Login / Signup
Yuji Waizumi
ORCID
Publication Activity (10 Years)
Years Active: 1997-2017
Publications (10 Years): 2
Top Topics
Segmented Regions
Restricted Boltzmann Machine
Loopy Belief Propagation
Image Segmentation
Top Venues
CoRR
IEEE Internet Things J.
ICSIPA
ICPR
</>
Publications
</>
Yuji Waizumi
,
Masako Omachi
,
Kazuyuki Tanaka
On-Demand Color Calibration for Pedestrian Tracking in Nonoverlapping Fields of View.
IEEE Internet Things J.
4 (2) (2017)
Hirotaka Tanaka
,
Yuji Waizumi
,
Tadashi Kasezawa
Retinex-based signal enhancement for image dark regions.
ICSIPA
(2017)
Kazuyuki Tanaka
,
Shun Kataoka
,
Muneki Yasuda
,
Yuji Waizumi
,
Chiou-Ting Hsu
Bayesian image segmentations by Potts prior and loopy belief propagation.
CoRR
(2014)
Muneki Yasuda
,
Shun Kataoka
,
Yuji Waizumi
,
Kazuyuki Tanaka
Composite Likelihood Estimation for Restricted Boltzmann machines.
CoRR
(2014)
Muneki Yasuda
,
Shun Kataoka
,
Yuji Waizumi
,
Kazuyuki Tanaka
Composite likelihood estimation for restricted Boltzmann machines.
ICPR
(2012)
Yuji Waizumi
,
Hiroshi Tsunoda
,
Masashi Tsuji
,
Yoshiaki Nemoto
A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy.
J. Information Security
3 (1) (2012)
Hiroshi Tsunoda
,
Hidehisa Nakayama
,
Kohei Ohta
,
Akihiro Suzuki
,
Hiroki Nishiyama
,
Ryoichi Nagatomi
,
Kazuo Hashimoto
,
Yuji Waizumi
,
Glenn Mansfield Keeni
,
Yoshiaki Nemoto
Development of a WLAN based monitoring system for group activity measurement in real-time.
J. Commun. Networks
13 (2) (2011)
Hiroshi Tsunoda
,
Takafumi Maruyama
,
Kohei Ohta
,
Yuji Waizumi
,
Glenn Mansfield Keeni
,
Yoshiaki Nemoto
A Prioritized Retransmission Mechanism for Reliable and Efficient Delivery of Syslog Messages.
CNSR
(2009)
Kumar Simkhada
,
Tarik Taleb
,
Yuji Waizumi
,
Abbas Jamalipour
,
Yoshiaki Nemoto
Combating against internet worms in large-scale networks: an autonomic signature-based solution.
Secur. Commun. Networks
2 (1) (2009)
Shinnosuke Yagi
,
Yuji Waizumi
,
Hiroshi Tsunoda
,
Yoshiaki Nemoto
A Reliable Network Identification Method Based on Transition Pattern of Payload Length.
GLOBECOM
(2008)
Hiroshi Tsunoda
,
Kenjirou Arai
,
Yuji Waizumi
,
Nirwan Ansari
,
Yoshiaki Nemoto
Detecting Pulsing Denial-of-Service Attacks Based on the Bandwidth Usage Condition.
ICC
(2008)
Shinnosuke Yagi
,
Yuji Waizumi
,
Hiroshi Tsunoda
,
Abbas Jamalipour
,
Nei Kato
,
Yoshiaki Nemoto
Network Application Identification Using Transition Pattern of Payload Length.
WCNC
(2008)
Hiroshi Tsunoda
,
Kohei Ohta
,
Atsunori Yamamoto
,
Nirwan Ansari
,
Yuji Waizumi
,
Yoshiaki Nemoto
Detecting DRDoS attacks by a simple response packet confirmation mechanism.
Comput. Commun.
31 (14) (2008)
Yuji Waizumi
,
Yohei Sato
,
Yoshiaki Nemoto
A Network-based Anomaly Detection System using Multiple Network Features.
WEBIST (1)
(2007)
Yuji Waizumi
,
Masashi Tsuji
,
Hiroshi Tsunoda
,
Nirwan Ansari
,
Yoshiaki Nemoto
Distributed Early Worm Detection Based on Payload Histograms.
ICC
(2007)
Youhei Suzuki
,
Yuji Waizumi
,
Hiroshi Tsunoda
,
Yoshiaki Nemoto
A Low Cost Worm Detection Technique based on Flow Payload Similarity.
WEBIST (1)
(2007)
Hitoshi Suzuki
,
Yuji Waizumi
,
Nei Kato
,
Yoshiaki Nemoto
Discrimination of similar characters with a nonlinear compound discriminant function.
Systems and Computers in Japan
38 (11) (2007)
Kumar Simkhada
,
Tarik Taleb
,
Yuji Waizumi
,
Abbas Jamalipour
,
Kazuo Hashimoto
,
Nei Kato
,
Yoshiaki Nemoto
A Multi-level Security Based Autonomic Parameter Selection Approach for an Effective and Early Detection of Internet Worms.
GLOBECOM
(2006)
Kumar Simkhada
,
Tarik Taleb
,
Yuji Waizumi
,
Abbas Jamalipour
,
Nei Kato
,
Yoshiaki Nemoto
An Efficient Signature-Based Approach for Automatic Detection of Internet Worms over Large-Scale Networks.
ICC
(2006)
Kumar Simkhada
,
Hiroshi Tsunoda
,
Yuji Waizumi
,
Yoshiaki Nemoto
Differencing Worm Flows and Normal Flows for Automatic Generation of Worm Signatures.
ISM
(2005)
Yuji Waizumi
,
Daisuke Kudo
,
Nei Kato
,
Yoshiaki Nemoto
A New Network Anomaly Detection Technique Based on Per-Flow and Per-Service Statistics.
CIS (2)
(2005)
Yuichi Uchiyama
,
Yuji Waizumi
,
Nei Kato
,
Yoshiaki Nemoto
Detecting and Tracing DDoS Attacks in the Traffic Analysis Using Auto Regressive Model.
IEICE Trans. Inf. Syst.
(12) (2004)
Yuji Waizumi
,
Nei Kato
,
Kazuki Saruta
,
Yoshiaki Nemoto
High speed rough classification for handwritten characters using hierarchical learning vector quantization.
ICDAR
(1997)