Detecting ransomware using support vector machines Y Takeuchi, K Sakai, S Fukumoto Workshop Proceedings of the 47th International Conference on Parallel …, 2018 | 108 | 2018 |
Timer-based CDS construction in wireless ad hoc networks K Sakai, SCH Huang, WS Ku, MT Sun, X Cheng IEEE Transactions on mobile computing 10 (10), 1388-1402, 2010 | 47 | 2010 |
A Framework for the Optimal -Coverage Deployment Patterns of Wireless Sensors K Sakai, MT Sun, WS Ku, TH Lai, AV Vasilakos IEEE Sensors Journal 15 (12), 7273-7283, 2015 | 46 | 2015 |
Performance and security analyses of onion-based anonymous routing for delay tolerant networks K Sakai, MT Sun, WS Ku, J Wu, FS Alanazi IEEE Transactions on Mobile Computing 16 (12), 3473-3487, 2017 | 38 | 2017 |
Freeway travel time prediction using deep hybrid model–taking Sun Yat-Sen freeway as an example PY Ting, T Wada, YL Chiu, MT Sun, K Sakai, WS Ku, AAK Jeng, JS Hwu IEEE Transactions on Vehicular Technology 69 (8), 8257-8266, 2020 | 34 | 2020 |
Multi-initiator connected dominating set construction for mobile ad hoc networks K Sakai, F Shen, KM Kim, MT Sun, H Okada 2008 IEEE International Conference on Communications, 2431-2436, 2008 | 32 | 2008 |
Dynamic bit encoding for privacy protection against correlation attacks in RFID backward channel K Sakai, WS Ku, R Zimmermann, MT Sun IEEE TRANSACTIONS on computers 62 (1), 112-123, 2011 | 29 | 2011 |
An analysis of onion-based anonymous routing for delay tolerant networks K Sakai, MT Sun, WS Ku, J Wu, FS Alanazi 2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016 | 28 | 2016 |
Maintaining CDS in mobile ad hoc networks K Sakai, MT Sun, WS Ku, H Okada Wireless Algorithms, Systems, and Applications: Third International …, 2008 | 27 | 2008 |
Private and secure tag access for large-scale RFID systems MT Sun, K Sakai, WS Ku, TH Lai, AV Vasilakos IEEE Transactions on Dependable and Secure Computing 13 (6), 657-671, 2015 | 25 | 2015 |
The optimal k-covering tag deployment for RFID-based localization WS Ku, K Sakai, MT Sun Journal of Network and Computer Applications 34 (3), 914-924, 2011 | 23 | 2011 |
Secure data communications in wireless networks using multi-path avoidance routing K Sakai, MT Sun, WS Ku, J Wu, TH Lai IEEE Transactions on Wireless Communications 18 (10), 4753-4767, 2019 | 22 | 2019 |
Multi-path based avoidance routing in wireless networks K Sakai, MT Sun, WS Ku, J Wu, TH Lai 2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015 | 21 | 2015 |
Data-intensive routing in delay-tolerant networks K Sakai, MT Sun, WS Ku IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2440-2448, 2019 | 19 | 2019 |
G-STAR: Geometric STAteless Routing for 3-D wireless sensor networks MT Sun, K Sakai, BR Hamilton, WS Ku, X Ma Ad Hoc Networks 9 (3), 341-354, 2011 | 19 | 2011 |
Fast connected dominating set construction in mobile ad hoc networks K Sakai, MT Sun, WS Ku 2009 IEEE International Conference on Communications, 1-6, 2009 | 19 | 2009 |
Contact avoidance routing in delay tolerant networks T Osuki, K Sakai, S Fukumoto IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017 | 18 | 2017 |
A novel DDoS attack defending framework with minimized bilateral damages Y Chen, WS Ku, K Sakai, C DeCruze 2010 7th IEEE Consumer Communications and Networking Conference, 1-5, 2010 | 17 | 2010 |
On anonymous routing in delay tolerant networks K Sakai, MT Sun, WS Ku, J Wu IEEE Transactions on Mobile Computing 18 (12), 2926-2940, 2018 | 15 | 2018 |
Privacy-preserving collaborative filtering using fully homomorphic encryption S Jumonji, K Sakai, MT Sun, WS Ku IEEE Transactions on Knowledge and Data Engineering 35 (3), 2961-2974, 2021 | 14 | 2021 |