default search action
Mirang Park
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Naonobu Okazaki, Shotaro Usuzaki, Tsubasa Waki, Hyoga Kawagoe, Mirang Park, Hisaaki Yamaba, Kentaro Aburada:
Optimal Weighted Voting-Based Collaborated Malware Detection for Zero-Day Malware: A Case Study on VirusTotal and MalwareBazaar. Future Internet 16(8): 259 (2024) - 2022
- [j13]Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki:
Correction to: Proposal and evaluation for color constancy CAPTCHA. Artif. Life Robotics 27(1): 179 (2022) - 2021
- [j12]Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki:
Proposal and evaluation for color constancy CAPTCHA. Artif. Life Robotics 26(3): 291-296 (2021) - [c32]Mirang Park, Kentaro Aburada, Naonobu Okazaki:
Proposal and Evaluation of a Gesture Authentication Method with Peep Resistance for Smartwatches. CANDAR (Workshops) 2021: 359-364 - [c31]Hisaaki Yamaba, Ahmad Saiful Aqmal Bin Ahmad Sohaimi, Shotaro Usuzaki, Kentaro Aburada, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki:
Proposal of Jawi CAPTCHA Using Digraphia Feature of the Malay Language. IWSEC 2021: 119-133 - 2020
- [j11]Hisaaki Yamaba, Shotaro Usuzaki, Kayoko Takatsuka, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
On a user authentication method to realise an authentication system using s-EMG. Int. J. Grid Util. Comput. 11(5): 725-734 (2020) - [c30]Hisaaki Yamaba, Yuki Nagatomo, Shotaro Usuzaki, Kayoko Takatsuka, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
Evaluation of Yubimoji Based Gestures for Realizing User Authentication Method Using s-EMG. AINA Workshops 2020: 834-844 - [c29]Hisaaki Yamaba, Shotaro Usuzaki, Kayoko Takatsuka, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
Identification of Manual Alphabets Based Gestures Using s-EMG for Realizing User Authentication. EIDWT 2020: 323-333
2010 – 2019
- 2019
- [j10]Kentaro Aburada, Yuki Arikawa, Shotaro Usuzaki, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
Use of access characteristics to distinguish legitimate user traffic from DDoS attack traffic. Artif. Life Robotics 24(3): 318-323 (2019) - [j9]Makoto Nagatomo, Kentaro Aburada, Naonobu Okazaki, Mirang Park:
Evaluation of Ad-hoc Secure Device Pairing Method with Accelerometer and Camera Using Marker. Int. J. Netw. Comput. 9(2): 318-338 (2019) - [c28]Makoto Nagatomo, Kentaro Aburada, Hisaaki Yamaba, Naonobu Okazaki, Mirang Park:
Proposal of Ad-Hoc Secure Device Pairing Method Using Similarity Between Marker Movement and Acceleration. AINA Workshops 2019: 683-692 - [c27]Hisaaki Yamaba, Shimpei Inotani, Shotaro Usuzaki, Kayoko Takatsuka, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
Introduction of Fingerspelling for Realizing a User Authentication Method Using s-EMG. AINA Workshops 2019: 693-701 - [c26]Kazuki Watanabe, Makoto Nagatomo, Kentaro Aburada, Naonobu Okazaki, Mirang Park:
Gait-Based Authentication Using Anomaly Detection with Acceleration of Two Devices in Smart Lock. BWCCA 2019: 352-362 - [c25]Kazuki Watanabe, Makoto Nagatomo, Kentaro Aburada, Naonobu Okazaki, Mirang Park:
Gait-Based Authentication for Smart Locks Using Accelerometers in Two Devices. NBiS 2019: 281-291 - [c24]Ryusei Fuji, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Norio Shiratori, Naonobu Okazaki:
Blockchain-Based Malware Detection Method Using Shared Signatures of Suspected Malware Files. NBiS 2019: 305-316 - [c23]Makoto Nagatomo, Kazuki Watanabe, Kentaro Aburada, Naonobu Okazaki, Mirang Park:
Proposal and Evaluation of Authentication Method Having Shoulder-Surfing Resistance for Smartwatches Using Shift Rule. NBiS 2019: 560-569 - [c22]Hisaaki Yamaba, Shotaro Usuzaki, Kayoko Takatsuka, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
Evaluation of Manual Alphabets Based Gestures for a User Authentication Method Using s-EMG. NBiS 2019: 570-580 - 2018
- [j8]Hisaaki Yamaba, Tokiyoshi Kurogi, Kentaro Aburada, Shin-Ichiro Kubota, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
On applying support vector machines to a user authentication method using surface electromyogram signals. Artif. Life Robotics 23(1): 87-93 (2018) - [j7]Shotaro Usuzaki, Yuki Arikawa, Hisaaki Yamaba, Kentaro Aburada, Shin-Ichiro Kubota, Mirang Park, Naonobu Okazaki:
A Proposal of Highly Responsive Distributed Denial-of-Service Attacks Detection Using Real-Time Burst Detection Method. J. Inf. Process. 26: 257-266 (2018) - [c21]Ryohei Tatsuda, Hisaaki Yamaba, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Norio Shiratori, Naonobu Okazaki:
An Examination of CAPTCHA for Tolerance of Relay Attacks and Automated Attacks. EIDWT 2018: 870-879 - [c20]Tokiyoshi Kurogi, Hisaaki Yamaba, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
