default search action
Kazuo Hashimoto
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c57]Hibiki Nakanishi, Kota Hisafuru, Kento Hasegawa, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, Nozomu Togawa:
Initial Seeds Generation Using LLM for IoT Device Fuzzing. IOTSMS 2024: 5-10 - [c56]Yuka Ikegami, Ryotaro Negishi, Kento Hasegawa, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, Nozomu Togawa:
Prioritizing Vulnerability Assessment Items Using LLM Based on IoT Device Documentations. IOTSMS 2024: 147-152 - 2023
- [c55]Kento Hasegawa, Kazuki Yamashita, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, Nozomu Togawa:
Membership Inference Attacks against GNN-based Hardware Trojan Detection. TrustCom 2023: 1222-1229 - 2021
- [j16]Kohei Nozawa, Kento Hasegawa, Seira Hidano, Shinsaku Kiyomoto, Kazuo Hashimoto, Nozomu Togawa:
Generating Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists. J. Inf. Process. 29: 236-246 (2021) - [i1]Kento Hasegawa, Kazuki Yamashita, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, Nozomu Togawa:
Node-wise Hardware Trojan Detection Based on Graph Learning. CoRR abs/2112.02213 (2021)
2010 – 2019
- 2019
- [c54]Kohei Nozawa, Kento Hasegawa, Seira Hidano, Shinsaku Kiyomoto, Kazuo Hashimoto, Nozomu Togawa:
Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 341-359 - 2018
- [c53]Yuya Kokaki, Naohiro Tawara, Tetsunori Kobayashi, Kazuo Hashimoto, Tetsuji Ogawa:
Sequential Fish Catch Forecasting Using Bayesian State Space Models. ICPR 2018: 776-781 - 2016
- [c52]Tatsuhiro Kishi, Takashi Nozawa, Ai Niibori, Hajime Futaki, Yusaku Miura, M. Shina, Kei Matsuki, Hiroshi Yanagino, Sarah Cosentino, Kazuo Hashimoto, Atsuo Takanishi:
One DoF robotic hand that makes human laugh by tickling through rubbing underarm. IROS 2016: 404-409 - 2015
- [c51]Yashuchika Fujiwara, Keiji Yamada, Kenichi Tabata, Michio Oda, Kazuo Hashimoto, Takuo Suganuma, Abdur Rahim Biswas, Panagiotis Vlacheas, Vera Stavroulaki, Dimitris Kelaidonis, Andreas Georgakopoulos:
Context Aware Services: A Novel Trend in IoT Based Research in Smart City Project. COMPSAC Workshops 2015: 479-480 - [c50]Kazuo Hashimoto, Keiji Yamada, Kenichi Tabata, Michio Oda, Takuo Suganuma, Abdur Rahim Biswas, Panagiotis Vlacheas, Vera Stavroulaki, Dimitris Kelaidonis, Andreas Georgakopoulos:
iKaaS Data Modeling: A Data Model for Community Services and Environment Monitoring in Smart City. ICAC 2015: 301-306 - 2014
- [c49]Tatsuhiro Kishi, Hajime Futaki, Gabriele Trovato, Nobutsuna Endo, Matthieu Destephe, Sarah Cosentino, Kazuo Hashimoto, Atsuo Takanishi:
Development of a comic mark based expressive robotic head adapted to Japanese cultural background. IROS 2014: 2608-2613 - 2011
- [j15]Hiroshi Tsunoda, Hidehisa Nakayama, Kohei Ohta, Akihiro Suzuki, Hiroki Nishiyama, Ryoichi Nagatomi, Kazuo Hashimoto, Yuji Waizumi, Glenn Mansfield Keeni, Yoshiaki Nemoto:
Development of a WLAN based monitoring system for group activity measurement in real-time. J. Commun. Networks 13(2): 86-94 (2011) - [j14]Tarik Taleb, Kazuo Hashimoto:
MS2 : A New Real-Time Multi-Source Mobile-Streaming Architecture. IEEE Trans. Broadcast. 57(3): 662-673 (2011) - [c48]Antonia Scheidel, Ahmad Zufri, Kazuo Hashimoto:
