Flight test of fault-tolerant flight control system using simple adaptive control with PID controller H Matsuki, T Nishiyama, Y Omori, S Suzuki, K Masui, M Sato Aircraft Engineering and Aerospace Technology 90 (1), 210-218, 2018 | 23 | 2018 |
SILU: Strategy involving large-scale unlabeled logs for improving malware detector T Nishiyama, A Kumagai, K Kamiya, K Takahashi 2020 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2020 | 17 | 2020 |
Simple adaptive control with PID for MIMO fault tolerant flight control design T Nishiyama, S Suzuki, M Sato, K Masui AIAA Infotech@ Aerospace, 0132, 2016 | 12 | 2016 |
On trajectory tracking control of port-Hamiltonian systems with quaternions K Fujimoto, T Nishiyama 53rd IEEE Conference on Decision and Control, 4820-4825, 2014 | 6 | 2014 |
Sharpshooting most beneficial part of auc for detecting malicious logs T Nishiyama, A Kumagai, A Fujino, K Kamiya Data Mining: 19th Australasian Conference on Data Mining, AusDM 2021 …, 2021 | 4 | 2021 |
Classification device, classification method, and classification program T Nishiyama, A Kumagai, K Kamiya US Patent App. 17/280,184, 2022 | 2 | 2022 |
Domain generation algorithm detection utilizing model hardening through GAN-generated adversarial examples N Gould, T Nishiyama, K Kamiya Deployable Machine Learning for Security Defense: First International …, 2020 | 2 | 2020 |
Training device, classification device, training method, and training program T Nishiyama, A Kumagai, K Kamiya US Patent App. 17/766,531, 2023 | 1 | 2023 |
Compression Algorithm Contribution for Infected-host Detection Y Okano, K Kamiya, A Kumagai, T Nishiyama, B Hu, M Tanikawa, ... International Journal of Informatics Society (IJIS) 11, 0 | 1 | |
Classification device, classification method, and classification program T Nishiyama, K Kamiya US Patent App. 18/266,807, 2024 | | 2024 |
Malicious Log Detection Using Machine Learning to Maximize the Partial AUC T Nishiyama, A Kumagai, A Fujino, K Kamiya 2024 IEEE 21st Consumer Communications & Networking Conference (CCNC), 339-344, 2024 | | 2024 |
Transfer Anomaly Detection for Maximizing the Partial AUC A Kumagai, T Iwata, T Nishiyama, Y Fujiwara 2022 International Joint Conference on Neural Networks (IJCNN), 1-8, 2022 | | 2022 |
企業内ネットワークの Proxy ログを活用した pAUC 最大化法による悪性通信検知性能の評価 西山泰史, 熊谷充敏, 藤野昭典, 神谷和憲 人工知能学会全国大会論文集 第 36 回 (2022), 3Yin245-3Yin245, 2022 | | 2022 |
マルウェア検知のための pAUC 最大化学習法 西山泰史, 熊谷充敏, 藤野昭典, 神谷和憲 コンピュータセキュリティシンポジウム 2019 論文集 2019, 503-510, 2019 | | 2019 |
Regulatory Compliance Monitoring on the Web Using Paragraph Vector M Sasaki, T Nishiyama, A Kumagai, K Kamiya IEICE Technical Report; IEICE Tech. Rep. 118 (486), 19-24, 2019 | | 2019 |
Paragraph Vector を用いた社内ポリシー遵守状況のモニタリングに関する検討 佐々木満春, 西山泰史, 熊谷充敏, 神谷和憲 研究報告セキュリティ心理学とトラスト (SPT) 2019 (6), 1-6, 2019 | | 2019 |
マルウェア感染端末の分類精度改善に向けたラベルなしネットワークログの活用法 西山泰史, 熊谷充敏, 神谷和憲, 谷川真樹, 高橋健司 コンピュータセキュリティシンポジウム 2018 論文集 2018 (2), 356-363, 2018 | | 2018 |
HTTP 通信を活用した半教師あり機械学習によるマルウェア感染端末の選別 西山泰史, 熊谷充敏, 神谷和憲, 谷川真樹 コンピュータセキュリティシンポジウム 2017 論文集 2017 (2), 2017 | | 2017 |
Deep Learning Approach for Detecting Malware Infected Host and Detection Performance Evaluation with HTTP Traffic T Nishiyama, A Kumagai, Y Okano, K Kamiya, M Tanikawa, K Okada, ... IEICE Technical Report; IEICE Tech. Rep. 116 (522), 49-54, 2017 | | 2017 |
HTTP 通信に着目した DeepLearning に基づくマルウェア感染端末検知手法と検知性能評価 西山泰史, 熊谷充敏, 岡野靖, 神谷和憲, 谷川真樹, 岡田和也, 関谷勇司 研究報告セキュリティ心理学とトラスト (SPT) 2017 (9), 1-6, 2017 | | 2017 |