SATOH, Akihiro
10  results:
Search for persons X
?
1

Characterizing the basic performance of IEEE 802.11ax using..:

, In: NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium,
 
?
2

Unknown Malicious Domain Detection based on DNS Query Analy..:

, In: 2022 International Conference on Computational Science and Computational Intelligence (CSCI),
Yamada, Hiroto ; Nobayashi, Daiki ; Satoh, Akihiro.. - p. 1096-1097 , 2022
 
?
3

Identifying Malicious DNS Tunnel Tools from DoH Traffic Usi..:

, In: Lecture Notes in Computer Science; Information Security,
Mitsuhashi, Rikima ; Satoh, Akihiro ; Jin, Yong... - p. 238-256 , 2021
 
?
4

Lightweight Approach to Detect Drive-by Download Attacks Ba..:

, In: Proceedings of the 2014 CoNEXT on Student Workshop,
 
?
5

Knowledge Oriented Network Fault Resolution Method Based on..:

, In: Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 02,
 
?
6

From Scarcity to Understanding: Transfer Learning for the E..:

, In: 2023 IEEE/CVF International Conference on Computer Vision Workshops (ICCVW),
Holmes, Ruth ; Rushe, Ellen ; De Coster, Mathieu... - p. 2000-2009 , 2023
 
?
7

List of Contributors:

, In: Recent Highlights in the Discovery and Optimization of Crop Protection Products,
Abe, Y. ; Anspaugh, Douglas D. ; Aoki, Takao... - p. xiii-xxi , 2021
 
?
8

What Does Your Tweet Emotion Mean? : Neural Emoji Predic..:

, In: Proceedings of the 20th International Conference on Information Integration and Web-based Applications & Services,
 
?
9

Network Softwarization View of 5G Networks:

, In: 5G Networks: Fundamental Requirements, Enabling Technologies, and Operations Management,
Shimizu, Takashi ; Nakao, Akihiro ; Satoh, Kohei - p. 499-518 , 2018
 
?
10

"KABU-WAKE" parallel inference mechanism and its evaluation:

, In: Proceedings of 1986 ACM Fall joint computer conference,
 
1-10