Follow
Kazuya Sakai
Kazuya Sakai
Associate Professor of Tokyo Metropolitan University
Verified email at tmu.ac.jp - Homepage
Title
Cited by
Cited by
Year
Detecting ransomware using support vector machines
Y Takeuchi, K Sakai, S Fukumoto
Workshop Proceedings of the 47th International Conference on Parallel …, 2018
992018
Timer-based CDS construction in wireless ad hoc networks
K Sakai, SCH Huang, WS Ku, MT Sun, X Cheng
IEEE Transactions on mobile computing 10 (10), 1388-1402, 2010
472010
A Framework for the Optimal -Coverage Deployment Patterns of Wireless Sensors
K Sakai, MT Sun, WS Ku, TH Lai, AV Vasilakos
IEEE Sensors Journal 15 (12), 7273-7283, 2015
452015
Performance and security analyses of onion-based anonymous routing for delay tolerant networks
K Sakai, MT Sun, WS Ku, J Wu, FS Alanazi
IEEE Transactions on Mobile Computing 16 (12), 3473-3487, 2017
342017
Multi-initiator connected dominating set construction for mobile ad hoc networks
K Sakai, F Shen, KM Kim, MT Sun, H Okada
2008 IEEE International Conference on Communications, 2431-2436, 2008
322008
Dynamic bit encoding for privacy protection against correlation attacks in RFID backward channel
K Sakai, WS Ku, R Zimmermann, MT Sun
IEEE TRANSACTIONS on computers 62 (1), 112-123, 2011
302011
An analysis of onion-based anonymous routing for delay tolerant networks
K Sakai, MT Sun, WS Ku, J Wu, FS Alanazi
2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016
292016
Freeway travel time prediction using deep hybrid model–taking Sun Yat-Sen freeway as an example
PY Ting, T Wada, YL Chiu, MT Sun, K Sakai, WS Ku, AAK Jeng, JS Hwu
IEEE Transactions on Vehicular Technology 69 (8), 8257-8266, 2020
272020
Maintaining CDS in mobile ad hoc networks
K Sakai, MT Sun, WS Ku, H Okada
Wireless Algorithms, Systems, and Applications: Third International …, 2008
272008
Private and secure tag access for large-scale RFID systems
MT Sun, K Sakai, WS Ku, TH Lai, AV Vasilakos
IEEE Transactions on Dependable and Secure Computing 13 (6), 657-671, 2015
252015
The optimal k-covering tag deployment for RFID-based localization
WS Ku, K Sakai, MT Sun
Journal of Network and Computer Applications 34 (3), 914-924, 2011
232011
Multi-path based avoidance routing in wireless networks
K Sakai, MT Sun, WS Ku, J Wu, TH Lai
2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015
202015
Secure data communications in wireless networks using multi-path avoidance routing
K Sakai, MT Sun, WS Ku, J Wu, TH Lai
IEEE Transactions on Wireless Communications 18 (10), 4753-4767, 2019
192019
Data-intensive routing in delay-tolerant networks
K Sakai, MT Sun, WS Ku
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2440-2448, 2019
192019
Fast connected dominating set construction in mobile ad hoc networks
K Sakai, MT Sun, WS Ku
2009 IEEE International Conference on Communications, 1-6, 2009
192009
Contact avoidance routing in delay tolerant networks
T Osuki, K Sakai, S Fukumoto
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
172017
G-STAR: Geometric STAteless Routing for 3-D wireless sensor networks
MT Sun, K Sakai, BR Hamilton, WS Ku, X Ma
Ad Hoc Networks 9 (3), 341-354, 2011
172011
A novel DDoS attack defending framework with minimized bilateral damages
Y Chen, WS Ku, K Sakai, C DeCruze
2010 7th IEEE Consumer Communications and Networking Conference, 1-5, 2010
162010
On anonymous routing in delay tolerant networks
K Sakai, MT Sun, WS Ku, J Wu
IEEE Transactions on Mobile Computing 18 (12), 2926-2940, 2018
142018
Message-efficient cds construction in manets
K Sakai, MT Sun, WS Ku
IEEE 5th International Symposium on Wireless Pervasive Computing 2010, 186-191, 2010
132010
The system can't perform the operation now. Try again later.
Articles 1–20