Mental state detection and tagging in nursing records. ICNC 2011: 913-916 - [c47]Kazuo Hashimoto, Gen Kitagata, Hideyuki Takahashi, Atsushi Takeda, Debasish Chakraborty, Norio Shiratori:
Socio-familiar Personalized Service and Its Application - Towards a New Network Software for Next Generation Ubiquitous Service. ISADS 2011: 449-455 - 2010
- [j13]Debasish Chakraborty, Satoshi Ogawa, Gen Kitagata, Atsushi Takeda, Kazuo Hashimoto, Norio Shiratori:
A Flexible and Secure Access Control Scheme Using Social Behavior in Real World. J. Mobile Multimedia 6(2): 145-157 (2010) - [j12]Dung Duc Nguyen, Kazunori Matsumoto, Yasuhiro Takishima, Kazuo Hashimoto:
Condensed Vector Machines: Learning Fast Machine for Large Data. IEEE Trans. Neural Networks 21(12): 1903-1914 (2010) - [c46]Jun Makishi, Debasish Chakraborty, Toshiaki Osada, Gen Kitagata, Atsushi Takeda, Kazuo Hashimoto, Norio Shiratori:
A Fair Load Sharing Scheme for Multi-source Multimedia Overlay Application Layer Multicast. CISIS 2010: 337-344 - [c45]Atsushi Takeda, Seiya Nakayama, Gen Kitagata, Debasish Chakraborty, Kazuo Hashimoto, Norio Shiratori:
Hash-Based Distributed Public Key Infrastructure for Ubiquitous Environments. CISIS 2010: 376-383 - [c44]Pedro B. F. Duarte, Zubair Md. Fadlullah, Kazuo Hashimoto, Nei Kato:
Partially Overlapped Channel Assignment on Wireless Mesh Network Backbone. GLOBECOM 2010: 1-5 - [c43]Gen Kitagata, Debasish Chakraborty, Satoshi Ogawa, Atsushi Takeda, Kazuo Hashimoto, Norio Shiratori:
Visitor Access Control Scheme Utilizing Social Relationship in the Real World. IFIPTM 2010: 95-107 - [c42]Yoshinori Osawa, Satoru Imamura, Atsushi Takeda, Gen Kitagata, Norio Shiratori, Kazuo Hashimoto:
A Proposal of Privacy Management Architecture. SAINT 2010: 161-164 - [c41]Akihiro Nakarai, Akira Sakatoku, Atsushi Takeda, Gen Kitagata, Debasish Chakraborty, Kazuo Hashimoto, Norio Shiratori:
An Overlay Authentication Network for Active Utilization of Private Information. SAINT 2010: 185-188
2000 – 2009
- 2009
- [j11]Akira Yamada, Ayumu Kubota, Yutaka Miyake, Kazuo Hashimoto:
Service Independent Access Control Architecture for User Generated Content (UGC) and Its Implementation. IEICE Trans. Inf. Syst. 92-D(10): 1961-1970 (2009) - [j10]Atushi Takeda, Debasish Chakraborty, Gen Kitagata, Kazuo Hashimoto, Norio Shiratori:
Proposal and Performance Evaluation of Hash-based Authentication for P2P Network. Inf. Media Technol. 4(2): 594-606 (2009) - [j9]Atsushi Takeda, Debasish Chakraborty, Gen Kitagata, Kazuo Hashimoto, Norio Shiratori:
Proposal and Performance Evaluation of Hash-based Authentication for P2P Network. J. Inf. Process. 17: 59-71 (2009) - [j8]Wataru Matsubara, Shunsuke Inenaga, Akira Ishino, Ayumi Shinohara, Tomoyuki Nakamura, Kazuo Hashimoto:
Efficient algorithms to compute compressed longest common substrings and compressed palindromes. Theor. Comput. Sci. 410(8-10): 900-913 (2009) - [c40]Akira Yamada, Yutaka Miyake, Masahiro Terabe, Kazuo Hashimoto, Nei Kato:
