


default search action
Kentaroh Toyoda
Person information
- affiliation: Kanagawa Institute of Technology, Atsugi, Japan
- affiliation (PhD 2016): Keio University, Japan
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Alexander Kudzin
, Kentaroh Toyoda
, Mitsuru Kawazoe
, Satoshi Takayama, Atsushi Ishigame:
Scaling Ethereum 2.0's Cross-Shard Transactions With Efficient Verification and Aggregation of KZG Commitments. IEEE Internet Things J. 11(19): 31822-31835 (2024) - [j17]Kentaroh Toyoda
, Rachel Gan Kai Ying
, Allan NengSheng Zhang
, Puay Siew Tan
:
Identifying the Key Attributes in an Unlabeled Event Log for Automated Process Discovery. IEEE Trans. Serv. Comput. 17(1): 74-81 (2024) - [i6]Leon Witt, Armando Teles Fortes, Kentaroh Toyoda, Wojciech Samek, Dan Li:
Blockchain and Artificial Intelligence: Synergies and Conflicts. CoRR abs/2405.13462 (2024) - [i5]Mingzhe Li, Bo Gao, Kentaroh Toyoda, Yechao Yang, Juniarto Samsudin, Haibin Zhang, Qingsong Wei, Yong Liu, Rich Siow Mong Goh:
MStableChain: Towards Multi-Native Stablecoins in EVM-Compatible Blockchain for Stable Fee and Mass Adoption. CoRR abs/2410.22100 (2024) - [i4]Kentaroh Toyoda, Xiao Wang, Mingzhe Li, Bo Gao, Yuan Wang, Qingsong Wei:
Blockchain Data Analysis in the Era of Large-Language Models. CoRR abs/2412.09640 (2024) - 2023
- [j16]Leon Witt
, Mathis Heyer, Kentaroh Toyoda
, Wojciech Samek
, Dan Li
:
Decentral and Incentivized Federated Learning Frameworks: A Systematic Literature Review. IEEE Internet Things J. 10(4): 3642-3663 (2023) - [c44]Kentaroh Toyoda
:
Web3 Meets Behavioral Economics: An Example of Profitable Crypto Lottery Mechanism Design. MetaCom 2023: 678-679 - [i3]Kentaroh Toyoda
, Rachel Gan Kai Ying, Allan NengSheng Zhang, Puay Siew Tan
:
Identifying the Key Attributes in an Unlabeled Event Log for Automated Process Discovery. CoRR abs/2301.12829 (2023) - 2022
- [j15]Alexander Kudzin
, Kentaroh Toyoda
, Satoshi Takayama
, Atsushi Ishigame
:
Scaling Ethereum 2.0s Cross-Shard Transactions with Refined Data Structures. Cryptogr. 6(4): 57 (2022) - [c43]Kentaroh Toyoda
, Justin Lim Kim Moh, Nang Hsu Hlaing Mon, Alvin Soo:
Design and Implementation of Blockchain-enabled Immutable and Interoperable Data Management System for Enterprise Systems. ICCMB 2022: 7-11 - [i2]Leon Witt, Mathis Heyer, Kentaroh Toyoda
, Wojciech Samek, Dan Li:
Decentral and Incentivized Federated Learning Frameworks: A Systematic Literature Review. CoRR abs/2205.07855 (2022) - [i1]Kentaroh Toyoda
, Xuan-The Tran, Minh Sang Nguyen, Hung Tien Dinh:
Web3 Meets Behavioral Economics: An Example of Profitable Crypto Lottery Mechanism Design. CoRR abs/2206.03664 (2022) - 2020
- [j14]Kentaroh Toyoda
, Koji Machi, Yutaka Ohtake, Allan N. Zhang:
Function-Level Bottleneck Analysis of Private Proof-of-Authority Ethereum Blockchain. IEEE Access 8: 141611-141621 (2020) - [j13]Kentaroh Toyoda
, Jun Zhao
, Allan NengSheng Zhang
, P. Takis Mathiopoulos
:
Blockchain-Enabled Federated Learning With Mechanism Design. IEEE Access 8: 219744-219756 (2020) - [j12]Hiromu Asahina, Kentaroh Toyoda
, P. Takis Mathiopoulos
, Iwao Sasase, Hisao Yamamoto:
