default search action
Masahiro Hiji
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j4]Toshihiro Uchibayashi, Bernady O. Apduhan, Takuo Suganuma, Masahiro Hiji:
Experiments and Evaluation of a Container Migration Data-Auditing System on Edge Computing Environment. Comput. 12(2): 27 (2023) - 2018
- [j3]Masahiro Hiji:
Foreword. IEICE Trans. Commun. 101-B(1): 1 (2018) - 2015
- [j2]Ikuo Nakagawa, Masahiro Hiji, Hiroshi Esaki:
Dripcast - Architecture and Implementation of Server-less Java Programming Framework for Billions of IoT Devices. J. Inf. Process. 23(4): 458-464 (2015) - 1996
- [j1]Masahiro Hiji, Masatoshi Miyazaki, Hiroshi Nunokawa:
Communication computation model for modeling dynamic human communication. Syst. Comput. Jpn. 27(12): 63-72 (1996)
Conference and Workshop Papers
- 2024
- [c32]Ryo Meguro, Hiroya Kato, Shintaro Narisada, Seira Hidano, Kazuhide Fukushima, Takuo Suganuma, Masahiro Hiji:
Gradient-Based Clean Label Backdoor Attack to Graph Neural Networks. ICISSP 2024: 510-521 - 2022
- [c31]Toshihiro Uchibayashi, Bernady O. Apduhan, Takuo Suganuma, Masahiro Hiji:
Design and Implementation of a Data-Auditing Mechanism for Container Migration. DASC/PiCom/CBDCom/CyberSciTech 2022: 1-4 - [c30]Toshihiro Uchibayashi, Bernady O. Apduhan, Takuo Suganuma, Masahiro Hiji:
Toward a Container Migration Data-Auditing Mechanism for Edge Computing Environment. ICCSA (Workshops 3) 2022: 90-102 - 2021
- [c29]Shintaro Narisada, Yuki Matsumoto, Seira Hidano, Toshihiro Uchibayashi, Takuo Suganuma, Masahiro Hiji, Shinsaku Kiyomoto:
Countermeasures Against Backdoor Attacks Towards Malware Detectors. CANS 2021: 295-314 - [c28]Shigeru Fujita, Yutaro Taki, Yohtaro Miyanishi, Tokuyasu Kakuta, Masahiro Hiji, Kenji Sugawara, Norio Shiratori, Claude Moulin, Thierry Gidel:
"Digital-Ji-in": A Framework for Sustainable Digital Identification Records Based on A Peer-to-peer Network. CSCWD 2021: 1281-1286 - [c27]Ryoju Hamada, Tomomi Kaneko, Masahiro Hiji:
Designing Business Game by Student-Teacher Collaboration. ISAGA 2021: 239-253 - 2020
- [c26]Shintaro Narisada, Shoichiro Sasaki, Seira Hidano, Toshihiro Uchibayashi, Takuo Suganuma, Masahiro Hiji, Shinsaku Kiyomoto:
Stronger Targeted Poisoning Attacks Against Malware Detection. CANS 2020: 65-84 - [c25]Masahiro Hiji, Yuichi Hashi, Kazuhiko Kikuchi, Shigeru Fujita, Yohtaro Miyanishi, Norio Shiratori:
Noble Inheritance Mechanism of Digital Content for "Digital-Ji-in" toward Sustainable Society. CANDAR (Workshops) 2020: 254-259 - [c24]Toshihiro Uchibayashi, Bernady O. Apduhan, Takuo Suganuma, Masahiro Hiji:
A Cloud VM Migration Control Mechanism Using Blockchain. ICCSA (4) 2020: 221-235 - 2019
- [c23]Toshihiro Uchibayashi, Bernady O. Apduhan, Norio Shiratori, Takuo Suganuma, Masahiro Hiji:
Policy Management Technique Using Blockchain for Cloud VM Migration. DASC/PiCom/DataCom/CyberSciTech 2019: 360-362 - [c22]Ryoju Hamada, Nanako Iwasa, Tomomi Kaneko, Masahiro Hiji:
Resolving Migrant Issues in Thailand Using the Framework of 'Simulation Game - Project PAL'. ISAGA 2019: 343-357 - [c21]Shoichiro Sasaki, Seira Hidano, Toshihiro Uchibayashi, Takuo Suganuma, Masahiro Hiji, Shinsaku Kiyomoto:
On Embedding Backdoor in Malware Detectors Using Machine Learning. PST 2019: 1-5 - 2018
- [c20]Toshihiro Uchibayashi, Bernady O. Apduhan, Takuo Suganuma, Masahiro Hiji:
Toward a Secure VM Migration Control Mechanism Using Blockchain Technique for Cloud Computing Environment. ICCSA (3) 2018: 177-186 - 2017
- [c19]Toshihiro Uchibayashi, Yuichi Hashi, Seira Hidano, Shinsaku Kiyomoto, Bernady O. Apduhan, Toru Abe, Takuo Suganuma, Masahiro Hiji:
