Daisuke Inoue

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
AMPIC: Adaptive Model Predictive Ising Controller for large-scale urban traffic signals.
CoRR, 2024

Predicting unobserved climate time series data at distant areas via spatial correlation using reservoir computing.
CoRR, 2024

An Uncertainty-aware, Mesh-free Numerical Method for Kolmogorov PDEs.
CoRR, 2024

Securing Code With Context: Enhancing Vulnerability Detection Through Contextualized Graph Representations.
IEEE Access, 2024

How WEIRD is Usable Privacy and Security Research?
Proceedings of the 33rd USENIX Security Symposium, 2024

VT-SOS: A Cost-effective URL Warning utilizing VirusTotal as a Second Opinion Service.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024

Customized Malware: Identifying Target Systems Using Personally Identifiable Information.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024

2023
Supporting table grape berry thinning with deep neural network and augmented reality technologies.
Comput. Electron. Agric., October, 2023

A Large-Scale Investigation into the Possibility of Malware Infection of IoT Devices with Weak Credentials.
IEICE Trans. Inf. Syst., September, 2023

Analysis of Non-Experts' Security- and Privacy-Related Questions on a Q&A Site.
IEICE Trans. Inf. Syst., September, 2023

Partially Centralized Model-Predictive Mean Field Games for controlling multi-agent systems.
IFAC J. Syst. Control., June, 2023

A Survey on the Geographic Diversity of Usable Privacy and Security Research.
CoRR, 2023

Convergence Analysis of the Upwind Difference Methods for Hamilton-Jacobi-Bellman Equations.
CoRR, 2023

IoT malware classification based on reinterpreted function-call graphs.
Comput. Secur., 2023

Detecting Malicious JavaScript Using Structure-Based Analysis of Graph Representation.
IEEE Access, 2023

Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT.
Proceedings of the 32nd USENIX Security Symposium, 2023

A high-power, power-efficient 1.3-μm SOA-integrated DFB laser for CPO applications.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2023

AiRcupid: Supporting Cucumber Picking for Intellectual Disabilities using Artificial Intelligence and Augmented Reality.
Proceedings of the IEEE International Symposium on Mixed and Augmented Reality Adjunct, 2023

Color-coded Attribute Graph: Visual Exploration of Distinctive Traits of IoT-Malware Families.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Machine Learning-Based Security Alert Screening with Focal Loss.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Detecting Android Malware and Classifying Its Families in Large-scale Datasets.
ACM Trans. Manag. Inf. Syst., 2022

Cooperative cargo transportation by a swarm of molecular machines.
Sci. Robotics, 2022

Design X Bioinformatics: a community-driven initiative to connect bioinformatics and design.
J. Integr. Bioinform., 2022

Radio Frame Timing Detection Method Using Demodulation Reference Signals Based on PCID Detection for NR Initial Access.
IEICE Trans. Commun., 2022

A Fictitious-play Finite-difference Method for Linearly Solvable Mean Field Games.
CoRR, 2022

Dark-TRACER: Early Detection Framework for Malware Activity Based on Anomalous Spatiotemporal Patterns.
IEEE Access, 2022

Understanding Non-Experts' Security- and Privacy-Related Questions on a Q&A Site.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

Understanding the Characteristics of Public Blocklist Providers.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

A Pilot Study on the AR Interface Design for People with Intellectual Disabilities.
Proceedings of the International Conference on Cyberworlds, 2022

Critical-Threat-Alert Detection using Online Machine Learning.
Proceedings of the IEEE International Conference on Big Data, 2022

NEMIANA: Cross-Platform Execution Migration for Debugging.
Proceedings of the IEEE/ACM International Conference on Automation of Software Test, 2022

Security-Alert Screening with Oversampling Based on Conditional Generative Adversarial Networks.
Proceedings of the 17th Asia Joint Conference on Information Security, 2022

An HDL Simulator with Direct Register Access for Improving Code Coverage.
Proceedings of the 17th Asia Joint Conference on Information Security, 2022

2021
Flexoelectric Effect on Image Sticking Caused by Residual Direct Current Voltage and Flicker Phenomenon in Fringe-Field Switching Mode Liquid Crystal Display.
IEICE Trans. Electron., 2021

Physical Cell ID Detection Using Joint Estimation of Frequency Offset and SSS Sequence for NR Initial Access.
IEICE Trans. Commun., 2021

Physical Cell ID Detection Probability Using NB-IoT Synchronization Signals in 28-GHz Band.
IEICE Trans. Commun., 2021

User compliance and remediation success after IoT malware notifications.
J. Cybersecur., 2021

Optimal Transport-Based Coverage Control for Swarm Robot Systems: Generalization of the Voronoi Tessellation-Based Method.
IEEE Control. Syst. Lett., 2021

Leveraging Machine Learning Techniques to Identify Deceptive Decoy Documents Associated With Targeted Email Attacks.
IEEE Access, 2021

Physical Cell ID Detection Performance Using Polarization Receiver Diversity for NR in 3GPP CDL Channel Models.
Proceedings of the 24th International Symposium on Wireless Personal Multimedia Communications, 2021

Synchronization Signal Design Using Single-Carrier Waveform for Physical- Layer Cell ID Detection.
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021

On-premises Analysis of Advanced Threat Prevention Appliances.
Proceedings of the CSET '21: Cyber Security Experimentation and Test Workshop, 2021

Combat Security Alert Fatigue with AI-Assisted Techniques.
Proceedings of the CSET '21: Cyber Security Experimentation and Test Workshop, 2021

Automated Detection of Malware Activities Using Nonnegative Matrix Factorization.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Model Predictive Mean Field Games for Controlling Multi-Agent Systems.
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021

Extracting Threat Intelligence Related IoT Botnet From Latest Dark Web Data Collection.
Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2021

JStrack: Enriching Malicious JavaScript Detection Based on AST Graph Analysis and Attention Mechanism.
Proceedings of the Neural Information Processing - 28th International Conference, 2021

Supporting Vine Vegetation Status Observation Using AR.
Proceedings of the International Conference on Cyberworlds, 2021

End-to-End Inflorescence Measurement for Supporting Table Grape Trimming with Augmented Reality.
Proceedings of the International Conference on Cyberworlds, 2021

A Machine Learning Approach to Detection of Critical Alerts from Imbalanced Multi-Appliance Threat Alert Logs.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
Efficient Detection and Classification of Internet-of-Things Malware Based on Byte Sequences from Executable Files.
IEEE Open J. Comput. Soc., 2020

Real-Time Detection of Global Cyberthreat Based on Darknet by Estimating Anomalous Synchronization Using Graphical Lasso.
IEICE Trans. Inf. Syst., 2020

Optimal Coverage Control for Swarm Robot Systems using a Mean Field Game.
CoRR, 2020

Traffic Signal Optimization on a Square Lattice using the D-Wave Quantum Annealer.
CoRR, 2020

Model Predictive Control for Finite Input Systems using the D-Wave Quantum Annealer.
CoRR, 2020

Separation of pedestrian counter flows with an array of obstacles.
Artif. Life Robotics, 2020

Threat Alert Prioritization Using Isolation Forest and Stacked Auto Encoder With Day-Forward-Chaining Analysis.
IEEE Access, 2020

Physical Cell ID Detection Probability Using Synchronization Signals of NB-IoT Radio Interface in 28-GHz Band.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

Cross Platform IoT- Malware Family Classification based on Printable Strings.
Proceedings of the 19th IEEE International Conference on Trust, 2020

ELF Analyzer Demo: Online Identification for IoT Malwares with Multiple Hardware Architectures.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs?
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

Toward Automated Smart Ships: Designing Effective Cyber Risk Management.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

IoT-Malware Detection Based on Byte Sequences of Executable Files.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

2019
Inspection Test of a Tunnel with an Inspection Vehicle for Tunnel Lining Concrete.
J. Robotics Mechatronics, 2019

A Cross-Platform Study on Emerging Malicious Programs Targeting IoT Devices.
IEICE Trans. Inf. Syst., 2019

Real-Time Detection of Malware Activities by Analyzing Darknet Traffic Using Graphical Lasso.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Stochastic Self-organizing Control for Swarm Robot Systems.
Proceedings of the Advances in Swarm Intelligence - 10th International Conference, 2019

Distributed Range-based Localization for Swarm Robot Systems using Sensor-fusion Technique.
Proceedings of the 8th International Conference on Sensor Networks, 2019

A scalable and accurate feature representation method for identifying malicious mobile applications.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Real-time botnet detection using nonnegative tucker decomposition.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Automated Threat-Alert Screening for Battling Alert Fatigue with Temporal Isolation Forest.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Combating Threat-Alert Fatigue with Online Anomaly Detection Using Isolation Forest.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

Establishing Trusted and Timely Information Source using Social Media Services.
Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference, 2019

Byakko: Automatic Whitelist Generation based on Occurrence Distribution of Features of Network Traffic.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

Measurement Study Towards a Unified Firmware Updating Scheme for Legacy IoT Devices.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

2018
Automatically Generating Malware Analysis Reports Using Sandbox Logs.
IEICE Trans. Inf. Syst., 2018

A Mechanism of Short-Term Image-Sticking Phenomenon Caused by Flexoelectric Effect in IPS LCD.
IEICE Trans. Electron., 2018

FCReducer: Locating Symmetric Cryptographic Functions on the Memory.
IEICE Trans. Inf. Syst., 2018

Usable and Secure Cloud-based Biometric Authentication Solution for IoT Devices.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

Online Max-flow Learning via Augmenting and De-augmenting Path.
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018

Employ Decision Values for Soft-Classifier Evaluation with Crispy References.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

A Cross-Platform Study on IoT Malware.
Proceedings of the Eleventh International Conference on Mobile Computing and Ubiquitous Network, 2018

NRZ and PAM-4 Direct Modulation of 1.3µm Quantum Dot Lasers Grown Directly on On-Axis (001) Si.
Proceedings of the European Conference on Optical Communication, 2018

Evasive Malware via Identifier Implanting.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

A Lightweight Host-Based Intrusion Detection Based on Process Generation Patterns.
Proceedings of the 13th Asia Joint Conference on Information Security, 2018

Evaluating Disassembly-Code Based Similarity between IoT Malware Samples.
Proceedings of the 13th Asia Joint Conference on Information Security, 2018

2017
Malicious Events Grouping via Behavior Based Darknet Traffic Flow Analysis.
Wirel. Pers. Commun., 2017

Parallel Interaction Detection Algorithms for a Particle-based Live Controlled Real-time Microtubule Gliding Simulation System Accelerated by GPGPU.
New Gener. Comput., 2017

Practical darknet traffic analysis: Methods and case studies.
Proceedings of the 2017 IEEE SmartWorld, 2017

Detection of Botnet Activities Through the Lens of a Large-Scale Darknet.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

2016
Incremental and Decremental Max-Flow for Online Semi-Supervised Learning.
IEEE Trans. Knowl. Data Eng., 2016

Intelligence of reconstructed biomolecular motor system.
EAI Endorsed Trans. Self Adapt. Syst., 2016

Real-time 3D microtubule gliding simulation accelerated by GPU computing.
Int. J. Autom. Comput., 2016

Optical Filters Based on Nano-Sized Hole and Slit Patterns in Aluminum Films.
IEICE Trans. Electron., 2016

Towards Early Detection of Novel Attack Patterns through the Lens of a Large-Scale Darknet.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

Feature subset selection by SVM ensemble.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

Generating software identifier dictionaries from Vulnerability Database.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Investigation of the microtubule dynamics with probabilistic data association filter.
Proceedings of the 11th IEEE Annual International Conference on Nano/Micro Engineered and Molecular Systems, 2016

Using a master and slave approach for GPGPU computing to achieve optimal scaling in a 3D real-time simulation.
Proceedings of the 11th IEEE Annual International Conference on Nano/Micro Engineered and Molecular Systems, 2016

The Usability of Metadata for Android Application Analysis.
Proceedings of the Neural Information Processing - 23rd International Conference, 2016

Comparing Malware Samples for Unpacking: A Feasibility Study.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

Integration of Multi-modal Features for Android Malware Detection Using Linear SVM.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

An Implementation of Visualization System for Vehicles and Pedestrians.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

2015
An Original Entry Point Detection Method with Candidate-Sorting for More Effective Generic Unpacking.
IEICE Trans. Inf. Syst., 2015

GHOST Sensor: A Proactive Cyber Attack Monitoring Platform.
IEICE Trans. Inf. Syst., 2015

A federated network online network traffics analysis engine for cybersecurity.
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015

A study on association rule mining of darknet big data.
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015

Replay attack detection in control systems with quantized signals.
Proceedings of the 14th European Control Conference, 2015

Using Bayesian Decision Making to Detect Slow Scans.
Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2015

2014
An Accurate Packer Identification Method Using Support Vector Machine.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

A Learner-Independent Knowledge Transfer Approach to Multi-task Learning.
Cogn. Comput., 2014

Tracking single microtubules by using B-spline curves and Hausdorff distance.
Proceedings of the 4th International Conference on Image Processing Theory, 2014

2013
Demonstration of In-Car Doppler Laser Radar at 1.55 $ \mu\hbox{m}$ for Range and Speed Measurement.
IEEE Trans. Intell. Transp. Syst., 2013

Dynamic class imbalance learning for incremental LPSVM.
Neural Networks, 2013

Catching the Behavioral Differences between Multiple Executions for Malware Detection.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Design and Implementation of Security for HIMALIS Architecture of Future Networks.
IEICE Trans. Inf. Syst., 2013

Chunk incremental IDR/QR LDA learning.
Proceedings of the 2013 International Joint Conference on Neural Networks, 2013

Application of string kernel based support vector machine for malware packer identification.
Proceedings of the 2013 International Joint Conference on Neural Networks, 2013

Generic Unpacking Method Based on Detecting Original Entry Point.
Proceedings of the Neural Information Processing - 20th International Conference, 2013

Referential kNN Regression for Financial Time Series Forecasting.
Proceedings of the Neural Information Processing - 20th International Conference, 2013

An incremental learning approach to continuous image change detection.
Proceedings of the 10th International Conference on Fuzzy Systems and Knowledge Discovery, 2013

The Carna Botnet Through the Lens of a Network Telescope.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

Efficient Malware Packer Identification Using Support Vector Machines with Spectrum Kernel.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
Amplitude-Modulated Laser Radar for Range and Speed Measurement in Car Applications.
IEEE Trans. Intell. Transp. Syst., 2012

Model Tests of Regolith Packaging Mechanism.
J. Robotics Mechatronics, 2012

Malware Sandbox Analysis with Efficient Observation of Herder's Behavior.
J. Inf. Process., 2012

Laser Radar Receiver Performance Improvement by Inter Symbol Interference.
IEICE Trans. Commun., 2012

Color Filter Based on Surface Plasmon Resonance Utilizing Sub-Micron Periodic Hole Array in Aluminum Thin Film.
IEICE Trans. Electron., 2012

Towards Cost-Effective P2P Traffic Classification in Cloud Environment.
IEICE Trans. Inf. Syst., 2012

Nanophotonics Based on Semiconductor-Photonic Crystal/Quantum Dot and Metal-/Semiconductor-Plasmonics.
IEICE Trans. Electron., 2012

DAEDALUS-VIZ: novel real-time 3D visualization for darknet monitoring-based alert system.
Proceedings of the 9th International Symposium on Visualization for Cyber Security, 2012

Malware Detection Method by Catching Their Random Behavior in Multiple Executions.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

A study on cost-effective P2P traffic classification.
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012

Training Minimum Enclosing Balls for Cross Tasks Knowledge Transfer.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

SDE-Driven Service Provision Control.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

Behavior Analysis of Long-term Cyber Attacks in the Darknet.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

An integrated security scheme for ID/locator split architecture of future network.
Proceedings of IEEE International Conference on Communications, 2012

Multipurpose Network Monitoring Platform Using Dynamic Address Assignment.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
Sorting System for Recycling of Construction Byproducts with Bayes' Theorem-Based Robot Vision.
J. Robotics Mechatronics, 2011

O-means: An Optimized Clustering Method for Analyzing Spam Based Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

A Novel Malware Clustering Method Using Frequency of Function Call Traces in Parallel Threads.
IEICE Trans. Inf. Syst., 2011

An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation.
IEICE Trans. Inf. Syst., 2011

Correlation Analysis between Spamming Botnets and Malware Infected Hosts.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

Entropy Based Discriminators for P2P Teletraffic Characterization.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011

nicter: a large-scale network incident analysis system: case studies for understanding threat landscape.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011

2010
Tracked-Vehicle Clutching Position Detectability on Bumps by Distributed Inclination Sensors.
J. Robotics Mechatronics, 2010

A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data.
IEICE Trans. Inf. Syst., 2010

Fine-Grain Feature Extraction from Malware's Scan Behavior Based on Spectrum Analysis.
IEICE Trans. Inf. Syst., 2010

An Empirical Study of Spam : Analyzing Spam Sending Systems and Malicious Web Servers.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

How to Locate a Target Binary Process and Its Derivatives in System Emulator.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

A Heuristic-Based Feature Selection Method for Clustering Spam Emails.
Proceedings of the Neural Information Processing. Theory and Algorithms, 2010

Working Towards a Primary Binary Analysis System.
Proceedings of the 2010 International Conference on Security & Management, 2010

2009
Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation.
IEICE Trans. Inf. Syst., 2009

Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring.
IEICE Trans. Inf. Syst., 2009

Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities.
IEICE Trans. Inf. Syst., 2009

Symmetricity of the Protocols Related to Oblivious Transfer.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

A Methodology for Analyzing Overall Flow of Spam-Based Attacks.
Proceedings of the Neural Information Processing, 16th International Conference, 2009

A Proposal of Malware Distinction Method Based on Scan Patterns Using Spectrum Analysis.
Proceedings of the Neural Information Processing, 16th International Conference, 2009

2008
Conditional Converge Cast.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

An Incident Analysis System NICTER and Its Analysis Engines Based on Data Mining Techniques.
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008

Malware Behavior Analysis in Isolated Miniature Network for Revealing Malware's Network Activity.
Proceedings of IEEE International Conference on Communications, 2008

2004
FDLKH: Fully Decentralized Key Management Scheme on Logical Key Hierarchy.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Detection-Resistant Steganography for Standard MIDI Files.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

2002
Rivulet: An Anonymous Communication Method Based on Group Communication.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

Scheme of standard MIDI files steganography and its evaluation.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002


  Loading...