default search action
Kentaro Aburada
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j36]Naonobu Okazaki, Shotaro Usuzaki, Tsubasa Waki, Hyoga Kawagoe, Mirang Park, Hisaaki Yamaba, Kentaro Aburada:
Optimal Weighted Voting-Based Collaborated Malware Detection for Zero-Day Malware: A Case Study on VirusTotal and MalwareBazaar. Future Internet 16(8): 259 (2024) - [j35]Haruki Onaga, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki:
RAGESS: A Tool for Real-time Automatic Generation of SwiftDiagram to Support iOS Application Development. J. Robotics Netw. Artif. Life 10(4): 336-341 (2024) - [j34]Kanta Kakinoki, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki:
ASLA: Automatic Segmentation and Labeling by Deep Learning for Document Pictures. J. Robotics Netw. Artif. Life 10(4): 362-367 (2024) - 2023
- [j33]Ryo Masuzawa, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Naonobu Okazaki:
Development of keypads which use colors or shapes to prevent shoulder surfing. Artif. Life Robotics 28(4): 710-717 (2023) - [j32]Keita Nabeyama, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Naonobu Okazaki:
Tsunami evacuation simulation considering road width in Aoshima district. Artif. Life Robotics 28(4): 779-788 (2023) - [j31]Mochamad Chandra Saputra, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki, Satrio Agung Wicaksono:
Analysis of Self Determination Factors for Continuance Intention on Online Learning Management System. J. Robotics Netw. Artif. Life 10(1): 91-95 (2023) - 2022
- [j30]Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki:
Correction to: Proposal and evaluation for color constancy CAPTCHA. Artif. Life Robotics 27(1): 179 (2022) - [j29]Isakwisa Gaddy Tende, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Naonobu Okazaki:
Proposal for a blockchain based agricultural input voucher system. Artif. Life Robotics 27(3): 461-471 (2022) - [j28]Bayu Priyambadha, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki:
Detection of Blob and Feature Envy Smells in a Class Diagram using Class's Features. J. Robotics Netw. Artif. Life 9(1): 43-48 (2022) - [j27]Takahiro Ueda, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki:
Proposal of Gamma Which Is a Messaging Platform for Spatial Data. J. Robotics Netw. Artif. Life 9(2): 136-142 (2022) - [j26]Takafumi Muto, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki:
Expansion of Application Scope and Addition of a Function for Operations into BWDM which is an Automatic Test Cases Generation Tool for VDM++ Specification. J. Robotics Netw. Artif. Life 9(3): 255-262 (2022) - 2021
- [j25]Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki:
Proposal and evaluation for color constancy CAPTCHA. Artif. Life Robotics 26(3): 291-296 (2021) - [j24]Bayu Priyambadha, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Nanoubu Okazaki:
Utilizing the Similarity Meaning of Label in Class Cohesion Calculation. J. Robotics Netw. Artif. Life 7(4): 270-274 (2021) - [j23]Mochamad Chandra Saputra, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki:
Measuring Redundancy Score for Test Suite Evaluation by Using Test Cases Matching Approach. J. Robotics Netw. Artif. Life 8(1): 1-5 (2021) - [j22]Mochamad Chandra Saputra, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki:
Measuring Test Suite Reusability Based on the Usage Frequency and Coverage of Reused Test Cases. J. Robotics Netw. Artif. Life 8(1): 24-28 (2021) - [c29]Isakwisa Gaddy Tende, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Naonobu Okazaki:
Performance Evaluation of Blockchain Based Agricultural Input Voucher System. GCCE 2021: 637-638 - [c28]Mirang Park, Kentaro Aburada, Naonobu Okazaki:
Proposal and Evaluation of a Gesture Authentication Method with Peep Resistance for Smartwatches. CANDAR (Workshops) 2021: 359-364 - [c27]Hisaaki Yamaba, Ahmad Saiful Aqmal Bin Ahmad Sohaimi, Shotaro Usuzaki, Kentaro Aburada, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki:
Proposal of Jawi CAPTCHA Using Digraphia Feature of the Malay Language. IWSEC 2021: 119-133 - [c26]Isakwisa Gaddy Tende, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Naonobu Okazaki:
Development and Evaluation of Swahili Text Based CAPTCHA. LifeTech 2021: 293-297 - 2020
- [j21]Hisaaki Yamaba, Shotaro Usuzaki, Kayoko Takatsuka, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
On a user authentication method to realise an authentication system using s-EMG. Int. J. Grid Util. Comput. 11(5): 725-734 (2020) - [j20]Tetsuro Katayama, Yasuhiro Shigyo, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki:
Proposal of an Algorithm to Generate VDM++ Specification Based on its Grammar by Using Word Lists Extracted from the Natural Language Specification. J. Robotics Netw. Artif. Life 7(3): 165-169 (2020) - [c25]Hisaaki Yamaba, Yuki Nagatomo, Shotaro Usuzaki, Kayoko Takatsuka, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
Evaluation of Yubimoji Based Gestures for Realizing User Authentication Method Using s-EMG. AINA Workshops 2020: 834-844 - [c24]Hisaaki Yamaba, Shotaro Usuzaki, Kayoko Takatsuka, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
Identification of Manual Alphabets Based Gestures Using s-EMG for Realizing User Authentication. EIDWT 2020: 323-333
2010 – 2019
- 2019
- [j19]Kentaro Aburada, Yuki Arikawa, Shotaro Usuzaki, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
Use of access characteristics to distinguish legitimate user traffic from DDoS attack traffic. Artif. Life Robotics 24(3): 318-323 (2019) - [j18]Makoto Nagatomo, Kentaro Aburada, Naonobu Okazaki, Mirang Park:
Evaluation of Ad-hoc Secure Device Pairing Method with Accelerometer and Camera Using Marker. Int. J. Netw. Comput. 9(2): 318-338 (2019) - [j17]Tetsuro Katayama, Tatsumi Nishida, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki:
Implementation of Arduino Simulator ADVIS Visualizing the Value of Voltage on the Circuit. J. Robotics Netw. Artif. Life 5(4): 249-252 (2019) - [j16]Tetsuro Katayama, Toshihiro Miyaji, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki:
Implementation of Tamias to Check Production Rules for Parsing Expression Grammar. J. Robotics Netw. Artif. Life 6(2): 123-127 (2019) - [j15]Tetsuro Katayama, Futa Hirakoba, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki:
Application of Pairwise Testing into BWDM which is a Test Case Generation Tool for the VDM++ Specification. J. Robotics Netw. Artif. Life 6(3): 143-147 (2019) - [c23]Makoto Nagatomo, Kentaro Aburada, Hisaaki Yamaba, Naonobu Okazaki, Mirang Park:
Proposal of Ad-Hoc Secure Device Pairing Method Using Similarity Between Marker Movement and Acceleration. AINA Workshops 2019: 683-692 - [c22]Hisaaki Yamaba, Shimpei Inotani, Shotaro Usuzaki, Kayoko Takatsuka, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
Introduction of Fingerspelling for Realizing a User Authentication Method Using s-EMG. AINA Workshops 2019: 693-701 - [c21]Kazuki Watanabe, Makoto Nagatomo, Kentaro Aburada, Naonobu Okazaki, Mirang Park:
Gait-Based Authentication Using Anomaly Detection with Acceleration of Two Devices in Smart Lock. BWCCA 2019: 352-362 - [c20]Kazuki Watanabe, Makoto Nagatomo, Kentaro Aburada, Naonobu Okazaki, Mirang Park:
Gait-Based Authentication for Smart Locks Using Accelerometers in Two Devices. NBiS 2019: 281-291 - [c19]Ryusei Fuji, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Norio Shiratori, Naonobu Okazaki:
Blockchain-Based Malware Detection Method Using Shared Signatures of Suspected Malware Files. NBiS 2019: 305-316 - [c18]Makoto Nagatomo, Kazuki Watanabe, Kentaro Aburada, Naonobu Okazaki, Mirang Park:
Proposal and Evaluation of Authentication Method Having Shoulder-Surfing Resistance for Smartwatches Using Shift Rule. NBiS 2019: 560-569 - [c17]Hisaaki Yamaba, Shotaro Usuzaki, Kayoko Takatsuka, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
Evaluation of Manual Alphabets Based Gestures for a User Authentication Method Using s-EMG. NBiS 2019: 570-580 - 2018
- [j14]Hisaaki Yamaba, Tokiyoshi Kurogi, Kentaro Aburada, Shin-Ichiro Kubota, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
On applying support vector machines to a user authentication method using surface electromyogram signals. Artif. Life Robotics 23(1): 87-93 (2018) - [j13]Isakwisa Gaddy Tende, Shin-Ichiro Kubota, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki:
Evaluation of Farmers Market Information System to Connect with Some Social Stakeholders. J. Inf. Process. 26: 247-256 (2018) - [j12]Shotaro Usuzaki, Yuki Arikawa, Hisaaki Yamaba, Kentaro Aburada, Shin-Ichiro Kubota, Mirang Park, Naonobu Okazaki:
A Proposal of Highly Responsive Distributed Denial-of-Service Attacks Detection Using Real-Time Burst Detection Method. J. Inf. Process. 26: 257-266 (2018) - [j11]Tetsuro Katayama, Keisuke Mori, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki:
RETUSS: Ensuring Traceability System between Class Diagram in UML and Java Source Code in Real Time. J. Robotics Netw. Artif. Life 5(2): 114-117 (2018) - [c16]Ryohei Tatsuda, Hisaaki Yamaba, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Norio Shiratori, Naonobu Okazaki:
An Examination of CAPTCHA for Tolerance of Relay Attacks and Automated Attacks. EIDWT 2018: 870-879 - [c15]Tokiyoshi Kurogi, Hisaaki Yamaba, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
A Study on a User Identification Method Using Dynamic Time Warping to Realize an Authentication System by s-EMG. EIDWT 2018: 889-900 - [c14]Makoto Nagatomo, Yoshihiro Kita, Kentaro Aburada, Naonobu Okazaki, Mirang Park:
Evaluation of Mouse Operation Authentication Method Having Shoulder Surfing Resistance. EIDWT 2018: 978-989 - [c13]Kentaro Aburada, Yoshihiro Kita, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
Evaluation of Index Poisoning Method in Large Scale Winny Network. EIDWT 2018: 999-1006 - [c12]Hisaaki Yamaba, Shotaro Usuzaki, Kentaro Aburada, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki:
A Proposal of New Reading Text CAPTCHA using Random Dot Patterns. CANDAR 2018: 207-212 - [c11]Makoto Nagatomo, Kentaro Aburada, Naonobu Okazaki, Mirang Park:
Proposal and Evaluation of Secure Device Pairing Method with Camera and Accelerometer. CANDAR Workshops 2018: 310-315 - [c10]Makoto Nagatomo, Kentaro Aburada, Naonobu Okazaki, Mirang Park:
An Examination of Pairing Method with Camera and Acceleration Sensor. ICMU 2018: 1-4 - [c9]Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki:
Interactive Video CAPTCHA for Better Resistance to Automated Attack. ICMU 2018: 1-2 - [c8]Hisaaki Yamaba, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
Evaluation of User Identification Methods for Realizing an Authentication System Using s-EMG. NBiS 2018: 733-742 - 2017
- [j10]Tetsuro Katayama, Yuuki Kikkawa, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki:
Development of a Tool to Keep Consistency between a Model and a Source Code in Software Development Using MDA. J. Robotics Netw. Artif. Life 3(4): 231-235 (2017) - [j9]Tetsuro Katayama, Hiroki Tachiyama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki:
BWDM: Test Cases Automatic Generation Tool Based on Boundary Value Analysis with VDM++. J. Robotics Netw. Artif. Life 4(2): 110-113 (2017) - [c7]Kentaro Aburada, Kengo Todaka, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Norio Shiratori, Naonobu Okazaki:
Development of a Monitoring System Based on Power Consumption. NBiS 2017: 363-372 - [c6]Isakwisa Gaddy Tende, Shin-Ichiro Kubota, Kentaro Aburada, Naonobu Okazaki:
Evaluation and Improvement of Farmers Market Information System to Connect with Some Social Stakeholders. NBiS 2017: 431-442 - [c5]Shotaro Usuzaki, Yuki Arikawa, Hisaaki Yamaba, Kentaro Aburada, Shin-Ichiro Kubota, Mirang Park, Naonobu Okazaki:
Highly Responsive Distributed Denial-of-Service Attacks Detection by Using Real-Time Burst Detection Method. NBiS 2017: 914-923 - 2015
- [j8]Tetsuro Katayama, Shoichiro Kitano, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki:
Proposal of a Testing Method Using Similarity of Interleaving for Java Multi-threaded Programs. J. Robotics Netw. Artif. Life 1(4): 299-302 (2015) - [j7]Tetsuro Katayama, Seiya Urata, Yohei Ogata, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki:
Prototype of a Supporting Tool to Generate Testing Communication Diagram. J. Robotics Netw. Artif. Life 2(1): 9-12 (2015) - [j6]Hisaaki Yamaba, So Nagatomo, Kentaro Aburada, Shin-Ichiro Kubota, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
An Authentication Method Independent of Tap Operation on the Touchscreen of a Mobile Device. J. Robotics Netw. Artif. Life 2(1): 60-63 (2015) - [j5]Kentaro Aburada, Hisaaki Yamaba, Shin-Ichiro Kubota, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
Proposal and Its Evaluation of Neighbors Based Routing for ad hoc networks. J. Robotics Netw. Artif. Life 2(2): 120-124 (2015) - [j4]Tetsuro Katayama, Yuuki Kikkawa, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki:
Proposal of a Modification Method of a Source Code to Correspond with a Modified Model in MDA. J. Robotics Netw. Artif. Life 2(2): 135-139 (2015) - [j3]Tetsuro Katayama, Hiroto Nakamura, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki:
TFVIS: a Supporting Debugging Tool for Java Programs by Visualizing Data Transitions and Execution Flows. J. Robotics Netw. Artif. Life 2(3): 177-181 (2015) - [j2]Naonobu Okazaki, Yoshihiro Kita, Kentaro Aburada, Mirang Park:
Security Evaluation System for Android Applications Using User's Reviews and Permissions. J. Robotics Netw. Artif. Life 2(3): 190-193 (2015) - [j1]Tetsuro Katayama, Kenta Nishikawa, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki:
Prototype of a Decision Table Generation Tool from the Formal Specification. J. Robotics Netw. Artif. Life 2(3): 205-208 (2015) - [c4]Kentaro Aburada, Yoshihiro Kita, Mirang Park, Naonobu Okazaki:
Content Access Control Scheme for P2P Networks Using a Reputation Value. AINA 2015: 527-533 - [c3]Masahiro Sakuma, Yoshihiro Kita, Kentaro Aburada, Mirang Park, Naonobu Okazaki:
Study of Filter Sharing Method Using Virtual Peers in P2P Networks. AINA 2015: 720-726 - 2014
- [c2]Kentaro Aburada, Mirang Park, Naonobu Okazaki:
Investigation of the routing method based on the number of neighbor nodes. ICMU 2014: 103-104 - [c1]Mirang Park, Yoshihiro Kita, Kentaro Aburada, Naonobu Okazaki:
Proposal of a Puzzle Authentication Method with Shoulder-surfing Attack Resistance. NBiS 2014: 495-500
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint