Tatsuya Mori
Orcid: 0000-0003-1583-4174
According to our database1,
Tatsuya Mori
authored at least 158 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Understanding the Breakdown of Same-origin Policies in Web Services That Rehost Websites.
J. Inf. Process., 2024
J. Inf. Process., 2024
Users Feel Guilty: Measurement of Illegal Software Installation Guide Videos on YouTube for Malware Distribution.
CoRR, 2024
Longitudinal Measurement Study of the Domain Names Associated With the Olympic Games.
IEEE Access, 2024
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024
A Method for Generating Tactile Sensations from Textual Descriptions Using Generative AI.
Proceedings of the SIGGRAPH Asia 2024 Posters, SA 2024, Tokyo, Japan, December 3-6, 2024, 2024
Proceedings of the Adjunct Proceedings of the 26th International Conference on Mobile Human-Computer Interaction, 2024
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
IEICE Trans. Inf. Syst., September, 2023
J. Inf. Process., 2023
Analysis of Privacy Compliance by Classifying Policies Before and After the Japanese Law Revision.
J. Inf. Process., 2023
J. Inf. Process., 2023
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023
Proceedings of the Passive and Active Measurement - 24th International Conference, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the International Conference on Machine Learning and Cybernetics, 2023
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the 2023 European Symposium on Usable Security, 2023
2022
On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework.
Proc. Priv. Enhancing Technol., 2022
Experiences, Behavioral Tendencies, and Concerns of Non-Native English Speakers in Identifying Phishing Emails.
J. Inf. Process., 2022
CHE: Channel-Wise Homomorphic Encryption for Ciphertext Inference in Convolutional Neural Network.
IEEE Access, 2022
Proceedings of the Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25, 2022
28-m W Fully Embedded AI Techniques with On-site Learning for Low-Power Handy Tactile Sensing System.
Proceedings of the 2022 International Symposium on VLSI Design, Automation and Test, 2022
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022
Understanding the Behavior Transparency of Voice Assistant Applications Using the ChatterBox Framework.
Proceedings of the 25th International Symposium on Research in Attacks, 2022
Cyber-physical firewall: monitoring and controlling the threats caused by malicious analog signals.
Proceedings of the CF '22: 19th ACM International Conference on Computing Frontiers, Turin, Italy, May 17, 2022
Proceedings of the 4th Blockchain and Internet of Things Conference, 2022
2021
Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams and its Feasibility.
IEEE Trans. Emerg. Top. Comput., 2021
J. Cyber Secur. Mobil., 2021
Why They Ignore English Emails: The Challenges of Non-Native Speakers in Identifying Phishing Emails.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
Proceedings of the Passive and Active Measurement - 22nd International Conference, 2021
Proceedings of the IEEE Global Communications Conference, 2021
Careless Participants Are Essential for Our Phishing Study: Understanding the Impact of Screening Methods.
Proceedings of the EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11, 2021
2020
Proceedings of the Data Science in Cybersecurity and Cyberthreat Intelligence, 2020
Addressing the Privacy Threat to Identify Existence of a Target's Account on Sensitive Services.
J. Inf. Process., 2020
Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?
IEICE Trans. Inf. Syst., 2020
Follow Your Silhouette: Identifying the Social Account of Website Visitors through User-Blocking Side Channel.
IEICE Trans. Inf. Syst., 2020
Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library.
IEICE Trans. Inf. Syst., 2020
IEICE Trans. Inf. Syst., 2020
Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
2019
Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps.
J. Inf. Process., 2019
Tap 'n Ghost: A Compilation of Novel Attack Techniques against Smartphone Touchscreens.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019
Proceedings of the Internet Measurement Conference, 2019
Understanding the Responsiveness of Mobile App Developers to Software Library Updates.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
EIGER: automated IOC generation for accurate and interpretable endpoint malware detection.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
PADetective: A Systematic Approach to Automate Detection of Promotional Attackers in Mobile App Store.
J. Inf. Process., 2018
DomainProfiler: toward accurate and early discovery of domain names abused in future.
Int. J. Inf. Sec., 2018
IEICE Trans. Inf. Syst., 2018
IEICE Trans. Inf. Syst., 2018
IEICE Trans. Inf. Syst., 2018
Comput. Secur., 2018
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018
User Blocking Considered Harmful? An Attacker-Controllable Side Channel to Identify Social Accounts.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
Proceedings of the Computer Security, 2018
Don't throw me away: Threats Caused by the Abandoned Internet Resources Used by Android Apps.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
IEICE Trans. Inf. Syst., 2017
IEICE Trans. Commun., 2017
IEICE Trans. Inf. Syst., 2017
IEICE Trans. Inf. Syst., 2017
Building a Scalable Web Tracking Detection System: Implementation and the Empirical Study.
IEICE Trans. Inf. Syst., 2017
CoRR, 2017
Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots.
Comput. Secur., 2017
Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market Analytics, 2017
Understanding the origins of mobile app vulnerabilities: a large-scale measurement study of free and paid apps.
Proceedings of the 14th International Conference on Mining Software Repositories, 2017
BotDetector: A robust and scalable approach toward detecting malware-infected devices.
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the Adjunct Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, 2017
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the Applications and Techniques in Information Security, 2017
2016
IEICE Trans. Inf. Syst., 2016
Comput. Commun., 2016
Spoofing detection for embedded face recognition system using a low cost stereo camera.
Proceedings of the 23rd International Conference on Pattern Recognition, 2016
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 2016
POSTER: Toward Automating the Generation of Malware Analysis Reports Using the Sandbox Logs.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the Biomedical Engineering Systems and Technologies, 2016
Proceedings of the 9th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2016), 2016
2015
RouteDetector: Sensor-based Positioning System That Exploits Spatio-Temporal Regularity of Human Mobility.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015
SFMap: Inferring Services over Encrypted Web Flows Using Dynamical Domain Name Graphs.
Proceedings of the Traffic Monitoring and Analysis - 7th International Workshop, 2015
Understanding the Inconsistencies between Text Descriptions and the Use of Privacy-sensitive Resources of Mobile Apps.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015
Inferring Popularity of Domain Names with DNS Traffic: Exploiting Cache Timeout Heuristics.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015
2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
POSTER: Seven Years in MWS: Experiences of Sharing Datasets with Anti-malware Research Community in Japan.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Telecommun. Syst., 2013
J. Inf. Process., 2013
IEICE Trans. Commun., 2013
Effect of Limiting Pre-Distribution and Clustering Users on Multicast Pre-Distribution VoD.
IEICE Trans. Commun., 2013
Analyzing Characteristics of TCP Quality Metrics with Respect to Type of Connection through Measured Traffic Data.
IEICE Trans. Commun., 2013
Mean-variance relationship of the number of flows in traffic aggregation and its application to traffic management.
Comput. Networks, 2013
A periodic combined-content distribution mechanism in peer-assisted content delivery networks.
Proceedings of the 2013 ITU Kaleidoscope: Building Sustainable Communities, 2013
Expected traffic reduction by content-oriented incentive in peer-assisted content delivery networks.
Proceedings of the International Conference on Information Networking 2013, 2013
2012
SpACCE: a sophisticated ad hoc cloud computing environment built by server migration to facilitate distributed collaboration.
Int. J. Space Based Situated Comput., 2012
IEICE Trans. Commun., 2012
Traffic Engineering of Peer-Assisted Content Delivery Network with Content-Oriented Incentive Mechanism.
IEICE Trans. Inf. Syst., 2012
IEICE Trans. Commun., 2012
Effects of Sampling and Spatio/Temporal Granularity in Traffic Monitoring on Anomaly Detectability.
IEICE Trans. Commun., 2012
Control. Intell. Syst., 2012
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012
Proceedings of IEEE International Conference on Communications, 2012
A Sophisticated Ad Hoc Cloud Computing Environment Built by the Migration of a Server to Facilitate Distributed Collaboration.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
2011
Int. J. Netw. Manag., 2011
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of the 8th Annual Collaboration, 2011
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011
2010
Proceedings of the Traffic Monitoring and Analysis, Second International Workshop, 2010
Sensor in the Dark: Building Untraceable Large-Scale Honeypots Using Virtualization Technologies.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of the Second International Conference on Communication Systems and Networks, 2010
2009
A Power, Performance Scalable Eight-Cores Media Processor for Mobile Multimedia Applications.
IEEE J. Solid State Circuits, 2009
Proceedings of the 2009 Joint International Conference on Digital Libraries, 2009
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Design and implementation of scalable, transparent threads for multi-core media processor.
Proceedings of the Design, Automation and Test in Europe, 2009
2008
Packet Sampling TCP Flow Rate Estimation and Performance Degradation Detection Method.
IEICE Trans. Commun., 2008
Finding Cardinality Heavy-Hitters in Massive Traffic Data and Its Application to Anomaly Detection.
IEICE Trans. Commun., 2008
Proceedings of the 2008 International Symposium on Applications and the Internet, 2008
Proceedings of the IP Operations and Management, 8th IEEE International Workshop, 2008
Integrated Method for Loss-Resilient Multicast Source Authentication and Data Reconstruction.
Proceedings of IEEE International Conference on Communications, 2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
2007
IEICE Trans. Commun., 2007
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007
Proceedings of the Global Communications Conference, 2007
2006
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006
Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006
Proceedings of IEEE International Conference on Communications, 2006
Estimating Flow Rate from Sampled Packet Streams for Detection of Performance Degradation at TCP Flow Level.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
2005
Syst. Comput. Jpn., 2005
Method of Bandwidth Dimensioning and Management for Aggregated TCP Flows with Heterogeneous Access Links.
IEICE Trans. Commun., 2005
2004
IEICE Trans. Inf. Syst., 2004
Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, 2004
2002
Analysis of Non-Gaussian Nature of Network Traffic and its Implication on Network Performance
CoRR, 2002