A Study on a User Identification Method Using Dynamic Time Warping to Realize an Authentication System by s-EMG. EIDWT 2018: 889-900 - [c19]Makoto Nagatomo, Yoshihiro Kita, Kentaro Aburada, Naonobu Okazaki, Mirang Park:
Evaluation of Mouse Operation Authentication Method Having Shoulder Surfing Resistance. EIDWT 2018: 978-989 - [c18]Kentaro Aburada, Yoshihiro Kita, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
Evaluation of Index Poisoning Method in Large Scale Winny Network. EIDWT 2018: 999-1006 - [c17]Hisaaki Yamaba, Shotaro Usuzaki, Kentaro Aburada, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki:
A Proposal of New Reading Text CAPTCHA using Random Dot Patterns. CANDAR 2018: 207-212 - [c16]Makoto Nagatomo, Kentaro Aburada, Naonobu Okazaki, Mirang Park:
Proposal and Evaluation of Secure Device Pairing Method with Camera and Accelerometer. CANDAR Workshops 2018: 310-315 - [c15]Makoto Nagatomo, Kentaro Aburada, Naonobu Okazaki, Mirang Park:
An Examination of Pairing Method with Camera and Acceleration Sensor. ICMU 2018: 1-4 - [c14]Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki:
Interactive Video CAPTCHA for Better Resistance to Automated Attack. ICMU 2018: 1-2 - [c13]Hisaaki Yamaba, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
Evaluation of User Identification Methods for Realizing an Authentication System Using s-EMG. NBiS 2018: 733-742 - 2017
- [j6]Kentaroh Toyoda, Mirang Park, Naonobu Okazaki, Tomoaki Ohtsuki:
Novel Unsupervised SPITters Detection Scheme by Automatically Solving Unbalanced Situation. IEEE Access 5: 6746-6756 (2017) - [j5]Hisaaki Yamaba, Akitoshi Kurogi, Shin-Ichiro Kubota, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
Evaluation of feature values of surface electromyograms for user authentication on mobile devices. Artif. Life Robotics 22(1): 108-112 (2017) - [c12]Kentaro Aburada, Kengo Todaka, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Norio Shiratori, Naonobu Okazaki:
Development of a Monitoring System Based on Power Consumption. NBiS 2017: 363-372 - [c11]Takahiro Hori, Yoshihiro Kita, Kentaroh Toyoda, Naonobu Okazaki, Mirang Park:
Empirical Evaluation of Rhythm-Based Authentication Method for Mobile Devices. NBiS 2017: 529-538 - [c10]Shotaro Usuzaki, Yuki Arikawa, Hisaaki Yamaba, Kentaro Aburada, Shin-Ichiro Kubota, Mirang Park, Naonobu Okazaki:
Highly Responsive Distributed Denial-of-Service Attacks Detection by Using Real-Time Burst Detection Method. NBiS 2017: 914-923 - 2016
- [c9]Kentaroh Toyoda, Mirang Park, Naonobu Okazaki:
Unsupervised SPITters Detection Scheme for Unbalanced Callers. AINA Workshops 2016: 64-68 - [c8]Jihoon Hong, Mirang Park, Naonobu Okazaki:
SGM: A Subgroup Management Scheme Using K-Means Clustering in M2M Systems. NBiS 2016: 146-151 - 2015
- [j4]Hisaaki Yamaba, So Nagatomo, Kentaro Aburada, Shin-Ichiro Kubota, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
An Authentication Method Independent of Tap Operation on the Touchscreen of a Mobile Device. J. Robotics Netw. Artif. Life 2(1): 60-63 (2015) - [j3]Kentaro Aburada, Hisaaki Yamaba, Shin-Ichiro Kubota, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
Proposal and Its Evaluation of Neighbors Based Routing for ad hoc networks. J. Robotics Netw. Artif. Life 2(2): 120-124 (2015) - [j2]Naonobu Okazaki, Yoshihiro Kita, Kentaro Aburada, Mirang Park:
Security Evaluation System for Android Applications Using User's Reviews and Permissions. J. Robotics Netw. Artif. Life 2(3): 190-193 (2015) - [c7]Kentaro Aburada, Yoshihiro Kita, Mirang Park, Naonobu Okazaki:
Content Access Control Scheme for P2P Networks Using a Reputation Value. AINA 2015: 527-533 - [c6]Masahiro Sakuma, Yoshihiro Kita, Kentaro Aburada, Mirang Park, Naonobu Okazaki:
Study of Filter Sharing Method Using Virtual Peers in P2P Networks. AINA 2015: 720-726 - [c5]Yoshihiro Kita, Mirang Park, Naonobu Okazaki:
Proposal of Rhythm Authentication Method Using Users Classification by Self-Organizing Map. NBiS 2015: 665-668 - 2014
- [c4]Kentaro Aburada, Mirang Park, Naonobu Okazaki:
Investigation of the routing method based on the number of neighbor nodes. ICMU 2014: 103-104 - [c3]Mirang Park, Yoshihiro Kita, Kentaro Aburada, Naonobu Okazaki:
Proposal of a Puzzle Authentication Method with Shoulder-surfing Attack Resistance. NBiS 2014: 495-500
2000 – 2009
- 2006
- [j1]Mirang Park, Naonobu Okazaki, Shoichiro Seno:
A proposal and its evaluations of a re-keying system for dynamic secure group communications. Syst. Comput. Jpn. 37(2): 11-24 (2006) - [c2]Mirang Park, Naonobu Okazaki, Yoshimasa Baba:
A New User Authentication Protocol for Mobile Terminals in Wireless Network. MDM 2006: 94 - 2004
- [c1]Mirang Park, Naonobu Okazaki, Shoichiro Seno, Kazuyuki Kashima, Kazuyoshi Oshima:
A Proposal and its Evaluations of a Re-keying Method for Dynamic Secure Group Communications. AINA (2) 2004: 43-49
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint