
Kazuya Okada
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c18]Nattapat Boonprakong, Tsukasa Kimura
, Ken-ichi Fukui, Kazuya Okada, Masato Ito, Hiroshi Maruyama, Masayuki Numao:
Towards Multimodal Office Task Performance Estimation. SMC 2020: 2695-2701
2010 – 2019
- 2019
- [c17]Kazuya Okada, Shigeru Kashihara, Yoshihisa Kondo, Nobuo Suzuki, Hiroyuki Yokoyama:
Device-Based Network Selection for Edge Computing. CCNC 2019: 1-2 - [c16]Bo Hu, Atsutoshi Kumagai, Kazunori Kamiya, Kenji Takahashi, Daniel Dalek, Ola Söderström, Kazuya Okada, Yuji Sekiya, Akihiro Nakao:
Alchemy: Stochastic Feature Regeneration for Malicious Network Traffic Classification. COMPSAC (1) 2019: 346-351 - [c15]Toki Suga, Kazuya Okada, Hiroshi Esaki:
Toward Real-time Packet Classification for Preventing Malicious Traffic by Machine Learning. ICIN 2019: 106-111 - 2018
- [c14]Keiichi Shima, Daisuke Miyamoto, Hiroshi Abe, Tomohiro Ishihara, Kazuya Okada, Yuji Sekiya, Hirochika Asai, Yusuke Doi:
Classification of URL bitstreams using bag of bytes. ICIN 2018: 1-5 - [c13]Masao Dohi, Kazuya Okada, Ikuo Maeda, Shigetoshi Fujitani, Toshihiro Fujita:
Proposal of Collaboration Safety in a Coexistence Environment of Human and Robots. ICRA 2018: 1924-1930 - [c12]Ryo Nakamura, Yuji Sekiya, Daisuke Miyamoto, Kazuya Okada, Tomohiro Ishihara:
Malicious Host Detection by Imaging SYN Packets and A Neural Network. ISNCC 2018: 1-4 - [c11]Kazuya Okada, Shigeru Kashihara, Nao Kawanishi, Nobuo Suzuki, Keizo Sugiyama, Youki Kadobayashi:
GoEdge: A Scalable and Stateless Local Breakout Method. TOPIC@PODC 2018: 29-34 - 2017
- [c10]Hiroshi Abe, Keiichi Shima, Yuji Sekiya, Daisuke Miyamoto, Tomohiro Ishihara, Kazuya Okada:
Hayabusa: Simple and Fast Full-Text Search Engine for Massive System Log Data. CFI 2017: 2:1-2:7 - 2015
- [c9]Pernelle Mensah, Gregory Blanc, Kazuya Okada, Daisuke Miyamoto, Youki Kadobayashi:
AJNA: Anti-phishing JS-based Visual Analysis, to Mitigate Users' Excessive Trust in SSL/TLS. BADGERS@RAID 2015: 74-84 - [c8]Jema David Ndibwile, A. Govardhan, Kazuya Okada, Youki Kadobayashi:
Web Server Protection against Application Layer DDoS Attacks Using Machine Learning and Traffic Authentication. COMPSAC Workshops 2015: 261-267 - [c7]Ryo Nakamura, Kazuya Okada, Shuichi Saito, Hiroyuki Tanahashi, Yuji Sekiya:
FlowFall: A Service Chaining Architecture with Commodity Technologies. ICNP 2015: 425-431 - 2014
- [j1]Takafumi Taketomi
, Kazuya Okada, Goshiro Yamamoto, Jun Miyazaki
, Hirokazu Kato:
Camera pose estimation under dynamic intrinsic parameter change for augmented reality. Comput. Graph. 44: 11-19 (2014) - [c6]Hajime Tazaki, Kazuya Okada, Yuji Sekiya, Youki Kadobayashi:
MATATABI: Multi-layer Threat Analysis Platform with Hadoop. BADGERS@ESORICS 2014: 75-82 - [c5]Kazuya Okada, Hiroaki Hazeyama, Youki Kadobayashi:
Oblivious DDoS mitigation with locator/ID separation protocol. CFI 2014: 8:1-8:6 - [c4]Thanasis Petsas, Kazuya Okada, Hajime Tazaki, Gregory Blanc
, Pawel Pawlinski:
A Trusted Knowledge Management System for Multi-layer Threat Analysis. TRUST 2014: 214-215 - 2013
- [c3]Kazuya Okada, Takeshi Okuda, Suguru Yamaguchi:
Design of Geographically Aggregatable Address and Routing Toward Location Based Multicast. AINA Workshops 2013: 1307-1312 - [c2]Takafumi Taketomi, Kazuya Okada, Goshiro Yamamoto, Jun Miyazaki, Hirokazu Kato:
Geometric registration for zoomable camera using epipolar constraint and pre-calibrated intrinsic camera parameter change. ISMAR 2013: 295-296 - [c1]Junya Niwa, Kazuya Okada, Takeshi Okuda, Suguru Yamaguchi:
MPSDataStore: a sensor data repository system for mobile participatory sensing. MCC@SIGCOMM 2013: 3-8
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-23 00:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint