Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Yoichi SatoProfessor, Institute of Industrial Science, The University of TokyoVerified email at iis.u-tokyo.ac.jp
Andreas BullingProfessor of Computer Science, University of StuttgartVerified email at vis.uni-stuttgart.de
Xucong ZhangDelft University of TechnologyVerified email at tudelft.nl
Yasuyuki MatsushitaOsaka UniversityVerified email at ist.osaka-u.ac.jp
Takahiro OkabeKyushu Institute of TechnologyVerified email at ai.kyutech.ac.jp
Feng LuProfessor, Beihang UniversityVerified email at buaa.edu.cn
Mario FritzFaculty CISPA Helmholtz Center for Information Security; Professor Saarland UniversityVerified email at cispa.de
Akihiro SugimotoNational Institute of InformaticsVerified email at nii.ac.jp
Julian SteilRobert Bosch GmbHVerified email at de.bosch.com
Masaki SamejimaAmazon Web Services JapanVerified email at amazon.co.jp
Hideki KoikeTokyo Institute of TechnologyVerified email at c.titech.ac.jp
Kazuo Hiraki 開 一夫The University of TokyoVerified email at idea.c.u-tokyo.ac.jp
Hiroaki SantoOsaka UniversityVerified email at ist.osaka-u.ac.jp
Tadas BaltrušaitisScientist, MicrosoftVerified email at microsoft.com
Peter RobinsonProfessor of Computer Technology, University of CambridgeVerified email at cam.ac.uk
Keisuke OGAKIM3, Inc.Verified email at dwango.co.jp
Yifei HuangThe University of TokyoVerified email at ut-vision.org
Daisuke SugimuraAssociate Professor, Tsuda UniversityVerified email at tsuda.ac.jp
Kentaro YAMADARakuten, incVerified email at rakuten.com
Boxin ShiPeking UniversityVerified email at pku.edu.cn
Follow
Yusuke Sugano
Institute of Industrial Science, The University of Tokyo
Verified email at iis.u-tokyo.ac.jp - Homepage