RPL-Based Tree Construction Scheme for Target-Specific Code Dissemination in Wireless Sensors Networks. IEICE Trans. Commun. 103-B(3): 190-199 (2020) - [j11]Chen Ye
, Kentaroh Toyoda
, Tomoaki Ohtsuki
:
Blind Source Separation on Non-Contact Heartbeat Detection by Non-Negative Matrix Factorization Algorithms. IEEE Trans. Biomed. Eng. 67(2): 482-494 (2020) - [c42]Takashi Nakamura, Kentaroh Toyoda
, Tomoaki Ohtsuki
:
On-Road Object Identification with Time Series Automotive Millimeter-wave Radar Information. VTC Spring 2020: 1-5
2010 – 2019
- 2019
- [j10]Kohei Yamamoto
, Kentaroh Toyoda
, Tomoaki Ohtsuki
:
Doppler Sensor-Based Blink Duration Estimation by Analysis of Eyelids Closing and Opening Behavior on Spectrogram. IEEE Access 7: 42726-42734 (2019) - [j9]Kentaroh Toyoda
, P. Takis Mathiopoulos
, Tomoaki Ohtsuki
:
A Novel Methodology for HYIP Operators' Bitcoin Addresses Identification. IEEE Access 7: 74835-74848 (2019) - [j8]Chen Ye
, Kentaroh Toyoda
, Tomoaki Ohtsuki
:
A Stochastic Gradient Approach for Robust Heartbeat Detection With Doppler Radar Using Time-Window-Variation Technique. IEEE Trans. Biomed. Eng. 66(6): 1730-1741 (2019) - [c41]Kentaroh Toyoda
, Allan N. Zhang:
Mechanism Design for An Incentive-aware Blockchain-enabled Federated Learning Platform. IEEE BigData 2019: 395-403 - [c40]Kentaroh Toyoda
, Mojtaba Shakeri, Xu Chi, Allan N. Zhang:
Performance Evaluation of Ethereum-based On-chain Sensor Data Management Platform for Industrial IoT. IEEE BigData 2019: 3939-3946 - [c39]Ryosuke Hiromatsu, Kohei Yamamoto, Kentaroh Toyoda
, Tomoaki Ohtsuki
:
Novel CA-CFAR Approach for Improvement of Doppler Sensor-based Heart Rate Variability Estimation. EMBC 2019: 796-799 - [c38]Kohei Yamamoto, Kentaroh Toyoda
, Tomoaki Ohtsuki
:
MUSIC-based Non-contact Heart Rate Estimation with Adaptive Window Size Setting. EMBC 2019: 6073-6076 - [c37]Wataru Takabatake, Kohei Yamamoto, Kentaroh Toyoda
, Tomoaki Ohtsuki
, Yohei Shibata, Atsushi Nagate:
FMCW Radar-Based Anomaly Detection in Toilet by Supervised Machine Learning Classifier. GLOBECOM 2019: 1-6 - [c36]Kohei Yamamoto, Kentaroh Toyoda
, Tomoaki Ohtsuki
:
CNN-Based Respiration Rate Estimation in Indoor Environments via MIMO FMCW Radar. GLOBECOM 2019: 1-6 - [c35]Kota Kanemura, Kentaroh Toyoda
, Tomoaki Ohtsuki
:
Identification of Darknet Markets' Bitcoin Addresses by Voting Per-address Classification Results. IEEE ICBC 2019: 154-158 - [c34]Kohei Yamamoto, Kentaroh Toyoda
, Tomoaki Ohtsuki
:
Spectrogram-Based Simultaneous Heartbeat and Blink Detection using Doppler Sensor. ICC 2019: 1-6 - [c33]Chen Ye
, Kentaroh Toyoda
, Tomoaki Ohtsuki
:
Non-Negative Matrix Factorization-Based Blind Source Separation for Non-Contact Heartbeat Detection. ICC 2019: 1-6 - 2018
- [j7]Kohei Yamamoto
, Kentaroh Toyoda
, Tomoaki Ohtsuki
:
Spectrogram-Based Non-Contact RRI Estimation by Accurate Peak Detection Algorithm. IEEE Access 6: 60369-60379 (2018) - [c32]Chen Ye
, Kentaroh Toyoda
, Tomoaki Ohtsuki
:
Improved Sparse Adaptive Algorithms for Accurate Non-contact Heartbeat Detection Using Time-Window-Variation Technique. EMBC 2018: 1-6 - [c31]Hiroto Kamoi, Kentaroh Toyoda
, Tomoaki Ohtsuki
:
Fall Detection Using UHF Passive RFID Based on the Neighborhood Preservation Principle. GLOBECOM 2018: 1-6 - [c30]Kohei Yamamoto, Kentaroh Toyoda
, Tomoaki Ohtsuki
:
Non-Contact Heartbeat Detection by MUSIC with Discrete Cosine Transform-Based Parameter Adjustment. GLOBECOM 2018: 1-6 - [c29]Yugo Agata, Tomoaki Ohtsuki
, Kentaroh Toyoda
:
Doppler Analysis Based Fall Detection Using Array Antenna. ICC 2018: 1-6 - [c28]Kohei Yamamoto, Kentaroh Toyoda
, Tomoaki Ohtsuki
:
Doppler Sensor-Based Blink Duration Estimation by Spectrogram Analysis. ICC 2018: 1-6 - [c27]Chen Ye
, Kentaroh Toyoda
, Tomoaki Ohtsuki
:
Robust Heartbeat Detection with Doppler Radar Based on Stochastic Gradient Approach. ICC 2018: 1-6 - [c26]Kentaroh Toyoda
, Tomoaki Ohtsuki
, P. Takis Mathiopoulos
:
Time Series Analysis for Bitcoin Transactions: The Case of Pirate@40's HYIP Scheme. ICDM Workshops 2018: 151-155 - [c25]Kentaroh Toyoda
, Tomoaki Ohtsuki
, P. Takis Mathiopoulos
:
Multi-Class Bitcoin-Enabled Service Identification Based on Transaction History Summarization. iThings/GreenCom/CPSCom/SmartData 2018: 1153-1160 - [c24]Hiromu Asahina, Kentaroh Toyoda
, Iwao Sasase, P. Takis Mathiopoulos
, Hisao Yamamoto:
An Energy Efficient Target Specific Code Dissemination Scheme with Forwarder Selection Algorithm in WSNs. PIMRC 2018: 1-6 - 2017
- [j6]Kentaroh Toyoda
, Mirang Park, Naonobu Okazaki, Tomoaki Ohtsuki
:
Novel Unsupervised SPITters Detection Scheme by Automatically Solving Unbalanced Situation. IEEE Access 5: 6746-6756 (2017) - [j5]Kentaroh Toyoda
, P. Takis Mathiopoulos
, Iwao Sasase, Tomoaki Ohtsuki
:
A Novel Blockchain-Based Product Ownership Management System (POMS) for Anti-Counterfeits in the Post Supply Chain. IEEE Access 5: 17465-17477 (2017) - [c23]Kentaroh Toyoda
, Tomoaki Ohtsuki
, P. Takis Mathiopoulos
:
Identification of High Yielding Investment Programs in Bitcoin via Transactions Pattern Analysis. GLOBECOM 2017: 1-6 - [c22]Takahiro Hori, Yoshihiro Kita, Kentaroh Toyoda
, Naonobu Okazaki, Mirang Park:
Empirical Evaluation of Rhythm-Based Authentication Method for Mobile Devices. NBiS 2017: 529-538 - [c21]Kota Kanemura, Kentaroh Toyoda
, Tomoaki Ohtsuki
:
Design of privacy-preserving mobile Bitcoin client based on γ-deniability enabled bloom filter. PIMRC 2017: 1-6 - [c20]Kohei Yamamoto, Kentaroh Toyoda
, Tomoaki Ohtsuki
:
Driver's blink detection using Doppler sensor. PIMRC 2017: 1-6 - 2016
- [j4]Kentaroh Toyoda
, Iwao Sasase:
Illegal Interrogation Detectable Products Distribution Scheme in RFID-Enabled Supply Chains. IEICE Trans. Commun. 99-B(4): 820-829 (2016) - [j3]Shuichiro Haruta, Kentaroh Toyoda
, Iwao Sasase:
Trust-Based Sybil Nodes Detection with Robust Seed Selection and Graph Pruning on SNS. IEICE Trans. Commun. 99-B(5): 1002-1011 (2016) - [j2]Yasuhito Utsunomiya, Kentaroh Toyoda
, Iwao Sasase:
LPCQP: Lightweight Private Circular Query Protocol with Divided POI-table and Somewhat Homomorphic Encryption for Privacy-Preserving k-NN Search. J. Inf. Process. 24(1): 109-122 (2016) - [c19]Kentaroh Toyoda
, Mirang Park, Naonobu Okazaki:
Unsupervised SPITters Detection Scheme for Unbalanced Callers. AINA Workshops 2016: 64-68 - [c18]Tatsuaki Sato, Kentaroh Toyoda
, Iwao Sasase:
