Follow
Yaokai Feng
Yaokai Feng
Verified email at ait.kyushu-u.ac.jp - Homepage
Title
Cited by
Cited by
Year
Lightweight classification of IoT malware based on image recognition
J Su, DV Vasconcellos, S Prasad, D Sgandurra, Y Feng, K Sakurai
2018 IEEE 42Nd annual computer software and applications conference (COMPSAC …, 2018
3582018
Machine learning-based IoT-botnet attack detection with sequential architecture
YN Soe, Y Feng, PI Santosa, R Hartanto, K Sakurai
Sensors 20 (16), 4372, 2020
1572020
Towards a lightweight detection system for cyber attacks in the IoT environment using corresponding features
YN Soe, Y Feng, PI Santosa, R Hartanto, K Sakurai
Electronics 9 (1), 144, 2020
972020
Implementing lightweight iot-ids on raspberry pi using correlation-based feature selection and its performance evaluation
YN Soe, Y Feng, PI Santosa, R Hartanto, K Sakurai
Advanced Information Networking and Applications: Proceedings of the 33rd …, 2020
442020
Packet in message based DDoS attack detection in SDN network using OpenFlow
X You, Y Feng, K Sakurai
2017 Fifth International Symposium on Computing and Networking (CANDAR), 522-528, 2017
412017
Feature selection for machine learning-based early detection of distributed cyber attacks
Y Feng, H Akiyama, L Lu, K Sakurai
2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th …, 2018
402018
A keypoint-based approach toward scenery character detection
S Uchida, Y Shigeyoshi, Y Kunishige, F Yaokai
2011 International Conference on Document Analysis and Recognition, 819-823, 2011
402011
Rule generation for signature based detection systems of cyber attacks in iot environments
YN Soe, Y Feng, PI Santosa, R Hartanto, K Sakurai
Bulletin of Networking, Computing, Systems, and Software 8 (2), 93-97, 2019
372019
A machine learning based approach for detecting DRDoS attacks and its performance evaluation
Y Gao, Y Feng, J Kawamoto, K Sakurai
2016 11th Asia joint conference on information security (AsiaJCIS), 80-86, 2016
272016
A behavior-based method for detecting distributed scan attacks in darknets
Y Feng, Y Hori, K Sakurai, J Takeuchi
Journal of information processing 21 (3), 527-538, 2013
242013
Scenery character detection with environmental context
Y Kunishige, F Yaokai, S Uchida
2011 International Conference on Document Analysis and Recognition, 1049-1053, 2011
232011
C&C session detection using random forest
L Lu, Y Feng, K Sakurai
Proceedings of the 11th International Conference on Ubiquitous Information …, 2017
202017
A sequential scheme for detecting cyber attacks in IoT environment
YN Soe, Y Feng, PI Santosa, R Hartanto, K Sakurai
2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2019
192019
A survey on feature selection techniques based on filtering methods for cyber attack detection
Y Lyu, Y Feng, K Sakurai
Information 14 (3), 191, 2023
162023
Character image patterns as big data
S Uchida, R Ishida, A Yoshida, W Cai, Y Feng
2012 International Conference on Frontiers in Handwriting Recognition, 479-484, 2012
162012
A part-based skew estimation method
S Shiraishi, Y Feng, S Uchida
2012 10th IAPR international workshop on document analysis systems, 185-189, 2012
162012
Analytical dynamic programming tracker
S Uchida, I Fujimura, H Kawano, Y Feng
Computer Vision–ACCV 2010: 10th Asian Conference on Computer Vision …, 2011
162011
Selective concealment of characters for privacy protection
K Inai, M Pålsson, V Frinken, Y Feng, S Uchida
2014 22nd International Conference on Pattern Recognition, 333-338, 2014
152014
SOM-based R*-tree for similarity retrieval
K Oh, Y Feng, K Kaneko, A Makinouchi, SH Bae
Proceedings Seventh International Conference on Database Systems for …, 2001
152001
Statistical contact potentials in protein coarse-grained modeling: from pair to multi-body potentials
SP Leelananda, Y Feng, P Gniewek, A Kloczkowski, RL Jernigan
Multiscale Approaches to Protein Modeling: Structure Prediction, Dynamics …, 2011
142011
The system can't perform the operation now. Try again later.
Articles 1–20