default search action
Masato Uchida
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Kota Kawamoto, Masato Uchida:
Q&A Label Learning. Neural Comput. 36(2): 312-349 (2024) - [c42]Ko Fujimori, Toshiki Shibahara, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
Evaluation of Adversarial Examples Based on Original Definition. HCI (62) 2024: 36-43 - [c41]Huiying Jin, Masato Uchida:
A Three-Year Analysis of Human Preferences in Delegating Tasks to AI. HCI (51) 2024: 48-66 - [i3]Kosuke Sugiyama, Masato Uchida:
Learning from Complementary Features. CoRR abs/2408.14788 (2024) - 2023
- [c40]Kosuke Sugiyama, Masato Uchida:
Balancing Selection and Diversity in Ensemble Learning with Exponential Mixture Model. ICANN (3) 2023: 307-319 - [c39]Shun Furusawa, Toshitaka Hamamura, Akio Yoneyama, Masaru Honjo, Nanase Kobayashi, Daisuke Jitoku, Masato Uchida:
Visualization Methods to Support the Medical Treatment of the Problematic Use of Smartphones. ICMHI 2023: 208-215 - [c38]Kosuke Sugiyama, Masato Uchida:
Exploring Hessian Regularization in Mixup. ICMLA 2023: 1817-1824 - [i2]Kota Kawamoto, Masato Uchida:
Q&A Label Learning. CoRR abs/2305.04539 (2023) - 2022
- [c37]Koji Fujita, Toshiki Shibahara, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
Objection!: Identifying Misclassified Malicious Activities with XAI. ICC 2022: 2065-2070 - 2021
- [j27]Takayuki Tomatsuri, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
Time-Series Measurement of Parked Domain Names and Their Malicious Uses. IEICE Trans. Commun. 104-B(7): 770-780 (2021) - [j26]Naoki Fukushi, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
A Comprehensive Measurement of Cloud Service Abuse. J. Inf. Process. 29: 93-102 (2021) - [j25]Kazuya Nomura, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
Auto-creation of Robust Android Malware Family Trees. J. Inf. Process. 29: 801-811 (2021) - [j24]Yasuhiro Katsura, Masato Uchida:
Candidate-Label Learning: A Generalization of Ordinary-Label Learning and Complementary-Label Learning. SN Comput. Sci. 2(4): 288 (2021) - [c36]Tomohiro Koide, Masato Uchida:
Behind The Mask: Masquerading The Reason for Prediction. COMPSAC 2021: 475-481 - [c35]Kentaro Goto, Akira Shibuya, Masayuki Okada, Masato Uchida:
Analysis of Route Announcements of Unassigned IP Addresses. COMPSAC 2021: 1411-1416 - [c34]Kazuya Nomura, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
Auto-creation of Android Malware Family Tree. ICC 2021: 1-6 - 2020
- [j23]Naoki Fukushi, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
Exploration into Gray Area: Toward Efficient Labeling for Detecting Malicious Domain Names. IEICE Trans. Commun. 103-B(4): 375-388 (2020) - [c33]Yasuhiro Katsura, Masato Uchida:
Bridging Ordinary-Label Learning and Complementary-Label Learning. ACML 2020: 161-176 - [c32]Naoki Fukushi, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
A Large-scale Analysis of Cloud Service Abuse. CNS 2020: 1-9 - [c31]Takayuki Tomatsuri, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
Time-series Measurement of Parked Domain Names. GLOBECOM 2020: 1-6 - [c30]Katsuki Yasudomi, Toshitaka Hamamura, Masaru Honjo, Akio Yoneyama, Masato Uchida:
Usage Prediction and Effectiveness Verification of App Restriction Function for Smartphone Addiction. HealthCom 2020: 1-8 - [c29]Kentaro Goto, Masato Uchida:
Tsallis Entropy Based Labelling. ICMLA 2020: 33-40 - [c28]Tokio Takahashi, Masaru Honjo, Akio Yoneyama, Masato Uchida:
Design of Typing Skills Feedback System for Behavior Change. TALE 2020: 678-683 - [i1]Yasuhiro Katsura, Masato Uchida:
Bridging Ordinary-Label Learning and Complementary-Label Learning. CoRR abs/2002.02158 (2020)
2010 – 2019
- 2019
- [c27]Yohei Hasegawa, Masato Uchida:
Predicting Network Outages Based on Q-Drop in Optical Network. COMPSAC (1) 2019: 258-263 - [c26]Tokio Takahashi, Masato Uchida:
Optimal Hand Sign Selection Using Information Theory for Custom Sign-Based Communication. COMPSAC (1) 2019: 610-615 - [c25]Naoki Fukushi, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
Exploration into Gray Area: Efficient Labeling for Malicious Domain Name Detection. COMPSAC (1) 2019: 770-775 - 2018
- [c24]Simon Kase, Masato Tsuru, Masato Uchida:
Accurate OD Traffic Matrix Estimation Based on Resampling of Observed Flow Data. APSIPA 2018: 1574-1579 - 2016
- [j22]Masato Uchida:
Human error tolerant anomaly detection based on time-periodic packet sampling. Knowl. Based Syst. 106: 242-250 (2016) - 2015
- [j21]Masato Uchida, Hideaki Iiduka, Isao Sugino:
Modeling User Behavior in P2P Data Storage System. IEICE Trans. Commun. 98-B(1): 33-41 (2015) - [j20]Masato Uchida:
Unsupervised Weight Parameter Estimation for Exponential Mixture Distribution Based on Symmetric Kullback-Leibler Divergence. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(11): 2349-2353 (2015) - [c23]Masato Uchida:
Recent Trends and Some Lessons for Serious Network Failures in Japan. INCoS 2015: 478-485 - 2014
- [j19]Masato Uchida:
Statistical characteristics of serious network failures in Japan. Reliab. Eng. Syst. Saf. 131: 126-134 (2014) - [c22]Masato Uchida:
Human Error Tolerant Anomaly Detection Using Time-Periodic Packet Sampling. INCoS 2014: 390-395 - [c21]Masato Uchida:
Unsupervised weight parameter estimation for exponential mixture distribution based on symmetric Kullback-Leibler divergence. SCIS&ISIS 2014: 1126-1129 - [c20]Masato Uchida:
Tight lower bound of generalization error in ensemble learning. SCIS&ISIS 2014: 1130-1133 - 2013
- [j18]Jun'ichi Shimada, Hitomi Tamura, Masato Uchida, Yuji Oie:
Node Degree Based Routing Metric for Traffic Load Distribution in the Internet. IEICE Trans. Inf. Syst. 96-D(2): 202-212 (2013) - 2012
- [j17]Masato Uchida:
Discrete Modeling of the Worm Spread with Random Scanning. IEICE Trans. Commun. 95-B(5): 1575-1579 (2012) - [j16]Masato Uchida, Shuichi Nawata, Yu Gu, Masato Tsuru, Yuji Oie:
Unsupervised Ensemble Anomaly Detection Using Time-Periodic Packet Sampling. IEICE Trans. Commun. 95-B(7): 2358-2367 (2012) - [j15]Masanori Takaoka, Masato Uchida, Kei Ohnishi, Yuji Oie:
A generalised diffusion-based file replication scheme for load balancing in P2P file-sharing networks. Int. J. Grid Util. Comput. 3(4): 242-252 (2012) - 2011
- [j14]Hideaki Iiduka, Masato Uchida:
Fixed Point Optimization Algorithms for Network Bandwidth Allocation Problems with Compoundable Constraints. IEEE Commun. Lett. 15(6): 596-598 (2011) - [j13]Kei Ohnishi, Hiroshi Yamamoto, Masato Uchida, Yuji Oie:
Query-Trail-Mediated Cooperative Behaviors of Peers in Unstructured P2P File Sharing Networks. IEICE Trans. Inf. Syst. 94-D(10): 1966-1980 (2011) - [j12]Masato Uchida, Jim Kurose:
An information-theoretic characterization of weighted α-proportional fairness in network resource allocation. Inf. Sci. 181(18): 4009-4023 (2011) - [j11]Masato Uchida, Yousuke Maehara, Hiroyuki Shioya:
Unsupervised Weight Parameter Estimation Method for Ensemble Learning. J. Math. Model. Algorithms 10(4): 307-322 (2011) - [c19]Hitomi Tamura, Mario Köppen, Masato Uchida, Masato Tsuru, Yuji Oie:
Node Degree-Aware Link Cost for Traffic Load-Distribution in Large-Scale Networks. INCoS 2011: 299-304 - [c18]Hitomi Tamura, Masato Uchida, Masato Tsuru, Jun'ichi Shimada, Takeshi Ikenaga, Yuji Oie:
Routing Metric Based on Node Degree for Load-Balancing in Large-Scale Networks. SAINT 2011: 519-523 - 2010
- [j10]Masato Uchida, Kei Ohnishi, Kento Ichikawa, Masato Tsuru, Yuji Oie:
Dynamic and Decentralized Storage Load Balancing with Analogy to Thermal Diffusion for P2P File Sharing. IEICE Trans. Commun. 93-B(3): 525-535 (2010) - [j9]Masanori Takaoka, Masato Uchida, Kei Ohnishi, Yuji Oie:
Access Load Balancing with Analogy to Thermal Diffusion for Dynamic P2P File-Sharing Environments. IEICE Trans. Commun. 93-B(5): 1140-1150 (2010) - [c17]Masanori Takaoka, Masato Uchida, Yuji Oie:
A Generalized File Replication Scheme with Diffusion-Based Storage Load Balancing Function in Unstructured P2P File-Sharing Networks. INCoS 2010: 350-355
2000 – 2009
- 2009
- [j8]Yuki Sakai, Masato Uchida, Masato Tsuru, Yuji Oie:
Impact of Censoring on Estimation of Flow Duration Distribution and Its Mitigation Using Kaplan-Meier-Based Method. IEICE Trans. Inf. Syst. 92-D(10): 1949-1952 (2009) - [c16]Yuya Yamada, Hitomi Tamura, Masato Uchida, Masato Tsuru, Yuji Oie:
Overlay routing with Acceptable Waiting Time for unstably fluctuated network environments. ICOIN 2009: 1-3 - [c15]Masato Uchida, Jim Kurose:
An Information-Theoretic Characterization of Weighted alpha-Proportional Fairness. INFOCOM 2009: 1053-1061 - [c14]Ryoichi Kawahara, Eng Keong Lua, Masato Uchida, Satoshi Kamei, Hideaki Yoshino:
On the Quality of Triangle Inequality Violation Aware Routing Overlay Architecture. INFOCOM 2009: 2761-2765 - 2008
- [j7]Yan Zhang, Masato Uchida, Masato Tsuru, Yuji Oie:
TCP Flow Level Performance Evaluation on Error Rate Aware Scheduling Algorithms in Evolved UTRA and UTRAN Networks. IEICE Trans. Commun. 91-B(3): 761-771 (2008) - [c13]Akira Nagata, Shinya Yamamura, Masato Uchida, Masato Tsuru:
Proxy data transfer system with a stable control channel and dynamically changing data channels. Challenged Networks 2008: 121-124 - [c12]Kento Ichikawa, Masato Uchida, Masato Tsuru, Yuji Oie:
Scaling properties of complex networks: Towards Wilsonian renormalization for complex networks. WiOpt 2008: 584-587 - 2007
- [j6]Tatsuya Mori, Tetsuya Takine, Jianping Pan, Ryoichi Kawahara, Masato Uchida, Shigeki Goto:
Identifying Heavy-Hitter Flows from Sampled Flow Statistics. IEICE Trans. Commun. 90-B(11): 3061-3072 (2007) - [j5]Kei Ohnishi, Masato Uchida, Yuji Oie:
Evolution and Learning Mediated by Differences in Developmental Timing. J. Adv. Comput. Intell. Intell. Informatics 11(8): 905-913 (2007) - [c11]Yan Zhang, Masato Uchida, Masato Tsuru, Yuji Oie:
Can Scheduling with Error Rate Consideration Support TCP Performance Comparable to Packet Combining HARQ in Evolved UTRA and UTRAN Networks? ECUMN 2007: 135-144 - [c10]Masato Uchida, Yousuke Maehara, Hiroyuki Shioya:
Design of an Unsupervised Weight Parameter Estimation Method in Ensemble Learning. ICONIP (1) 2007: 771-780 - [c9]Masato Uchida:
Information theoretic aspects of fairness criteria in network resource allocation problems. VALUETOOLS 2007: 3 - 2006
- [j4]Masato Uchida, Satoshi Kamei, Ryoichi Kawahara, Takeo Abe:
QoS-Aware Overlay Routing with Limited Number of Alternative Route Candidates and Its Evaluation. IEICE Trans. Commun. 89-B(9): 2361-2374 (2006) - [c8]Masato Uchida, Satoshi Kamei, Ryoichi Kawahara:
Performance Evaluation of QoS-Aware Routing in Overlay Network. ICOIN 2006: 925-934 - [c7]Kei Ohnishi, Hiroshi Yamamoto, Kento Ichikawa, Masato Uchida, Yuji Oie:
Storage load balancing via local interactions among peers in unstructured P2P networks. Infoscale 2006: 55 - [c6]Yan Zhang, Masato Uchida, Masato Tsuru, Yuji Oie:
Scheduling algorithms with error rate consideration in HSDPA networks. IWCMC 2006: 1241-1246 - [c5]Yan Zhang, Masato Uchida, Masato Tsuru, Yuji Oie:
Effect of Introducing Predictive CIR on Throughput Performance in HSDPA Networks. PIMRC 2006: 1-5 - 2005
- [j3]Masato Uchida, Shinya Nogami:
Hop-Value-Based Query-Packet Forwarding for Pure P2P. IEICE Trans. Commun. 88-B(12): 4517-4522 (2005) - [j2]Tatsuya Mori, Masato Uchida, Shigeki Goto:
Flow analysis of internet traffic: World Wide Web versus peer-to-peer. Syst. Comput. Jpn. 36(11): 70-81 (2005) - [c4]Masato Uchida:
Modeling Viral Spread by Random Scanning and Its Relationship with the Epidemiological Model. IPDPS 2005 - [c3]Shinya Nogami, Masato Uchida, Takeo Abe:
Replication scheme for traffic load balancing and its parameter tuning in pure P2P communication. ISADS 2005: 701-706 - 2004
- [j1]Masato Uchida:
Traffic Data Analysis Based on Extreme Value Theory and Its Applications to Predicting Unknown Serious Deterioration. IEICE Trans. Inf. Syst. 87-D(12): 2654-2664 (2004) - [c2]Masato Uchida:
Traffic data analysis based on extreme value theory and its applications. GLOBECOM 2004: 1418-1424 - [c1]Tatsuya Mori, Masato Uchida, Ryoichi Kawahara, Jianping Pan, Shigeki Goto:
Identifying elephant flows through periodically sampled packets. Internet Measurement Conference 2004: 115-120
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-27 21:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint