default search action
ATAIT 2022: Virtual Event / Ibaraki, Japan
- Hiroki Nishikawa, Xiangbo Kong:
Proceedings of the 4th International Symposium on Advanced Technologies and Applications in the Internet of Things (ATAIT 2022), Ibaraki and Virtual, Japan, August 24-26, 2022. CEUR Workshop Proceedings 3198, CEUR-WS.org 2022
Invited Talks
- Yuting Geng:
Ultrasonic Audio-spot and Potential Applications in Internet of Things. - Jiaqing Liu:
Multimodal Deep Learning in Healthcare.
Regular Papers
- Kazuki Yasuda, Teppei Tsuyuhara, Masao Masugi, Kenshi Saho:
Gait Classification of Common Pedestrians and Smartphone Zombies Using Micro-Doppler Radar. 1-6 - Hiroki Matsumiya, Xiangbo Kong, Ami Tanaka, Hiroki Nishikawa, Hiroyuki Tomiyama:
A Case Study on Forehand Footwork Mistake Detection in Table Tennis. 7-16 - Ryoto Ishibashi, Naoto Nojiri, Kenshi Saho, Lin Meng:
Dementia Diagnose Based on Machine Learning Using Doppler Radar Image for the Elderly Person. 17-24 - Zhuo Li, Lin Meng:
A survey of model pruning for deep neural network. 25-34 - Mao Nishira, Hiroki Nishikawa, Xiangbo Kong, Hiroyuki Tomiyama:
Delivery Drone Routing under Load-dependent Flight Speed based on Integer Quadratic Programming. 35-42 - Tomoyasu Shimada, Hiroki Nishikawa, Xiangbo Kong, Hiroyuki Tomiyama:
Monocular Thermal Camera Depth Estimation with Optical Flow for Autonomous Drones. 43-52 - Koyu Ohata, Hiroki Nishikawa, Xiangbo Kong, Hiroyuki Tomiyama:
A Heuristic Scheduling Algorithm with Variable-Cycle Approximate Functional Units in High-Level Synthesis. 53-59 - Masaki Sano, Hiroki Nishikawa, Xiangbo Kong, Hiroyuki Tomiyama, Tongxin Yang, Tomoaki Ukezono, Toshinori Sato:
An Accuracy-Controllable Approximate Adder for FPGAs. 60-66 - Yilin Zhao, Qidi Zhang, Hiroki Nishikawa, Xiangbo Kong, Hiroyuki Tomiyama:
Evaluation of Power Analysis Attack Resistance of Masked Adders on FPGA. 67-74 - Seiya Shimada, Kunihiro Kuroda, Yuta Fukuda, Kota Yoshida, Takeshi Fujino:
Deep Learning-Based Side-Channel Attacks against Software-Implemented RSA using Binary Exponentiation with Dummy Multiplication. 75-84 - Madoka Sakou, Kunihiro Kuroda, Yuta Fukuda, Kota Yoshida, Takeshi Fujino:
Deep Learning Side-Channel Attacks against Hardware-Implemented Lightweight Cipher Midori 64. 85-94
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.