Follow
Toshiki Shibahara
Toshiki Shibahara
NTT Social Informatics Laboratories
Verified email at hco.ntt.co.jp
Title
Cited by
Cited by
Year
Efficient dynamic malware analysis based on network behavior using deep learning
T Shibahara, T Yagi, M Akiyama, D Chiba, T Yada
2016 IEEE Global Communications Conference (GLOBECOM), 1-7, 2016
1162016
Graph signal processing for directed graphs based on the hermitian laplacian
S Furutani, T Shibahara, M Akiyama, K Hato, M Aida
Machine Learning and Knowledge Discovery in Databases: European Conference …, 2020
712020
DomainProfiler: Discovering domain names abused in future
D Chiba, T Yagi, M Akiyama, T Shibahara, T Yada, T Mori, S Goto
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016
622016
Understanding the origins of mobile app vulnerabilities: A large-scale measurement study of free and paid apps
T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishi, ...
2017 IEEE/ACM 14th International Conference on Mining Software Repositories …, 2017
582017
Malicious URL sequence detection using event de-noising convolutional neural network
T Shibahara, K Yamanishi, Y Takata, D Chiba, M Akiyama, T Yagi, ...
2017 IEEE International Conference on Communications (ICC), 1-7, 2017
572017
Megex: Data-free model extraction attack against gradient-based explainable ai
T Miura, T Shibahara, N Yanai
Proceedings of the 2nd ACM Workshop on Secure and Trustworthy Deep Learning …, 2024
402024
Detecting malicious websites by integrating malicious, benign, and compromised redirection subgraph similarities
T Shibahara, Y Takata, M Akiyama, T Yagi, T Yada
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC …, 2017
232017
DomainProfiler: toward accurate and early discovery of domain names abused in future
D Chiba, T Yagi, M Akiyama, T Shibahara, T Mori, S Goto
International Journal of Information Security 17, 661-680, 2018
182018
Anomaly detection for mixed transmission CAN messages using quantized intervals and absolute difference of payloads
T Koyama, T Shibahara, K Hasegawa, Y Okano, M Tanaka, Y Oshima
Proceedings of the ACM Workshop on Automotive Cybersecurity, 19-24, 2019
172019
Access classification device, access classification method, and recording medium
T Shibahara, T Yagi, M Akiyama, Y Takata
US Patent 11,212,297, 2021
102021
Access classifying device, access classifying method, and access classifying program
T Shibahara, T Yagi, M Akiyama, Y Takata
US Patent 10,462,168, 2019
92019
Sybil detection as graph filtering
S Furutani, T Shibahara, K Hato, M Akiyama, M Aida
GLOBECOM 2020-2020 IEEE Global Communications Conference, 1-6, 2020
72020
Event de-noising convolutional neural network for detecting malicious url sequences from proxy logs
T Shibahara, K Yamanishi, Y Takata, D Chiba, T Hokaguchi, M Akiyama, ...
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2018
72018
Objection!: Identifying misclassified malicious activities with xai
K Fujita, T Shibahara, D Chiba, M Akiyama, M Uchida
ICC 2022-IEEE International Conference on Communications, 2065-2070, 2022
62022
Study on the vulnerabilities of free and paid mobile apps associated with software library
T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishii, ...
IEICE TRANSACTIONS on Information and Systems 103 (2), 276-291, 2020
62020
POSTER: Detecting Malicious Web Pages based on Structural Similarity of Redirection Chains
T Shibahara, T Yagi, M Akiyama, Y Takata, T Yada
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
62015
Classification apparatus, classification method, and classification program
T Shibahara, T Yagi, M Akiyama, Y Takata, D Chiba
US Patent 11,270,001, 2022
52022
Evasive malicious website detection by leveraging redirection subgraph similarities
T Shibahara, Y Takata, M Akiyama, T Yagi, K Hato, M Murata
IEICE TRANSACTIONS on Information and Systems 102 (3), 430-443, 2019
52019
A study on the vulnerabilities of mobile apps associated with software modules
T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishi, ...
arXiv preprint arXiv:1702.03112, 2017
52017
Interpreting graph-based Sybil detection methods as low-pass filtering
S Furutani, T Shibahara, M Akiyama, M Aida
IEEE Transactions on Information Forensics and Security 18, 1225-1236, 2023
42023
The system can't perform the operation now. Try again later.
Articles 1–20