Takeshi Takahashi
Orcid: 0000-0002-6477-7770Affiliations:
- National Institute of Information and Communications Technology, Japan
According to our database1,
Takeshi Takahashi
authored at least 121 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
ACM Trans. Internet Techn., May, 2024
Securing Code With Context: Enhancing Vulnerability Detection Through Contextualized Graph Representations.
IEEE Access, 2024
Proceedings of the 19th Asia Joint Conference on Information Security, 2024
2023
Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware.
IEICE Trans. Inf. Syst., September, 2023
Service Function Chaining security survey: Addressing security challenges and threats.
Comput. Networks, February, 2023
FINISH: Efficient and Scalable NMF-Based Federated Learning for Detecting Malware Activities.
IEEE Trans. Emerg. Top. Comput., 2023
Comput. Secur., 2023
IEEE Access, 2023
Detecting Malicious JavaScript Using Structure-Based Analysis of Graph Representation.
IEEE Access, 2023
Consolidating Packet-Level Features for Effective Network Intrusion Detection: A Novel Session-Level Approach.
IEEE Access, 2023
Scalable and Fast Algorithm for Constructing Phylogenetic Trees With Application to IoT Malware Clustering.
IEEE Access, 2023
Color-coded Attribute Graph: Visual Exploration of Distinctive Traits of IoT-Malware Families.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Towards Long-Term Continuous Tracing of Internet-Wide Scanning Campaigns Based on Darknet Analysis.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
Towards Functional Analysis of IoT Malware Using Function Call Sequence Graphs and Clustering.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Work in Progress: New Seed Set Selection Method of the Scalable Method for Constructing Phylogenetic Trees.
Proceedings of the 20th ACM International Conference on Computing Frontiers, 2023
ARTMAN '23: First Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
Packet-Level Intrusion Detection Using LSTM Focusing on Personal Information and Payloads.
Proceedings of the 18th Asia Joint Conference on Information Security, 2023
Proceedings of the 2023 Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks, 2023
Model Selection for Continuous Operation of Automated Vulnerability Assessment System.
Proceedings of the 2023 Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks, 2023
2022
ACM Trans. Manag. Inf. Syst., 2022
Ann. des Télécommunications, 2022
Ann. des Télécommunications, 2022
Interactions between artificial intelligence and cybersecurity to protect future networks.
Ann. des Télécommunications, 2022
Generating Labeled Training Datasets Towards Unified Network Intrusion Detection Systems.
IEEE Access, 2022
Dark-TRACER: Early Detection Framework for Malware Activity Based on Anomalous Spatiotemporal Patterns.
IEEE Access, 2022
Toward a Better Understanding of Mobile Users' Behavior: A Web Session Repair Scheme.
IEEE Access, 2022
Proceedings of the Intelligent Systems and Pattern Recognition, 2022
Proceedings of the IEEE Symposium on Computers and Communications, 2022
SenseInput: An Image-Based Sensitive Input Detection Scheme for Phishing Website Detection.
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022
Proceedings of the IEEE International Conference on Big Data, 2022
Darknet Analysis-Based Early Detection Framework for Malware Activity: Issue and Potential Extension.
Proceedings of the IEEE International Conference on Big Data, 2022
Security-Alert Screening with Oversampling Based on Conditional Generative Adversarial Networks.
Proceedings of the 17th Asia Joint Conference on Information Security, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams and its Feasibility.
IEEE Trans. Emerg. Top. Comput., 2021
Partition-then-Overlap Method for Labeling Cyber Threat Intelligence Reports by Topics over Time.
IEICE Trans. Inf. Syst., 2021
Leveraging Machine Learning Techniques to Identify Deceptive Decoy Documents Associated With Targeted Email Attacks.
IEEE Access, 2021
IEEE Access, 2021
Proceedings of the CSET '21: Cyber Security Experimentation and Test Workshop, 2021
Proceedings of the CSET '21: Cyber Security Experimentation and Test Workshop, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Multi-label Positive and Unlabeled Learning and its Application to Common Vulnerabilities and Exposure Categorization.
Proceedings of the 20th IEEE International Conference on Trust, 2021
Investigating behavioral differences between IoT malware via function call sequence graphs.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
Machine-learning Approach using Solidity Bytecode for Smart-contract Honeypot Detection in the Ethereum.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Designing Comprehensive Cyber Threat Analysis Platform: Can We Orchestrate Analysis Engines?
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021
Extracting Threat Intelligence Related IoT Botnet From Latest Dark Web Data Collection.
Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2021
JStrack: Enriching Malicious JavaScript Detection Based on AST Graph Analysis and Attention Mechanism.
Proceedings of the Neural Information Processing - 28th International Conference, 2021
Proceedings of the Sixth International Conference on Fog and Mobile Edge Computing, 2021
Scalable and Fast Hierarchical Clustering of IoT Malware Using Active Data Selection.
Proceedings of the Sixth International Conference on Fog and Mobile Edge Computing, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
A Machine Learning Approach to Detection of Critical Alerts from Imbalanced Multi-Appliance Threat Alert Logs.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
Which Packet Did They Catch? Associating NIDS Alerts with Their Communication Sessions.
Proceedings of the 16th Asia Joint Conference on Information Security, 2021
2020
Proceedings of the Data Science in Cybersecurity and Cyberthreat Intelligence, 2020
Efficient Detection and Classification of Internet-of-Things Malware Based on Byte Sequences from Executable Files.
IEEE Open J. Comput. Soc., 2020
Real-Time Detection of Global Cyberthreat Based on Darknet by Estimating Anomalous Synchronization Using Graphical Lasso.
IEICE Trans. Inf. Syst., 2020
Threat Alert Prioritization Using Isolation Forest and Stacked Auto Encoder With Day-Forward-Chaining Analysis.
IEEE Access, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs?
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020
Automation of Vulnerability Classification from its Description using Machine Learning.
Proceedings of the IEEE Symposium on Computers and Communications, 2020
Proceedings of the 15th Asia Joint Conference on Information Security, 2020
A Privacy-Preserving Federated Learning System for Android Malware Detection Based on Edge Computing.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020
2019
Character-Level Convolutional Neural Network for Predicting Severity of Software Vulnerability from Vulnerability Description.
IEICE Trans. Inf. Syst., 2019
Real-Time Detection of Malware Activities by Analyzing Darknet Traffic Using Graphical Lasso.
Proceedings of the 18th IEEE International Conference On Trust, 2019
A scalable and accurate feature representation method for identifying malicious mobile applications.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Automated Threat-Alert Screening for Battling Alert Fatigue with Temporal Isolation Forest.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
A Fast Algorithm for Constructing Phylogenetic Trees with Application to IoT Malware Clustering.
Proceedings of the Neural Information Processing - 26th International Conference, 2019
Proceedings of the Neural Information Processing - 26th International Conference, 2019
Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference, 2019
2018
Web of cybersecurity: Linking, locating, and discovering structured cybersecurity information.
Int. J. Commun. Syst., 2018
IEICE Trans. Inf. Syst., 2018
ANTSdroid: Using RasMMA Algorithm to Generate Malware Behavior Characteristics of Android Malware Family.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018
Proceedings of the Neural Information Processing - 25th International Conference, 2018
Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Establishing secure and anonymous communication channel: KEM/DEM-based construction and its implementation.
J. Inf. Secur. Appl., 2017
2016
Secure and Anonymous Communication Technique: Formal Model and Its Prototype Implementation.
IEEE Trans. Emerg. Top. Comput., 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Toward automated vulnerability monitoring using open information and standardized tools.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016
Structured cybersecurity information exchange for streamlining incident response operations.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016
Proceedings of the Neural Information Processing - 23rd International Conference, 2016
Proceedings of the 11th Asia Joint Conference on Information Security, 2016
2015
Int. J. Commun. Syst., 2015
Proceedings of the Neural Information Processing - 22nd International Conference, 2015
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
2014
An Incident Object Description Exchange Format (IODEF) Extension for Structured Cybersecurity Information.
RFC, April, 2014
CoRR, 2014
Expressing Security Requirements: Usability of Taxonomy-Based Requirement Identification Scheme.
Proceedings of the 2014 IEEE World Congress on Services, 2014
Mechanism for Linking and Discovering Structured Cybersecurity Information over Networks.
Proceedings of the 2014 IEEE International Conference on Semantic Computing, 2014
Building secure and anonymous communication channel: formal model and its prototype implementation.
Proceedings of the Symposium on Applied Computing, 2014
MindYourPrivacy: Design and implementation of a visualization system for third-party Web tracking.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Data Model for Android Package Information and Its Application to Risk Analysis System.
Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security, 2014
2013
IEEE Veh. Technol. Mag., 2013
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Risk visualization and alerting system: architecture and proof-of-concept implementation.
Proceedings of the first international workshop on Security in embedded systems and smartphones, 2013
2012
Proceedings of the Neural Information Processing - 19th International Conference, 2012
Proceedings of the Neural Information Processing - 19th International Conference, 2012
Proceedings of the 2nd Baltic Congress on Future Internet Communications, 2012
2011
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
Proceedings of the ITU Kaleidoscope 2011: The Fully Networked Human?, 2011
2010
Comput. Commun. Rev., 2010
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
2005
Proactive Handover Scheme Based on Forwarding Router Discovery for Mobile IP Networks.
IEICE Trans. Commun., 2005
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005
Inter-domain handover scheme based on forwarding router discovery for mobile IP networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005
Multicast Receiver Mobility over Mobile IP Networks based on Forwarding Router Discovery.
Proceedings of the Networking, 2005
Proceedings of IEEE International Conference on Communications, 2005
Proceedings of the 2nd International Conference on Broadband Networks (BROADNETS 2005), 2005
2004
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004
2002
Proceedings of the IEEE International Conference on Acoustics, 2002
2001
Proceedings of the 2001 IEEE International Conference on Multimedia and Expo, 2001