Daisuke Inoue
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2024
AMPIC: Adaptive Model Predictive Ising Controller for large-scale urban traffic signals.
CoRR, 2024
Predicting unobserved climate time series data at distant areas via spatial correlation using reservoir computing.
CoRR, 2024
Securing Code With Context: Enhancing Vulnerability Detection Through Contextualized Graph Representations.
IEEE Access, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
VT-SOS: A Cost-effective URL Warning utilizing VirusTotal as a Second Opinion Service.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024
Customized Malware: Identifying Target Systems Using Personally Identifiable Information.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
2023
Supporting table grape berry thinning with deep neural network and augmented reality technologies.
Comput. Electron. Agric., October, 2023
A Large-Scale Investigation into the Possibility of Malware Infection of IoT Devices with Weak Credentials.
IEICE Trans. Inf. Syst., September, 2023
IEICE Trans. Inf. Syst., September, 2023
Partially Centralized Model-Predictive Mean Field Games for controlling multi-agent systems.
IFAC J. Syst. Control., June, 2023
CoRR, 2023
Convergence Analysis of the Upwind Difference Methods for Hamilton-Jacobi-Bellman Equations.
CoRR, 2023
Comput. Secur., 2023
Detecting Malicious JavaScript Using Structure-Based Analysis of Graph Representation.
IEEE Access, 2023
Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2023
AiRcupid: Supporting Cucumber Picking for Intellectual Disabilities using Artificial Intelligence and Augmented Reality.
Proceedings of the IEEE International Symposium on Mixed and Augmented Reality Adjunct, 2023
Color-coded Attribute Graph: Visual Exploration of Distinctive Traits of IoT-Malware Families.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
2022
ACM Trans. Manag. Inf. Syst., 2022
Sci. Robotics, 2022
Design X Bioinformatics: a community-driven initiative to connect bioinformatics and design.
J. Integr. Bioinform., 2022
Radio Frame Timing Detection Method Using Demodulation Reference Signals Based on PCID Detection for NR Initial Access.
IEICE Trans. Commun., 2022
CoRR, 2022
Dark-TRACER: Early Detection Framework for Malware Activity Based on Anomalous Spatiotemporal Patterns.
IEEE Access, 2022
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022
Proceedings of the IEEE Symposium on Computers and Communications, 2022
Proceedings of the International Conference on Cyberworlds, 2022
Proceedings of the IEEE International Conference on Big Data, 2022
Proceedings of the IEEE/ACM International Conference on Automation of Software Test, 2022
Security-Alert Screening with Oversampling Based on Conditional Generative Adversarial Networks.
Proceedings of the 17th Asia Joint Conference on Information Security, 2022
Proceedings of the 17th Asia Joint Conference on Information Security, 2022
2021
Flexoelectric Effect on Image Sticking Caused by Residual Direct Current Voltage and Flicker Phenomenon in Fringe-Field Switching Mode Liquid Crystal Display.
IEICE Trans. Electron., 2021
Physical Cell ID Detection Using Joint Estimation of Frequency Offset and SSS Sequence for NR Initial Access.
IEICE Trans. Commun., 2021
Physical Cell ID Detection Probability Using NB-IoT Synchronization Signals in 28-GHz Band.
IEICE Trans. Commun., 2021
J. Cybersecur., 2021
Optimal Transport-Based Coverage Control for Swarm Robot Systems: Generalization of the Voronoi Tessellation-Based Method.
IEEE Control. Syst. Lett., 2021
Leveraging Machine Learning Techniques to Identify Deceptive Decoy Documents Associated With Targeted Email Attacks.
IEEE Access, 2021
Physical Cell ID Detection Performance Using Polarization Receiver Diversity for NR in 3GPP CDL Channel Models.
Proceedings of the 24th International Symposium on Wireless Personal Multimedia Communications, 2021
Synchronization Signal Design Using Single-Carrier Waveform for Physical- Layer Cell ID Detection.
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021
Proceedings of the CSET '21: Cyber Security Experimentation and Test Workshop, 2021
Proceedings of the CSET '21: Cyber Security Experimentation and Test Workshop, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021
Extracting Threat Intelligence Related IoT Botnet From Latest Dark Web Data Collection.
Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2021
JStrack: Enriching Malicious JavaScript Detection Based on AST Graph Analysis and Attention Mechanism.
Proceedings of the Neural Information Processing - 28th International Conference, 2021
Proceedings of the International Conference on Cyberworlds, 2021
End-to-End Inflorescence Measurement for Supporting Table Grape Trimming with Augmented Reality.
Proceedings of the International Conference on Cyberworlds, 2021
A Machine Learning Approach to Detection of Critical Alerts from Imbalanced Multi-Appliance Threat Alert Logs.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
2020
Efficient Detection and Classification of Internet-of-Things Malware Based on Byte Sequences from Executable Files.
IEEE Open J. Comput. Soc., 2020
Real-Time Detection of Global Cyberthreat Based on Darknet by Estimating Anomalous Synchronization Using Graphical Lasso.
IEICE Trans. Inf. Syst., 2020
CoRR, 2020
CoRR, 2020
Artif. Life Robotics, 2020
Threat Alert Prioritization Using Isolation Forest and Stacked Auto Encoder With Day-Forward-Chaining Analysis.
IEEE Access, 2020
Physical Cell ID Detection Probability Using Synchronization Signals of NB-IoT Radio Interface in 28-GHz Band.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
ELF Analyzer Demo: Online Identification for IoT Malwares with Multiple Hardware Architectures.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020
Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs?
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020
Proceedings of the 15th Asia Joint Conference on Information Security, 2020
2019
J. Robotics Mechatronics, 2019
IEICE Trans. Inf. Syst., 2019
Real-Time Detection of Malware Activities by Analyzing Darknet Traffic Using Graphical Lasso.
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the Advances in Swarm Intelligence - 10th International Conference, 2019
Distributed Range-based Localization for Swarm Robot Systems using Sensor-fusion Technique.
Proceedings of the 8th International Conference on Sensor Networks, 2019
A scalable and accurate feature representation method for identifying malicious mobile applications.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Automated Threat-Alert Screening for Battling Alert Fatigue with Temporal Isolation Forest.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the Neural Information Processing - 26th International Conference, 2019
Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference, 2019
Byakko: Automatic Whitelist Generation based on Occurrence Distribution of Features of Network Traffic.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
Proceedings of the 14th Asia Joint Conference on Information Security, 2019
2018
IEICE Trans. Inf. Syst., 2018
A Mechanism of Short-Term Image-Sticking Phenomenon Caused by Flexoelectric Effect in IPS LCD.
IEICE Trans. Electron., 2018
IEICE Trans. Inf. Syst., 2018
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018
Proceedings of the Neural Information Processing - 25th International Conference, 2018
Proceedings of the Eleventh International Conference on Mobile Computing and Ubiquitous Network, 2018
NRZ and PAM-4 Direct Modulation of 1.3µm Quantum Dot Lasers Grown Directly on On-Axis (001) Si.
Proceedings of the European Conference on Optical Communication, 2018
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018
Proceedings of the 13th Asia Joint Conference on Information Security, 2018
Proceedings of the 13th Asia Joint Conference on Information Security, 2018
2017
Wirel. Pers. Commun., 2017
Parallel Interaction Detection Algorithms for a Particle-based Live Controlled Real-time Microtubule Gliding Simulation System Accelerated by GPGPU.
New Gener. Comput., 2017
Proceedings of the 2017 IEEE SmartWorld, 2017
Proceedings of the Neural Information Processing - 24th International Conference, 2017
2016
IEEE Trans. Knowl. Data Eng., 2016
EAI Endorsed Trans. Self Adapt. Syst., 2016
Int. J. Autom. Comput., 2016
IEICE Trans. Electron., 2016
Towards Early Detection of Novel Attack Patterns through the Lens of a Large-Scale Darknet.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016
SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Investigation of the microtubule dynamics with probabilistic data association filter.
Proceedings of the 11th IEEE Annual International Conference on Nano/Micro Engineered and Molecular Systems, 2016
Using a master and slave approach for GPGPU computing to achieve optimal scaling in a 3D real-time simulation.
Proceedings of the 11th IEEE Annual International Conference on Nano/Micro Engineered and Molecular Systems, 2016
Proceedings of the Neural Information Processing - 23rd International Conference, 2016
Proceedings of the 11th Asia Joint Conference on Information Security, 2016
Proceedings of the 11th Asia Joint Conference on Information Security, 2016
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016
2015
An Original Entry Point Detection Method with Candidate-Sorting for More Effective Generic Unpacking.
IEICE Trans. Inf. Syst., 2015
IEICE Trans. Inf. Syst., 2015
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015
Proceedings of the 14th European Control Conference, 2015
Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2015
2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Cogn. Comput., 2014
Proceedings of the 4th International Conference on Image Processing Theory, 2014
2013
Demonstration of In-Car Doppler Laser Radar at 1.55 $ \mu\hbox{m}$ for Range and Speed Measurement.
IEEE Trans. Intell. Transp. Syst., 2013
Catching the Behavioral Differences between Multiple Executions for Malware Detection.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
IEICE Trans. Inf. Syst., 2013
Proceedings of the 2013 International Joint Conference on Neural Networks, 2013
Application of string kernel based support vector machine for malware packer identification.
Proceedings of the 2013 International Joint Conference on Neural Networks, 2013
Proceedings of the Neural Information Processing - 20th International Conference, 2013
Proceedings of the Neural Information Processing - 20th International Conference, 2013
Proceedings of the 10th International Conference on Fuzzy Systems and Knowledge Discovery, 2013
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013
Efficient Malware Packer Identification Using Support Vector Machines with Spectrum Kernel.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013
2012
IEEE Trans. Intell. Transp. Syst., 2012
J. Inf. Process., 2012
IEICE Trans. Commun., 2012
Color Filter Based on Surface Plasmon Resonance Utilizing Sub-Micron Periodic Hole Array in Aluminum Thin Film.
IEICE Trans. Electron., 2012
IEICE Trans. Inf. Syst., 2012
Nanophotonics Based on Semiconductor-Photonic Crystal/Quantum Dot and Metal-/Semiconductor-Plasmonics.
IEICE Trans. Electron., 2012
DAEDALUS-VIZ: novel real-time 3D visualization for darknet monitoring-based alert system.
Proceedings of the 9th International Symposium on Visualization for Cyber Security, 2012
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012
Proceedings of the Neural Information Processing - 19th International Conference, 2012
Proceedings of the Neural Information Processing - 19th International Conference, 2012
Proceedings of the Neural Information Processing - 19th International Conference, 2012
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012
2011
Sorting System for Recycling of Construction Byproducts with Bayes' Theorem-Based Robot Vision.
J. Robotics Mechatronics, 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
A Novel Malware Clustering Method Using Frequency of Function Call Traces in Parallel Threads.
IEICE Trans. Inf. Syst., 2011
An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation.
IEICE Trans. Inf. Syst., 2011
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011
Proceedings of the Neural Information Processing - 18th International Conference, 2011
Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011
nicter: a large-scale network incident analysis system: case studies for understanding threat landscape.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011
2010
Tracked-Vehicle Clutching Position Detectability on Bumps by Distributed Inclination Sensors.
J. Robotics Mechatronics, 2010
A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data.
IEICE Trans. Inf. Syst., 2010
Fine-Grain Feature Extraction from Malware's Scan Behavior Based on Spectrum Analysis.
IEICE Trans. Inf. Syst., 2010
An Empirical Study of Spam : Analyzing Spam Sending Systems and Malicious Web Servers.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010
Proceedings of the Neural Information Processing. Theory and Algorithms, 2010
Working Towards a Primary Binary Analysis System.
Proceedings of the 2010 International Conference on Security & Management, 2010
2009
IEICE Trans. Inf. Syst., 2009
Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring.
IEICE Trans. Inf. Syst., 2009
Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities.
IEICE Trans. Inf. Syst., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the Neural Information Processing, 16th International Conference, 2009
A Proposal of Malware Distinction Method Based on Scan Patterns Using Spectrum Analysis.
Proceedings of the Neural Information Processing, 16th International Conference, 2009
2008
An Incident Analysis System NICTER and Its Analysis Engines Based on Data Mining Techniques.
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008
Malware Behavior Analysis in Isolated Miniature Network for Revealing Malware's Network Activity.
Proceedings of IEEE International Conference on Communications, 2008
2004
Proceedings of the Applied Cryptography and Network Security, 2004
2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002