A Highly Reliable Technique for CAN under Highly Electromagnetic Noise

Koji Konomi , Muneyuki Nakamura , Kazuya Sakai , Satoshi Fukumoto
IEICE Technical Report; IEICE Tech. Rep. 115 ( 382) 35 -40

2015
Studies on Reliability Evaluation Techniques for Triple Register Circuits

Naoki Midorikawa , Muneyuki Nakamura , Aromhack Saysanasongkham , Kazuya Sakai
IEICE Technical Report; IEICE Tech. Rep. 114 ( 384) 29 -32

2014
A Note on Ransomeware Detection using Support Vector Machines

Yuuki Takeuchi , Kazuya Sakai , Satoshi Fukumoto
IEICE Technical Report; IEICE Tech. Rep. 118 ( 93) 131 -136

2018
A Note On Privacy Preserving k-Nearest Neighbors Algorithms

Yuya Fukuchi , Kazuya Sakai , Satoshi Fukumoto
IEICE Technical Report; IEICE Tech. Rep. 117 ( 480) 263 -268

2018
Designing and Performance Evaluation of Quality-Aware Task Assignment Algorithm

Shohei Karaguchi , Kazuya Sakai , Satoshi Fukumoto
IEICE Technical Report; IEICE Tech. Rep. 118 ( 231) 13 -18

2018
A Study of Response Time Analysis of Controller Area Networks

Ryouhei Satoh , Kazuya Sakai , Satoshi Fukumoto , Mamoru Ohara
IEICE Technical Report; IEICE Tech. Rep. 117 ( 480) 269 -274

2018
A Note On Privacy Preserving k-Nearest Neighbors Algorithms in Multiple Cloud Enviroments

Yuuya Fukuchi , Kazuya Sakai , Satoshi Fukumoto
IEICE Technical Report; IEICE Tech. Rep. 118 ( 166) 23 -26

2018
A Note on Encryption-based Recommender Systems

Sakai Kazuya , Jumonji Seiya
IEICE Technical Report; IEICE Tech. Rep. 119 ( 257) 149 -152

2019
A Study of Dynamic Pricing Mechanisms for Self-Balanced Docked Bike Sharing Systems

Sakai Kazuya , Chen Donghui
IEICE Technical Report; IEICE Tech. Rep. 120 ( 19) 19 -25

2020
A Note on Hybrid ARQ for DC-DC Converter Noise in Controller Area Networks

Aromhack Saysanasongkham , Masayuki Arai , Mamoru Ohara , Muneyuki Nakamura
IEICE technical report. Dependable computing 114 ( 280) 23 -28

2014
Randomized skip lists-based private authentication for large-scale RFID systems

Kazuya Sakai , Min-Te Sun , Wei-Shinn Ku , Ten H. Lai
mobile ad hoc networking and computing 277 -280

8
2013
Fast and secure tag authentication in large-scale RFID systems using skip graphs

Yudai Komori , Kazuya Sakai , Satoshi Fukumoto
Computer Communications 116 77 -89

7
2018
Privacy preserving continuous multimedia streaming in MANETs

Kazuya Sakai , Wei-Shinn Ku , Min-Te Sun , Roger Zimmermann
ACM Transactions on Multimedia Computing, Communications, and Applications 9 ( 4) 23

3
2013
Maintaining CDS in Mobile Ad Hoc Networks

Kazuya Sakai , Min-Te Sun , Wei-Shinn Ku , Hiromi Okada
wireless algorithms, systems, and applications 141 -153

24
2008
Electromagnetic Noise Tolerant Hybrid Communication Protocol for CANs

Muneyuki Nakamura , Koji Konomi , Mamoru Ohara , Kazuya Sakai
pacific rim international symposium on dependable computing 284 -291

1
2017
The optimal k-covering tag deployment for RFID-based localization

Wei-Shinn Ku , Kazuya Sakai , Min-Te Sun
Journal of Network and Computer Applications 34 ( 3) 914 -924

12
2011
Data-Intensive Routing in Delay-Tolerant Networks

Kazuya Sakai , Min-Te Sun , Wei-Shinn Ku
IEEE INFOCOM 2019 - IEEE Conference on Computer Communications 2440 -2448

5
2019
Contact avoidance routing in delay tolerant networks

Tomoya Osuki , Kazuya Sakai , Satoshi Fukumoto
IEEE INFOCOM 2017 - IEEE Conference on Computer Communications 1 -9

5
2017
A Collaborative-Task Assignment Algorithm for Mobile Crowdsourcing in Opportunistic Networks

Ryota Mizuhara , Kazuya Sakai , Satoshi Fukumoto
2018 IEEE International Conference on Communications (ICC) 1 -6

3
2018
Detecting Ransomware using Support Vector Machines

Yuki Takeuchi , Kazuya Sakai , Satoshi Fukumoto
international conference on parallel processing 1

21
2018