default search action
Yuichi Sei
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Keiichiro Oishi, Yuichi Sei, J. Andrew, Yasuyuki Tahara, Akihiko Ohsuga:
Algorithm to satisfy l-diversity by combining dummy records and grouping. Secur. Priv. 7(3) (2024) - [c87]Yuki Saito, Shusaku Egami, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
An Analysis of Knowledge Representation for Anime Recommendation Using Graph Neural Networks. ICAART (2) 2024: 243-252 - [c86]Natsumi Baba, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Proposal of a Cosmetic Product Recommendation Method with Review Text that is Predicted to Be Write by Users. ICAART (3) 2024: 609-616 - [c85]Akira Nakagawa, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Analysis of the Echo Chamber Caused by Unexpected Opinions. ICICT 2024: 20-26 - [c84]Koki Miyauchi, Ryohei Orihara, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Hollowed-Out Icon Colorization with Controllable Diffusion Model. ICICT 2024: 204-210 - [c83]Jianglin Xu, Ryohei Orihara, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Analysis of Conditional Image Generation Methods Using Color Palettes in Animal Personification Task. ICICT 2024: 514-521 - 2023
- [j29]Takao Murakami, Yuichi Sei:
Automatic Tuning of Privacy Budgets in Input-Discriminative Local Differential Privacy. IEEE Internet Things J. 10(18): 15990-16005 (2023) - [j28]Andrew J, Deva Priya Isravel, K. Martin Sagayam, Bharat Bhushan, Yuichi Sei, Jennifer Eunice:
Blockchain for healthcare systems: Architecture, security challenges, trends and future directions. J. Netw. Comput. Appl. 215: 103633 (2023) - [j27]Jennifer Eunice, J. Andrew Onesimu, Yuichi Sei, D. Jude Hemanth:
Sign2Pose: A Pose-Based Approach for Gloss Prediction Using a Transformer Model. Sensors 23(5): 2853 (2023) - [j26]Yuichi Sei, J. Andrew Onesimu, Hiroshi Okumura, Akihiko Ohsuga:
Privacy-Preserving Collaborative Data Collection and Analysis With Many Missing Values. IEEE Trans. Dependable Secur. Comput. 20(3): 2158-2173 (2023) - [c82]Tetsumaru Akatsuka, Ryohei Orihara, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Estimation of Unmasked Face Images Based on Voice and 3DMM. AI (1) 2023: 239-251 - [c81]Kotaro Koseki, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Generation of Facial Images Reflecting Speaker Attributes and Emotions Based on Voice Input. ICAART (2) 2023: 99-105 - [c80]Ami Yamamoto, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Predicting Visual Importance of Mobile UI Using Semantic Segmentation. ICAART (3) 2023: 260-266 - [c79]Syuusuke Ishihata, Ryohei Orihara, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Background Image Editing with HyperStyle and Semantic Segmentation. ICAART (3) 2023: 293-300 - [c78]Akimasa Murata, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Proposal of a Signal Control Method Using Deep Reinforcement Learning with Pedestrian Traffic Flow. ICAART (3) 2023: 319-325 - [c77]Soichiro Takata, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Diverse Level Generation for Tile-Based Video Game using Generative Adversarial Networks from Few Samples. ICAART (3) 2023: 326-333 - [c76]So Honda, Ryohei Orihara, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
GAN Inversion with Editable StyleMap. ICAART (3) 2023: 389-396 - [c75]Takumi Takei, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Rumor Detection in Tweets Using Graph Convolutional Networks. ICAART (3) 2023: 397-404 - [c74]Takuro Hada, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Detection of Compound-Type Dark Jargons Using Similar Words. ICAART (1) 2023: 427-437 - [c73]Risa Sugai, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
A k-Anonymization Method for Social Network Data with Link Prediction. ICISSP 2023: 493-500 - [c72]Minami Yoda, Shigeo Nakamura, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
A Middleware to Improve Analysis Coverage in IoT Vulnerability Detection. IoTaIS 2023: 103-107 - [c71]Keiichiro Oishi, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Federated Learning Algorithm Handling Missing Attributes. IoTaIS 2023: 146-151 - 2022
- [j25]Yuichi Sei, Akihiko Ohsuga:
Private True Data Mining: Differential Privacy Featuring Errors to Manage Internet-of-Things Data. IEEE Access 10: 8738-8757 (2022) - [j24]Yuichi Sei, J. Andrew Onesimu, Akihiko Ohsuga:
Machine Learning Model Generation With Copula-Based Synthetic Dataset for Local Differentially Private Numerical Data. IEEE Access 10: 101656-101671 (2022) - [j23]Yuichi Sei, Hiroshi Okumura, Akihiko Ohsuga:
Re-Identification in Differentially Private Incomplete Datasets. IEEE Open J. Comput. Soc. 3: 62-72 (2022) - [j22]Yuichi Sei, Akihiko Ohsuga:
Local Differential Privacy for Person-to-Person Interactions. IEEE Open J. Comput. Soc. 3: 304-312 (2022) - [j21]Yuichi Sei, Akihiko Ohsuga:
False Event Message Detection Robust to Burst Attacks in Wireless Sensor Networks. IEEE Open J. Commun. Soc. 3: 1630-1642 (2022) - [c70]Minami Yoda, Shuji Sakuraba, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Detection of Plaintext Login Information in Firmware. ICCE-TW 2022: 523-524 - [c69]Minami Yoda, Shuji Sakuraba, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Detecting Hardcoded Login Information from User Input. ICCE 2022: 1-2 - [c68]Minami Yoda, Shuji Sakuraba, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Proposal of a Middleware to Support Development of IoT Firmware Analysis Tools. JCKBSE 2022: 3-14 - 2021
- [j20]Yuichi Sei, Akihiko Ohsuga:
Privacy-preserving chi-squared test of independence for small samples. BioData Min. 14(1): 6 (2021) - [j19]Satoru Mizusawa, Yuichi Sei, Ryohei Orihara, Akihiko Ohsuga:
Computed tomography image reconstruction using stacked U-Net. Comput. Medical Imaging Graph. 90: 101920 (2021) - [j18]Tomoki Chiba, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
A Countermeasure Method Using Poisonous Data Against Poisoning Attacks on IoT Machine Learning. Int. J. Semantic Comput. 15(2): 215-240 (2021) - [j17]Yuichi Sei, Akihiko Ohsuga:
Count Estimation With a Low-Accuracy Machine Learning Model. IEEE Internet Things J. 8(8): 7079-7088 (2021) - [j16]J. Andrew Onesimu, J. Karthikeyan, Yuichi Sei:
An efficient clustering-based anonymization scheme for privacy-preserving data collection in IoT based healthcare services. Peer-to-Peer Netw. Appl. 14(3): 1629-1649 (2021) - [c67]Takashi Abe, Ryohei Orihara, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Acquisition of Cooperative Behavior in a Soccer Task Using Reward Shaping. ICIAI 2021: 145-150 - [c66]Yuta Yanagi, Ryohei Orihara, Yasuyuki Tahara, Yuichi Sei, Akihiko Ohsuga:
Classifying COVID-19 Conspiracy Tweets with Word Embedding and BERT. MediaEval 2021 - [c65]Shuji Sakuraba, Minami Yoda, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Improvement of Legitimate Mail Server Detection Method using Sender Authentication. SERA 2021: 10-14 - 2020
- [j15]Keiichiro Oishi, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Semantic diversity: Privacy considering distance between values of sensitive attribute. Comput. Secur. 94: 101823 (2020) - [j14]Yuichi Sei:
Foreword. IEICE Trans. Inf. Syst. 103-D(12): 2530 (2020) - [j13]Yuto Tsukagoshi, Takahiro Kawamura, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Knowledge Graph Completion to Solve University Campus Issues. J. Data Intell. 1(3): 333-350 (2020) - [j12]Yuichi Sei, Akihiko Ohsuga:
Differentially Private Mobile Crowd Sensing Considering Sensing Errors. Sensors 20(10): 2785 (2020) - [c64]Yuto Tsukagoshi, Shusaku Egami, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Ontology-Based Correlation Detection Among Heterogeneous Data Sets: A Case Study of University Campus Issues. AIKE 2020: 33-40 - [c63]Tomoki Chiba, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
A Defense Method against Poisoning Attacks on IoT Machine Learning Using Poisonous Data. AIKE 2020: 100-107 - [c62]Tatsuki Fujii, Ryohei Orihara, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Generating Cooking Recipes from Cooking Videos Using Deep Learning Considering Previous Process with Video Encoding. APPIS 2020: 21:1-21:5 - [c61]Toyoaki Kuwahara, Ryohei Orihara, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Model Smoothing using Virtual Adversarial Training for Speech Emotion Estimation using Spontaneity. ICAART (2) 2020: 570-577 - [c60]Masashi Aizawa, Ryohei Orihara, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Hair Shading Style Transfer for Manga with cGAN. ICAART (2) 2020: 587-594 - [c59]Krishna Priawan Hardinda, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Adaptation Plan Policy in Traffic Routing for Priority Vehicle. ICAIIC 2020: 113-118
2010 – 2019
- 2019
- [j11]Tatsuki Fujii, Yuichi Sei, Yasuyuki Tahara, Ryohei Orihara, Akihiko Ohsuga:
"Never fry carrots without chopping" Generating Cooking Recipes from Cooking Videos Using Deep Learning Considering Previous Process. Int. J. Networked Distributed Comput. 7(3): 107-112 (2019) - [j10]Masashi Aizawa, Yuichi Sei, Yasuyuki Tahara, Ryohei Orihara, Akihiko Ohsuga:
Do You Like Sclera? Sclera-region Detection and Colorization for Anime Character Line Drawings. Int. J. Networked Distributed Comput. 7(3): 113-120 (2019) - [j9]Yuichi Sei, Hiroshi Okumura, Takao Takenouchi, Akihiko Ohsuga:
Anonymization of Sensitive Quasi-Identifiers for l-Diversity and t-Closeness. IEEE Trans. Dependable Secur. Comput. 16(4): 580-593 (2019) - [c58]Minami Yoda, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Mis.Config: Finding Misreferred Configuration Bugs in Web Application Using Thin Slicing. ICIS (best papers) 2019: 47-64 - [c57]Satoru Yamagata, Hiroyuki Nakagawa, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Self-Adaptation for Heterogeneous Client-Server Online Games. ICIS (best papers) 2019: 65-79 - [c56]Shota Imai, Yuichi Sei, Yasuyuki Tahara, Ryohei Orihara, Akihiko Ohsuga:
Multi-task Deep Reinforcement Learning with Evolutionary Algorithm and Policy Gradients Method in 3D Control Tasks. BCD (selected papers) 2019: 19-32 - [c55]Toyoaki Kuwahara, Yuichi Sei, Yasuyuki Tahara, Ryohei Orihara, Akihiko Ohsuga:
Model Smoothing Using Virtual Adversarial Training for Speech Emotion Estimation. BCD 2019: 60-64 - [c54]Shota Imai, Yuichi Sei, Yasuyuki Tahara, Ryohei Orihara, Akihiko Ohsuga:
Multi-task Deep Reinforcement Learning with Evolutionary Algorithm and Policy Gradients Method in 3D Control Tasks. BCD 2019: 100-105 - [c53]Masashi Aizawa, Yuichi Sei, Yasuyuki Tahara, Ryohei Orihara, Akihiko Ohsuga:
Do You Like the Sclera?: Sclera-Region Detection in Line Drawings for Automated Colorization. BCD 2019: 118-123 - [c52]Tatsuki Fujii, Yuichi Sei, Yasuyuki Tahara, Ryohei Orihara, Akihiko Ohsuga:
"Never fry carrots without cutting." Cooking Recipe Generation from Videos Using Deep Learning Considering Previous Process. BCD 2019: 124-129 - [c51]Fumika Okuhara, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Generation of Multiple Choice Questions Including Panoramic Information using Linked Data. ICAART (1) 2019: 110-120 - [c50]Kenji Yasuda, Ryohei Orihara, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Transforming the Emotion in Speech using a Generative Adversarial Network. ICAART (2) 2019: 427-434 - [c49]Masatoshi Kanbata, Ryohei Orihara, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
New Indicator for Centrality Measurements in Passing-network Analysis of Soccer. ICAART (2) 2019: 616-623 - [c48]Yuto Tsukagoshi, Takahiro Kawamura, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Knowledge Graph of University Campus Issues and Application of Completion Methods. iiWAS 2019: 304-312 - [c47]Tomoki Chiba, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Trajectory Anonymization: Balancing Usefulness about Position Information and Timestamp. NTMS 2019: 1-6 - 2018
- [c46]Hidenori Kato, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Agent-based Simulation Model Embedded Accounting's Purchase Method; Analysis on the Systemic Risk of Mergers and Acquisitions between Financial Institutions. ICAART (1) 2018: 168-175 - [c45]Fumiya Yamashita, Ryohei Orihara, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Factors Affecting Accuracy in Image Translation based on Generative Adversarial Network. ICAART (2) 2018: 446-453 - [c44]Takaya Koizumi, Ryohei Orihara, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Do Professional Football Players Follow the Optimal Strategies in Penalty Shootout? ICAART (2) 2018: 454-461 - [c43]Yuki Ina, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Anonymization and Analysis of Horizontally and Vertically Divided User Profile Databases with Multiple Sensitive Attributes. SOLI 2018: 262-267 - 2017
- [j8]Yuichi Sei, Akihiko Ohsuga:
Differential Private Data Collection and Analysis Based on Randomized Multiple Dummies for Untrusted Mobile Crowdsensing. IEEE Trans. Inf. Forensics Secur. 12(4): 926-939 (2017) - [j7]Yuichi Sei, Akihiko Ohsuga:
Location Anonymization With Considering Errors and Existence Probability. IEEE Trans. Syst. Man Cybern. Syst. 47(12): 3207-3218 (2017) - [c42]Yuichi Sei, Akihiko Ohsuga:
Privacy-preserving Chi-squared testing for genome SNP databases. EMBC 2017: 3884-3889 - [c41]Minato Sato, Ryohei Orihara, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Text Classification and Transfer Learning Based on Character-Level Deep Convolutional Neural Networks. ICAART (Revised Selected Papers) 2017: 62-81 - [c40]Yusuke Sekii, Ryohei Orihara, Keisuke Kojima, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Fast Many-to-One Voice Conversion using Autoencoders. ICAART (2) 2017: 164-174 - [c39]Minato Sato, Ryohei Orihara, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Japanese Text Classification by Character-level Deep ConvNets and Transfer Learning. ICAART (2) 2017: 175-184 - [c38]Motoko Suzuki, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
An Observation of Behavioral Changes of Indoor Dogs in Response to Caring Behavior by Humanoid Robots - Can Dogs and Robots Be Companions?. ICAART (2) 2017: 481-488 - [c37]Shota Suzuki, Ryohei Orihara, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Sarcasm Detection Method to Improve Review Analysis. ICAART (2) 2017: 519-526 - [c36]Ryohei Kozu, Takahiro Kawamura, Shusaku Egami, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
User Participatory Construction of Open Hazard Data for Preventing Bicycle Accidents. JIST 2017: 289-303 - [c35]Keiichiro Oishi, Yasuyuki Tahara, Yuichi Sei, Akihiko Ohsuga:
Proposal of l-diversity algorithm considering distance between sensitive attribute values. SSCI 2017: 1-8 - 2016
- [j6]Yuta Ohwatari, Takahiro Kawamura, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Estimation of Interpersonal Relationships in Movies. IEICE Trans. Inf. Syst. 99-D(1): 128-137 (2016) - [j5]Kazuhiro Tashiro, Takahiro Kawamura, Yuichi Sei, Hiroyuki Nakagawa, Yasuyuki Tahara, Akihiko Ohsuga:
Iterative Improvement of Human Pose Classification Using Guide Ontology. IEICE Trans. Inf. Syst. 99-D(1): 236-247 (2016) - [j4]Teruyuki Iijima, Takahiro Kawamura, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Sake Selection Support Application for Countryside Tourism. Trans. Large Scale Data Knowl. Centered Syst. 27: 19-30 (2016) - [j3]Shusaku Egami, Takahiro Kawamura, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
A Solution to Visualize Open Urban Data for Illegally Parked Bicycles. Trans. Large Scale Data Knowl. Centered Syst. 27: 129-141 (2016) - [c34]Yuichi Sei, Akihiko Ohsuga:
Privacy Preservation for Participatory Sensing Applications. AINA 2016: 653-660 - [c33]Yuichi Sei, Hiroshi Okumura, Akihiko Ohsuga:
Privacy-Preserving Publication of Deep Neural Networks. HPCC/SmartCity/DSS 2016: 1418-1425 - [c32]Shusaku Egami, Takahiro Kawamura, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Schema Design of Illegally Parked Bicycles LOD. IIAI-AAI 2016: 692-697 - [c31]Yuri Uehara, Takahiro Kawamura, Shusaku Egami, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Linked Data Collection and Analysis Platform of Audio Features. JIST (Workshops & Posters) 2016: 78-81 - [c30]Yuri Uehara, Takahiro Kawamura, Shusaku Egami, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Linked Data Collection and Analysis Platform for Music Information Retrieval. JIST 2016: 127-135 - 2015
- [j2]Yuichi Sei, Akihiko Ohsuga:
Malicious Node Detection in Mobile Wireless Sensor Networks. J. Inf. Process. 23(4): 476-487 (2015) - [c29]Shogo Higuchi, Ryohei Orihara, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Decision Making Strategy Based on Time Series Data of Voting Behavior. Australasian Conference on Artificial Intelligence 2015: 229-241 - [c28]Tomoaki Ueda, Ryohei Orihara, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Towards the Elimination of the Miscommunication Between Users in Twitter - Tweet Classification Based on Expected Responses by User. Australasian Conference on Artificial Intelligence 2015: 589-595 - [c27]Tatsuya Kiyohara, Ryohei Orihara, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Activity Recognition for Dogs Using Off-the-Shelf Accelerometer. ICAART (2) 2015: 100-110 - [c26]Tatsuya Kiyohara, Ryohei Orihara, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Activity Recognition for Dogs Based on Time-series Data Analysis. ICAART (Revised Selected Papers) 2015: 163-184 - [c25]Yuta Ohwatari, Takahiro Kawamura, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Estimation of character diagram from open-movie databases for cultural understanding. ICSC 2015: 208-215 - [c24]Yuichi Sei, Takao Takenouchi, Akihiko Ohsuga:
(l1, ..., lq)-diversity for Anonymizing Sensitive Quasi-Identifiers. TrustCom/BigDataSE/ISPA (1) 2015: 596-603 - 2014
- [j1]Mian Wang, Takahiro Kawamura, Yuichi Sei, Hiroyuki Nakagawa, Yasuyuki Tahara, Akihiko Ohsuga:
Music Recommender Adapting Implicit Context Using 'renso' Relation among Linked Data. J. Inf. Process. 22(2): 279-288 (2014) - [c23]Kyosuke Ikejiri, Yuichi Sei, Hiroyuki Nakagawa, Yasuyuki Tahara, Akihiko Ohsuga:
Surprising Recipe Extraction based on Rarity and Generality of Ingredients. ICAART (1) 2014: 428-436 - [c22]Yuki Iwasaki, Ryohei Orihara, Yuichi Sei, Hiroyuki Nakagawa, Yasuyuki Tahara, Akihiko Ohsuga:
Identification of Flaming and Its Applications in CGM - Case Studies toward Ultimate Prevention. ICAART (1) 2014: 639-644 - [c21]Yuta Ohwatari, Takahiro Kawamura, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Estimation of Character Diagram from Open Movie Database Using Markov Logic Network. JIST (Workshops & Posters) 2014: 124-127 - [c20]Ryohei Yoko, Takahiro Kawamura, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
News Recommendation based on Semantic Relations between Events. JIST (Workshops & Posters) 2014: 128-131 - [c19]Yuichi Sei, Akihiko Ohsuga:
Locating Malicious Agents in Mobile Wireless Sensor Networks. PRIMA 2014: 206-221 - [c18]Hiroki Horita, Kozo Honda, Yuichi Sei, Hiroyuki Nakagawa, Yasuyuki Tahara, Akihiko Ohsuga:
Transformation approach from KAOS goal models to BPMN models using refinement patterns. SAC 2014: 1023-1024 - [c17]Hiroyuki Nakagawa, Takumitsu Kudo, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Towards Software Evolution for Embedded Systems Based on MAPE Loop Encapsulation. SASO 2014: 203-204 - [c16]Yuichi Sei, Akihiko Ohsuga:
Randomized Addition of Sensitive Attributes for l-diversity. SECRYPT 2014: 350-360 - [c15]Satoru Yamagata, Hiroyuki Nakagawa, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
A MAPE Loop Control Pattern for Heterogeneous Client/Server Online Games. SEKE 2014: 742-743 - [c14]Kazuhiro Tashiro, Takahiro Kawamura, Yuichi Sei, Hiroyuki Nakagawa, Yasuyuki Tahara, Akihiko Ohsuga:
Refinement of Ontology-Constrained Human Pose Classification. ICSC 2014: 60-67 - 2013
- [c13]Yuichi Sei, Akihiko Ohsuga:
False Event Detection for Mobile Sinks in Wireless Sensor Networks. EISIC 2013: 52-59 - [c12]Mian Wang, Takahiro Kawamura, Yuichi Sei, Hiroyuki Nakagawa, Yasuyuki Tahara, Akihiko Ohsuga:
Context-Aware Music Recommendation with Serendipity Using Semantic Relations. JIST 2013: 17-32 - [c11]Yutaka Yoshida, Kozo Honda, Yuichi Sei, Hiroyuki Nakagawa, Yasuyuki Tahara, Akihiko Ohsuga:
Towards Semi-Automatic Identification of Functional Requirements in Legal Texts for Public Administration. JURIX 2013: 175-184
2000 – 2009
- 2009
- [c10]Yuichi Sei, Shinichi Honiden:
Reporter node determination of replicated node detection in wireless sensor networks. ICUIMC 2009: 566-573 - [c9]Daisuke Fukuchi, Christian Sommer, Yuichi Sei, Shinichi Honiden:
Distributed Arrays: A P2P Data Structure for Efficient Logical Arrays. INFOCOM 2009: 1458-1466 - 2008
- [c8]Susumu Toriumi, Yuichi Sei, Shinichi Honiden:
Energy-efficient event detection in 3D wireless sensor networks. Wireless Days 2008: 1-5 - [c7]Yuichi Sei, Shinichi Honiden:
Distributed detection of node replication attacks resilient to many compromised nodes in wireless sensor networks. WICON 2008: 28 - 2007
- [c6]Yuichi Sei, Kazutaka Matsuzaki, Shinichi Honiden:
Flexible Bloom Filters for Searching Textual Objects. AP2PC 2007: 110-121 - [c5]Yuichi Sei, Shinichi Honiden:
Ringed Filters for Peer-to-Peer Keyword Searching. ICCCN 2007: 772-779 - [c4]Yuichi Sei, Shinichi Honiden:
Resilient Security for False Event Detection Without Loss of Legitimate Events in Wireless Sensor Networks. OTM Conferences (1) 2007: 454-470 - [c3]Daisuke Fukuchi, Yuichi Sei, Shinichi Honiden:
Managing Difference-Based Objects with Sub-networks in Peer-to-Peer Environments. OTM Workshops (2) 2007: 1001-1010 - 2006
- [c2]Yuichi Sei, Kazutaka Matsuzaki, Shinichi Honiden:
Reduction of the Communication Traffic for Multi-word Searches in DHTs. CIMCA/IAWTIC 2006: 14 - [c1]Yuichi Sei, Kazutaka Matsuzaki, Shinichi Honiden:
An Algorithm to Reduce the Communication Traffic for Multi-Word Searches in a Distributed Hash Table. IFIP TCS 2006: 115-129
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 18:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint