default search action
Kaoru Teranishi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Akane Kosugi, Kaoru Teranishi, Kiminao Kogiso:
Experimental Validation of the Attack-Detection Capability of Encrypted Control Systems Using Man-in-the-Middle Attacks. IEEE Access 12: 10535-10547 (2024) - [j7]Katsumasa Kosha, Tetsuro Miyazaki, Kaoru Teranishi, Kiminao Kogiso, Kenji Kawashima:
Detection and Cancellation of Multiplicative FDI Attack on Bilateral Encrypted Control System. IEEE Access 12: 120979-120993 (2024) - [j6]Kaoru Teranishi, Tomonori Sadamoto, Kiminao Kogiso:
Input-Output History Feedback Controller for Encrypted Control With Leveled Fully Homomorphic Encryption. IEEE Trans. Control. Netw. Syst. 11(1): 271-283 (2024) - 2023
- [j5]Masaki Miyamoto, Kaoru Teranishi, Keita Emura, Kiminao Kogiso:
Cybersecurity-Enhanced Encrypted Control System Using Keyed-Homomorphic Public Key Encryption. IEEE Access 11: 45749-45760 (2023) - [j4]Kaoru Teranishi, Kiminao Kogiso:
Optimal Controller and Security Parameter for Encrypted Control Systems Under Least Squares Identification. IEEE Control. Syst. Lett. 7: 1482-1487 (2023) - [j3]Kaoru Teranishi, Tomonori Sadamoto, Aranya Chakrabortty, Kiminao Kogiso:
Designing Optimal Key Lengths and Control Laws for Encrypted Control Systems Based on Sample Identifying Complexity and Deciphering Time. IEEE Trans. Autom. Control. 68(4): 2183-2198 (2023) - [c10]Naoto Shono, Tetsuro Miyazaki, Kaoru Teranishi, Kiminao Kogiso, Kenji Kawashima:
A False Data Injection Attack Model Targeting Passivity of Encrypted Wave Variable Based Bilateral Control System. SII 2023: 1-6 - [c9]Haruki Takanashi, Kaoru Teranishi, Kiminao Kogiso:
Experimental Validation of Reaction Force Estimation for Secure Robot Teleoperation. SII 2023: 1-4 - [i9]Kaoru Teranishi, Kiminao Kogiso:
Optimal Controller and Security Parameter for Encrypted Control Systems Under Least Squares Identification. CoRR abs/2302.12154 (2023) - [i8]Haruki Takanashi, Akane Kosugi, Kaoru Teranishi, Toru Mizuya, Kenichi Abe, Kiminao Kogiso:
Cyber-Secure Teleoperation With Encrypted Four-Channel Bilateral Control. CoRR abs/2302.13709 (2023) - [i7]Kaoru Teranishi, Kiminao Kogiso:
Optimal Security Parameter for Encrypted Control Systems Against Eavesdropper and Malicious Server. CoRR abs/2303.13059 (2023) - [i6]Yuta Takeda, Takaya Shin, Kaoru Teranishi, Kiminao Kogiso:
Encrypted Simultaneous Control of Joint Angle and Stiffness of Antagonistic Pneumatic Artificial Muscle Actuator by Polynomial Approximation. CoRR abs/2306.05686 (2023) - [i5]Haruki Takanashi, Kaoru Teranishi, Kiminao Kogiso:
Secure Motion-Copying via Homomorphic Encryption. CoRR abs/2310.11103 (2023) - 2022
- [j2]Takaya Shin, Kaoru Teranishi, Kiminao Kogiso:
Cyber-secure pneumatic actuator system equipped with encrypted controller and attack detectors. Adv. Robotics 36(9): 438-449 (2022) - [c8]Hiroaki Kawase, Kaoru Teranishi, Kiminao Kogiso:
Dynamic Quantizer Synthesis for Encrypted State-Feedback Control Systems with Partially Homomorphic Encryption. ACC 2022: 75-81 - [c7]Kaoru Teranishi, Kiminao Kogiso:
Towards Provably Secure Encrypted Control Using Homomorphic Encryption*. CDC 2022: 7740-7745 - [i4]Kaoru Teranishi, Kiminao Kogiso:
Sample Identifying Complexity of Encrypted Control Systems Under Least Squares Identification. CoRR abs/2210.08846 (2022) - [i3]Kaoru Teranishi, Kiminao Kogiso:
Towards Provably Secure Encrypted Control Using Homomorphic Encryption. CoRR abs/2210.08849 (2022) - 2021
- [c6]Kaoru Teranishi, Kiminao Kogiso:
Encrypted Gain Scheduling with Quantizers for Stability Guarantee *. CDC 2021: 5628-5633 - [i2]Kaoru Teranishi, Tomonori Sadamoto, Aranya Chakrabortty, Kiminao Kogiso:
Designing Optimal Key Lengths and Control Laws for Encrypted Control Systems based on Sample Identifying Complexity and Deciphering Time. CoRR abs/2104.12436 (2021) - [i1]Kaoru Teranishi, Tomonori Sadamoto, Kiminao Kogiso:
Input-Output History Feedback Controller for Encrypted Control with Leveled Fully Homomorphic Encryption. CoRR abs/2109.10718 (2021) - 2020
- [j1]Kaoru Teranishi, Naoki Shimada, Kiminao Kogiso:
Development and Examination of Fog Computing-Based Encrypted Control System. IEEE Robotics Autom. Lett. 5(3): 4642-4648 (2020) - [c5]Kaoru Teranishi, Kiminao Kogiso, Jun Ueda:
Encrypted Feedback Linearization and Motion Control for Manipulator with Somewhat Homomorphic Encryption. AIM 2020: 613-618 - [c4]Kaoru Teranishi, Kiminao Kogiso:
Dynamic Quantizer for Encrypted Observer-based Control. CDC 2020: 5477-5482
2010 – 2019
- 2019
- [c3]Kaoru Teranishi, Masahiro Kusaka, Naoki Shimada, Jun Ueda, Kiminao Kogiso:
Secure Observer-based Motion Control based on Controller Encryption. ACC 2019: 2978-2983 - [c2]Kaoru Teranishi, Naoki Shimada, Kiminao Kogiso:
Stability Analysis and Dynamic Quantizer for Controller Encryption. CDC 2019: 7184-7189 - 2018
- [c1]Kaoru Teranishi, Naoki Shimada:
Precise modeling suitable for control system design based on impulse response. AMC 2018: 485-490
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint