关注
Kazuya Sakai
Kazuya Sakai
Associate Professor of Tokyo Metropolitan University
在 tmu.ac.jp 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Detecting ransomware using support vector machines
Y Takeuchi, K Sakai, S Fukumoto
Workshop Proceedings of the 47th International Conference on Parallel …, 2018
1082018
Timer-based CDS construction in wireless ad hoc networks
K Sakai, SCH Huang, WS Ku, MT Sun, X Cheng
IEEE Transactions on mobile computing 10 (10), 1388-1402, 2010
472010
A Framework for the Optimal -Coverage Deployment Patterns of Wireless Sensors
K Sakai, MT Sun, WS Ku, TH Lai, AV Vasilakos
IEEE Sensors Journal 15 (12), 7273-7283, 2015
462015
Performance and security analyses of onion-based anonymous routing for delay tolerant networks
K Sakai, MT Sun, WS Ku, J Wu, FS Alanazi
IEEE Transactions on Mobile Computing 16 (12), 3473-3487, 2017
382017
Freeway travel time prediction using deep hybrid model–taking Sun Yat-Sen freeway as an example
PY Ting, T Wada, YL Chiu, MT Sun, K Sakai, WS Ku, AAK Jeng, JS Hwu
IEEE Transactions on Vehicular Technology 69 (8), 8257-8266, 2020
342020
Multi-initiator connected dominating set construction for mobile ad hoc networks
K Sakai, F Shen, KM Kim, MT Sun, H Okada
2008 IEEE International Conference on Communications, 2431-2436, 2008
322008
Dynamic bit encoding for privacy protection against correlation attacks in RFID backward channel
K Sakai, WS Ku, R Zimmermann, MT Sun
IEEE TRANSACTIONS on computers 62 (1), 112-123, 2011
292011
An analysis of onion-based anonymous routing for delay tolerant networks
K Sakai, MT Sun, WS Ku, J Wu, FS Alanazi
2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016
282016
Maintaining CDS in mobile ad hoc networks
K Sakai, MT Sun, WS Ku, H Okada
Wireless Algorithms, Systems, and Applications: Third International …, 2008
272008
Private and secure tag access for large-scale RFID systems
MT Sun, K Sakai, WS Ku, TH Lai, AV Vasilakos
IEEE Transactions on Dependable and Secure Computing 13 (6), 657-671, 2015
252015
The optimal k-covering tag deployment for RFID-based localization
WS Ku, K Sakai, MT Sun
Journal of Network and Computer Applications 34 (3), 914-924, 2011
232011
Secure data communications in wireless networks using multi-path avoidance routing
K Sakai, MT Sun, WS Ku, J Wu, TH Lai
IEEE Transactions on Wireless Communications 18 (10), 4753-4767, 2019
222019
Multi-path based avoidance routing in wireless networks
K Sakai, MT Sun, WS Ku, J Wu, TH Lai
2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015
212015
Data-intensive routing in delay-tolerant networks
K Sakai, MT Sun, WS Ku
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2440-2448, 2019
192019
G-STAR: Geometric STAteless Routing for 3-D wireless sensor networks
MT Sun, K Sakai, BR Hamilton, WS Ku, X Ma
Ad Hoc Networks 9 (3), 341-354, 2011
192011
Fast connected dominating set construction in mobile ad hoc networks
K Sakai, MT Sun, WS Ku
2009 IEEE International Conference on Communications, 1-6, 2009
192009
Contact avoidance routing in delay tolerant networks
T Osuki, K Sakai, S Fukumoto
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
182017
A novel DDoS attack defending framework with minimized bilateral damages
Y Chen, WS Ku, K Sakai, C DeCruze
2010 7th IEEE Consumer Communications and Networking Conference, 1-5, 2010
172010
On anonymous routing in delay tolerant networks
K Sakai, MT Sun, WS Ku, J Wu
IEEE Transactions on Mobile Computing 18 (12), 2926-2940, 2018
152018
Privacy-preserving collaborative filtering using fully homomorphic encryption
S Jumonji, K Sakai, MT Sun, WS Ku
IEEE Transactions on Knowledge and Data Engineering 35 (3), 2961-2974, 2021
142021
系统目前无法执行此操作,请稍后再试。
文章 1–20