A Control Mechanism for Live Migration with Data Regulations Preservation. ICCSA (1) 2017: 509-522 - [c18]Ryoju Hamada, Tomomi Kaneko, Masahiro Hiji:
Development of BASE Manufacturing Business Board Game. ISAGA 2017: 34-40 - [c17]Toshihiro Uchibayashi, Yuichi Hashi, Seira Hidano, Shinsaku Kiyomoto, Takuo Suganuma, Masahiro Hiji:
Verification of Data Collection Methods for Live Migration Protection Mechanism. NBiS 2017: 420-430 - 2016
- [c16]Ikuo Nakagawa, Masahiro Hiji, Hiroshi Esaki:
Design and Implementation of Global Reference and Indirect Method Invocation Mechanisms in the Dripcast. COMPSAC Workshops 2016: 338-343 - [c15]Yuichi Hashi, Toshihiro Uchibayashi, Seira Hidano, Shinsaku Kiyomoto, Abdur Rahim Biswas, Takuo Suganuma, Masahiro Hiji:
Data Protection for Cross-Border Live Migration in Multi-cloud Environment. CANDAR 2016: 681-685 - [c14]Tomomi Kaneko, Ryoju Hamada, Masahiro Hiji:
Effectiveness of analogue business game for learning elementary corporate management : An experimental approach. KICSS 2016: 1-6 - [c13]Toshihiro Uchibayashi, Masahiro Hiji, Takuo Suganuma, Yuichi Hashi, Seira Hidano:
Proposed data audit system enhances use in accordance with the data owner's policy. KICSS 2016: 1-5 - 2015
- [c12]Yuichi Hashi, Kazuyoshi Matsumoto, Yoshinori Seki, Masahiro Hiji, Toru Abe, Takuo Suganuma:
Data Management Scheme to Enable Efficient Analysis of Sensing Data for Smart Community. COMPSAC Workshops 2015: 182-187 - [c11]Ikuo Nakagawa, Yoshifumi Hashimoto, Mitsuharu Goto, Masahiro Hiji, Yutaka Kikuchi, Masahiro Fukumoto, Shinji Shimojo:
DHT Extension of m-Cloud - Scalable and Distributed Privacy Preserving Statistical Computation on Public Cloud. COMPSAC Workshops 2015: 682-683 - [c10]Yuichi Hashi, Kazuyoshi Matsumoto, Yoshinori Seki, Masahiro Hiji, Toru Abe, Takuo Suganuma:
Design and Implementation of Data Management Scheme to Enable Efficient Analysis of Sensing Data. ICAC 2015: 319-324 - [c9]Tomomi Kaneko, Ryoju Hamada, Masahiro Hiji:
Experimental Teaching of Collaborative Knowledge Creation Using Analogue Games. KICSS 2015: 69-76 - 2014
- [c8]Ikuo Nakagawa, Masahiro Hiji, Hiroshi Esaki:
Dripcast - Server-less Java Programming Framework for Billions of IoT Devices. COMPSAC Workshops 2014: 186-191 - [c7]Ikuo Nakagawa, Masahiro Hiji, Yutaka Kikuchi, Masahiro Fukumoto, Shinji Shimojo:
m-cloud - Distributed Statistical Computation Using Multiple Cloud Computers. COMPSAC Workshops 2014: 301-305 - 2008
- [c6]Munakata Satoshi, Kunio Saito, Masahiro Hiji:
A new session management method for efficient mobile access to web applications. CIT 2008: 497-502 - 2006
- [c5]Masaru Tezuka, Masaharu Munetomo, Kiyoshi Akama, Masahiro Hiji:
Genetic Algorithm to Optimize Fitness Function with Sampling Error and its Application to Financial Optimization Problem. IEEE Congress on Evolutionary Computation 2006: 81-87 - 2003
- [c4]Masaru Tezuka, Masahiro Hiji:
Genetic Algorithm for Supply Planning Optimization under Uncertain Demand. GECCO 2003: 2337-2346 - 2000
- [c3]Masaru Tezuka, Masahiro Hiji, Kazunori Miyabayashi, Keigo Okumura:
A New Genetic Representation and Common Cluster Crossover for Job Shop Scheduling Problems. EvoWorkshops 2000: 297-306 - 1999
- [c2]Masahiro Hiji, Masaru Tezuka:
Modeling Manufacturing Resources based on Agent Model. ISADS 1999: 107-115 - 1997
- [c1]Masahiro Hiji, Hiroshi Nunokawa, Masatoshi Miyazaki:
A communication computation model for developing computer supported cooperative work systems. ISADS 1997: 213-220
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint