Author of the publication

Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware.

, , , , , , , , , , , , , , and . IEICE Trans. Inf. Syst., 106 (9): 1302-1315 (September 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effects of norms on learning properties of support vector machines., and . ICASSP (5), page 241-244. IEEE, (2005)Neural Network with Unbounded Activation Functions is Universal Approximator, and . (2015)cite arxiv:1505.03654Comment: under review; first revised version.Learning Scale and Shift-Invariant Dictionary for Sparse Representation., and . LOD, volume 11943 of Lecture Notes in Computer Science, page 472-483. Springer, (2019)A Generalization of Independence in Naive Bayes Model., and . IDEAL, volume 6283 of Lecture Notes in Computer Science, page 153-161. Springer, (2010)Multi-frame image super resolution based on sparse coding., , and . Neural Networks, (2015)Detecting cell assemblies by NMF-based clustering from calcium imaging data., , , , , , , and . Neural Networks, (2022)Extraction of Basic Patterns of Household Energy Consumption., , , and . ICMLA (2), page 275-280. IEEE Computer Society, (2011)978-0-7695-4607-0.An Estimation of Generalized Bradley-Terry Models Based on the em Algorithm., , and . Neural Comput., 23 (6): 1623-1659 (2011)Statistical Theory of Learning Curves under Entropic Loss Criterion., and . Neural Comput., 5 (1): 140-153 (1993)Sequential Extraction of Minor Components., , and . Neural Processing Letters, 13 (3): 195-201 (2001)