Efficient dynamic malware analysis based on network behavior using deep learning T Shibahara, T Yagi, M Akiyama, D Chiba, T Yada 2016 IEEE Global Communications Conference (GLOBECOM), 1-7, 2016 | 116 | 2016 |
Graph signal processing for directed graphs based on the hermitian laplacian S Furutani, T Shibahara, M Akiyama, K Hato, M Aida Machine Learning and Knowledge Discovery in Databases: European Conference …, 2020 | 71 | 2020 |
DomainProfiler: Discovering domain names abused in future D Chiba, T Yagi, M Akiyama, T Shibahara, T Yada, T Mori, S Goto 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016 | 62 | 2016 |
Understanding the origins of mobile app vulnerabilities: A large-scale measurement study of free and paid apps T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishi, ... 2017 IEEE/ACM 14th International Conference on Mining Software Repositories …, 2017 | 58 | 2017 |
Malicious URL sequence detection using event de-noising convolutional neural network T Shibahara, K Yamanishi, Y Takata, D Chiba, M Akiyama, T Yagi, ... 2017 IEEE International Conference on Communications (ICC), 1-7, 2017 | 57 | 2017 |
Megex: Data-free model extraction attack against gradient-based explainable ai T Miura, T Shibahara, N Yanai Proceedings of the 2nd ACM Workshop on Secure and Trustworthy Deep Learning …, 2024 | 40 | 2024 |
Detecting malicious websites by integrating malicious, benign, and compromised redirection subgraph similarities T Shibahara, Y Takata, M Akiyama, T Yagi, T Yada 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC …, 2017 | 23 | 2017 |
DomainProfiler: toward accurate and early discovery of domain names abused in future D Chiba, T Yagi, M Akiyama, T Shibahara, T Mori, S Goto International Journal of Information Security 17, 661-680, 2018 | 18 | 2018 |
Anomaly detection for mixed transmission CAN messages using quantized intervals and absolute difference of payloads T Koyama, T Shibahara, K Hasegawa, Y Okano, M Tanaka, Y Oshima Proceedings of the ACM Workshop on Automotive Cybersecurity, 19-24, 2019 | 17 | 2019 |
Access classification device, access classification method, and recording medium T Shibahara, T Yagi, M Akiyama, Y Takata US Patent 11,212,297, 2021 | 10 | 2021 |
Access classifying device, access classifying method, and access classifying program T Shibahara, T Yagi, M Akiyama, Y Takata US Patent 10,462,168, 2019 | 9 | 2019 |
Sybil detection as graph filtering S Furutani, T Shibahara, K Hato, M Akiyama, M Aida GLOBECOM 2020-2020 IEEE Global Communications Conference, 1-6, 2020 | 7 | 2020 |
Event de-noising convolutional neural network for detecting malicious url sequences from proxy logs T Shibahara, K Yamanishi, Y Takata, D Chiba, T Hokaguchi, M Akiyama, ... IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2018 | 7 | 2018 |
Objection!: Identifying misclassified malicious activities with xai K Fujita, T Shibahara, D Chiba, M Akiyama, M Uchida ICC 2022-IEEE International Conference on Communications, 2065-2070, 2022 | 6 | 2022 |
Study on the vulnerabilities of free and paid mobile apps associated with software library T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishii, ... IEICE TRANSACTIONS on Information and Systems 103 (2), 276-291, 2020 | 6 | 2020 |
POSTER: Detecting Malicious Web Pages based on Structural Similarity of Redirection Chains T Shibahara, T Yagi, M Akiyama, Y Takata, T Yada Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 6 | 2015 |
Classification apparatus, classification method, and classification program T Shibahara, T Yagi, M Akiyama, Y Takata, D Chiba US Patent 11,270,001, 2022 | 5 | 2022 |
Evasive malicious website detection by leveraging redirection subgraph similarities T Shibahara, Y Takata, M Akiyama, T Yagi, K Hato, M Murata IEICE TRANSACTIONS on Information and Systems 102 (3), 430-443, 2019 | 5 | 2019 |
A study on the vulnerabilities of mobile apps associated with software modules T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishi, ... arXiv preprint arXiv:1702.03112, 2017 | 5 | 2017 |
Interpreting graph-based Sybil detection methods as low-pass filtering S Furutani, T Shibahara, M Akiyama, M Aida IEEE Transactions on Information Forensics and Security 18, 1225-1236, 2023 | 4 | 2023 |