Search Results - "Yamauchi, Masaaki"

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    Anomaly Detection in Smart Home Operation From User Behaviors and Home Conditions by Yamauchi, Masaaki, Ohsita, Yuichi, Murata, Masayuki, Ueda, Kensuke, Kato, Yoshiaki

    Published in IEEE transactions on consumer electronics (01-05-2020)
    “…As several home appliances, such as air conditioners, heaters, and refrigerators, were connecting to the Internet, they became targets of cyberattacks, which…”
    Get full text
    Journal Article
  2. 2
  3. 3

    Platform Utilizing Similar Users' Data to Detect Anomalous Operation of Home IoT Without Sharing Private Information by Yamauchi, Masaaki, Ohsita, Yuichi, Murata, Masayuki

    Published in IEEE access (2021)
    “…To mitigate the risk of cyberattacks on home IoT devices, we have proposed a method for detecting anomalous operations by learning the behaviors of users based…”
    Get full text
    Journal Article
  4. 4

    Characteristics of electric performance and key factors of a hybrid piezo/triboelectric generator for wave energy harvesting by Wardhana, Ede Mehta, Mutsuda, Hidemi, Tanaka, Yoshikazu, Nakashima, Takuji, Kanehira, Taiga, Maeda, Shuhei, Yamauchi, Masaaki

    “…Since the ocean energy field has a wide variety range of frequencies and amplitude, applying energy harvesters such as a piezoelectric generator (PEG) with a…”
    Get full text
    Journal Article
  5. 5

    Harvesting contact-separation-compression vibrations using a flexible and compressible triboelectric generator by Wardhana, Ede Mehta, Mutsuda, Hidemi, Tanaka, Yoshikazu, Nakashima, Takuji, Kanehira, Taiga, Taniguchi, Naokazu, Maeda, Shuhei, Yonezawa, Takayuki, Yamauchi, Masaaki

    “…•We propose and develop a polymer-based triboelectric nanogenerator, which is called FC-TENG (a flexible and compressible type of triboelectric nanogenerator),…”
    Get full text
    Journal Article
  6. 6

    Anomaly Detection for Smart Home Based on User Behavior by Yamauchi, Masaaki, Ohsita, Yuichi, Murata, Masayuki, Ueda, Kensuke, Kato, Yoshiaki

    “…Many devices, such as air conditioners and refrigerators, are now being connected to the Internet and, as a consequence, have become targets of cyberattacks…”
    Get full text
    Conference Proceeding
  7. 7

    Genetic Algorithm with Gene Regulatory Networks Based Optimization Method for Distributed Video Analysis System by Inoue, Seishiro, Yamauchi, Masaaki, Kominami, Daichi, Shimonishi, Hideyuki, Murata, Masayuki

    “…To construct a digital twin, we have to analyze a large amount of video data obtained from the real world in real-time to perceive an accurate current…”
    Get full text
    Conference Proceeding
  8. 8

    Platform Utilizing Others' Behavior Data to Detect Anomalous Operation Hiding Private Information by Yamauchi, Masaaki, Ohsita, Yuichi, Murata, Masayuki

    “…As the number of IoT consumer electronics is increasing, cyberattacks to IoT devices are increasing. In particular, operating IoT devices by attackers make…”
    Get full text
    Conference Proceeding
  9. 9

    Smart-home anomaly detection using combination of in-home situation and user behavior by Yamauchi, Masaaki, Tanaka, Masahiro, Ohsita, Yuichi, Murata, Masayuki, Ueda, Kensuke, Kato, Yoshiaki

    Published 29-09-2021
    “…Internet-of-things (IoT) devices are vulnerable to malicious operations by attackers, which can cause physical and economic harm to users; therefore, we…”
    Get full text
    Journal Article