default search action
Yuji Watanabe
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c49]Takumi Yanagawa, Vikas Agarwal, Yuji Watanabe, Lou Degenaro, Anca Sailer:
A Secure Framework for Continuous Compliance across Heterogeneous Policy Validation Points. CLOUD 2024: 176-182 - [c48]Zhongtian Kong, Yuji Watanabe:
A Mobile Real-time Identification System of Isomorphic Objects Using YOLO with Attention for Visually Impaired People. GCCE 2024: 121-122 - [c47]Yonghao Ba, Yuji Watanabe:
Proposed Models for Improving Lesion Segmentation in Ischemic Stroke CT Images Based on Hybrid CNN-Transformer Architectures. GCCE 2024: 975-976 - 2023
- [c46]Wenxuan Zhang, Yuji Watanabe:
Real-time Identification System Using YOLO and Isomorphic Object Identification for Visually Impaired People. GCCE 2023: 757-758 - [c45]Shoichiro Hara, Yuji Watanabe:
NP4G: Network Programming for Generalization. IntelliSys (1) 2023: 301-315 - 2022
- [j10]Ruriko Kudo, Hirokuni Kitahara, Kugamoorthy Gajananan, Yuji Watanabe:
Application Integrity Protection on Kubernetes cluster based on Manifest Signature Verification. J. Inf. Process. 30: 626-635 (2022) - [c44]Yang Qun, Shoichiro Hara, Yuji Watanabe:
Motion Estimation by Deep Learnings Using Ambient Sensor Network. GCCE 2022: 389-390 - [c43]Ryouta Kozakai, Toshiki Kobayashi, Wenxuan Zhang, Yuji Watanabe:
Tendency Analysis of Python Programming Classes for Junior and Senior High School Students. KES 2022: 4603-4612 - [i1]Shoichiro Hara, Yuji Watanabe:
NP4G : Network Programming for Generalization. CoRR abs/2212.11118 (2022) - 2021
- [j9]Hirokuni Kitahara, Kugamoorthy Gajananan, Yuji Watanabe:
Real-time Container Integrity Monitoring for Large-Scale Kubernetes Cluster. J. Inf. Process. 29: 505-514 (2021) - [c42]Ruriko Kudo, Hirokuni Kitahara, Kugamoorthy Gajananan, Yuji Watanabe:
Integrity Protection for Kubernetes Resource Based on Digital Signature. CLOUD 2021: 288-296 - [c41]Kugamoorthy Gajananan, Hirokuni Kitahara, Ruriko Kudo, Yuji Watanabe:
Scalable Runtime Integrity Protection for Helm Based Applications on Kubernetes Cluster. IEEE BigData 2021: 2362-2371 - 2020
- [c40]Hirokuni Kitahara, Kugamoorthy Gajananan, Yuji Watanabe:
Highly-Scalable Container Integrity Monitoring for Large-Scale Kubernetes Cluster. IEEE BigData 2020: 449-454 - [c39]Pablo Loyola, Kugamoorthy Gajananan, Hirokuni Kitahara, Yuji Watanabe, Fumiko Satoh:
Automating Domain Squatting Detection Using Representation Learning. IEEE BigData 2020: 1021-1030 - [c38]Yuji Watanabe, Masaki Kimura:
Gait identification and authentication using LSTM based on 3-axis accelerations of smartphone. KES 2020: 3873-3880
2010 – 2019
- 2019
- [c37]Toshiki Kobayashi, Ryouta Kozakai, Yuji Watanabe:
User Identification Using Neural Network Based on Japanese Flick Input on Smartphone. GCCE 2019: 188-189 - [c36]Yuji Watanabe, Nao Yasuda:
Identification and features selection of elderly people based on accelerations of smartphone. KES 2019: 2629-2638 - 2018
- [c35]Pablo Loyola, Kugamoorthy Gajananan, Yuji Watanabe, Fumiko Satoh:
Villani at SemEval-2018 Task 8: Semantic Extraction from Cybersecurity Reports using Representation Learning. SemEval@NAACL-HLT 2018: 885-889 - 2017
- [c34]Nilton Bila, Paolo Dettori, Ali Kanso, Yuji Watanabe, Alaa Youssef:
Leveraging the Serverless Architecture for Securing Linux Containers. ICDCS Workshops 2017: 401-404 - [c33]Yuji Watanabe, Liu Kun:
Long-term influence of user identification based on touch operation on smart phone. KES 2017: 2529-2536 - 2016
- [c32]Yuji Watanabe, San Sara:
Toward an Immunity-based Gait Recognition on Smart Phone: A Study of Feature Selection and Walking State Classification. KES 2016: 1790-1800 - 2015
- [c31]Yuji Watanabe:
Toward Application of Immunity-based Model to Gait Recognition Using Smart Phone Sensors: A Study of Various Walking States. KES 2015: 1856-1864 - 2014
- [c30]Yuji Watanabe:
Influence of Holding Smart Phone for Acceleration-Based Gait Authentication. EST 2014: 30-33 - [c29]Yuji Watanabe, Ei Jyo:
Analogy between Immune System and Sensor Replacement Using Mobile Robots on Wireless Sensor Networks. KES 2014: 1352-1359 - [c28]Yuji Watanabe, Akira Koseki:
A financial risk evaluation service for integrating private portfolios securely. SOLI 2014: 59-64 - 2013
- [c27]Yuji Watanabe, Houryu, Tsutomu Fujita:
Toward Introduction of Immunity-based Model to Continuous Behavior-based User Authentication on Smart Phone. KES 2013: 1319-1327 - 2011
- [j8]Yuji Watanabe:
Performance evaluation of immunity-based statistical en-route filtering in wireless sensor networks. Artif. Life Robotics 16(3): 422-425 (2011) - [c26]Yuji Watanabe:
An analysis of immunity-based statistical en-route filtering in wireless sensor networks. MEDES 2011: 250-256 - 2010
- [j7]Yuji Watanabe, Tong Tran Nhat Linh:
A secure routing scheme for mobile wireless sensor networks. Artif. Life Robotics 15(3): 302-305 (2010) - [c25]Yuji Watanabe:
An Immunity-Based Scheme for Statistical En-route Filtering in Wireless Sensor Networks. KES (3) 2010: 660-665
2000 – 2009
- 2009
- [c24]Yasuharu Katsuno, Yuji Watanabe, Michiharu Kudo, Eiji Okamoto:
A Pluggable Domain Management Approach for Building Practical Distributed Coalitions. ARES 2009: 1-8 - 2008
- [c23]Yasuhito Arimoto, Michiharu Kudo, Yuji Watanabe, Kokichi Futatsugi:
Checking assignments of controls to risks for internal control. ICEGOV 2008: 98-104 - 2007
- [c22]Sachiko Yoshihama, Takeo Yoshizawa, Yuji Watanabe, Michiharu Kudo, Kazuko Oyanagi:
Dynamic Information Flow Control Architecture for Web Applications. ESORICS 2007: 267-282 - [c21]Satoshi Iwatsu, Yuji Watanabe, Kiminobu Kodama:
Development of communications protocols between manufacturing execution system and production equipment. ETFA 2007: 280-287 - [c20]Christine Robson, Yuji Watanabe, Masayuki Numao:
Parts Traceability for Manufacturers. ICDE 2007: 1212-1221 - [c19]Yuji Watanabe, Yoshiteru Ishida:
Performance Evaluation of Immunity-Based Diagnosis on Complex Networks. KES (3) 2007: 846-853 - [c18]Yasuharu Katsuno, Yuji Watanabe, Sanehiro Furuichi, Michiharu Kudo:
Chinese-wall process confinement for practical distributed coalitions. SACMAT 2007: 225-234 - 2006
- [c17]Yasuharu Katsuno, Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo:
Layering negotiations for flexible attestation. STC 2006: 17-20 - [c16]Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo, Hiroshi Maruyama:
Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components. ESORICS 2006: 65-80 - [c15]Yuji Watanabe, Yoshiteru Ishida:
Migration Strategies of Immunity-Based Diagnostic Nodes for Wireless Sensor Network. KES (2) 2006: 131-138 - 2005
- [c14]Yuji Watanabe, Shigeyuki Sato, Yoshiteru Ishida:
Mutual Repairing System Using Immunity-Based Diagnostic Mobile Agent. KES (2) 2005: 72-78 - 2004
- [j6]Yuji Watanabe, Yoshiteru Ishida:
Mutual tests using immunity-based diagnostic mobile agents in distributed intrusion detection systems. Artif. Life Robotics 8(2): 163-167 (2004) - [j5]Yuji Watanabe, Yoshiteru Ishida:
Mutual tests using immunity-based diagnostic mobile agents in distributed intrusion detection systems. Artif. Life Robotics 8(2): 163-167 (2004) - [c13]Yuji Watanabe, Shigeyuki Sato, Yoshiteru Ishida:
An Approach for Self-repair in Distributed System Using Immunity-Based Diagnostic Mobile Agents. KES 2004: 504-510 - 2003
- [j4]Yuji Watanabe, Yoshiteru Ishida:
Distributed credibility evaluation of an information gathering mobile agent system. Syst. Comput. Jpn. 34(9): 10-19 (2003) - [c12]Yuji Watanabe, Masayuki Numao:
Multi-round Secure-Light Broadcast Exclusion Protocol with Pre-processing. ESORICS 2003: 85-99 - [c11]Yuji Watanabe, Yoshiteru Ishida:
Immunity-Based Approaches for Self-Monitoring in Distributed Intrusion Detection System. KES 2003: 503-510 - 2002
- [c10]Yuji Watanabe, Masayuki Numao:
Conditional Cryptographic Delegation for P2P Data Sharing. ISC 2002: 309-321 - 2001
- [c9]Yuji Watanabe, Goichiro Hanaoka, Hideki Imai:
Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents. CT-RSA 2001: 392-407 - [c8]Hirotaka Komaki, Yuji Watanabe, Goichiro Hanaoka, Hideki Imai:
Efficient Asymmetric Self-Enforcement Scheme with Public Traceability. Public Key Cryptography 2001: 225-239 - 2000
- [c7]Yuji Watanabe, Hideki Imai:
Reducing the round complexity of a sealed-bid auction protocol with an off-line TTP. CCS 2000: 80-86
1990 – 1999
- 1999
- [c6]Yuji Watanabe, Hideki Imai:
Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks. ISW 1999: 118-135 - [c5]Yuji Watanabe, Hideki Imai:
Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret. Public Key Cryptography 1999: 290-305 - 1998
- [j3]Yuji Watanabe, Akio Ishiguro, Yoshiki Uchikawa:
Autonomous Mobile Robot Behavior Control Using Immune Network. J. Robotics Mechatronics 10(4): 326-332 (1998) - 1997
- [j2]Yuji Watanabe, Akio Ishiguro, Yasuhiro Shirai, Yoshiki Uchikawa:
Emergent construction of a behavior arbitration mechanism based on the immune system. Adv. Robotics 12(3): 227-242 (1997) - [c4]Akio Ishiguro, Yuji Watanabe, Toshiyuki Kondo, Yasuhiro Shirai, Yoshiki Uchikawa:
A robot with a decentralized consensus-making mechanism based on the immune system. ISADS 1997: 231-237 - 1996
- [c3]Akio Ishiguro, Yuji Watanabe, Toshiyuki Kondo, Yoshiki Uchikawa:
Decentralized Consensus-Making Mechanisms Based on Immune System. Application to a Behavior Arbitration of an Autonomous Mobile Robot. International Conference on Evolutionary Computation 1996: 82-87 - [c2]Akio Ishiguro, Toshiyuki Kondo, Yuji Watanabe, Yoshiki Uchikawa:
Immunoid: An Immunological Approach to Decentralized Behavoir Arbitration of Autonomous Mobile Robots. PPSN 1996: 666-675 - 1995
- [c1]Akio Ishiguro, Yuji Watanabe, Yoshiki Uchikawa:
An immunological approach to dynamic behavior control for autonomous mobile robots. IROS (1) 1995: 495-500 - 1990
- [j1]Yuji Watanabe:
Gray Scale Judgement System. J. Robotics Mechatronics 2(3): 184-188 (1990)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 19:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint