Toshiki Shibahara

Orcid: 0000-0002-2192-4355

According to our database1, Toshiki Shibahara authored at least 33 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SETSUBUN: Revisiting Membership Inference Game for Evaluating Synthetic Data Generation.
J. Inf. Process., 2024

MEGEX: Data-Free Model Extraction Attack Against Gradient-Based Explainable AI.
Proceedings of the 2nd ACM Workshop on Secure and Trustworthy Deep Learning Systems, 2024

Evaluation of Adversarial Examples Based on Original Definition.
Proceedings of the HCI International 2024 Posters, 2024

Efficiently Calculating Stronger Lower Bound for Differentially Private SGD in Black-Box Setting.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024

Noisy Label Detection for Multi-labeled Malware.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
Interpreting Graph-Based Sybil Detection Methods as Low-Pass Filtering.
IEEE Trans. Inf. Forensics Secur., 2023

On Rényi Differential Privacy in Statistics-based Synthetic Data Generation.
J. Inf. Process., 2023

Do Backdoors Assist Membership Inference Attacks?
CoRR, 2023

Analysis of Homophily Effects on Information Diffusion on Social Networks.
IEEE Access, 2023

2022
Competitive Information Spreading on Modular Networks.
Proceedings of the Network Science - 7th International Winter Conference, 2022

Objection!: Identifying Misclassified Malicious Activities with XAI.
Proceedings of the IEEE International Conference on Communications, 2022

2021
Timing Attack on Random Forests: Experimental Evaluation and Detailed Analysis.
J. Inf. Process., 2021

MEGEX: Data-Free Model Extraction Attack against Gradient-Based Explainable AI.
CoRR, 2021

Understanding Update of Machine-Learning-Based Malware Detection by Clustering Changes in Feature Attributions.
Proceedings of the Advances in Information and Computer Security, 2021

2020
Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library.
IEICE Trans. Inf. Syst., 2020

Special-purpose Model Extraction Attacks: Stealing Coarse Model with Fewer Queries.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Timing Attack on Random Forests for Generating Adversarial Examples.
Proceedings of the Advances in Information and Computer Security, 2020

Sybil Detection as Graph Filtering.
Proceedings of the IEEE Global Communications Conference, 2020

Detecting Malware-infected Hosts Using Templates of Multiple HTTP Requests.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020

2019
Efficient Dynamic Malware Analysis for Collecting HTTP Requests using Deep Learning.
IEICE Trans. Inf. Syst., 2019

Evasive Malicious Website Detection by Leveraging Redirection Subgraph Similarities.
IEICE Trans. Inf. Syst., 2019

Graph Signal Processing for Directed Graphs Based on the Hermitian Laplacian.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2019

Anomaly Detection for Mixed Transmission CAN Messages Using Quantized Intervals and Absolute Difference of Payloads.
Proceedings of the ACM Workshop on Automotive Cybersecurity, 2019

Cross-Vendor Knowledge Transfer for Managed Security Services with Triplet Network.
Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, 2019

2018
DomainProfiler: toward accurate and early discovery of domain names abused in future.
Int. J. Inf. Sec., 2018

Event De-Noising Convolutional Neural Network for Detecting Malicious URL Sequences from Proxy Logs.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

2017
A Study on the Vulnerabilities of Mobiles Apps associated with Software Modules.
CoRR, 2017

Understanding the origins of mobile app vulnerabilities: a large-scale measurement study of free and paid apps.
Proceedings of the 14th International Conference on Mining Software Repositories, 2017

Malicious URL sequence detection using event de-noising convolutional neural network.
Proceedings of the IEEE International Conference on Communications, 2017

Detecting Malicious Websites by Integrating Malicious, Benign, and Compromised Redirection Subgraph Similarities.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Efficient Dynamic Malware Analysis Based on Network Behavior Using Deep Learning.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

DomainProfiler: Discovering Domain Names Abused in Future.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

2015
POSTER: Detecting Malicious Web Pages based on Structural Similarity of Redirection Chains.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015


  Loading...