Practical key distribution scheme with less dummy tags in RFID-enabled supply chains. APCC 2016: 476-480 - [c17]Yuya Tamura, Kentaroh Toyoda
, Iwao Sasase:
Closer destination selection scheme for mobile sink and charger enabled WRSNs. CCNC 2016: 125-130 - 2015
- [j1]Kentaroh Toyoda
, Iwao Sasase:
Unsupervised Clustering-based SPITters Detection Scheme. J. Inf. Process. 23(1): 81-92 (2015) - [c16]Miho Kurata, Kentaroh Toyoda
, Iwao Sasase:
Two-stage SPIT detection scheme with betweenness centrality and social trust. APCC 2015: 289-293 - [c15]Kenji Iuchi, Takumi Matsunaga, Kentaroh Toyoda
, Iwao Sasase:
Secure parent node selection scheme in route construction to exclude attacking nodes from RPL network. APCC 2015: 299-303 - [c14]Hiromu Asahina, Hisao Yamamoto, Kentaroh Toyoda
, Iwao Sasase:
Path metrics for lower throughput fluctuation for video streaming service in wireless mesh networks. APCC 2015: 539-543 - [c13]Yasuhito Utsunomiya, Kentaroh Toyoda
, Iwao Sasase:
LPCQP: Lightweight private circular query protocol for privacy-preserving k-NN search. CCNC 2015: 59-64 - [c12]Takuma Koga, Kentaroh Toyoda
, Iwao Sasase:
Adaptive relay selection with energy and channel information in Energy Harvesting WSNs. CCNC 2015: 696-701 - [c11]Kentaroh Toyoda
, Iwao Sasase:
Secure and fast missing RFID tags identification with lightweight MAC and rateless coding. ICC Workshops 2015: 2659-2664 - [c10]Kentaroh Toyoda
, Iwao Sasase:
Secret sharing based unidirectional key distribution with dummy tags in Gen2v2 RFID-enabled supply chains. IEEE RFID 2015: 63-69 - [c9]Kentaroh Toyoda
, Iwao Sasase:
Illegal interrogation detectable EPC distribution scheme in RFID-enabled supply chains. RFID-TA 2015: 159-164 - [c8]Alisa Arno, Kentaroh Toyoda
, Iwao Sasase:
Accelerometer assisted authentication scheme for smart bicycle lock. WF-IoT 2015: 520-523 - [c7]Shuichiro Haruta, Kentaroh Toyoda
, Iwao Sasase:
Trust-based Sybil nodes detection with robust seed selection and graph pruning on SNS. WIFS 2015: 1-6 - [c6]Takayuki Hirayama, Kentaroh Toyoda
, Iwao Sasase:
Fast target link flooding attack detection scheme by analyzing traceroute packets flow. WIFS 2015: 1-6 - 2014
- [c5]Ryo Hattori, Kentaroh Toyoda
, Iwao Sasase:
Deterministic Blocker Tag Detection Scheme by Comparing Expected and Observed Slot Status in UHF RFID Inventory Management Systems. HPCC/CSS/ICESS 2014: 1166-1169 - [c4]Yuya Tamura, Takuma Koga, Shinichiro Hara, Kentaroh Toyoda
, Iwao Sasase:
Concurrent Moving-Based Connection Restoration Scheme between Actors to Ensure the Continuous Connectivity in WSANs. HPCC/CSS/ICESS 2014: 1185-1188 - [c3]Takumi Matsunaga, Kentaroh Toyoda
, Iwao Sasase:
Low false alarm rate RPL network monitoring system by considering timing inconstancy between the rank measurements. ISWCS 2014: 427-431 - 2013
- [c2]Kentaroh Toyoda
, Iwao Sasase:
SPIT callers detection with unsupervised Random Forests classifier. ICC 2013: 2068-2072 - 2011
- [c1]Kentaroh Toyoda
, Yuta Kamiguchi, Shinichiro Inoue, Iwao Sasase:
Efficient solution to decrease the effect of DoS attack against IP address ownership proof in Mobile IPv6. PIMRC 2011: 1223-1227
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 20:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint