Yuji Watanabe  Yuji Watanabe photo         

contact information

Senior Technical Staff Member (STSM), Hybrid Cloud Security & Compliance
IBM Research - Tokyo, Japan



Towards Federated Graph Learning for Collaborative Financial Crimes Detection
Toyotaro Suzumura, Yi Zhou, Natahalie Baracaldo, Guangnan Ye, Keith Houck, Ryo Kawahara, Ali Anwar, Lucia Larise Stavarache, Yuji Watanabe, Pablo Loyola, Daniel Klyashtorny, Heiko Ludwig, Kumar Bhaskaran
arXiv e-prints, arXiv:1909.12946, 2019


Villani at SemEval-2018 Task 8: Semantic Extraction from Cybersecurity Reports using Representation Learning
Pablo Loyola, Kugamoorthy Gajananan, Yuji Watanabe, Fumiko Satoh
Proceedings of The 12th International Workshop on Semantic Evaluation, pp. 885--889, 2018


Leveraging the Serverless Architecture for Securing Linux Containers
Nilton Bila, Paolo Dettori, Ali Kanso, Yuji Watanabe, Alaa Youssef
2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 401-404
Abstract   vulnerability, operating system, computer security, computer science, architecture


Vibration-base Key Exchange among Multiple Smart Devices on the Desk
Alisa Arno, Kentaroh Toyoda, Yuji Watanabe, Iwao Sasase, P. Takis Mathiopoulos
Image Processing and Communications 21(2), 33-42, 2016
Abstract   vulnerability, vibration, key exchange, eavesdropping, desk, data sharing, computer security, computer science, android, accelerometer


A financial risk evaluation service for integrating private portfolios securely
Yuji Watanabe, Akira Koseki
Service Operations and Logistics, and Informatics (SOLI), 2014 IEEE International Conference on, pp. 59-64
risk management, risk analysis, marketing, it risk management, financial risk management, financial risk, engineering, actuarial science

Advanced security and privacy in connected vehicles
H Kitayama, S Munetoh, K Ohnishi, N Uramoto, Y Watanabe
IBM Journal of Research and Development 58(1), 7--1, IBM, 2014


A Pluggable Domain Management Approach for Building Practical Distributed Coalitions
Yasuharu Katsuno, Yuji Watanabe, Michiharu Kudo, Eiji Okamoto
Availability, Reliability and Security, 2009. ARES'09. International Conference on, pp. 1--8


Checking assignments of controls to risks for internal control
Y Arimoto, M Kudoh, Y Watanabe, K Futatsugi
Proceedings of the 2nd International Conference on Theory and Practice of Electronic Governance, pp. 98--104, 2008


Chinese-wall process confinement for practical distributed coalitions
Yasuharu Katsuno, Yuji Watanabe, Sanehiro Furuichi, Michiharu Kudo
Proceedings of the 12th ACM symposium on Access control models and technologies, pp. 225--234, 2007

Parts Traceability for Manufacturers
C Robson, Y Watanabe, M Numao
Proc, 2007

Dynamic information flow control architecture for web applications
Sachiko Yoshihama, Takeo Yoshizawa, Yuji Watanabe, Michiharu Kudoh, Kazuko Oyanagi
Computer Security--ESORICS 2007, pp. 267--282, Springer


Bridging the gap between inter-communication boundary and internal trusted components
Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo, Hiroshi Maruyama
Computer Security--ESORICS 2006, pp. 65--80, Springer

Layering negotiations for flexible attestation
Yasuharu Katsuno, Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudoh
Proceedings of the first ACM workshop on Scalable trusted computing, pp. 17--20, 2006


Dynamic Group Key Construction for P2P Multicast
Transactions 45(2), 597--604, 2004


Fair Private List Matching Schemes
Transactions 44(8), 2117--2125, 2003

Multi-round secure light-weight broadcast exclusion protocol with pre-processing
Y Watanabe, M Numao
Computer Security--ESORICS 2003, 85--99, Springer


Conditional cryptographic delegation for P2P data sharing
Y Watanabe, M Numao
Information Security, 309--321, Springer, 2002

Year Unknown

Towards Multi--Layer Trusted Virtual Domains
Yasuharu Katsuno Michiharu Kudo, Ronald Perez Reiner Sailer, Yuji Watanabe Sachiko Yoshihama, Leendert van Doorn
Citeseer, Citeseer, 0