Tatsuya Mori

Orcid: 0000-0003-1583-4174

According to our database1, Tatsuya Mori authored at least 148 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Longitudinal Measurement Study of the Domain Names Associated With the Olympic Games.
IEEE Access, 2024

2023
Analysis of Non-Experts' Security- and Privacy-Related Questions on a Q&A Site.
IEICE Trans. Inf. Syst., September, 2023

Understanding the Inconsistencies in the Permissions Mechanism of Web Browsers.
J. Inf. Process., 2023

Analysis of Privacy Compliance by Classifying Policies Before and After the Japanese Law Revision.
J. Inf. Process., 2023

Automating the Detection of Fraudulent Activities in Online Banking Service.
J. Inf. Process., 2023

Impact Analysis of Organizational Structure of Group Companies on Privacy Policies.
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023

A First Look at Brand Indicators for Message Identification (BIMI).
Proceedings of the Passive and Active Measurement - 24th International Conference, 2023

Browser Permission Mechanisms Demystified.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Radiomics Based Prediction of Symptomatic Carotid Plaque in MR Images.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2023

HAPS Trajectory Optimization Based on Throughput Heat Map.
Proceedings of the IEEE Global Communications Conference, 2023

PinchKey: A Natural and User-Friendly Approach to VR User Authentication.
Proceedings of the 2023 European Symposium on Usable Security, 2023

2022
On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework.
Proc. Priv. Enhancing Technol., 2022

Experiences, Behavioral Tendencies, and Concerns of Non-Native English Speakers in Identifying Phishing Emails.
J. Inf. Process., 2022

CHE: Channel-Wise Homomorphic Encryption for Ciphertext Inference in Convolutional Neural Network.
IEEE Access, 2022

Know Your Victim: Tor Browser Setting Identification via Network Traffic Analysis.
Proceedings of the Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25, 2022

28-m W Fully Embedded AI Techniques with On-site Learning for Low-Power Handy Tactile Sensing System.
Proceedings of the 2022 International Symposium on VLSI Design, Automation and Test, 2022

Understanding Non-Experts' Security- and Privacy-Related Questions on a Q&A Site.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

Understanding the Behavior Transparency of Voice Assistant Applications Using the ChatterBox Framework.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

Cyber-physical firewall: monitoring and controlling the threats caused by malicious analog signals.
Proceedings of the CF '22: 19th ACM International Conference on Computing Frontiers, Turin, Italy, May 17, 2022

Distributed Random Number Generation Method on Smart Contracts.
Proceedings of the 4th Blockchain and Internet of Things Conference, 2022

2021
Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams and its Feasibility.
IEEE Trans. Emerg. Top. Comput., 2021

Identifying the Phishing Websites Using the Patterns of TLS Certificates.
J. Cyber Secur. Mobil., 2021

Application of Adversarial Examples to Physical ECG Signals.
CoRR, 2021

Why They Ignore English Emails: The Challenges of Non-Native Speakers in Identifying Phishing Emails.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

A First Look at COVID-19 Domain Names: Origin and Implications.
Proceedings of the Passive and Active Measurement - 22nd International Conference, 2021

Measuring Adoption of DNS Security Mechanisms with Cross-Sectional Approach.
Proceedings of the IEEE Global Communications Conference, 2021

Careless Participants Are Essential for Our Phishing Study: Understanding the Impact of Screening Methods.
Proceedings of the EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11, 2021

2020
Discovering Malicious URLs Using Machine Learning Techniques.
Proceedings of the Data Science in Cybersecurity and Cyberthreat Intelligence, 2020

Addressing the Privacy Threat to Identify Existence of a Target's Account on Sensitive Services.
J. Inf. Process., 2020

Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?
IEICE Trans. Inf. Syst., 2020

Follow Your Silhouette: Identifying the Social Account of Website Visitors through User-Blocking Side Channel.
IEICE Trans. Inf. Syst., 2020

Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library.
IEICE Trans. Inf. Syst., 2020

CLAP: Classification of Android PUAs by Similarity of DNS Queries.
IEICE Trans. Inf. Syst., 2020

Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Discovering HTTPSified Phishing Websites Using the TLS Certificates Footprints.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2019
Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps.
J. Inf. Process., 2019

Tap 'n Ghost: A Compilation of Novel Attack Techniques against Smartphone Touchscreens.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Learning Robust Options by Conditional Value at Risk Optimization.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

ShamFinder: An Automated Framework for Detecting IDN Homographs.
Proceedings of the Internet Measurement Conference, 2019

Understanding the Responsiveness of Mobile App Developers to Software Library Updates.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Poster: A First Look at the Privacy Risks of Voice Assistant Apps.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

EIGER: automated IOC generation for accurate and interpretable endpoint malware detection.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
PADetective: A Systematic Approach to Automate Detection of Promotional Attackers in Mobile App Store.
J. Inf. Process., 2018

DomainProfiler: toward accurate and early discovery of domain names abused in future.
Int. J. Inf. Sec., 2018

Understanding the Inconsistency between Behaviors and Descriptions of Mobile Apps.
IEICE Trans. Inf. Syst., 2018

Automatically Generating Malware Analysis Reports Using Sandbox Logs.
IEICE Trans. Inf. Syst., 2018

Detecting Malware-Infected Devices Using the HTTP Header Patterns.
IEICE Trans. Inf. Syst., 2018

DomainChroma: Building actionable threat intelligence from malicious domain names.
Comput. Secur., 2018

A Feasibility Study of Radio-frequency Retroreflector Attack.
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018

User Blocking Considered Harmful? An Attacker-Controllable Side Channel to Identify Social Accounts.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Stay On-Topic: Generating Context-Specific Fake Restaurant Reviews.
Proceedings of the Computer Security, 2018

Don't throw me away: Threats Caused by the Abandoned Internet Resources Used by Android Apps.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Tracking the Human Mobility Using Mobile Device Sensors.
IEICE Trans. Inf. Syst., 2017

Network Event Extraction from Log Data with Nonnegative Tensor Factorization.
IEICE Trans. Commun., 2017

APPraiser: A Large Scale Analysis of Android Clone Apps.
IEICE Trans. Inf. Syst., 2017

Finding New Varieties of Malware with the Classification of Network Behavior.
IEICE Trans. Inf. Syst., 2017

Building a Scalable Web Tracking Detection System: Implementation and the Empirical Study.
IEICE Trans. Inf. Syst., 2017

A Study on the Vulnerabilities of Mobiles Apps associated with Software Modules.
CoRR, 2017

Trojan of Things: Embedding Malicious NFC Tags into Common Objects.
CoRR, 2017

Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots.
Comput. Secur., 2017

Understanding the security management of global third-party Android marketplaces.
Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market Analytics, 2017

Understanding the origins of mobile app vulnerabilities: a large-scale measurement study of free and paid apps.
Proceedings of the 14th International Conference on Mining Software Repositories, 2017

BotDetector: A robust and scalable approach toward detecting malware-infected devices.
Proceedings of the IEEE International Conference on Communications, 2017

Eating moment recognition using heart rate responses.
Proceedings of the Adjunct Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, 2017

Detecting and Classifying Android PUAs by Similarity of DNS queries.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

DomainChroma: Providing Optimal Countermeasures against Malicious Domain Names.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

POSTER: Is Active Electromagnetic Side-channel Attack Practical?
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

POSTER: TOUCHFLOOD: A Novel Class of Attacks against Capacitive Touchscreens.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Characterizing Promotional Attacks in Mobile App Store.
Proceedings of the Applications and Techniques in Information Security, 2017

2016
Automating URL Blacklist Generation with Similarity Search Approach.
IEICE Trans. Inf. Syst., 2016

Statistical estimation of the names of HTTPS servers with domain name graphs.
Comput. Commun., 2016

Spoofing detection for embedded face recognition system using a low cost stereo camera.
Proceedings of the 23rd International Conference on Pattern Recognition, 2016

DomainProfiler: Discovering Domain Names Abused in Future.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Clone or Relative?: Understanding the Origins of Similar Android Apps.
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 2016

