Hiroshi Esaki

ORCID: 0000-0001-5657-9216
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Internet Traffic Analysis and Secure E-voting
  • Network Traffic and Congestion Control
  • Caching and Content Delivery
  • Opportunistic and Delay-Tolerant Networks
  • Software-Defined Networks and 5G
  • Mobile Ad Hoc Networks
  • IPv6, Mobility, Handover, Networks, Security
  • Energy Efficient Wireless Sensor Networks
  • Privacy-Preserving Technologies in Data
  • Vehicular Ad Hoc Networks (VANETs)
  • Mobile Agent-Based Network Management
  • Network Packet Processing and Optimization
  • Anomaly Detection Techniques and Applications
  • Advanced Malware Detection Techniques
  • Interconnection Networks and Systems
  • IoT and Edge/Fog Computing
  • Peer-to-Peer Network Technologies
  • Advanced Optical Network Technologies
  • Software System Performance and Reliability
  • Autonomous Vehicle Technology and Safety
  • Multimedia Communication and Technology
  • Cloud Computing and Resource Management
  • Wireless Networks and Protocols
  • IoT-based Smart Home Systems

The University of Tokyo
2016-2025

Tokyo University of Information Sciences
2024

Bunkyo University
2003-2022

Takenaka (Japan)
2019

Japan Graduate School of Education University
2017

Chulalongkorn University
2012

Central Region Agricultural Research Center
2007

Toshiba (Japan)
1995-2003

Columbia University
2003

Toshiba (South Korea)
1997

It has been reported worldwide that peer-to-peer traffic is taking up a significant portion of backbone networks. In particular, it prominent in Japan because the high penetration rate fiber-based broadband access. this paper, we first report aggregated measurements collected over 21 months from seven ISPs covering 42% Japanese traffic. The dominated by symmetric residential which increased 37%in 2005. We further investigate per-customer trafficc one comparing DSL and fiber users,...

10.1145/1151659.1159938 article EN ACM SIGCOMM Computer Communication Review 2006-08-11

For cooperative intelligent transport systems (C-ITS), vehicle-to-everything (V2X) communication is utilized to allow autonomous vehicles share critical information with each other. We propose AutowareV2X, an implementation of a V2X module that integrated into the driving (AD) software, Autoware. AutowareV2X provides external connectivity entire AD stack, enabling end-to-end (E2E) experimentation and evaluation connected (CAV). The Collective Perception Service was also implemented, allowing...

10.1109/vtc2023-spring57618.2023.10199425 article EN 2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring) 2023-06-01

It has been reported worldwide that peer-to-peer traffic is taking up a significant portion of backbone networks. In particular, it prominent in Japan because the high penetration rate fiber-based broadband access. this paper, we first report aggregated measurements collected over 21 months from seven ISPs covering 42% Japanese traffic. The dominated by symmetric residential which increased 37%in 2005. We further investigate per-customer trafficc one comparing DSL and fiber users,...

10.1145/1159913.1159938 article EN 2006-08-11

It is often argued that rapidly increasing video content along with the penetration of high-speed access leading to explosive growth in Internet traffic. Contrary this popular claim, technically solid reports show only modest traffic worldwide. This paper sheds light on causes apparently slow trends by analyzing commercial residential Japan where fiber rate much higher than other countries. We first report Japanese also has rates using aggregated measurements from six ISPs. Then, we...

10.1145/1544012.1544024 article EN 2008-01-01

A typical large building contains thousands of sensors, monitoring the HVAC system, lighting, and other operational sub-systems. With increased push for efficiency, operators are relying more on historical data processing to uncover opportunities energy-savings. However, they overwhelmed with deluge seek efficient ways identify potential problems. In this paper, we present a new approach called Strip, Bind Search (SBS); method uncovering abnormal equipment behavior in-concert usage patterns....

10.1145/2461381.2461399 article EN 2013-04-08

Network log messages (e.g., syslog) are expected to be valuable and useful information detect unexpected or anomalous behavior in large scale networks. However, because of the huge amount system data collected daily operation, it is not easy extract pinpoint failures identify their causes. In this paper, we propose a method for extracting identifying causes from network syslog data. The methodology proposed paper relies on causal inference that reconstructs causality events set time series...

10.1109/tnsm.2017.2778096 article EN IEEE Transactions on Network and Service Management 2017-11-28

Vehicle-to-Everything (V2X) communication enhances the capability of autonomous driving through better safety, efficiency, and comfort. In particular, sensor data sharing, known as cooperative perception, is a crucial technique to accommodate vulnerable road users in intelligent transport system (ITS). this paper, we describe roadside perception unit (RSPU) that combines sensors units (RSUs) for infrastructure-based perception. We propose software called AutoC2X designed realize RSPUs...

10.3390/s20185320 article EN cc-by Sensors 2020-09-17

Predominant network intrusion detection systems (NIDS) aim to identify malicious traffic patterns based on a handcrafted dataset of rules. Recently, the application machine learning in NIDS helps alleviate enormous effort human observation. Federated (FL) is collaborative scheme concerning distributed data. Instead sharing raw data, it allows participant share only trained local model. Despite success existing FL solutions, NIDS, network's data distribution does not always fit into single...

