VORTEX: Visual phishing detectiOns aRe Through EXplanations F Charmet, T Morikawa, A Tanaka, T Takahashi ACM Transactions on Internet Technology 24 (2), 1-24, 2024 | | 2024 |
FINISH: Efficient and Scalable NMF-Based Federated Learning for Detecting Malware Activities YW Chang, HY Chen, C Han, T Morikawa, T Takahashi, TN Lin IEEE Transactions on Emerging Topics in Computing, 2023 | 1 | 2023 |
Color-coded Attribute Graph: Visual Exploration of Distinctive Traits of IoT-Malware Families J Zhou, T Ban, T Morikawa, T Takahashi, D Inoue 2023 IEEE Symposium on Computers and Communications (ISCC), 1410-1416, 2023 | | 2023 |
Towards Long-Term Continuous Tracing of Internet-Wide Scanning Campaigns Based on Darknet Analysis. C Han, A Tanaka, Jun'ichi Takeuchi, T Takahashi, T Morikawa, TN Lin ICISSP, 617-625, 2023 | | 2023 |
Toward a better understanding of mobile users’ behavior: A web session repair scheme F Charmet, T Morikawa, T Takahashi IEEE Access 10, 99931-99943, 2022 | 1 | 2022 |
Understanding the Characteristics of Public Blocklist Providers M Umizaki, T Morikawa, A Fujita, T Takahashi, TN Lin, D Inoue 2022 IEEE Symposium on Computers and Communications (ISCC), 01-07, 2022 | 1 | 2022 |
IoT botnet detection based on the behaviors of DNS queries CI Fan, CH Shie, CM Hsu, T Ban, T Morikawa, T Takahashi 2022 IEEE Conference on Dependable and Secure Computing (DSC), 1-7, 2022 | 2 | 2022 |
Towards Polyvalent Adversarial Attacks on URL Classification Engines F Charmet, HC Tanuwidjaja, T Morikawa, T Takahashi Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | | 2022 |
Senseinput: An image-based sensitive input detection scheme for phishing website detection SC Lin, PC Wl, HY Chen, T Morikawa, T Takahashi, TN Lin ICC 2022-IEEE International Conference on Communications, 4180-4186, 2022 | 6 | 2022 |
IoT malware detection using function-call-graph embedding CY Wu, T Ban, SM Cheng, B Sun, T Takahashi 2021 18th International Conference on Privacy, Security and Trust (PST), 1-9, 2021 | 9 | 2021 |
Detecting android malware and classifying its families in large-scale datasets B Sun, T Takahashi, T Ban, D Inoue ACM Transactions on Management Information Systems (TMIS) 13 (2), 1-21, 2021 | 9 | 2021 |
Impact of code deobfuscation and feature interaction in android malware detection YC Chen, HY Chen, T Takahashi, B Sun, TN Lin IEEE Access 9, 123208-123219, 2021 | 13 | 2021 |
Leveraging machine learning techniques to identify deceptive decoy documents associated with targeted email attacks B Sun, T Ban, C Han, T Takahashi, K Yoshioka, J Takeuchi, ... IEEE Access 9, 87962-87971, 2021 | 3 | 2021 |
Efficient detection and classification of internet-of-things malware based on byte sequences from executable files TL Wan, T Ban, SM Cheng, YT Lee, B Sun, R Isawa, T Takahashi, D Inoue IEEE Open Journal of the Computer Society 1, 262-275, 2020 | 28 | 2020 |
A privacy-preserving federated learning system for android malware detection based on edge computing RH Hsu, YC Wang, CI Fan, B Sun, T Ban, T Takahashi, TW Wu, SW Kao 2020 15th Asia Joint Conference on Information Security (AsiaJCIS), 128-136, 2020 | 65 | 2020 |
Automation of vulnerability classification from its description using machine learning M Aota, H Kanehara, M Kubo, N Murata, B Sun, T Takahashi 2020 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2020 | 56 | 2020 |
A Privacy-Preserving Federated Learning System for Android Malware Detection based on Edge Computing YC Wang | | 2020 |
Study on the vulnerabilities of free and paid mobile apps associated with software library T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishii, ... IEICE TRANSACTIONS on Information and Systems 103 (2), 276-291, 2020 | 6 | 2020 |
Discovering malicious urls using machine learning techniques B Sun, T Takahashi, L Zhu, T Mori Data science in cybersecurity and cyberthreat intelligence, 33-60, 2020 | 3 | 2020 |
A scalable and accurate feature representation method for identifying malicious mobile applications B Sun, T Ban, SC Chang, YS Sun, T Takahashi, D Inoue Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 1182-1189, 2019 | 8 | 2019 |