default search action
Toshiyuki Nakata 0001
Person information
- unicode name: 中田 登志之
- affiliation: University of Tokyo, Japan
Other persons with the same name
- Toshiyuki Nakata 0002 — Chiba University, Chiba, Japan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c22]Tran Van Sang, Tran Phuong Thao, Rie Shigetomi Yamaguchi, Toshiyuki Nakata:
Enhancing Boundary Attack in Adversarial Image Using Square Random Constraint. IWSPA@CODASPY 2022: 13-23 - [c21]Tran Van Sang, Rie Shigetomi Yamaguchi, Ryosuke Kobayashi, Toshiyuki Nakata:
Evaluating the Performance Acceleration of Generalized Linear Solver using Normal Equation on Three Architectures for Tall Skinny Datasets. CSCI 2022: 134-139 - [c20]Tran Van Sang, Rie Shigetomi Yamaguchi, Mhd Irvan, Toshiyuki Nakata:
Component-Wise Natural Gradient Descent on Deep Neural Networks. CSCI 2022: 183-188 - [c19]Tran Van Sang, Mhd Irvan, Rie Shigetomi Yamaguchi, Toshiyuki Nakata:
Component-Wise Natural Gradient Descent - An Efficient Neural Network Optimization. CANDAR 2022: 66-75 - [i1]Tran Van Sang, Mhd Irvan, Rie Shigetomi Yamaguchi, Toshiyuki Nakata:
Component-Wise Natural Gradient Descent - An Efficient Neural Network Optimization. CoRR abs/2210.05268 (2022) - 2021
- [c18]Mhd Irvan, Tran Phuong Thao, Ryosuke Kobayashi, Toshiyuki Nakata, Rie Shigetomi Yamaguchi:
Learning from Smartphone Location Data as Anomaly Detection for Behavioral Authentication through Deep Neuroevolution. ICISSP 2021: 723-728 - 2020
- [j5]Rie Shigetomi Yamaguchi, Toshiyuki Nakata, Ryosuke Kobayashi:
Redefine and Organize, 4th Authentication Factor, Behavior. Int. J. Netw. Comput. 10(2): 189-199 (2020) - [c17]Mhd Irvan, Toshiyuki Nakata, Rie Shigetomi Yamaguchi:
User authentication based on smartphone application usage patterns through learning classifier systems. IEEE BigData 2020: 4462-4466 - [c16]Zicong Zhu, Tran Phuong Thao, Hoang-Quoc Nguyen-Son, Rie Shigetomi Yamaguchi, Toshiyuki Nakata:
Enhancing A New Classification for IDN Homograph Attack Detection. DASC/PiCom/CBDCom/CyberSciTech 2020: 507-514 - [c15]Tran Phuong Thao, Mhd Irvan, Ryosuke Kobayashi, Rie Shigetomi Yamaguchi, Toshiyuki Nakata:
Self-enhancing GPS-Based Authentication Using Corresponding Address. DBSec 2020: 333-344 - [c14]Mhd Irvan, Tran Phuong Thao, Ryosuke Kobayashi, Toshiyuki Nakata, Rie Shigetomi Yamaguchi:
Predicting Smartphone Users' Future Locations through Deep Reinforcement Learning. CANDAR (Workshops) 2020: 120-124 - [c13]Zicong Zhu, Tran Phuong Thao, Hoang-Quoc Nguyen-Son, Rie Shigetomi Yamaguchi, Toshiyuki Nakata:
Enhanced Classification Method for Homograph Attack Detection. CANDAR (Workshops) 2020: 380-386 - [c12]Tran Phuong Thao, Hoang-Quoc Nguyen-Son, Rie Shigetomi Yamaguchi, Toshiyuki Nakata:
Boosting Homograph Attack Classification Using Ensemble Learning and N-gram Model. TrustCom 2020: 1983-1988
2010 – 2019
- 2019
- [c11]Rie Shigetomi Yamaguchi, Toshiyuki Nakata, Ryosuke Kobayashi:
Redefine and Organize, 4th Authentication Factor, Behavior. CANDAR Workshops 2019: 412-415 - [c10]Tran Van Sang, Ryosuke Kobayashi, Rie Shigetomi Yamaguchi, Toshiyuki Nakata:
Accelerating Solution of Generalized Linear Models by Solving Normal Equation Using GPGPU on a Large Real-World Tall-Skinny Data Set. SBAC-PAD 2019: 112-119
2000 – 2009
- 2006
- [c9]Heiko Ludwig, Toshiyuki Nakata, Oliver Wäldrich, Philipp Wieder, Wolfgang Ziegler:
Reliable Orchestration of Resources Using WS-Agreement. HPCC 2006: 753-762
1990 – 1999
- 1999
- [c8]Yasushi Kanoh, Masaaki Nakamura, Tetsuya Hirose, Takeo Hosomi, Hirokazu Takayama, Toshiyuki Nakata:
Message Passing Communication in a Parallel Computer Cenju-4. ISHPC 1999: 55-70 - 1997
- [c7]Koutaro Hachiya, Toshiyuki Saito, Toshiyuki Nakata, Norio Tanabe:
Enhancement of parallelism for tearing-based circuit simulation. ASP-DAC 1997: 493-498 - 1995
- [j4]Tsutomu Maruyama, Yasushi Kanoh, Tetsuya Hirose, Kazuhiro Muramatsu, Toshiyuki Nakata, Yoshihiro Asano, Yu Inamura:
Architecture of a parallel machine: Cenju-3. Syst. Comput. Jpn. 26(14): 26-36 (1995) - 1994
- [c6]Kazuhiro Muramatsu, Shun Doi, Takumi Washio, Toshiyuki Nakata:
Cenju-3 parallel computer and its application to CFD. ISPAN 1994: 318-325 - 1992
- [j3]Tatsuoki Takeda, Keiji Tani, Toshihide Tsunematsu, Yasuaki Kishimoto, Gen'Ichi Kurita, Satoshi Matsushita, Toshiyuki Nakata:
Plasma simulator METIS for tokamak confinement and heating studies. Parallel Comput. 18(7): 743-765 (1992) - 1991
- [c5]Tsukasa Yamauchi, Akio Ishizuka, Toshiyuki Nakata, Nobuyuki Nishiguchi, Nobuhiko Koike:
PROTON: A Parallel Detailed Router on an MIMD Parallel Machine. ICCAD 1991: 340-343 - 1990
- [c4]Shigeru Takasaki, Nobuyoshi Nomizu, Yoshihiro Hirabayashi, Hiroshi Ishikura, Masahiro Kurashita, Nobuhiko Koike, Toshiyuki Nakata:
HAL III: function level hardware logic simulation. ICCD 1990: 167-170
1980 – 1989
- 1989
- [j2]Nobuhiko Koike, Toshiyuki Nakata, Nobuki Kajihara:
MAN-YO: Mixed level parallel logic simulation engine. Syst. Comput. Jpn. 20(10): 31-38 (1989) - 1988
- [j1]Nobuki Kajihara, Satoshi Matsushita, Toshiyuki Nakata, Nobuhiko Koike:
Parallel neural network simulation machine: Neuman. Neural Networks 1(Supplement-1): 544 (1988) - 1986
- [c3]Toshiyuki Nakata, Nobuhiko Koike:
A Functional Level Simulation Engine of MAN-YO: A Special Purpose Parallel Machine for Logic Design Automation. ISCA 1986: 202-208 - [c2]Shinji Tomita, Kiyoshi Shibayama, Toshiyuki Nakata, Shinji Yuasa, Hiroshi Hagiwara:
A Computer with Low-Level Parallelism QA-2: Its Applications to 3-D Graphics and Prolog/Lisp Machines. ISCA 1986: 280-289 - 1983
- [c1]Shinji Tomita, Kiyoshi Shibayama, Toshiaki Kitamura, Toshiyuki Nakata, Hiroshi Hagiwara:
A User-Microprogrammable, Local Host Computer With Low-Level Parallelism. ISCA 1983: 151-157
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint