default search action
Satoshi Okada
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Kuniaki Kawabata
, Fumiaki Abe, Satoshi Okada, Takayuki Tanaka:
Special Issue on Robotic, Mechatronic and Information Systems for Decommissioning. J. Robotics Mechatronics 36(1): 7-8 (2024) - [j8]Naoaki Okuzumi, Kenji Matsuzaki, Satoshi Okada:
Development and Application of Robotics for Decommissioning of Fukushima Daiichi NPS by IRID. J. Robotics Mechatronics 36(1): 9-20 (2024) - [c15]Satoshi Okada
, Houda Jmila
, Kunio Akashi
, Takuho Mitsunaga
, Yuji Sekiya
, Hideki Takase
, Gregory Blanc
, Hiroshi Nakamura
:
XAI-driven Adversarial Attacks on Network Intrusion Detectors. EICC 2024: 65-73 - [c14]Taisei Matsumura, Satoshi Okada, Koki Watarai, Takuho Mitsunaga:
Explainable Anomaly Detection Method Using LLM Embeddings Model with SHAP. ICSPIS 2024: 1-5 - 2023
- [j7]Satoshi Okada, Nobuho Hashimoto, Takuho Mitsunaga
:
Efficient Matching Algorithms between Logs and Indicators for Automatic Incident Response System. J. Inf. Process. 31: 279-287 (2023) - [j6]Satoshi Okada, Kunio Akashi, Daisuke Miyamoto, Yuji Sekiya, Hideki Takase, Hiroshi Nakamura:
Memory-saving LDoS Attacker Detection Algorithms in Zigbee Network. J. Inf. Process. 31: 537-549 (2023) - [j5]Masaki Kuwano, Momoka Okuma, Satoshi Okada, Takuho Mitsunaga:
The Attacker Might Also Do Next: ATT&CK Behavior Forecasting by Attacker-based Collaborative Filtering and Graph Databases. J. Inf. Process. 31: 802-811 (2023) - [c13]Momoka Okuma, Koki Watarai, Satoshi Okada, Takuho Mitsunaga
:
Automated Mapping Method for Sysmon Logs to ATT&CK Techniques by Leveraging Atomic Red Team. ICSPIS 2023: 104-109 - 2021
- [c12]Satoshi Okada, Daisuke Miyamoto, Yuji Sekiya, Hideki Takase, Hiroshi Nakamura
:
LDoS Attacker Detection Algorithms in Zigbee Network. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2021: 43-50 - [c11]Satoshi Okada, Yuntao Wang
:
Recovery Attack on Bob's Reused Randomness in CRYSTALS-KYBER and SABER. ProvSec 2021: 155-173 - [c10]Satoshi Okada, Daisuke Miyamoto, Yuji Sekiya, Hiroshi Nakamura
:
New LDoS Attack in Zigbee Network and its Possible Countermeasures. SMARTCOMP 2021: 246-251 - 2020
- [j4]Satoshi Okada
, Satoko Takayasu, Shunsuke Tomita
, Yoshio Suzuki, Shinya Yamamoto
:
Development of Neutral pH-Responsive Microgels by Tuning Cross-Linking Conditions. Sensors 20(12): 3367 (2020) - [c9]Satoshi Okada, Yuntao Wang
, Tsuyoshi Takagi:
Improving Key Mismatch Attack on NewHope with Fewer Queries. ACISP 2020: 505-524 - [c8]Yu Shimizu, Junichiro Yoshimoto, Masahiro Takamura, Go Okada, Tomoya Matsumoto, Manabu Fuchikami, Satoshi Okada, Shigeru Morinobu, Yasumasa Okamoto, Shigeto Yamawaki, Kenji Doya:
Maximum Credibility Voting (MCV) An Integrative Approach for Accurate Diagnosis of Major Depressive Disorder from Clinically Readily Available Data. APSIPA 2020: 1023-1032 - [i2]Satoshi Okada, Yuntao Wang, Tsuyoshi Takagi:
Improving Key Mismatch Attack on NewHope with Fewer Queries. IACR Cryptol. ePrint Arch. 2020: 585 (2020) - [i1]Satoshi Okada, Yuntao Wang:
Key Recovery Attack on Bob's Secrets in CRYSTALS-KYBER and SABER. IACR Cryptol. ePrint Arch. 2020: 1503 (2020)
2010 – 2019
- 2013
- [c7]Hiroshi Kazato, Shinpei Hayashi
, Takashi Kobayashi
, Tsuyoshi Oshima, Satoshi Okada, Shunsuke Miyata, Takashi Hoshino, Motoshi Saeki:
Incremental Feature Location and Identification in Source Code. CSMR 2013: 371-374 - 2012
- [c6]Hiroshi Kazato, Shinpei Hayashi
, Satoshi Okada, Shunsuke Miyata, Takashi Hoshino, Motoshi Saeki:
Feature Location for Multi-Layer System Based on Formal Concept Analysis. CSMR 2012: 429-434 - [c5]Hiroshi Kazato, Shinpei Hayashi
, Satoshi Okada, Shunsuke Miyata, Takashi Hoshino, Motoshi Saeki:
Toward structured location of features. ICPC 2012: 255-256
2000 – 2009
- 2005
- [j3]Satoshi Okada, Ryoichi Shinkuma
, Tatsuro Takahashi:
An Application of Uplink Common Channel to Packet Relay in CDMA Radio Access Networks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(7): 1800-1808 (2005)
1990 – 1999
- 1996
- [c4]Katsuhiko Sato, Hisashi Hozumi, Satoshi Okada, Takao Itoh, Shigeru Kanemoto, Hideharu Okano:
Autonomous mobile patrol system for nuclear power plants: field test report of vehicle navigation and sensor positioning. IROS 1996: 743-750 - 1995
- [c3]Etsurou Igarashi, Katsuhiko Sato, Satoshi Okada, Hisashi Hozumi, Hideo Shimada, Hideharu Okano, Osamu Ozaki:
Hierarchical Autonomous Mobile Control System of a Patrol Robot for Nuclear Power Plants. ICRA 1995: 837-842 - 1993
- [j2]Ryoichi Nakayama, Hitoshi Iida, Hisashi Hozumi, Satoshi Okada, Hideharu Okano, Tatsuo Miyazawa:
Distributed Control System for Six-Legged Walking Robot. J. Robotics Mechatronics 5(6): 570-574 (1993) - [c2]Shinya Kotosaka, Hajime Asama, Hayato Kaetsu, Isao Endo, Katsuhiko Sato, Satoshi Okada, Ryoichi Nakayama:
Fault tolerance of a functionally adaptive and robust manipulator. IROS 1993: 294-300 - 1991
- [j1]Yoshinori Kuno
, Yasukazu Okamoto, Satoshi Okada:
Robot Vision Using a Feature Search Strategy Generated from a 3D Oobject Model. IEEE Trans. Pattern Anal. Mach. Intell. 13(10): 1085-1097 (1991) - 1990
- [c1]Yoshinori Kuno, Yasukazu Okamoto, Satoshi Okada:
Object recognition using a feature search strategy generated from a 3D model. ICCV 1990: 626-635
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-02 15:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint