default search action
Takeshi Yagi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Hiroki Nakano, Daiki Chiba, Takashi Koide, Naoki Fukushi, Takeshi Yagi, Takeo Hariu, Katsunari Yoshioka, Tsutomu Matsumoto:
Understanding Characteristics of Phishing Reports from Experts and Non-Experts on Twitter. IEICE Trans. Inf. Syst. 107(7): 807-824 (2024) - 2023
- [c36]Hiroki Nakano, Daiki Chiba, Takashi Koide, Naoki Fukushi, Takeshi Yagi, Takeo Hariu, Katsunari Yoshioka, Tsutomu Matsumoto:
Canary in Twitter Mine: Collecting Phishing Reports from Experts and Non-experts. ARES 2023: 6:1-6:12 - [i3]Hiroki Nakano, Daiki Chiba, Takashi Koide, Naoki Fukushi, Takeshi Yagi, Takeo Hariu, Katsunari Yoshioka, Tsutomu Matsumoto:
Canary in Twitter Mine: Collecting Phishing Reports from Experts and Non-experts. CoRR abs/2303.15847 (2023) - 2022
- [j24]Daiki Chiba, Mitsuaki Akiyama, Yuto Otsuki, Hiroki Hada, Takeshi Yagi, Tobias Fiebig, Michel van Eeten:
DomainPrio: Prioritizing Domain Name Investigations to Improve SOC Efficiency. IEEE Access 10: 34352-34368 (2022) - 2021
- [j23]Naomi Kuze, Shu Ishikura, Takeshi Yagi, Daiki Chiba, Masayuki Murata:
Classification of diversified web crawler accesses inspired by biological adaptation. Int. J. Bio Inspired Comput. 17(3): 165-173 (2021) - 2020
- [j22]Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Keito Sasaoka, Takeshi Yagi, Tatsuya Mori:
Follow Your Silhouette: Identifying the Social Account of Website Visitors through User-Blocking Side Channel. IEICE Trans. Inf. Syst. 103-D(2): 239-255 (2020) - [j21]Takuya Watanabe, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, Yuta Takata, Bo Sun, Yuta Ishii, Toshiki Shibahara, Takeshi Yagi, Tatsuya Mori:
Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library. IEICE Trans. Inf. Syst. 103-D(2): 276-291 (2020)
2010 – 2019
- 2019
- [j20]Toshiki Shibahara, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato, Masayuki Murata:
Evasive Malicious Website Detection by Leveraging Redirection Subgraph Similarities. IEICE Trans. Inf. Syst. 102-D(3): 430-443 (2019) - [j19]Toshiki Shibahara, Takeshi Yagi, Mitsuaki Akiyama, Daiki Chiba, Kunio Hato:
Efficient Dynamic Malware Analysis for Collecting HTTP Requests using Deep Learning. IEICE Trans. Inf. Syst. 102-D(4): 725-736 (2019) - [j18]Shun Tobiyama, Yukiko Yamaguchi, Hirokazu Hasegawa, Hajime Shimada, Mitsuaki Akiyama, Takeshi Yagi:
Using Seq2Seq Model to Detect Infection Focusing on Behavioral Features of Processes. J. Inf. Process. 27: 545-554 (2019) - [e1]Nuttapong Attrapadung, Takeshi Yagi:
Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings. Lecture Notes in Computer Science 11689, Springer 2019, ISBN 978-3-030-26833-6 [contents] - 2018
- [j17]Daiki Chiba, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato, Tatsuya Mori, Shigeki Goto:
DomainChroma: Building actionable threat intelligence from malicious domain names. Comput. Secur. 77: 138-161 (2018) - [j16]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Kazuhiko Ohkubo, Shigeki Goto:
Identifying Evasive Code in Malicious Websites by Analyzing Redirection Differences. IEICE Trans. Inf. Syst. 101-D(11): 2600-2611 (2018) - [j15]Toshiki Shibahara, Kohei Yamanishi, Yuta Takata, Daiki Chiba, Taiga Hokaguchi, Mitsuaki Akiyama, Takeshi Yagi, Yuichi Ohsita, Masayuki Murata:
Event De-Noising Convolutional Neural Network for Detecting Malicious URL Sequences from Proxy Logs. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(12): 2149-2161 (2018) - [j14]Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Youki Kadobayashi:
HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle. Int. J. Inf. Sec. 17(2): 135-151 (2018) - [j13]Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Toshiki Shibahara, Tatsuya Mori, Shigeki Goto:
DomainProfiler: toward accurate and early discovery of domain names abused in future. Int. J. Inf. Sec. 17(6): 661-680 (2018) - [c35]Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Keito Sasaoka, Takeshi Yagi, Tatsuya Mori:
User Blocking Considered Harmful? An Attacker-Controllable Side Channel to Identify Social Accounts. EuroS&P 2018: 323-337 - [c34]Shun Tobiyama, Yukiko Yamaguchi, Hirokazu Hasegawa, Hajime Shimada, Mitsuaki Akiyama, Takeshi Yagi:
A method for estimating process maliciousness with Seq2Seq model. ICOIN 2018: 255-260 - [c33]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato, Shigeki Goto:
POSTER: Predicting Website Abuse Using Update Histories. WWW (Companion Volume) 2018: 9-10 - [i2]Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Keito Sasaoka, Takeshi Yagi, Tatsuya Mori:
User Blocking Considered Harmful? An Attacker-controllable Side Channel to Identify Social Accounts. CoRR abs/1805.05085 (2018) - 2017
- [j12]Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Tatsuya Mori, Youki Kadobayashi:
Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots. Comput. Secur. 69: 155-173 (2017) - [j11]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Shigeki Goto:
Fine-Grained Analysis of Compromised Websites with Redirection Graphs and JavaScript Traces. IEICE Trans. Inf. Syst. 100-D(8): 1714-1728 (2017) - [c32]Daiki Chiba, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Tatsuya Mori, Shigeki Goto:
DomainChroma: Providing Optimal Countermeasures against Malicious Domain Names. COMPSAC (1) 2017: 643-648 - [c31]Toshiki Shibahara, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada:
Detecting Malicious Websites by Integrating Malicious, Benign, and Compromised Redirection Subgraph Similarities. COMPSAC (1) 2017: 655-664 - [c30]Toshiki Shibahara, Kohei Yamanishi, Yuta Takata, Daiki Chiba, Mitsuaki Akiyama, Takeshi Yagi, Yuichi Ohsita, Masayuki Murata:
Malicious URL sequence detection using event de-noising convolutional neural network. ICC 2017: 1-7 - [c29]Hideki Ogawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura, Mitsuaki Akiyama, Takeshi Yagi:
Malware originated HTTP traffic detection utilizing cluster appearance ratio. ICOIN 2017: 248-253 - [c28]Takuya Watanabe, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, Yuta Takata, Bo Sun, Yuta Ishii, Toshiki Shibahara, Takeshi Yagi, Tatsuya Mori:
Understanding the origins of mobile app vulnerabilities: a large-scale measurement study of free and paid apps. MSR 2017: 14-24 - [c27]Yuta Ishii, Takuya Watanabe, Fumihiro Kanei, Yuta Takata, Eitaro Shioji, Mitsuaki Akiyama, Takeshi Yagi, Bo Sun, Tatsuya Mori:
Understanding the security management of global third-party Android marketplaces. WAMA@ESEC/SIGSOFT FSE 2017: 12-18 - [c26]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Shigeki Goto:
Understanding Evasion Techniques that Abuse Differences Among JavaScript Implementations. WISE (2) 2017: 278-294 - [i1]Takuya Watanabe, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, Yuta Takata, Bo Sun, Yuta Ishii, Toshiki Shibahara, Takeshi Yagi, Tatsuya Mori:
A Study on the Vulnerabilities of Mobiles Apps associated with Software Modules. CoRR abs/1702.03112 (2017) - 2016
- [j10]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Shigeki Goto:
MineSpider: Extracting Hidden URLs Behind Evasive Drive-by Download Attacks. IEICE Trans. Inf. Syst. 99-D(4): 860-872 (2016) - [j9]Bo Sun, Mitsuaki Akiyama, Takeshi Yagi, Mitsuhiro Hatada, Tatsuya Mori:
Automating URL Blacklist Generation with Similarity Search Approach. IEICE Trans. Inf. Syst. 99-D(4): 873-882 (2016) - [j8]Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Kazufumi Aoki, Takeo Hariu, Shigeki Goto:
BotProfiler: Detecting Malware-Infected Hosts by Profiling Variability of Malicious Infrastructure. IEICE Trans. Commun. 99-B(5): 1012-1023 (2016) - [c25]Shohei Hiruta, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura, Takeshi Yagi, Mitsuaki Akiyama:
Evaluation on Malware Classification by Session Sequence of Common Protocols. CANS 2016: 521-531 - [c24]Shun Tobiyama, Yukiko Yamaguchi, Hajime Shimada, Tomonori Ikuse, Takeshi Yagi:
Malware Detection with Deep Neural Network Using Process Behavior. COMPSAC Workshops 2016: 577-582 - [c23]Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Toshiki Shibahara, Takeshi Yada, Tatsuya Mori, Shigeki Goto:
DomainProfiler: Discovering Domain Names Abused in Future. DSN 2016: 491-502 - [c22]Toshiki Shibahara, Takeshi Yagi, Mitsuaki Akiyama, Daiki Chiba, Takeshi Yada:
Efficient Dynamic Malware Analysis Based on Network Behavior Using Deep Learning. GLOBECOM 2016: 1-7 - [c21]Naomi Kuze, Shu Ishikura, Takeshi Yagi, Daiki Chiba, Masayuki Murata:
Detection of vulnerability scanning using features of collective accesses based on information collected from multiple honeypots. NOMS 2016: 1067-1072 - [c20]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Shigeki Goto:
Website Forensic Investigation to Identify Evidence and Impact of Compromise. SecureComm 2016: 431-453 - 2015
- [j7]Mitsuaki Akiyama, Takeshi Yagi, Youki Kadobayashi, Takeo Hariu, Suguru Yamaguchi:
Client Honeypot Multiplication with High Performance and Precise Detection. IEICE Trans. Inf. Syst. 98-D(4): 775-787 (2015) - [c19]Toshiki Shibahara, Takeshi Yagi, Mitsuaki Akiyama, Yuta Takata, Takeshi Yada:
POSTER: Detecting Malicious Web Pages based on Structural Similarity of Redirection Chains. CCS 2015: 1671-1673 - [c18]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Shigeki Goto:
MineSpider: Extracting URLs from Environment-Dependent Drive-by Download Attacks. COMPSAC 2015: 444-449 - [c17]Naomi Kuze, Shu Ishikura, Takeshi Yagi, Daiki Chiba, Masayuki Murata:
Crawler classification using ant-based clustering scheme. ICITST 2015: 84-89 - [c16]Bo Sun, Mitsuaki Akiyama, Takeshi Yagi, Mitsuhiro Hatada, Tatsuya Mori:
AutoBLG: Automatic URL blacklist generator using search space expansion and filters. ISCC 2015: 625-631 - [c15]Ken Tanizawa, Hiroyuki Matsuura, Kensuke Ogawa, Toshimitsu Kaneko, Eiichi Banno, Katsumi Uesaka, Shigehiro Takasaka, Hidenori Iwai, Kazuya Ota, Haruhiko Kuwatsuka, Yoichi Oikawa, Takeshi Yagi, Hajime Shoji, Shu Namiki:
Dynamic parametric dispersion compensation using FPGA pump controller and dispersion monitor. OFC 2015: 1-3 - [c14]Yasuyoshi Uchida, Shintaro Yamasaki, Masanori Takahashi, Junichi Hasegawa, Takeshi Yagi:
Ultra-compact 8-arrayed 8ç1 switch consists of ZrO2-SiO2-based high a PLC. OFC 2015: 1-3 - [c13]Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Kazufumi Aoki, Takeo Hariu, Shigeki Goto:
BotProfiler: Profiling Variability of Substrings in HTTP Requests to Detect Malware-Infected Hosts. TrustCom/BigDataSE/ISPA (1) 2015: 758-765 - 2014
- [j6]Takeshi Yagi, Junichi Murayama, Takeo Hariu, Sho Tsugawa, Hiroyuki Ohsaki, Masayuki Murata:
Analysis of Blacklist Update Frequency for Countering Malware Attacks on Websites. IEICE Trans. Commun. 97-B(1): 76-86 (2014) - [j5]Masanori Takahashi, Yasuyoshi Uchida, Shintaro Yamasaki, Junichi Hasegawa, Takeshi Yagi:
Development of Low Loss Ultra-High Δ ZrO2-SiO2 PLC for Next Generation Compact and High-Density Integrated Devices. IEICE Trans. Electron. 97-C(7): 725-730 (2014) - [c12]Masanori Takahashi, Yasuyoshi Uchida, Shintaro Yamasaki, Junichi Hasegawa, Takeshi Yagi:
Ultra-small coherent mixer consists of 5.5%-Δ ZrO2-SiO2-based low loss PLC. OFC 2014: 1-3 - [c11]Hung Nguyen Tan, Takashi Inoue, Ken Tanizawa, Stephane Petit, Yoichi Oikawa, Shigehiro Takasaka, Takeshi Yagi, Shu Namiki:
Counter-dithering pump scheme for cascaded degenerate FWM based wavelength converter. OFC 2014: 1-3 - [c10]Shintaro Yamasaki, Yasuyoshi Uchida, Masanori Takahashi, Junichi Hasegawa, Takeshi Yagi:
Spot size converter with cross-vertical taper for low-loss coupling between ZrO2-SiO2 PLC and SMF. OFC 2014: 1-3 - 2013
- [j4]Takeshi Yagi, Junichi Murayama, Takeo Hariu, Hiroyuki Ohsaki:
Evaluations and Analysis of Malware Prevention Methods on Websites. IEICE Trans. Commun. 96-B(12): 3091-3100 (2013) - [j3]Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu:
Improved Blacklisting: Inspecting the Structural Neighborhood of Malicious URLs. IT Prof. 15(4): 50-56 (2013) - [c9]Mitsuaki Akiyama, Takeshi Yagi, Kazufumi Aoki, Takeo Hariu, Youki Kadobayashi:
Active Credential Leakage for Observing Web-Based Attack Cycle. RAID 2013: 223-243 - 2011
- [j2]Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh:
Intelligent High-Interaction Web Honeypots Based on URL Conversion Scheme. IEICE Trans. Commun. 94-B(5): 1339-1347 (2011) - [c8]Kazufumi Aoki, Takeshi Yagi, Makoto Iwamura, Mitsutaka Itoh:
Controlling malware HTTP communications in dynamic analysis system using search engine. CSS 2011: 1-6 - [c7]Mitsuaki Akiyama, Takeshi Yagi, Mitsutaka Itoh:
Searching Structural Neighborhood of Malicious URLs to Improve Blacklisting. SAINT 2011: 1-10 - 2010
- [j1]Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh:
Design of Provider-Provisioned Website Protection Scheme against Malware Distribution. IEICE Trans. Commun. 93-B(5): 1122-1130 (2010) - [c6]Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh:
Enhanced attack collection scheme on high-interaction web honeypots. ISCC 2010: 81-86 - [c5]Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh:
Life-cycle monitoring scheme of malware download sites for websites. SOCA 2010: 1-6 - [c4]Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh:
Investigation and analysis of malware on websites. WSE 2010: 73-81
2000 – 2009
- 2009
- [c3]Tomoyasu Ogasa, Yousuke Takahashi, Hiroyuki Ohsaki, Takeshi Yagi, Junichi Murayama, Makoto Imase:
Dynamic Topology Reconfiguration Method for Service Overlay Networks Using Users' Community Information. SAINT 2009: 141-144 - 2008
- [c2]Yousuke Takahashi, Kouhei Sugiyama, Hiroyuki Ohsaki, Makoto Imase, Takeshi Yagi, Junichi Murayama:
Group-Oriented Communication: Concept and Network Architecture. ICCCN 2008: 969-975 - [c1]Kouhei Sugiyama, Hiroyuki Ohsaki, Makoto Imase, Takeshi Yagi, Junichi Murayama:
NMF: Network Mining Framework Using Topological Structure of Complex Networks. SERVICES II 2008: 210-211
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-12 20:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint