default search action
Takumi Yamamoto
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Yukina Sato, Takashi Amesaka, Takumi Yamamoto, Hiroki Watanabe, Yuta Sugiura:
Exploring User-Defined Gestures as Input for Hearables and Recognizing Ear-Level Gestures with IMUs. Proc. ACM Hum. Comput. Interact. 8(MHCI): 1-23 (2024) - [c30]Takumi Yamamoto, Biyon Fernando, Takashi Amesaka, Anusha Withana, Yuta Sugiura:
Creating viewpoint-dependent display on Edible Cookies. AHs 2024: 286-289 - [c29]Hiyori Tsuji, Takumi Yamamoto, Sora Yamaji, Maiko Kobayashi, Kyoshiro Sasaki, Noriko Aso, Yuta Sugiura:
Smartphone-Based Teaching System for Neonate Soothing Motions. SII 2024: 178-183 - [c28]Naoharu Sawada, Takumi Yamamoto, Yuta Sugiura:
Converting Tatamis into Touch Sensors by Measuring Capacitance. SII 2024: 554-558 - 2023
- [j4]Takumi Yamamoto, Yuta Sugiura:
Turning carpets into multi-image switchable displays. Comput. Graph. 111: 190-198 (2023) - [j3]Tian Min, Chengshuo Xia, Takumi Yamamoto, Yuta Sugiura:
Seeing the Wind: An Interactive Mist Interface for Airflow Input. Proc. ACM Hum. Comput. Interact. 7(ISS): 398-419 (2023) - [c27]Naoharu Sawada, Takumi Yamamoto, Yuta Sugiura:
A Virtual Window Using Curtains and Image Projection. APMAR 2023 - [c26]Takumi Yamamoto, Ryohei Baba, Yuta Sugiura:
Augmented Sports of Badminton by Changing Opening Status of Shuttle's Feathers. APMAR 2023 - [c25]Sana Okumura, Tomoya Amagasa, Tsubasa Shibata, Takumi Yamamoto, Tadakazu Yamanaka, Tetsushi Ohki, Masakatsu Nishigaki:
Scheme for Selection of Deceptions as a Countermeasure for Insider Threats. BWCCA 2023: 109-121 - [c24]Riku Kitamura, Takumi Yamamoto, Yuta Sugiura:
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors. ISWC 2023: 92-97 - [c23]Takumi Yamamoto, Katsutoshi Masai, Anusha Withana, Yuta Sugiura:
Masktrap: Designing and Identifying Gestures to Transform Mask Strap into an Input Interface. IUI 2023: 762-775 - 2022
- [j2]Takumi Yamamoto, Yuta Sugiura:
A robotic system for images on carpet surface. Graph. Vis. Comput. 6: 200045 (2022) - [j1]Atsushi Oshiro, Naoki Nishigami, Takumi Yamamoto, Yosuke Nishida, Julian L. Webber, Masayuki Fujita, Tadao Nagatsuma:
PAM4 48-Gbit/s wireless communication using a resonant tunneling diode in the 300-GHz band. IEICE Electron. Express 19(2): 20210494 (2022) - [c22]Takumi Yamamoto, Aiko Iwasaki, Hajime Kobayashi, Kiyoto Kawauchi, Ayako Yoshimura:
A Study on Enhancing Anomaly Detection Technology with Synthetic-Log Generation. AINA (2) 2022: 528-538 - [c21]Takumi Yamamoto, Yuta Sugiura:
Demonstration of Multi-image Switchable Visual Displays Using Carpets. ISMAR Adjunct 2022: 893-894 - [c20]Takumi Yamamoto, Kento Ohtani, Tomoki Hayashi, Alexander Carballo, Kazuya Takeda:
Efficient Training Method for Point Cloud-Based Object Detection Models by Combining Environmental Transitions and Active Learning. RiTA 2022: 292-303 - 2020
- [c19]Kota Uehara, Hiroki Nishikawa, Takumi Yamamoto, Kiyoto Kawauchi, Masakatsu Nishigaki:
Analysis of the Relationship Between Psychological Manipulation Techniques and Both Personality Factors and Behavioral Characteristics in Targeted Email. AINA 2020: 1278-1290 - [c18]Hiroki Nishikawa, Takumi Yamamoto, Bret A. Harsham, Ye Wang, Kota Uehara, Chiori Hori, Aiko Iwasaki, Kiyoto Kawauchi, Masakatsu Nishigaki:
Analysis of Malicious Email Detection using Cialdini's Principles. AsiaJCIS 2020: 137-142
2010 – 2019
- 2019
- [c17]Kota Uehara, Kohei Mukaiyama, Masahiro Fujita, Hiroki Nishikawa, Takumi Yamamoto, Kiyoto Kawauchi, Masakatsu Nishigaki:
Basic Study on Targeted E-mail Attack Method Using OSINT. AINA 2019: 1329-1341 - [c16]Kota Uehara, Hiroki Nishikawa, Takumi Yamamoto, Kiyoto Kawauchi, Masakatsu Nishigaki:
Analysis of the Relationship Between Psychological Manipulation Techniques and Personality Factors in Targeted Emails. BWCCA 2019: 338-351 - 2016
- [c15]Takato Hirano, Takashi Ito, Yutaka Kawai, Nori Matsuda, Takumi Yamamoto, Tatsuji Munaka:
A practical attack to AINA2014's countermeasure for cancelable biometric authentication protocols. ISITA 2016: 315-319 - 2014
- [c14]Takumi Yamamoto, Kiyoto Kawauchi, Shoji Sakurai:
Proposal of a Method Detecting Malicious Processes. AINA Workshops 2014: 518-523 - 2011
- [c13]Takumi Yamamoto, Tokuichiro Suzuki, Masakatsu Nishigaki:
A Proposal of Four-Panel Cartoon CAPTCHA. AINA 2011: 159-166 - [c12]Kohei Nasaka, Tomohiro Takami, Takumi Yamamoto, Masakatsu Nishigaki:
A Keystroke Logger Detection Using Keyboard-Input-Related API Monitoring. NBiS 2011: 651-656 - [c11]Takehisa Kato, Kohei Nasaka, Takumi Yamamoto, Masakatsu Nishigaki:
A Study on a Practical Measure against Billing Frauds. NBiS 2011: 667-672 - 2010
- [c10]Takumi Yamamoto, J. Doug Tygar, Masakatsu Nishigaki:
CAPTCHA Using Strangeness in Machine Translation. AINA 2010: 430-437 - [c9]Takumi Yamamoto, Yuma Usui, Fumihiko Magata, Yoshimi Teshigawara, Ryôichi Sasaki, Masakatsu Nishigaki:
A Security Measure Selection Scheme with Consideration of Potential Lawsuits. Security and Management 2010: 104-110 - [c8]Takumi Yamamoto, Tokuichiro Suzuki, Masakatsu Nishigaki:
A Proposal of Four-Panel Cartoon CAPTCHA: The Concept. NBiS 2010: 575-578
2000 – 2009
- 2009
- [c7]Masakatsu Nishigaki, Takumi Yamamoto:
Making Use of Human Visual Capability to Improve Information Security. ARES 2009: 990-994 - [c6]Takumi Yamamoto, Atsushi Harada, Takeo Isarida, Masakatsu Nishigaki:
Advantages of User Authentication Using Unclear Images. AINA 2009: 668-674 - [c5]Takumi Yamamoto, Yuko Kojima, Masakatsu Nishigaki:
A Shoulder-Surfing-Resistant Image-Based Authentication System with Temporal Indirect Image Selection. Security and Management 2009: 188-194 - [c4]Taiki Sakashita, Yoichi Shibata, Takumi Yamamoto, Kenta Takahashi, Wakaha Ogata, Hiroaki Kikuchi, Masakatsu Nishigaki:
A Proposal of Efficient Remote Biometric Authentication Protocol. IWSEC 2009: 212-227 - 2008
- [c3]Takumi Yamamoto, Atsushi Harada, Takeo Isarida, Masakatsu Nishigaki:
Improvement of User Authentication Using Schema of Visual Memory: Exploitation of "Schema of Story". AINA 2008: 40-47 - 2007
- [c2]Takumi Yamamoto, Atsushi Harada, Takeo Isarida, Masakatsu Nishigaki:
Improvement of User Authentication Using Schema of Visual Memory: Guidance by Verbal Cue. Security and Management 2007: 58-64 - 2005
- [c1]Kosuke Sekiyama, Takumi Yamamoto:
Embodied Cognition in Directed Multi-Agent Systems - Empirical Study on Subjective Distance. AMiRE 2005: 293-298
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 19:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint