Shuichiro Haruta

Orcid: 0000-0002-0695-9963

According to our database1, Shuichiro Haruta authored at least 31 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Top-down Activity Representation Learning for Video Question Answering.
CoRR, 2024

Multi-object event graph representation learning for Video Question Answering.
CoRR, 2024

Mutual Information-based Preference Disentangling and Transferring for Non-overlapped Multi-target Cross-domain Recommendations.
Proceedings of the 47th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2024

Representing the Interaction between Users and Products via LLM-assisted Knowledge Graph Construction.
Proceedings of the 18th IEEE International Conference on Semantic Computing, 2024

QWalkVec: Node Embedding by Quantum Walk.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2024

2023
Semantic Relation Transfer for Non-overlapped Cross-domain Recommendations.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2023

A Graph-Based Recommendation Model Using Contrastive Learning for Inductive Scenario.
Proceedings of the International Conference on Machine Learning and Applications, 2023

CG-GNN: A Novel Compiled Graphs-based Feature Extraction Method for Enterprise Social Networks.
Proceedings of the 4th ACM Workshop on Intelligent Cross-Data Analysis and Retrieval, 2023

Unvisited Out-Of-Town POI Recommendation with Simultaneous Learning of Multiple Regions.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Multi-view Contrastive Multiple Knowledge Graph Embedding for Knowledge Completion.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

Debiasing Graph Transfer Learning via Item Semantic Clustering for Cross-Domain Recommendations.
Proceedings of the IEEE International Conference on Big Data, 2022

A Novel Graph Aggregation Method Based on Feature Distribution Around Each Ego-node for Heterophily.
Proceedings of the Asian Conference on Machine Learning, 2022

2021
An Energy-Efficient Defense against Message Flooding Attacks in Delay Tolerant Networks.
IEICE Trans. Commun., 2021

Does Activeness Originate in Individuals or Groups? Analysis of the Interrelationships between Network Indices and Posts Using Multilevel Cross-Lagged Model.
Proceedings of the WI-IAT '21: IEEE/WIC/ACM International Conference on Web Intelligence, Hybrid Event / Melbourne, VIC, Australia, December 14 - 17, 2021, 2021

A Study on Metrics for Concept Drift Detection Based on Predictions and Parameters of Ensemble Model.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking and Services, 2021

An Empirical Study on News Recommendation in Multiple Domain Settings.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking and Services, 2021

A Website Fingerprinting Attack based on the Virtual Memory of the Process on Android Devices.
Proceedings of the 26th IEEE Asia-Pacific Conference on Communications, 2021

2020
A Server-Based Distributed Storage Using Secret Sharing with AES-256 for Lightweight Safety Restoration.
IEICE Trans. Inf. Syst., 2020

Android Malware Detection Scheme Based on Level of SSL Server Certificate.
IEICE Trans. Inf. Syst., 2020

A Preprocessing by Using Multiple Steganography for Intentional Image Downsampling on CNN-Based Steganalysis.
IEEE Access, 2020

A Preprocessing Methodology by Using Additional Steganography on CNN-based Steganalysis.
Proceedings of the IEEE Global Communications Conference, 2020

2019
An Effective Feature Selection Scheme for Android ICC-Based Malware Detection Using the Gap of the Appearance Ratio.
IEICE Trans. Inf. Syst., 2019

Hue Signature Auto Update System for Visual Similarity-Based Phishing Detection with Tolerance to Zero-Day Attack.
IEICE Trans. Inf. Syst., 2019

Traffic Feature-Based Botnet Detection Scheme Emphasizing the Importance of Long Patterns.
Proceedings of the Image Processing and Communications, 2019

Trust-based Verification Attack Prevention Scheme using Tendency of Contents Request on NDN.
Proceedings of the 25th Asia-Pacific Conference on Communications, 2019

A Novel Visual Similarity-based Phishing Detection Scheme using Hue Information with Auto Updating Database.
Proceedings of the 25th Asia-Pacific Conference on Communications, 2019

2018
Encounter Record Reduction Scheme based on Theoretical Contact Probability for Flooding Attack Mitigation in DTN.
Proceedings of the 24th Asia-Pacific Conference on Communications, 2018

2017
Visual Similarity-Based Phishing Detection Scheme Using Image and CSS with Target Website Finder.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Traceroute-based target link flooding attack detection scheme by analyzing hop count to the destination.
Proceedings of the 23rd Asia-Pacific Conference on Communications, 2017

Obfuscated malicious javascript detection scheme using the feature based on divided URL.
Proceedings of the 23rd Asia-Pacific Conference on Communications, 2017

2016
Trust-Based Sybil Nodes Detection with Robust Seed Selection and Graph Pruning on SNS.
IEICE Trans. Commun., 2016


  Loading...