10.1109/ojcoms.2020.3044323 article EN cc-by IEEE Open Journal of the Communications Society 2020-12-17

Wider coverage and a better solution to latency reduction in 5G necessitate its combination with multi-access edge computing (MEC) technology. Decentralized deep learning (DDL) such as federated swarm promising privacy-preserving data processing for millions of smart devices, leverages distributed multi-layer neural networks within the networking local clients, whereas, without disclosing original training data. Notably, industries finance healthcare where sensitive transactions personal...

10.1109/tai.2021.3133819 article EN cc-by IEEE Transactions on Artificial Intelligence 2021-12-09

This paper investigates the effects of rapidly-growing residential broadband traffic on commercial ISP backbone networks. We collected month-long aggregated logs for different groups from seven major ISPs in Japan order to analyze macro-level impact broad-band traffic. These are carefully selected be summable, and not count same multiple times.Our results show that (1) customer our data exceeds 100Gbps average. Our is considered cover 41% total Japan, thus we can estimate currently about...

10.1145/1052812.1052820 article EN ACM SIGCOMM Computer Communication Review 2005-01-01

This paper presents our field experience in data collection from remote sensors. By letting tractors, farmers, and sensors have short-range radio communication devices with delay-disruption tolerant networking (DTN), we can collect those to central database. Although, several implementations been made cellular phones or mesh networks the past, DTN-based systems for such applications are still under explored. The main objective of this is present practical implementation experiences software,...

10.1109/jsen.2011.2170562 article EN IEEE Sensors Journal 2011-10-05

The realization of vehicle-to-everything (V2X) communication enhances the capabilities autonomous vehicles in terms safety efficiency and comfort. In particular, sensor data sharing, known as cooperative perception, is a crucial technique to accommodate vulnerable road users intelligent transport system (ITS). this regard, open-source software plays significant role prototyping, validation, deployment. Specifically, developer community, Autoware popular for self-driving vehicles, OpenC2X an...

10.1109/vtc2020-fall49728.2020.9348525 preprint EN 2020-11-01

The commercialization of 5G has been initiated for a while. Furthermore, millimeter wave (mmWave) introduced to small cells with coverage due its strong linearity and non-winding characteristics. On the other hand, in connected autonomous vehicles (CAV s), where various traffic systems can cooperatively perform recognition, decision-making, execution, communication is assumed be always connected. Therefore, use low latency mm Wave high-speed moving CAV, existing beamforming cannot follow...

10.1109/ccnc51664.2024.10454766 article EN 2024-01-06

System log from network equipment is one of the most important information for management. Sophisticated message mining could help in investigating a huge number messages trouble shooting, especially recent complicated structure (e.g., virtualized networks). However, generating templates (i.e., meta format) real (instances) still difficult problem terms accuracy. In this paper we propose Natural Language Processing (NLP) approach to generate produced by order overcome problem. The key idea...

10.1145/2619287.2619290 article EN 2014-06-10

Privacy-sensitive data is stored in autonomous vehicles, smart devices, or sensor nodes that can move around with making opportunistic contact each other. Federation among such was mainly discussed the context of federated learning a centralized mechanism many works. However, because multi-vendor issues, those do not want to rely on specific server operated by third party for this purpose. In paper, we propose wireless ad hoc (WAFL) -- fully distributed cooperative machine organized...

10.48550/arxiv.2205.11779 preprint EN cc-by arXiv (Cornell University) 2022-01-01

Abstract The increasing demand for remote collaboration and working has become crucial to daily life owing the Covid-19 pandemic development of internet-based video distribution services. Furthermore, low-latency collaboration, such as teleoperation support applications designed in-vehicle environments, gained considerable attention. 5 G technology is considered a key infrastructure collaboration. This study aimed evaluate actual capability achieve high quality service (QoS) We implemented...

10.1007/s10922-023-09778-5 article EN cc-by Journal of Network and Systems Management 2023-10-24

Intelligent buildings are getting data-centric - they archive the historical records of motion detectors, power usages, HVAC statuses, weather, and any other information in order to improve their control strategies. The engineering cost installation maintenance such systems should be minimized as system owner has operate them for several decades: i.e., lifetime building. However, there design pitfalls that multiply costs, which make operation heavy burden. This paper identifies those...

10.1109/infcomw.2011.5928814 article EN 2011-04-01

Traditional approaches to cybersecurity issues usually protect users from attacks after the occurrence of specific types attacks. Besides, patterns recent cyberattacks tend be changeable, which add up unpredictability them. On other hand, machine learning, as a new method used detect intrusion, is attracting more and attention. Moreover, through sharing local training data, centralized learning approach has proven improve model's performance. In this research, segmented federated proposed,...

10.1109/ijcnn48605.2020.9207094 article EN 2022 International Joint Conference on Neural Networks (IJCNN) 2020-07-01

IPv6 has been designed, among other things, to provide an expanded address space satisfy the future networking requirements. In this article, we analyze and discuss important aspects of deployment scenarios, propose system architecture coexisting integrating with IPv4/MPLS networks. We investigate on various strategies along network design examples, comparing these techniques. Then in service provider environments is proposed.

10.1109/mcom.2004.1262167 article EN IEEE Communications Magazine 2004-01-01

Abstract A novel host behavior classification approach is proposed as a preliminary step toward traffic and anomaly detection in network communication. Although many attempts described the literature were devoted to flow or application classifications, these approaches are not always adaptable operational constraints of monitoring (expected work even without packet payload, bidirectionality, on high‐speed networks from reports only, etc.). Instead, here relies leading idea that relevantly...

10.1002/nem.750 article EN International Journal of Network Management 2010-08-30
Coming Soon ...