Yaokai Feng
Yaokai Feng
Verified email at - Homepage
Cited by
Cited by
Lightweight classification of IoT malware based on image recognition
J Su, DV Vasconcellos, S Prasad, D Sgandurra, Y Feng, K Sakurai
2018 IEEE 42Nd annual computer software and applications conference (COMPSAC …, 2018
Machine learning-based IoT-botnet attack detection with sequential architecture
YN Soe, Y Feng, PI Santosa, R Hartanto, K Sakurai
Sensors 20 (16), 4372, 2020
Towards a lightweight detection system for cyber attacks in the IoT environment using corresponding features
YN Soe, Y Feng, PI Santosa, R Hartanto, K Sakurai
Electronics 9 (1), 144, 2020
A keypoint-based approach toward scenery character detection
S Uchida, Y Shigeyoshi, Y Kunishige, F Yaokai
2011 International Conference on Document Analysis and Recognition, 819-823, 2011
Characterizing immunoglobulin repertoire from whole blood by a personal genome sequencer
F Gao, E Lin, Y Feng, WJ Mack, Y Shen, K Wang
PLoS One 8 (9), e75294, 2013
A behavior-based method for detecting distributed scan attacks in darknets
Y Feng, Y Hori, K Sakurai, J Takeuchi
Journal of information processing 21 (3), 527-538, 2013
Packet in message based DDoS attack detection in SDN network using OpenFlow
X You, Y Feng, K Sakurai
2017 Fifth International Symposium on Computing and Networking (CANDAR), 522-528, 2017
Engineered warp knit auxetic fabrics
SC Ugbolue, YK Kim, SB Warner, Q Fan, CL Yang, O Kyzymchuk, Y Feng, ...
J Text Sci Eng 2 (1), 1e8, 2012
Scenery character detection with environmental context
Y Kunishige, F Yaokai, S Uchida
2011 International Conference on Document Analysis and Recognition, 1049-1053, 2011
A machine learning based approach for detecting DRDoS attacks and its performance evaluation
Y Gao, Y Feng, J Kawamoto, K Sakurai
2016 11th Asia Joint Conference on Information Security (AsiaJCIS), 80-86, 2016
Implementing lightweight iot-ids on raspberry pi using correlation-based feature selection and its performance evaluation
YN Soe, Y Feng, PI Santosa, R Hartanto, K Sakurai
International Conference on Advanced Information Networking and Applications …, 2019
Feature selection for machine learning-based early detection of distributed cyber attacks
Y Feng, H Akiyama, L Lu, K Sakurai
2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th …, 2018
Evolution process of the Late Silurian–Late Devonian tectonic environment in Qimantagh in the western portion of east Kunlun, China: Evidence from the geochronology and …
N Hao, W Yuan, A Zhang, Y Feng, J Cao, X Chen, X Cheng, X Mo
Journal of Earth System Science 124 (1), 171-196, 2015
Rule generation for signature based detection systems of cyber attacks in iot environments
YN Soe, Y Feng, PI Santosa, R Hartanto, K Sakurai
Bulletin of Networking, Computing, Systems, and Software 8 (2), 93-97, 2019
Analytical dynamic programming tracker
S Uchida, I Fujimura, H Kawano, Y Feng
Asian Conference on Computer Vision, 296-309, 2010
Comprehensive analysis of correlation coefficients estimated from pooling heterogeneous microarray data
MM Almeida-de-Macedo, N Ransom, Y Feng, J Hurst, ES Wurtele
BMC bioinformatics 14 (1), 1-14, 2013
Character image patterns as big data
S Uchida, R Ishida, A Yoshida, W Cai, Y Feng
2012 International Conference on Frontiers in Handwriting Recognition, 479-484, 2012
A part-based skew estimation method
S Shiraishi, Y Feng, S Uchida
2012 10th IAPR international workshop on document analysis systems, 185-189, 2012
C&C session detection using random forest
L Lu, Y Feng, K Sakurai
Proceedings of the 11th International Conference on Ubiquitous Information …, 2017
Statistical contact potentials in protein coarse-grained modeling: from pair to multi-body potentials
SP Leelananda, Y Feng, P Gniewek, A Kloczkowski, RL Jernigan
Multiscale Approaches to Protein Modeling, 127-157, 2011
The system can't perform the operation now. Try again later.
Articles 1–20