POSTER: Toward Automating the Generation of Malware Analysis Reports Using the Sandbox Logs.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Continuous Real-Time Measurement Method for Heart Rate Monitoring Using Face Images.
Proceedings of the Biomedical Engineering Systems and Technologies, 2016

Continuous Real-time Heart Rate Monitoring from Face Images.
Proceedings of the 9th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2016), 2016

2015
RouteDetector: Sensor-based Positioning System That Exploits Spatio-Temporal Regularity of Human Mobility.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

SFMap: Inferring Services over Encrypted Web Flows Using Dynamical Domain Name Graphs.
Proceedings of the Traffic Monitoring and Analysis - 7th International Workshop, 2015

Understanding the Inconsistencies between Text Descriptions and the Use of Privacy-sensitive Resources of Mobile Apps.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

AutoBLG: Automatic URL blacklist generator using search space expansion and filters.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

Inferring Popularity of Domain Names with DNS Traffic: Exploiting Cache Timeout Heuristics.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Increasing the Darkness of Darknet Traffic.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Discovering similar malware samples using API call topics.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015

2014
Spatio-temporal factorization of log data for understanding network events.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

POSTER: Seven Years in MWS: Experiences of Sharing Datasets with Anti-malware Research Community in Japan.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Analyzing influence of network topology on designing ISP-operated CDN.
Telecommun. Syst., 2013

Analyzing Spatial Structure of IP Addresses for Detecting Malicious Websites.
J. Inf. Process., 2013

A Resilient Forest-Based Application Level Multicast for Real-Time Streaming.
IEICE Trans. Commun., 2013

Optimally Identifying Worm-Infected Hosts.
IEICE Trans. Commun., 2013

Optimally Designing ISP-Operated CDN.
IEICE Trans. Commun., 2013

Multicast Pre-Distribution VoD System.
IEICE Trans. Commun., 2013

Effect of Limiting Pre-Distribution and Clustering Users on Multicast Pre-Distribution VoD.
IEICE Trans. Commun., 2013

Analyzing Characteristics of TCP Quality Metrics with Respect to Type of Connection through Measured Traffic Data.
IEICE Trans. Commun., 2013

Mean-variance relationship of the number of flows in traffic aggregation and its application to traffic management.
Comput. Networks, 2013

Autonomic load balancing of flow monitors.
Comput. Networks, 2013

A periodic combined-content distribution mechanism in peer-assisted content delivery networks.
Proceedings of the 2013 ITU Kaleidoscope: Building Sustainable Communities, 2013

Expected traffic reduction by content-oriented incentive in peer-assisted content delivery networks.
Proceedings of the International Conference on Information Networking 2013, 2013

2012
SpACCE: a sophisticated ad hoc cloud computing environment built by server migration to facilitate distributed collaboration.
Int. J. Space Based Situated Comput., 2012

Extended Darknet: Multi-Dimensional Internet Threat Monitoring System.
IEICE Trans. Commun., 2012

Traffic Engineering of Peer-Assisted Content Delivery Network with Content-Oriented Incentive Mechanism.
IEICE Trans. Inf. Syst., 2012

Analyzing and Reducing the Impact of Traffic on Large-Scale NAT.
IEICE Trans. Commun., 2012

Effects of Sampling and Spatio/Temporal Granularity in Traffic Monitoring on Anomaly Detectability.
IEICE Trans. Commun., 2012

Fundamental Study for Controlling Environment using Biological signal.
Control. Intell. Syst., 2012

Detecting Malicious Websites by Learning IP Address Features.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

Autonomic load balancing for flow monitoring.
Proceedings of IEEE International Conference on Communications, 2012

A Sophisticated Ad Hoc Cloud Computing Environment Built by the Migration of a Server to Facilitate Distributed Collaboration.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Detection accuracy of network anomalies using sampled flow statistics.
Int. J. Netw. Manag., 2011

Parallel video streaming optimizing network throughput.
Comput. Commun., 2011

Optimally designing caches to reduce P2P traffic.
Comput. Commun., 2011

Limiting pre-distribution and clustering users on multicast pre-distribution VoD.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Traffic Engineering Using Overlay Network.
Proceedings of IEEE International Conference on Communications, 2011

How is e-mail sender authentication used and misused?
Proceedings of the 8th Annual Collaboration, 2011

Performance evaluation of peer-assisted content distribution.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

2010
Characterizing Traffic Flows Originating from Large-Scale Video Sharing Services.
Proceedings of the Traffic Monitoring and Analysis, Second International Workshop, 2010

Sensor in the Dark: Building Untraceable Large-Scale Honeypots Using Virtualization Technologies.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

Impact of topology on parallel video streaming.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010

Optimally Designing Capacity and Location of Caches to Reduce P2P Traffic.
Proceedings of IEEE International Conference on Communications, 2010

On the effectiveness of IP reputation for spam filtering.
Proceedings of the Second International Conference on Communication Systems and Networks, 2010

2009
A Power, Performance Scalable Eight-Cores Media Processor for Mobile Multimedia Applications.
IEEE J. Solid State Circuits, 2009

Exploitation of the wikipedia category system for enhancing the value of LCSH.
Proceedings of the 2009 Joint International Conference on Digital Libraries, 2009

Adaptive Bandwidth Control to Handle Long-Duration Large Flows.
Proceedings of IEEE International Conference on Communications, 2009

Improving Deployability of Peer-Assisted CDN Platform with Incentive.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Design and implementation of scalable, transparent threads for multi-core media processor.
Proceedings of the Design, Automation and Test in Europe, 2009

2008
Packet Sampling TCP Flow Rate Estimation and Performance Degradation Detection Method.
IEICE Trans. Commun., 2008

Finding Cardinality Heavy-Hitters in Massive Traffic Data and Its Application to Anomaly Detection.
IEICE Trans. Commun., 2008

Extracting Worm-Infected Hosts Using White List.
Proceedings of the 2008 International Symposium on Applications and the Internet, 2008

Optimum Identification of Worm-Infected Hosts.
Proceedings of the IP Operations and Management, 8th IEEE International Workshop, 2008

Integrated Method for Loss-Resilient Multicast Source Authentication and Data Reconstruction.
Proceedings of IEEE International Conference on Communications, 2008

A Method of Detecting Network Anomalies in Cyclic Traffic.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
Identifying Heavy-Hitter Flows from Sampled Flow Statistics.
IEICE Trans. Commun., 2007

Inferring Original Traffic Pattern from Sampled Flow Statistics.
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007

A Study on Detecting Network Anomalies Using Sampled Flow Statistics.
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007

2-D Bitmap for Summarizing Inter-Host Communication Patterns.
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007

Simple and Adaptive Identification of Superspreaders by Flow Sampling.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Efficient Timeout Checking Mechanism for Traffic Control.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

Detection Accuracy of Network Anomalies Using Sampled Flow Statistics.
Proceedings of the Global Communications Conference, 2007

2006
Simple and Accurate Identification of High-Rate Flows by Packet Sampling.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Estimating Top N Hosts in Cardinality Using Small Memory Resources.
Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006

QoS control to handle long-duration large flows and its performance evaluation.
Proceedings of IEEE International Conference on Communications, 2006

Estimating Flow Rate from Sampled Packet Streams for Detection of Performance Degradation at TCP Flow Level.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Flow analysis of internet traffic: World Wide Web versus peer-to-peer.
Syst. Comput. Jpn., 2005

Method of Bandwidth Dimensioning and Management for Aggregated TCP Flows with Heterogeneous Access Links.
IEICE Trans. Commun., 2005

2004
On the Characteristics of Internet Traffic Variability: Spikes and Elephants.
IEICE Trans. Inf. Syst., 2004

Identifying elephant flows through periodically sampled packets.
Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, 2004

2002
Analysis of Non-Gaussian Nature of Network Traffic and its Implication on Network Performance
CoRR, 2002

Analysis of Non-Gaussian Nature of Network Traffic
CoRR, 2002


  Loading...