default search action
Shoichi Saito
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c27]Hiroki Inayoshi, Shohei Kakei, Shoichi Saito:
Detection of Inconsistencies between Guidance Pages and Actual Data Collection of Third-party SDKs in Android Apps. MOBILESoft@ICSE 2024: 43-53 - 2023
- [j8]Hiroki Inayoshi, Shohei Kakei, Shoichi Saito:
Execution Recording and Reconstruction for Detecting Information Flows in Android Apps. IEEE Access 11: 10730-10750 (2023) - [j7]Shohei Kakei, Hiroaki Seko, Yoshiaki Shiraishi, Shoichi Saito:
Design of Enclosing Signing Keys by All Issuers in Distributed Public Key Certificate-Issuing Infrastructure. IEICE Trans. Inf. Syst. 106(9): 1495-1498 (2023) - 2022
- [j6]Keigo Taga, Junjun Zheng, Koichi Mouri, Shoichi Saito, Eiji Takimoto:
Firewall Traversal Method by Pseudo-TCP Encapsulation. IEICE Trans. Inf. Syst. 105-D(1): 105-115 (2022) - [j5]Hiroki Inayoshi, Shohei Kakei, Eiji Takimoto, Koichi Mouri, Shoichi Saito:
Value-utilized taint propagation: toward precise detection of apps' information flows across Android API calls. Int. J. Inf. Sec. 21(5): 1127-1149 (2022) - [c26]Hiroki Inayoshi, Shohei Kakei, Shoichi Saito:
Plug and Analyze: Usable Dynamic Taint Tracker for Android Apps. SCAM 2022: 24-34 - [c25]Shohei Kakei, Yoshiaki Shiraishi, Shoichi Saito:
Granting Access Privileges Using OpenID Connect in Permissioned Distributed Ledgers. SecureComm 2022: 290-308 - 2021
- [c24]Hiroki Inayoshi, Shohei Kakei, Eiji Takimoto, Koichi Mouri, Shoichi Saito:
VTDroid: Value-based Tracking for Overcoming Anti-Taint-Analysis Techniques in Android Apps. ARES 2021: 29:1-29:6 - [c23]Moeka Yamamoto, Shohei Kakei, Shoichi Saito:
FirmPot: A Framework for Intelligent-Interaction Honeypots Using Firmware of IoT Devices. CANDAR (Workshops) 2021: 405-411 - [c22]Shohei Kakei, Yoshiaki Shiraishi, Shoichi Saito:
Simplifying Dynamic Public Key Certificate Graph for Certification Path Building in Distributed Public Key Infrastructure. ICTC 2021: 545-550 - 2020
- [j4]Shohei Kakei, Yoshiaki Shiraishi, Masami Mohri, Toru Nakamura, Masayuki Hashimoto, Shoichi Saito:
Cross-Certification Towards Distributed Authentication Infrastructure: A Case of Hyperledger Fabric. IEEE Access 8: 135742-135757 (2020) - [j3]Hayato Itoh, Yukitaka Nimura, Yuichi Mori, Masashi Misawa, Shin-ei Kudo, Kinichi Hotta, Kazuo Ohtsuka, Shoichi Saito, Yutaka Saito, Hiroaki Ikematsu, Yuichiro Hayashi, Masahiro Oda, Kensaku Mori:
Robust endocytoscopic image classification based on higher-order symmetric tensor analysis and multi-scale topological statistics. Int. J. Comput. Assist. Radiol. Surg. 15(12): 2049-2059 (2020)
2010 – 2019
- 2019
- [j2]Manabu Takamatsu, Noriko Yamamoto, Hiroshi Kawachi, Akiko Chino, Shoichi Saito, Masashi Ueno, Yuichi Ishikawa, Yutaka Takazawa, Kengo Takeuchi:
Prediction of early colorectal cancer metastasis by machine learning using digital slide images. Comput. Methods Programs Biomed. 178: 155-161 (2019) - [c21]Hiroki Inayoshi, Shohei Kakei, Eiji Takimoto, Koichi Mouri, Shoichi Saito:
Prevention of Data Leakage due to Implicit Information Flows in Android Applications. AsiaJCIS 2019: 103-110 - 2018
- [c20]Hiroki Ogawa, Eiji Takimoto, Koichi Mouri, Shoichi Saito:
User-Side Updating of Third-Party Libraries for Android Applications. CANDAR Workshops 2018: 452-458 - 2017
- [c19]Toshiki Takeuchi, Koichi Mouri, Shoichi Saito:
Mocha: Automatically Applying Content Security Policy to HTML Hybrid Application on Android Device. CANDAR 2017: 503-509 - 2016
- [c18]Kohei Sato, Koichi Mouri, Shoichi Saito:
Design and Implementation of an Application State Migration Mechanism between Android Devices. CANDAR 2016: 696-700 - 2015
- [j1]Shin Muramatsu, Ryota Kawashima, Shoichi Saito, Hiroshi Matsuo, Hiroki Nakayama, Tsunemasa Hayashi:
A Software Approach of Controlling the CPU Resource Assignment in Network Virtualization. IEICE Trans. Commun. 98-B(11): 2171-2179 (2015) - 2014
- [c17]Shin Muramatsu, Ryota Kawashima, Shoichi Saito, Hiroshi Matsuo:
VSE: Virtual Switch Extension for Adaptive CPU Core Assignment in Softirq. CloudCom 2014: 923-928 - [c16]Hirotaka Itoh, Yuma Itoh, Kenji Funahashi, Daisuke Yamamoto, Shoichi Saito, Hiroshi Matsuo, Ichi Takumi:
Forecasting students' future academic records using Bayesian network. SCIS&ISIS 2014: 458-462 - 2013
- [c15]Satoshi Fukuda, Ryota Kawashima, Shoichi Saito, Hiroshi Matsuo:
Improving Response Time for Cassandra with Query Scheduling. CANDAR 2013: 128-133 - [c14]Kazuki Yamazaki, Ryota Kawashima, Shoichi Saito, Hiroshi Matsuo:
Implementation and Evaluation of the JobTracker Initiative Task Scheduling on Hadoop. CANDAR 2013: 622-626 - [c13]Hirotaka Itoh, Yuma Itoh, Kenji Funahashi, Daisuke Yamamoto, Shoichi Saito, Ichi Takumi, Hiroshi Matsuo:
Forecasting Students' Future Academic Records Using Past Attendance Recording Data and Grade Data. KES 2013: 921-927 - [c12]Kenji Yoshida, Shoichi Saito, Koichi Mouri, Hiroshi Matsuo:
Orthros: A High-Reliability Operating System with Transmigration of Processes. PRDC 2013: 318-327 - 2012
- [c11]Shiori Kurazumi, Tomoaki Tsumura, Shoichi Saito, Hiroshi Matsuo:
Dynamic Processing Slots Scheduling for I/O Intensive Jobs of Hadoop MapReduce. ICNC 2012: 288-292 - 2011
- [c10]Hiroyuki Tanaka, Shoichi Saito, Hiroshi Matsuo:
Removing directory servers from anonymous communication systems using ID-Based Encryption to improve scalability. WorldCIS 2011: 79-84 - 2010
- [c9]Yudai Kato, Yuji Makimoto, Hironori Shirai, Hiromi Shimizu, Yusuke Furuya, Shoichi Saito, Hiroshi Matsuo:
Monitoring Library Function-based Intrusion Prevention System with Continuing Execution Mechanism. EUC 2010: 548-554
2000 – 2009
- 2009
- [c8]Masaki Kondo, Shoichi Saito, Kiyohisa Ishiguro, Hiroyuki Tanaka, Hiroshi Matsuo:
Bifrost : A Novel Anonymous Communication System with DHT. PDCAT 2009: 324-329 - 2003
- [c7]Hirofumi Nobuhara, Masaaki Mineo, Tetsutaro Uehara, Shoichi Saito, Yoshitoshi Kunieda:
Design and Implementation of the Loop Restructuring Feature for the MIRAI Parallelizing Complier. PDPTA 2003: 1134-1140 - 2002
- [c6]Ichi Takumi, Shoichi Saito, Akio Shimura, Masayasu Hata, Hiroshi Yasukawa:
Estimation of EM radiation source in ELF band. IGARSS 2002: 3551-3553 - [c5]Shoichi Saito:
A Genetic Algorithm by Use of Virus Evolutionary Theory for Combinatorial Problems. PDPTA 2002: 222-227 - [c4]Masaaki Mineo, Satoshi Yokote, Tetsutaro Uehara, Shoichi Saito, Yoshitoshi Kunieda:
An Automatic Parallelizing Compiler MIRAI with Data Distribution Function and its Runtime Support System Fagus for Distributed Memory Architecture. PDPTA 2002: 1451-1457 - [c3]Kazuya Okuno, Satoshi Yokote, Shoichi Saito, Tetsutaro Uehara, Yoshitoshi Kunieda:
A Wavefront Method on Distributed Shared Memory Systems for Protein Homology Analysis. PDPTA 2002: 1458-1464 - 2000
- [c2]Shoichi Saito, Akihito Hayashi, Tetsutaro Uehara, Kazuki Joe, Yoshitoshi Kunieda:
Wind : a Low-Costs Communication Module for Software DSM Systems. PDPTA 2000
1990 – 1999
- 1999
- [c1]Tetsutaro Uehara, Shoichi Saito, Kazuki Joe, Yoshitoshi Kunieda:
The Design and Implementation of cc-COMA as a Platform for Distributed-Memory Machines. PDPTA 1999: 1946-1952
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint