Takeshi Takahashi

Orcid: 0000-0002-6477-7770

Affiliations:
  • National Institute of Information and Communications Technology, Japan


According to our database1, Takeshi Takahashi authored at least 121 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
VORTEX : Visual phishing detectiOns aRe Through EXplanations.
ACM Trans. Internet Techn., May, 2024

Securing Code With Context: Enhancing Vulnerability Detection Through Contextualized Graph Representations.
IEEE Access, 2024

Evading IoT Intrusion Detection Systems with GAN.
Proceedings of the 19th Asia Joint Conference on Information Security, 2024

2023
Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware.
IEICE Trans. Inf. Syst., September, 2023

Service Function Chaining security survey: Addressing security challenges and threats.
Comput. Networks, February, 2023

FINISH: Efficient and Scalable NMF-Based Federated Learning for Detecting Malware Activities.
IEEE Trans. Emerg. Top. Comput., 2023

IoT malware classification based on reinterpreted function-call graphs.
Comput. Secur., 2023

Detecting Coordinated Internet-Wide Scanning by TCP/IP Header Fingerprint.
IEEE Access, 2023

Detecting Malicious JavaScript Using Structure-Based Analysis of Graph Representation.
IEEE Access, 2023

Consolidating Packet-Level Features for Effective Network Intrusion Detection: A Novel Session-Level Approach.
IEEE Access, 2023

Scalable and Fast Algorithm for Constructing Phylogenetic Trees With Application to IoT Malware Clustering.
IEEE Access, 2023

Color-coded Attribute Graph: Visual Exploration of Distinctive Traits of IoT-Malware Families.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Towards Long-Term Continuous Tracing of Internet-Wide Scanning Campaigns Based on Darknet Analysis.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Towards Functional Analysis of IoT Malware Using Function Call Sequence Graphs and Clustering.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Work in Progress: New Seed Set Selection Method of the Scalable Method for Constructing Phylogenetic Trees.
Proceedings of the 20th ACM International Conference on Computing Frontiers, 2023

ARTMAN '23: First Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Machine Learning-Based Security Alert Screening with Focal Loss.
Proceedings of the IEEE International Conference on Big Data, 2023

Packet-Level Intrusion Detection Using LSTM Focusing on Personal Information and Payloads.
Proceedings of the 18th Asia Joint Conference on Information Security, 2023

Hybrid Explainable Intrusion Detection System: Global vs. Local Approach.
Proceedings of the 2023 Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks, 2023

Model Selection for Continuous Operation of Automated Vulnerability Assessment System.
Proceedings of the 2023 Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks, 2023

2022
Detecting Android Malware and Classifying Its Families in Large-scale Datasets.
ACM Trans. Manag. Inf. Syst., 2022

Multi-labeling with topic models for searching security information.
Ann. des Télécommunications, 2022

Explainable artificial intelligence for cybersecurity: a literature survey.
Ann. des Télécommunications, 2022

Interactions between artificial intelligence and cybersecurity to protect future networks.
Ann. des Télécommunications, 2022

Generating Labeled Training Datasets Towards Unified Network Intrusion Detection Systems.
IEEE Access, 2022

Dark-TRACER: Early Detection Framework for Malware Activity Based on Anomalous Spatiotemporal Patterns.
IEEE Access, 2022

Toward a Better Understanding of Mobile Users' Behavior: A Web Session Repair Scheme.
IEEE Access, 2022

Malicious Packet Classification Based on Neural Network Using Kitsune Features.
Proceedings of the Intelligent Systems and Pattern Recognition, 2022

Understanding the Characteristics of Public Blocklist Providers.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

SenseInput: An Image-Based Sensitive Input Detection Scheme for Phishing Website Detection.
Proceedings of the IEEE International Conference on Communications, 2022

IoT Botnet Detection Based on the Behaviors of DNS Queries.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

Critical-Threat-Alert Detection using Online Machine Learning.
Proceedings of the IEEE International Conference on Big Data, 2022

Darknet Analysis-Based Early Detection Framework for Malware Activity: Issue and Potential Extension.
Proceedings of the IEEE International Conference on Big Data, 2022

Security-Alert Screening with Oversampling Based on Conditional Generative Adversarial Networks.
Proceedings of the 17th Asia Joint Conference on Information Security, 2022

Towards Polyvalent Adversarial Attacks on URL Classification Engines.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams and its Feasibility.
IEEE Trans. Emerg. Top. Comput., 2021

Partition-then-Overlap Method for Labeling Cyber Threat Intelligence Reports by Topics over Time.
IEICE Trans. Inf. Syst., 2021

Leveraging Machine Learning Techniques to Identify Deceptive Decoy Documents Associated With Targeted Email Attacks.
IEEE Access, 2021

Impact of Code Deobfuscation and Feature Interaction in Android Malware Detection.
IEEE Access, 2021

On-premises Analysis of Advanced Threat Prevention Appliances.
Proceedings of the CSET '21: Cyber Security Experimentation and Test Workshop, 2021

Combat Security Alert Fatigue with AI-Assisted Techniques.
Proceedings of the CSET '21: Cyber Security Experimentation and Test Workshop, 2021

Automated Detection of Malware Activities Using Nonnegative Matrix Factorization.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Multi-label Positive and Unlabeled Learning and its Application to Common Vulnerabilities and Exposure Categorization.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Investigating behavioral differences between IoT malware via function call sequence graphs.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Machine-learning Approach using Solidity Bytecode for Smart-contract Honeypot Detection in the Ethereum.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

IoT Malware Detection Using Function-Call-Graph Embedding.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

Designing Comprehensive Cyber Threat Analysis Platform: Can We Orchestrate Analysis Engines?
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021

Extracting Threat Intelligence Related IoT Botnet From Latest Dark Web Data Collection.
Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2021

JStrack: Enriching Malicious JavaScript Detection Based on AST Graph Analysis and Attention Mechanism.
Proceedings of the Neural Information Processing - 28th International Conference, 2021

Internet-Wide Scanner Fingerprint Identifier Based on TCP/IP Header.
Proceedings of the Sixth International Conference on Fog and Mobile Edge Computing, 2021

Scalable and Fast Hierarchical Clustering of IoT Malware Using Active Data Selection.
Proceedings of the Sixth International Conference on Fog and Mobile Edge Computing, 2021

Towards Efficient Labeling of Network Incident Datasets Using Tcpreplay and Snort.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

A Machine Learning Approach to Detection of Critical Alerts from Imbalanced Multi-Appliance Threat Alert Logs.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Which Packet Did They Catch? Associating NIDS Alerts with Their Communication Sessions.
Proceedings of the 16th Asia Joint Conference on Information Security, 2021

2020
JSON Binding of the Incident Object Description Exchange Format.
RFC, August, 2020

Discovering Malicious URLs Using Machine Learning Techniques.
Proceedings of the Data Science in Cybersecurity and Cyberthreat Intelligence, 2020

Efficient Detection and Classification of Internet-of-Things Malware Based on Byte Sequences from Executable Files.
IEEE Open J. Comput. Soc., 2020

Message from the guest editors.
Int. J. Inf. Sec., 2020

Real-Time Detection of Global Cyberthreat Based on Darknet by Estimating Anomalous Synchronization Using Graphical Lasso.
IEICE Trans. Inf. Syst., 2020

Threat Alert Prioritization Using Isolation Forest and Stacked Auto Encoder With Day-Forward-Chaining Analysis.
IEEE Access, 2020

Cross Platform IoT- Malware Family Classification based on Printable Strings.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs?
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

Toward Automated Smart Ships: Designing Effective Cyber Risk Management.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

Automation of Vulnerability Classification from its Description using Machine Learning.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

IoT-Malware Detection Based on Byte Sequences of Executable Files.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

A Privacy-Preserving Federated Learning System for Android Malware Detection Based on Edge Computing.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

2019
Character-Level Convolutional Neural Network for Predicting Severity of Software Vulnerability from Vulnerability Description.
IEICE Trans. Inf. Syst., 2019

Real-Time Detection of Malware Activities by Analyzing Darknet Traffic Using Graphical Lasso.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A scalable and accurate feature representation method for identifying malicious mobile applications.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Real-time botnet detection using nonnegative tucker decomposition.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Automated Threat-Alert Screening for Battling Alert Fatigue with Temporal Isolation Forest.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

A Fast Algorithm for Constructing Phylogenetic Trees with Application to IoT Malware Clustering.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

Combating Threat-Alert Fatigue with Online Anomaly Detection Using Isolation Forest.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

Establishing Trusted and Timely Information Source using Social Media Services.
Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference, 2019

2018
Web of cybersecurity: Linking, locating, and discovering structured cybersecurity information.
Int. J. Commun. Syst., 2018

Automatically Generating Malware Analysis Reports Using Sandbox Logs.
IEICE Trans. Inf. Syst., 2018

ANTSdroid: Using RasMMA Algorithm to Generate Malware Behavior Characteristics of Android Malware Family.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

Usable and Secure Cloud-based Biometric Authentication Solution for IoT Devices.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

Online Max-flow Learning via Augmenting and De-augmenting Path.
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018

Employ Decision Values for Soft-Classifier Evaluation with Crispy References.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Establishing secure and anonymous communication channel: KEM/DEM-based construction and its implementation.
J. Inf. Secur. Appl., 2017

2016
Secure and Anonymous Communication Technique: Formal Model and Its Prototype Implementation.
IEEE Trans. Emerg. Top. Comput., 2016

Generating software identifier dictionaries from Vulnerability Database.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Toward automated vulnerability monitoring using open information and standardized tools.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

Offloading smartphone firewalling using OpenFlow-capable wireless access points.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

Structured cybersecurity information exchange for streamlining incident response operations.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

The Usability of Metadata for Android Application Analysis.
Proceedings of the Neural Information Processing - 23rd International Conference, 2016

Integration of Multi-modal Features for Android Malware Detection Using Linear SVM.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

2015
A non-repudiable negotiation protocol for security service level agreements.
Int. J. Commun. Syst., 2015

Reference Ontology for Cybersecurity Operational Information.
Comput. J., 2015

Fine-Grained Risk Level Quantication Schemes Based on APK Metadata.
Proceedings of the Neural Information Processing - 22nd International Conference, 2015

A KEM/DEM-Based Construction for Secure and Anonymous Communication.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

2014
An Incident Object Description Exchange Format (IODEF) Extension for Structured Cybersecurity Information.
RFC, April, 2014

Tailored Security: Building Nonrepudiable Security Service-Level Agreements.
CoRR, 2014

Expressing Security Requirements: Usability of Taxonomy-Based Requirement Identification Scheme.
Proceedings of the 2014 IEEE World Congress on Services, 2014

Mechanism for Linking and Discovering Structured Cybersecurity Information over Networks.
Proceedings of the 2014 IEEE International Conference on Semantic Computing, 2014

Building secure and anonymous communication channel: formal model and its prototype implementation.
Proceedings of the Symposium on Applied Computing, 2014

MindYourPrivacy: Design and implementation of a visualization system for third-party Web tracking.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Data Model for Android Package Information and Its Application to Risk Analysis System.
Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security, 2014

2013
Tailored Security: Building Nonrepudiable Security Service-Level Agreements.
IEEE Veh. Technol. Mag., 2013

Accountable security mechanism based on security service level agreement.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

Toward Automated Reduction of Human Errors Based on Cognitive Analysis.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Risk visualization and alerting system: architecture and proof-of-concept implementation.
Proceedings of the first international workshop on Security in embedded systems and smartphones, 2013

2012
DNS-Based Defense against IP Spoofing Attacks.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

Secure Distributed Storage for Bulk Data.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

Enabling secure multitenancy in cloud computing: Challenges and approaches.
Proceedings of the 2nd Baltic Congress on Future Internet Communications, 2012

2011
Mining interlacing manifolds in high dimensional spaces.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Toward global cybersecurity collaboration: Cybersecurity operation activity model.
Proceedings of the ITU Kaleidoscope 2011: The Fully Networked Human?, 2011

2010
CYBEX: the cybersecurity information exchange framework (x.1500).
Comput. Commun. Rev., 2010

Ontological approach toward cybersecurity in cloud computing.
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010

Building ontology of cybersecurity operational information.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2005
Proactive Handover Scheme Based on Forwarding Router Discovery for Mobile IP Networks.
IEICE Trans. Commun., 2005

Adaptive MAC protocol for high-load inter-vehicle communication.
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005

Inter-domain handover scheme based on forwarding router discovery for mobile IP networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Multicast Receiver Mobility over Mobile IP Networks based on Forwarding Router Discovery.
Proceedings of the Networking, 2005

A routing-aware handover scheme for mobile IP.
Proceedings of IEEE International Conference on Communications, 2005

Multicast source handover scheme based on proxy router discovery.
Proceedings of the 2nd International Conference on Broadband Networks (BROADNETS 2005), 2005

2004
Implementation and performance evaluation of multicast control protocol.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

2002
Packet-multiplexing scheme in MPEG-2 multi-program transport stream transcoder.
Proceedings of the IEEE International Conference on Acoustics, 2002

2001
MPEG-2 Multi-Program Transport Stream Transcoder.
Proceedings of the 2001 IEEE International Conference on Multimedia and Expo, 2001


  Loading...