao and Hajime Shimada and Yasuhiko Nakashima}, title = {An Instruction Mapping Scheme for {FU} Array Accelerator}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {94-D}, number = {2}, pages = {286--297}, year = {2011}, url = {https://doi.org/10.1587/transinf.E94.D.286}, doi = {10.1587/TRANSINF.E94.D.286}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YoshimuraINYSN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/YaoMST11, author = {Jun Yao and Shinobu Miwa and Hajime Shimada and Shinji Tomita}, title = {A Fine-Grained Runtime Power/Performance Optimization Method for Processors with Adaptive Pipeline Depth}, journal = {J. Comput. Sci. Technol.}, volume = {26}, number = {2}, pages = {292--301}, year = {2011}, url = {https://doi.org/10.1007/s11390-011-9436-3}, doi = {10.1007/S11390-011-9436-3}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/YaoMST11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/YaoWYNSN11, author = {Jun Yao and Ryoji Watanabe and Kazuhiro Yoshimura and Takashi Nakada and Hajime Shimada and Yasuhiko Nakashima}, title = {An efficient and reliable 1.5-way processor by fusion of space and time redundancies}, booktitle = {{IEEE/IFIP} International Conference on Dependable Systems and Networks Workshops {(DSN-W} 2011), Hong Kong, China, June 27-30, 2011}, pages = {69--74}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/DSNW.2011.5958838}, doi = {10.1109/DSNW.2011.5958838}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/YaoWYNSN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia2/0001SK10, author = {Jun Yao and Hajime Shimada and Kazutoshi Kobayashi}, editor = {Kazuki Joe and Alexander V. Veidenbaum}, title = {A Stage-Level Recovery Scheme in Scalable Pipeline Modules for High Dependability}, booktitle = {International Workshop on Innovative Architecture for Future Generation High Performance Processors and Systems, {IWIA} 2010, Hilo, Kohala Coast, HI, USA, January 17-19, 2010}, pages = {21--29}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.ieeecomputersociety.org/10.1109/IWIA.2010.11}, doi = {10.1109/IWIA.2010.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia2/0001SK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prdc/YaoWNSNK10, author = {Jun Yao and Ryoji Watanabe and Takashi Nakada and Hajime Shimada and Yasuhiko Nakashima and Kazutoshi Kobayashi}, editor = {Yutaka Ishikawa and Dong Tang and Hiroshi Nakamura}, title = {A Minimal Roll-Back Based Recovery Scheme for Fault Toleration in Pipeline Processors}, booktitle = {16th {IEEE} Pacific Rim International Symposium on Dependable Computing, {PRDC} 2010, Tokyo, Japan, December 13-15, 2010}, pages = {237--238}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/PRDC.2010.44}, doi = {10.1109/PRDC.2010.44}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/prdc/YaoWNSNK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YaoMST08, author = {Jun Yao and Shinobu Miwa and Hajime Shimada and Shinji Tomita}, title = {A Dynamic Control Mechanism for Pipeline Stage Unification by Identifying Program Phases}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {91-D}, number = {4}, pages = {1010--1022}, year = {2008}, url = {https://doi.org/10.1093/ietisy/e91-d.4.1010}, doi = {10.1093/IETISY/E91-D.4.1010}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YaoMST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigarch/YaoMST07, author = {Jun Yao and Shinobu Miwa and Hajime Shimada and Shinji Tomita}, title = {Optimal pipeline depth with pipeline stage unification adoption}, journal = {{SIGARCH} Comput. Archit. News}, volume = {35}, number = {5}, pages = {3--9}, year = {2007}, url = {https://doi.org/10.1145/1360464.1360470}, doi = {10.1145/1360464.1360470}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigarch/YaoMST07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ishpc/YaoSNMT05, author = {Jun Yao and Hajime Shimada and Yasuhiko Nakashima and Shin{-}ichiro Mori and Shinji Tomita}, editor = {Jes{\'{u}}s Labarta and Kazuki Joe and Toshinori Sato}, title = {Program Phase Detection Based Dynamic Control Mechanisms for Pipeline Stage Unification Adoption}, booktitle = {High-Performance Computing - 6th International Symposium, {ISHPC} 2005, Nara, Japan, September 7-9, 2005, First International Workshop on Advanced Low Power Systems, {ALPS} 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4759}, pages = {494--507}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77704-5\_46}, doi = {10.1007/978-3-540-77704-5\_46}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/ishpc/YaoSNMT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/islped/ShimadaAS03, author = {Hajime Shimada and Hideki Ando and Toshio Shimada}, editor = {Ingrid Verbauwhede and Hyung Roh}, title = {Pipeline stage unification: a low-energy consumption technique for future mobile processors}, booktitle = {Proceedings of the 2003 International Symposium on Low Power Electronics and Design, 2003, Seoul, Korea, August 25-27, 2003}, pages = {326--329}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/871506.871587}, doi = {10.1145/871506.871587}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/islped/ShimadaAS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.