Anomaly Detection for DNS Servers Using Frequent Host Selection. AINA 2009: 853-860 - [c39]Debasish Chakraborty, Satoshi Ogawa, Gen Kitagata, Atsushi Takeda, Kazuo Hashimoto, Norio Shiratori:
A Flexible and Secure Access Control Scheme Using Social Behavior in the Real World. CISIS 2009: 375-381 - [c38]Qing Chen, Xiaodong Lin, Sherman X. Shen, Kazuo Hashimoto, Nei Kato:
A Group-Based Key Management Protocol for Mobile Ad Hoc Networks. GLOBECOM 2009: 1-5 - 2008
- [j7]Tarik Taleb, Kenichi Kashibuchi, Alessandro Leonardi, Sergio Palazzo, Kazuo Hashimoto, Nei Kato, Yoshiaki Nemoto:
A Cross-Layer Approach for an Efficient Delivery of TCP/RTP-Based Multimedia Applications in Heterogeneous Wireless Networks. IEEE Trans. Veh. Technol. 57(6): 3801-3814 (2008) - [c37]Atsushi Takeda, Kazuo Hashimoto, Gen Kitagata, Salahuddin Muhammad Salim Zabir, Tetsuo Kinoshita, Norio Shiratori:
A New Authentication Method with Distributed Hash Table for P2P Network. AINA Workshops 2008: 483-488 - [c36]Satoru Nishimura, Masahiro Terabe, Kazuo Hashimoto:
Decision Tree Induction from Numeric Data Stream. Australasian Conference on Artificial Intelligence 2008: 311-317 - [c35]Ashkan Sami, Ryoichi Nagatomi, Masahiro Terabe, Kazuo Hashimoto:
Design of Physical Activity Recommendation System. IADIS European Conf. Data Mining 2008: 148-152 - [c34]Tarik Taleb, Tomoyuki Nakamura, Kazuo Hashimoto:
Multi-Source Streaming in Next Generation Mobile Communication Systems. ICC 2008: 296-300 - [c33]Satoru Nishimura, Masahiro Terabe, Kazuo Hashimoto, Koichiro Mihara:
Learning Higher Accuracy Decision Trees from Concept Drifting Data Streams. IEA/AIE 2008: 179-188 - [c32]Tarik Taleb, Tomoyuki Nakamura, Kazuo Hashimoto:
On supporting handoff management for multi-source video streaming in mobile communication systems. LCN 2008: 395-402 - [c31]Duc Dung Nguyen, Kazunori Matsumoto, Kazuo Hashimoto, Yasuhiro Takishima, Daichi Takatori, Masahiro Terabe:
Multi-class Support Vector Machine Simplification. PRICAI 2008: 799-808 - [c30]Wataru Matsubara, Shunsuke Inenaga, Akira Ishino, Ayumi Shinohara, Tomoyuki Nakamura, Kazuo Hashimoto:
Computing Longest Common Substring and All Palindromes from Compressed Strings. SOFSEM 2008: 364-375 - [c29]Tarik Taleb, Keisuke Ooi, Kazuo Hashimoto:
An Efficient Collision Avoidance Strategy for ITS systems. WCNC 2008: 2212-2217 - [c28]Koichiro Mihara, Masahiro Terabe, Kazuo Hashimoto:
A Novel Web Usage Mining Method - Mining and Clustering of DAG Access Patterns Considering Page Browsing Time. WEBIST (2) 2008: 313-320 - 2007
- [j6]Tarik Taleb, Abdelhamid Nafaa, Liam Murphy, Kazuo Hashimoto, Nei Kato, Yoshiaki Nemoto:
Toward Efficient Service-Level QoS Provisioning in Large-Scale 802.11-Based Networks. IEEE Netw. 21(5): 42-48 (2007) - [j5]Tarik Taleb, Ehssan Sakhaee, Abbas Jamalipour, Kazuo Hashimoto, Nei Kato, Yoshiaki Nemoto:
A Stable Routing Protocol to Support ITS Services in VANET Networks. IEEE Trans. Veh. Technol. 56(6): 3337-3347 (2007) - [c27]Do Van Giang, Tarik Taleb, Kazuo Hashimoto, Nei Kato, Yoshiaki Nemoto:
A Fair and Lifetime-Maximum Routing Algorithm for Wireless Sensor Networks. GLOBECOM 2007: 581-585 - [c26]Tarik Taleb, Juan Carlos Fernandez, Kazuo Hashimoto, Yoshiaki Nemoto, Nei Kato:
A Bandwidth Aggregation-Aware QoS Negotiation Mechanism for Next-Generation Wireless Networks. GLOBECOM 2007: 1912-1916 - [c25]Feriel Mimoune, Farid Naït-Abdesselam, Tarik Taleb, Kazuo Hashimoto:
Route Optimization for Large Scale Network Mobility Assisted by BGP. GLOBECOM 2007: 4659-4663 - [c24]Tarik Taleb, Kazuo Hashimoto, Nei Kato, Yoshiaki Nemoto:
A Dynamic Service Level Negotiation Mechanism for QoS Provisioning in NGEO Satellite Networks. ICC 2007: 1-6 - [c23]Tarik Taleb, Yuji Ikeda, Kazuo Hashimoto, Yoshiaki Nemoto, Nei Kato:
An Application-Driven Mobility Management Scheme for Hierarchical Mobile IPv6 Networks. ICC 2007: 320-325 - [c22]Zubair Md. Fadlullah, Tarik Taleb, Nirwan Ansari, Kazuo Hashimoto, Yutaka Miyake, Yoshiaki Nemoto, Nei Kato:
Combating Against Attacks on Encrypted Protocols. ICC 2007: 1211-1216 - [c21]Tarik Taleb, Zubair Md. Fadlullah, Kazuo Hashimoto, Yoshiaki Nemoto, Nei Kato:
Tracing back attacks against encrypted protocols. IWCMC 2007: 121-126 - [c20]Juan Carlos Fernandez, Tarik Taleb, Nirwan Ansari, Kazuo Hashimoto, Yoshiaki Nemoto, Nei Kato:
Dynamic QoS Negotiation for Next-Generation Wireless Communications Systems. WCNC 2007: 3227-3231 - 2006
- [c19]Kumar Simkhada, Tarik Taleb, Yuji Waizumi, Abbas Jamalipour, Kazuo Hashimoto, Nei Kato, Yoshiaki Nemoto:
A Multi-level Security Based Autonomic Parameter Selection Approach for an Effective and Early Detection of Internet Worms. GLOBECOM 2006 - [c18]Tarik Taleb, Daisuke Mashimo, Abbas Jamalipour, Kazuo Hashimoto, Yoshiaki Nemoto, Nei Kato:
ELB: An Explicit Load Balancing Routing Protocol for Multi-Hop NGEO Satellite Constellations. GLOBECOM 2006 - [c17]Tarik Taleb, Farid Naït-Abdesselam, Abbas Jamalipour, Kazuo Hashimoto, Nei Kato, Yoshiaki Nemoto:
Design Guidelines for a Global and Self-Managed LEO Satellites-Based Sensor Network. GLOBECOM 2006 - 2005
- [j4]Shigeyuki Sakazawa, Yasuhiro Takishima, Yoshinori Kitatsuji, Yasuyuki Nakajima, Masahiro Wada, Kazuo Hashimoto:
Video Data Transmission Protocol "SVFTP" Using Multiple TCP Connections and Its Application. IEICE Trans. Inf. Syst. 88-D(5): 976-983 (2005) - 2004
- [c16]Shigeyuki Sakazawa, Yasuhiro Takishima, Yasuyuki Nakajima, Masahiro Wada, Kazuo Hashimoto:
Multimedia contents management and transmission system "VAST-web" and its effective transport protocol "SVFTP". ICME 2004: 647-650 - 2003
- [c15]Kenichi Yoshida, Kazuo Hashimoto:
AI application of the Internet - Backgrounds and Issues. SAINT Workshops 2003: 273-275 - 2002
- [j3]Shuji Hashimoto, Seinosuke Narita, Hironori Kasahara, Katsuhiko Shirai, Atsuo Kobayashi, Atsuo Takanishi, Shigeki Sugano, Jin'ichi Yamaguchi, Hideyuki Sawada, Hideaki Takanobu, Koji Shibuya, Toshio Morita, T. Kurata, Naoyuki Onoe, K. Ouchi, T. Noguchi, Yosihiro Niwa, Seikon Nagayama, Hirokazu Tabayashi, I. Matsui, Motoki Obata, H. Matsuzaki, A. Murasugi, Tetsunori Kobayashi, Satoshi Haruyama, Tetsuhiko Okada, Yasuaki Hidaki, Yuichi Taguchi, Keiichiro Hoashi, Emi Morikawa, Yuri Iwano, D. Araki, J. Suzuki, Masao Yokoyama, I. Dawa, Daisuke Nishino, Sadatoshi Inoue, Tomoshiro Hirano, Eiji Soga, S. Gen, T. Yanada, Keisuke Kato, S. Sakamoto, Y. Ishii, Shigeru Matsuo, Yousuke Yamamoto, Kensuke Sato, T. Hagiwara, T. Ueda, N. Honda, Kazuo Hashimoto, T. Hanamoto, S. Kayaba, Takuya Kojima, Hiroyasu Iwata, H. Kubodera, R. Matsuki, T. Nakajima, K. Nitto, D. Yamamoto, Y. Kamizaki, S. Nagaike, Y. Kunitake, Satoshi Morita:
Humanoid Robots in Waseda University-Hadaly-2 and WABIAN. Auton. Robots 12(1): 25-38 (2002) - 2001
- [j2]Masami Suzuki, Naomi Inoue, Kazuo Hashimoto:
A Method for Supporting Document Selection in Cross-language Information Retrieval and its Evaluation. Comput. Humanit. 35(4): 421-438 (2001) - [c14]Keiichiro Hoashi, Kazunori Matsumoto, Naomi Inoue, Kazuo Hashimoto:
Query Expansion Based on Predictive Algorithms for Collaborative Filtering. SIGIR 2001: 414-415 - 2000
- [c13]Kazuo Hashimoto, Kazunori Matsumoto, Norio Shiratori:
Probabilistic Modeling of Alarm Observation Delay in Network Diagnosis. PRICAI 2000: 734-744 - [c12]Keiichiro Hoashi, Kazunori Matsumoto, Naomi Inoue, Kazuo Hashimoto:
Document filtering method using non-relevant information profile. SIGIR 2000: 176-183 - [c11]Keiichiro Hoashi, Kazunori Matsumoto, Naomi Inoue, Kazuo Hashimoto, Takashi Hasegawa, Katsuhiko Shirai:
Experiments on the TREC-9 Filtering Track. TREC 2000
1990 – 1999
- 1999
- [c10]Kazunori Matsumoto, Kazuo Hashimoto:
Schema Design for Causal Law Mining from Incomplete Database. Discovery Science 1999: 92-102 - [c9]Kazunori Matsumoto, Kazuo Hashimoto:
Intelligent Monitoring Method Using Time Varying Binomial Distribution Models for Pseudo-Periodic Communication Traffic. IDA 1999: 123-136 - [c8]Fumihiro Yato, Naomi Inoue, Kazuo Hashimoto:
A study of speech recognition for the elderly. EUROSPEECH 1999: 101-104 - [c7]Keiichiro Hoashi, Kazunori Matsumoto, Naomi Inoue, Kazuo Hashimoto:
Query Expansion Method Based on Word Contribution (poster abstract). SIGIR 1999: 303-304 - [c6]Keiichiro Hoashi, Kazunori Matsumoto, Naomi Inoue, Kazuo Hashimoto:
Experiments on the TREC-8 Filtering Track. TREC 1999 - 1998
- [c5]Keiko Aoki, Kazunori Matsumoto, Keiichiro Hoashi, Kazuo Hashimoto:
A Study of Bayesian Clustering of a Document Set Based on GA. SEAL 1998: 260-267 - [c4]Keiichiro Hoashi, Kazunori Matsumoto, Naomi Inoue, Kazuo Hashimoto:
TREC-7 Experiments: Query Expansion Method Based on Word Contribution. TREC 1998: 373-381 - 1995
- [c3]Kazunori Matsumoto, Kazuo Hashimoto, Sadao Obana:
Design and Implementation of Real-Time Expert System for Troubleshooting in International Telephone Networks. IEA/AIE 1995: 345-352 - 1994
- [j1]Tohru Asami, Hachisu Unoki, Kazuo Hashimoto, Seiichi Yamamoto:
Reconstruction of a decision tree with learning examples generated from an original tree and its characteristics. Syst. Comput. Jpn. 25(9): 93-105 (1994) - 1991
- [c2]Katsuhiko Shirai, Kazuo Hashimoto, Tetsunori Kobayashi:
Text-to-speech synthesizer using superposition of sinusoidal waves generated by synchronized oscillators. EUROSPEECH 1991: 39-42 - 1990
- [c1]Katsuhiko Shirai, Y. Sato, Kazuo Hashimoto:
Speech synthesis using superposition of sinusoidal waves generated by synchronized oscillators. ICSLP 1990: 345-348
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint