Daiki Chiba
Orcid: 0000-0002-7532-6633Affiliations:
- NTT, Tokyo, Japan
- Waseda University, Tokyo, Japan (PhD 2017)
According to our database1,
Daiki Chiba
authored at least 58 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Understanding Characteristics of Phishing Reports from Experts and Non-Experts on Twitter.
IEICE Trans. Inf. Syst., 2024
CoRR, 2024
CoRR, 2024
DomainLynx: Leveraging Large Language Models for Enhanced Domain Squatting Detection.
CoRR, 2024
ChatSpamDetector: Leveraging Large Language Models for Effective Phishing Email Detection.
CoRR, 2024
IEEE Access, 2024
Longitudinal Measurement Study of the Domain Names Associated With the Olympic Games.
IEEE Access, 2024
Proceedings of the HCI International 2024 Posters, 2024
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024
2023
Proceedings of the Passive and Active Measurement - 24th International Conference, 2023
PhishReplicant: A Language Model-based Approach to Detect Generated Squatting Domain Names.
Proceedings of the Annual Computer Security Applications Conference, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Exploring Event-synced Navigation Attacks across User-generated Content Platforms in the Wild.
J. Inf. Process., 2022
Understanding Security Risks of Ad-based URL Shortening Services Caused by Users' Behaviors.
J. Inf. Process., 2022
IEEE Access, 2022
Proceedings of the IEEE International Conference on Communications, 2022
2021
J. Inf. Process., 2021
Classification of diversified web crawler accesses inspired by biological adaptation.
Int. J. Bio Inspired Comput., 2021
To Get Lost is to Learn the Way: An Analysis of Multi-Step Social Engineering Attacks on the Web.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
Analyzing Security Risks of Ad-Based URL Shortening Services Caused by Users' Behaviors.
Proceedings of the Security and Privacy in Communication Networks, 2021
Proceedings of the Passive and Active Measurement - 22nd International Conference, 2021
Understanding Update of Machine-Learning-Based Malware Detection by Clustering Changes in Feature Attributions.
Proceedings of the Advances in Information and Computer Security, 2021
Proceedings of the IEEE Global Communications Conference, 2021
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
2020
IEICE Trans. Inf. Syst., 2020
IEICE Trans. Inf. Syst., 2020
Exploration into Gray Area: Toward Efficient Labeling for Detecting Malicious Domain Names.
IEICE Trans. Commun., 2020
Proceedings of the IEEE Global Communications Conference, 2020
It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
To Get Lost is to Learn the Way: Automatically Collecting Multi-step Social Engineering Attacks on the Web.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020
2019
J. Inf. Process., 2019
Detecting Dynamic IP Addresses and Cloud Blocks Using the Sequential Characteristics of PTR Records.
J. Inf. Process., 2019
IEICE Trans. Inf. Syst., 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the Internet Measurement Conference, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, 2019
2018
DomainProfiler: toward accurate and early discovery of domain names abused in future.
Int. J. Inf. Sec., 2018
Event De-Noising Convolutional Neural Network for Detecting Malicious URL Sequences from Proxy Logs.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Comput. Secur., 2018
Don't throw me away: Threats Caused by the Abandoned Internet Resources Used by Android Apps.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
Malicious URL sequence detection using event de-noising convolutional neural network.
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
2016
BotProfiler: Detecting Malware-Infected Hosts by Profiling Variability of Malicious Infrastructure.
IEICE Trans. Commun., 2016
Detection of vulnerability scanning using features of collective accesses based on information collected from multiple honeypots.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
2015
BotProfiler: Profiling Variability of Substrings in HTTP Requests to Detect Malware-Infected Hosts.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015
2013
J. Inf. Process., 2013
2012
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012