Top-k Query Processing and Malicious Node Identification against Data Replacement Attack in MANETs
Tsuda, Takuji, Komai, Yuka, Sasaki, Yuya, Hara, Takahiro, Nishio, Shojiro
Published in 2014 IEEE 15th International Conference on Mobile Data Management (01.07.2014)
Published in 2014 IEEE 15th International Conference on Mobile Data Management (01.07.2014)
Get full text
Conference Proceeding
Testing and relaxing the exclusion restriction in the control function approach
D’Haultfœuille, Xavier, Hoderlein, Stefan, Sasaki, Yuya
Published in Journal of econometrics (01.03.2024)
Published in Journal of econometrics (01.03.2024)
Get full text
Journal Article
Extranodal natural killer/T-cell lymphoma, nasal type developing central nervous system and epididymis involvement immediately after concurrent chemoradiotherapy
Sasaki, Yuya, Yonezawa, Akihito, Kinoshita, Yoshihiro, Kitagawa, Tomoya, Mori, Minako, Onaka, Takashi, Imada, Kazunori
Published in Rinshō ketsueki (01.12.2015)
Published in Rinshō ketsueki (01.12.2015)
Get more information
Journal Article
Scaling Private Deep Learning with Low-rank and Sparse Gradients
Ito, Ryuichi, Liew, Seng Pei, Takahashi, Tsubasa, Sasaki, Yuya, Onizuka, Makoto
Published in Journal of Information Processing (2023)
Published in Journal of Information Processing (2023)
Get full text
Journal Article
Successful second cord blood transplantation (CBT) for late graft failure associated with several immune disorders after the initial CBT in a patient with acute myeloid leukemia
Mori, Minako, Yonezawa, Akihito, Kitagawa, Tomoya, Sasaki, Yuya, Onaka, Takashi, Imada, Kazunori
Published in Rinshō ketsueki (01.07.2015)
Published in Rinshō ketsueki (01.07.2015)
Get more information
Journal Article