


default search action
Yuzo Taenaka
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Olufemi Abiodun Abraham
, Hideya Ochiai
, Md Delwar Hossain
, Yuzo Taenaka, Youki Kadobayashi:
Electricity Theft Detection for Smart Homes: Harnessing the Power of Machine Learning With Real and Synthetic Attacks. IEEE Access 12: 26023-26045 (2024) - [j22]Bernard Ousmane Sané
, Mandicou Ba
, Doudou Fall, Yuzo Taenaka, Ibrahima Niang, Youki Kadobayashi:
Interdependency Attack-Aware Secure and Performant Virtual Machine Allocation Policies With Low Attack Efficiency and Coverage. IEEE Access 12: 74944-74960 (2024) - [j21]Taisho Sasada
, Yuzo Taenaka, Youki Kadobayashi, Doudou Fall:
Web-Biometrics for User Authenticity Verification in Zero Trust Access Control. IEEE Access 12: 129611-129622 (2024) - [j20]Nahid Ferdous Aurna
, Md Delwar Hossain
, Latifur Khan
, Yuzo Taenaka, Youki Kadobayashi:
FedFusion: Adaptive Model Fusion for Addressing Feature Discrepancies in Federated Credit Card Fraud Detection. IEEE Access 12: 136962-136978 (2024) - [j19]Taisho Sasada
, Yuzo Taenaka, Youki Kadobayashi:
D2-PSD: Dynamic Differentially-Private Spatial Decomposition in Collaboration With Edge Server. IEEE Access 12: 156307-156326 (2024) - [j18]Shota Akiyoshi, Yuzo Taenaka, Kazuya Tsukamoto, Myung Jong Lee:
Content Search Method Utilizing the Metadata Matching Characteristics of Both Spatio-Temporal Content and User Request in the IoT Era. IEICE Trans. Commun. 107(1): 163-172 (2024) - [c50]Harland Fitriadi Amin, Youki Kadobayashi, Yuzo Taenaka:
Increasing LoRa-like Physical Layer Capacity by Introducing Orthogonal Code. APCC 2024: 125-130 - [c49]Oyebode Oluwatobi Oyewale, Md Delwar Hossain, Yuzo Taenaka, Youki Kadobayashi:
Optimizing Voice Biometric Verification in Banking with Machine Learning for Speaker Identification. APCC 2024: 377-384 - [c48]Adil Bin Bhutto, Ryota Kawashima, Yuzo Taenaka, Youki Kadobayashi:
Meeting Latency and Jitter Demands of Beyond 5G Networking Era: Are CNFs Up to the Challenge? COMPSAC 2024: 1598-1605 - [c47]Nahid Ferdous Aurna, Md Delwar Hossain
, Hideya Ochiai, Yuzo Taenaka, Latifur Khan, Youki Kadobayashi:
Banking Malware Detection: Leveraging Federated Learning with Conditional Model Updates and Client Data Heterogeneity. ICISSP 2024: 309-319 - [c46]Taisho Sasada, Nesrine Kaaniche
, Maryline Laurent, Yuzo Taenaka, Youki Kadobayashi:
Differentially-Private Data Aggregation over Encrypted Location Data for Range Counting Query. ICOIN 2024: 409-414 - [c45]Junki Yuasa, Taisho Sasada, Christophe Kiennert, Gregory Blanc, Yuzo Taenaka, Youki Kadobayashi:
OIPM: Access Control Method to Prevent ID/Session Token Abuse on OpenID Connect. SECRYPT 2024: 674-679 - 2023
- [j17]Kabid Hassan Shibly, Md Delwar Hossain
, Hiroyuki Inoue, Yuzo Taenaka, Youki Kadobayashi:
Towards Autonomous Driving Model Resistant to Adversarial Attack. Appl. Artif. Intell. 37(1) (2023) - [j16]Taisho Sasada
, Yuzo Taenaka, Youki Kadobayashi:
Oblivious Statistic Collection With Local Differential Privacy in Mutual Distrust. IEEE Access 11: 21374-21386 (2023) - [j15]Taisho Sasada
, Masataka Kawai, Yuto Masuda, Yuzo Taenaka, Youki Kadobayashi:
Factor Analysis of Learning Motivation Difference on Cybersecurity Training With Zero Trust Architecture. IEEE Access 11: 141358-141374 (2023) - [j14]N'guessan Yves-Roland Douha, Karen Renaud, Yuzo Taenaka, Youki Kadobayashi:
Smart home cybersecurity awareness and behavioral incentives. Inf. Comput. Secur. 31(5): 545-575 (2023) - [j13]Shun Yonamine
, Yuzo Taenaka, Youki Kadobayashi, Daisuke Miyamoto:
Design and implementation of a sandbox for facilitating and automating IoT malware analysis with techniques to elicit malicious behavior: case studies of functionalities for dissecting IoT malware. J. Comput. Virol. Hacking Tech. 19(2): 149-163 (2023) - [c44]Mohammad Hafiz Hersyah, Md Delwar Hossain
, Yuzo Taenaka, Youki Kadobayashi:
A Risk Assessment Study: Encircling Docker Container Assets on IaaS Cloud Computing Topology. CIoT 2023: 225-230 - [c43]Nahid Ferdous Aurna, Md Delwar Hossain
, Yuzo Taenaka, Youki Kadobayashi:
Federated Learning-Based Credit Card Fraud Detection: Performance Analysis with Sampling Methods and Deep Learning Algorithms. CSR 2023: 180-186 - [c42]Kabid Hassan Shibly, Md Delwar Hossain
, Hiroyuki Inoue, Yuzo Taenaka, Youki Kadobayashi:
A Feature-Aware Semi-Supervised Learning Approach for Automotive Ethernet. CSR 2023: 426-431 - [c41]Md Sharafat Hossain, Md Delwar Hossain
, Md Mahbubur Rahman, Yuzo Taenaka, Md Saiful Islam, Youki Kadobayashi:
A Comparative Performance Analysis of Android Malware Classification Using Supervised and Semi-supervised Deep Learning. SIN 2023: 1-8 - [c40]Ryosuke Araki, Kshira Sagar Sahoo, Yuzo Taenaka, Youki Kadobayashi, Erik Elmroth, Monowar H. Bhuyan:
Detecting DDoS Attacks on the Network Edge: An Information-Theoretic Correlation Analysis. TrustCom 2023: 485-494 - [c39]Olufemi Abiodun Abraham, Hideya Ochiai, Md Delwar Hossain
, Yuzo Taenaka, Youki Kadobayashi:
Electricity Theft Detection for Smart Homes with Knowledge-Based Synthetic Attack Data. WFCS 2023: 1-8 - 2022
- [j12]N'guessan Yves-Roland Douha
, Monowar H. Bhuyan, Shigeru Kashihara, Doudou Fall, Yuzo Taenaka, Youki Kadobayashi:
A survey on blockchain, SDN and NFV for the smart-home security. Internet Things 20: 100588 (2022) - [c38]Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi:
Decoupling Statistical Trends from Data Volume on LDP-Based Spatio-Temporal Data Collection. FNWF 2022: 262-269 - [c37]Kabid Hassan Shibly, Md Delwar Hossain
, Hiroyuki Inoue, Yuzo Taenaka, Youki Kadobayashi:
Personalized Federated Learning for Automotive Intrusion Detection Systems. FNWF 2022: 544-549 - [c36]Olufemi Abiodun Abraham, Hideya Ochiai, Kabid Hassan Shibly, Md Delwar Hossain
, Yuzo Taenaka, Youki Kadobayashi:
Unauthorized Power Usage Detection Using Gradient Boosting Classifier in Disaggregated Smart Meter Home Network. FNWF 2022: 688-693 - [c35]Kabid Hassan Shibly, Md Delwar Hossain
, Hiroyuki Inoue, Yuzo Taenaka, Youki Kadobayashi:
Autonomous Driving Model Defense Study on Hijacking Adversarial Attack. ICANN (4) 2022: 546-557 - [c34]Shun Yonamine, Yuzo Taenaka, Youki Kadobayashi:
Tamer: A Sandbox for Facilitating and Automating IoT Malware Analysis with Techniques to Elicit Malicious Behavior. ICISSP 2022: 677-687 - [c33]Shota Akiyoshi, Yuzo Taenaka, Kazuya Tsukamoto, Myung J. Lee:
Resource Allocation Method for Fairness and Efficient Utilization of Network and Computational Resources in Edge Networks. INCoS 2022: 463-474 - [c32]Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi:
DPSD: Dynamic Private Spatial Decomposition Based on Spatial and Temporal Correlations. SmartCom 2022: 188-202 - 2021
- [j11]Shumpei Shimokawa
, Yuzo Taenaka, Kazuya Tsukamoto
, Myung J. Lee
:
SDN Based in-Network Two-Staged Video QoE Estimation With Measurement Error Correction for Edge Network. IEEE Access 9: 39733-39745 (2021) - [j10]Kazuya Tsukamoto, Hitomi Tamura, Yuzo Taenaka, Daiki Nobayashi, Hiroshi Yamamoto, Takeshi Ikenaga, Myung J. Lee:
Geolocation-Centric Information Platform for Resilient Spatio-temporal Content Management. IEICE Trans. Commun. 104-B(3): 199-209 (2021) - [j9]Enkhtur Tsogbaatar
, Monowar H. Bhuyan, Yuzo Taenaka, Doudou Fall, Gonchigsumlaa Khishigjargal, Erik Elmroth, Youki Kadobayashi:
DeL-IoT: A deep ensemble learning approach to uncover anomalies in IoT. Internet Things 14: 100391 (2021) - [c31]Mohd Ruzeiny Bin Kamaruzzaman, Bernard Ousmane Sané
, Doudou Fall, Yuzo Taenaka, Youki Kadobayashi:
Analyzing Cascading Effects of Spoofing Attacks on ADS-B Using a Discrete Model of Air Traffic Control Responses and AGMOD Dynamics. CSR 2021: 241-248 - [c30]Cheikh Saliou Mbacke Babou, Doudou Fall, Shigeru Kashihara, Yuzo Taenaka, Monowar H. Bhuyan, Ibrahima Niang, Ibrahima Diané, Youki Kadobayashi:
D-LBAH: Dynamic Load Balancing Algorithm for HEC-SDN systems. FiCloud 2021: 304-310 - [c29]Taisho Sasada, Masataka Kawai, Yuzo Taenaka, Doudou Fall, Youki Kadobayashi:
Differentially-Private Text Generation via Text Preprocessing to Reduce Utility Loss. ICAIIC 2021: 42-47 - [c28]Enkhtur Tsogbaatar
, Monowar H. Bhuyan, Doudou Fall, Yuzo Taenaka, Gonchigsumlaa Khishigjargal, Erik Elmroth, Youki Kadobayashi:
A 1D-CNN Based Deep Learning for Detecting VSI-DDoS Attacks in IoT Applications. IEA/AIE (1) 2021: 530-543 - [c27]Shota Akiyoshi, Yuzo Taenaka, Kazuya Tsukamoto, Myung J. Lee:
Loose Matching Approach Considering the Time Constraint for Spatio-Temporal Content Discovery. INCoS 2021: 295-306 - [c26]Taisho Sasada, Yuto Masuda, Yuzo Taenaka, Youki Kadobayashi, Doudou Fall:
Zero-Trust Access Control Focusing on Imbalanced Distribution in Browser Clickstreams. SDS 2021: 1-8 - 2020
- [j8]Cheikh Saliou Mbacke Babou
, Doudou Fall, Shigeru Kashihara
, Yuzo Taenaka, Monowar H. Bhuyan
, Ibrahima Niang, Youki Kadobayashi:
Hierarchical Load Balancing and Clustering Technique for Home Edge Computing. IEEE Access 8: 127593-127607 (2020) - [c25]Matthias Baudlet, Doudou Fall, Yuzo Taenaka, Youki Kadobayashi:
The Best of Both Worlds: A New Composite Framework Leveraging PoS and PoW for Blockchain Security and Governance. BRAINS 2020: 17-24 - [c24]Bernard Ousmane Sané
, Mandicou Ba
, Doudou Fall, Shigeru Kashihara, Yuzo Taenaka, Ibrahima Niang, Youki Kadobayashi:
Solving the Interdependency Problem: A Secure Virtual Machine Allocation Method Relying on the Attacker's Efficiency and Coverage. CCGRID 2020: 440-449 - [c23]Enkhtur Tsogbaatar
, Monowar H. Bhuyan, Yuzo Taenaka, Doudou Fall, Gonchigsumlaa Khishigjargal, Erik Elmroth, Youki Kadobayashi:
SDN-Enabled IoT Anomaly Detection Using Ensemble Learning. AIAI (2) 2020: 268-280 - [c22]Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi:
Anonymizing Location Information in Unstructured Text Using Knowledge Graph. iiWAS 2020: 163-167 - [c21]Kaoru Nagashima, Yuzo Taenaka, Akira Nagata, Hitomi Tamura
, Kazuya Tsukamoto, Myung J. Lee:
Matching Based Content Discovery Method on Geo-Centric Information Platform. INCoS 2020: 470-479 - [c20]Shumpei Shimokawa, Yuzo Taenaka, Kazuya Tsukamoto, Myung J. Lee:
SDN-Based In-network Early QoE Prediction for Stable Route Selection on Multi-path Network. INCoS 2020: 480-492
2010 – 2019
- 2019
- [c19]Youki Shiraishi, Akiko Manada, Yuzo Taenaka, Youki Kadobayashi:
A Method for Designing Proximity-Aware Regular Graph-Based Structured Overlay Networks. ICCCS 2019: 430-435 - [c18]Shun Yonamine, Youki Kadobayashi, Daisuke Miyamoto, Yuzo Taenaka:
Towards Automated Characterization of Malware's High-level Mechanism using Virtual Machine Introspection. ICISSP 2019: 471-478 - [c17]Shumpei Shimokawa, Takuya Kanaoka, Yuzo Taenaka, Kazuya Tsukamoto, Myung J. Lee:
SDN-Based Time-Domain Error Correction for In-Network Video QoE Estimation in Wireless Networks. INCoS 2019: 331-341 - [c16]Kaoru Nagashima, Yuzo Taenaka, Akira Nagata, Katsuichi Nakamura, Hitomi Tamura
, Kazuya Tsukamoto:
Experimental Evaluation of Publish/Subscribe-Based Spatio-Temporal Contents Management on Geo-Centric Information Platform. NBiS 2019: 396-405 - [c15]Kazuya Yuge, Yuzo Taenaka, Daiki Nobayashi, Takeshi Ikenaga:
Conceptual experiment of geolocation-aware IoT data dissemination model. PACRIM 2019: 1-5 - 2018
- [j7]Yuzo Taenaka, Kazuki Mizuyama, Kazuya Tsukamoto:
Adaptive Bundle Flow Management for Reducing Control Traffic on SDN-Enabled Multi-Radio Wireless Networks. IEICE Trans. Commun. 101-B(7): 1685-1692 (2018) - [c14]Yuzo Taenaka, Kazuya Tsukamoto:
Elastic Channel Utilization Against External Radio Interference on SDN-Enabled Multi-Radio Wireless Backhaul Networks. CloudNet 2018: 1-6 - 2017
- [c13]Kazuki Mizuyama, Yuzo Taenaka, Kazuya Tsukamoto:
Estimation based adaptable Flow Aggregation Method for reducing control traffic on Software Defined wireless Networks. PerCom Workshops 2017: 363-368 - 2015
- [j6]Yuzo Taenaka, Masaki Tagawa, Kazuya Tsukamoto:
An Experimental Approach to Examine a Multi-Channel Multi-Hop Wireless Backbone Network. Informatica (Slovenia) 39(4) (2015) - [c12]Yuzo Taenaka, Kazuya Tsukamoto:
A Radio Interference Aware Dynamic Channel Utilization Method on Software Defined WMN. 3PGCIC 2015: 736-741 - 2014
- [j5]Yuzo Taenaka, Shigeru Kashihara
, Kazuya Tsukamoto, Suguru Yamaguchi, Yuji Oie:
An implementation design of a cross-layer handover method with multi-path transmission for VoIP communication. Ad Hoc Networks 13: 462-475 (2014) - [j4]Shinnosuke Yamaguchi, Yuzo Taenaka, Yuki Toyosaka, Yoshimasa Ohnishi, Kazunori Nishino, Yoshimi Fukumura:
The Distribution Method of the High Resolution Video for a Blackboard Based Lecture. Int. J. Technol. Educ. Mark. 4(2): 28-42 (2014) - [c11]Yuzo Taenaka, Masaki Tagawa, Kazuya Tsukamoto:
Experimental Deployment of a Multi-channel Wireless Backbone Network Based on an Efficient Traffic Management Framework. 3PGCIC 2014: 579-584 - [c10]Jane Louie Fresco Zamora, Noriyuki Suzuki, Hiroaki Takemoto, Shigeru Kashihara
, Yuzo Taenaka, Suguru Yamaguchi:
Battery-saving message collection method for disrupted communication service areas. CCNC 2014: 113-118 - [c9]Jane Louie Fresco Zamora, Naoya Sawada, Takemi Sahara, Shigeru Kashihara
, Yuzo Taenaka, Suguru Yamaguchi:
Surface weather observation via distributed devices. I2MTC 2014: 1405-1410 - [c8]Masaki Tagawa, Yutaro Wada, Yuzo Taenaka, Kazuya Tsukamoto:
Network capacity expansion methods based on efficient channel utilization for multi-channel wireless backbone network. ICCCN 2014: 1-6 - [c7]Yuzo Taenaka, Kazuya Tsukamoto:
An Adaptive Channel Utilization Method with Traffic Balancing for Multi-hop Multi-channel Wireless Backbone Network. IoT360 (2) 2014: 241-247 - 2013
- [j3]Kazuya Tsukamoto, Shigeru Kashihara
, Yuzo Taenaka, Yuji Oie:
An efficient handover decision method based on frame retransmission and data rate for multi-rate WLANs. Ad Hoc Networks 11(1): 324-338 (2013) - [j2]Yuzo Taenaka, Kazuya Tsukamoto, Shigeru Kashihara
, Suguru Yamaguchi, Yuji Oie:
An Implementation Design of a WLAN Handover Method Based on Cross-Layer Collaboration for TCP Communication. IEICE Trans. Commun. 96-B(7): 1716-1726 (2013) - [c6]Daisuke Miyamoto, Toshiyuki Miyachi, Yuzo Taenaka, Hiroaki Hazeyama:
PhishCage: reproduction of fraudulent websites in the emulated internet. SimuTools 2013: 242-247 - 2011
- [c5]Zilu Liang
, Yuzo Taenaka, Takefumi Ogawa, Yasushi Wakahara:
Pro-Reactive Route Recovery with Automatic Route Shortening in Wireless Ad Hoc Networks. ISADS 2011: 57-64 - 2010
- [c4]Kazuya Tsukamoto, Yuji Oie, Shigeru Kashihara
, Yuzo Taenaka:
Seamless handover management scheme under multi-rate WLANs. MoMM 2010: 148-158
2000 – 2009
- 2009
- [j1]Yuzo Taenaka, Shigeru Kashihara
, Kazuya Tsukamoto, Suguru Yamaguchi, Yuji Oie:
Proactive AP Selection Method Considering the Radio Interference Environment. IEICE Trans. Inf. Syst. 92-D(10): 1867-1876 (2009) - [c3]Yuzo Taenaka, Shigeru Kashihara
, Youki Kadobayashi, Suguru Yamaguchi:
Wireless Measurement Framework to Survey an Area with Required Communication Quality. AINA Workshops 2009: 439-446 - 2007
- [c2]Yuzo Taenaka, Shigeru Kashihara
, Kazuya Tsukamoto, Youki Kadobayashi, Yuji Oie:
Design and Implementation of Cross-layer Architecture for Seamless VoIP Handover. MASS 2007: 1-6 - [c1]Yuzo Taenaka, Shigeru Kashihara
, Kazuya Tsukamoto, Suguru Yamaguchi, Yuji Oie:
Terminal-centric ap selection algorithm based on frame retransmissions. PM2HW2N 2007: 128-131
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-18 18:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint