Yoshiaki Shiraishi

Orcid: 0000-0002-8970-9408

According to our database1, Yoshiaki Shiraishi authored at least 74 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Early mitigation of CPU-optimized ransomware using monitoring encryption instructions.
Int. J. Inf. Sec., October, 2024

A Method for Solving Problems in Acquiring Communication Logs on End Hosts.
Digit., June, 2024

Breaktooth: Breaking Bluetooth Sessions Abusing Power-Saving Mode.
IACR Cryptol. ePrint Arch., 2024

Personalized federated learning-based intrusion detection system: Poisoning attack and defense.
Future Gener. Comput. Syst., 2024

Can We Determine Whether a Set of Ethereum Transaction Data Contains Fraudulent Transactions?
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2024

Systematic Construction of Adaptively Decodable Visual Secret Sharing Scheme on Background Color.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2024

2023
Malicious Domain Detection Based on Decision Tree.
IEICE Trans. Inf. Syst., September, 2023

Few-Shot Learning-Based Malicious IoT Traffic Detection with Prototypical Graph Neural Networks.
IEICE Trans. Inf. Syst., September, 2023

Foreword.
IEICE Trans. Inf. Syst., September, 2023

Investigations of Electronic Signatures for Construction of Trust Services.
IEICE Trans. Inf. Syst., September, 2023

Design of Enclosing Signing Keys by All Issuers in Distributed Public Key Certificate-Issuing Infrastructure.
IEICE Trans. Inf. Syst., September, 2023

A New Approach to Disabling SSL/TLS: Man-in-the-Middle Attacks are still Effective.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, Matsue, Japan, November 28, 2023

Encryption Invalidation Attacks: Is your Wi-Fi encryption really working?
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, Matsue, Japan, November 28, 2023

Model Selection for Continuous Operation of Automated Vulnerability Assessment System.
Proceedings of the 2023 Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks, 2023

2022
DOC-IDS: A Deep Learning-Based Method for Feature Extraction and Anomaly Detection in Network Traffic.
Sensors, 2022

Extracting the Secrets of OpenSSL with RAMBleed.
Sensors, 2022

Editor's Message to Special Issue of Information Security and Trust for the IT Infrastructure of a Sustainable Society.
J. Inf. Process., 2022

Three Layered Architecture for Driver Behavior Analysis and Personalized Assistance with Alert Message Dissemination in 5G Envisioned Fog-IoCV.
Future Internet, 2022

Multi-labeling with topic models for searching security information.
Ann. des Télécommunications, 2022

Granting Access Privileges Using OpenID Connect in Permissioned Distributed Ledgers.
Proceedings of the Security and Privacy in Communication Networks, 2022

A Cache-Aided Power Optimization Technique for Adaptive Secure Transmission Systems.
Proceedings of the 2022 IEEE 33rd Annual International Symposium on Personal, 2022

Attack Techniques and Countermeasures against Kr00k using CSA.
Proceedings of the Tenth International Symposium on Computing and Networking, 2022

2021
Partition-then-Overlap Method for Labeling Cyber Threat Intelligence Reports by Topics over Time.
IEICE Trans. Inf. Syst., 2021

Fake News Detection via Biased User Profiles in Social Networking Sites.
Proceedings of the WI-IAT '21: IEEE/WIC/ACM International Conference on Web Intelligence, Melbourne VIC Australia, December 14, 2021

Systemization of Vulnerability Information by Ontology for Impact Analysis.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

Designing Comprehensive Cyber Threat Analysis Platform: Can We Orchestrate Analysis Engines?
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021

Simplifying Dynamic Public Key Certificate Graph for Certification Path Building in Distributed Public Key Infrastructure.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2021

2020
A Spatial-Temporal Subspace-Based Compressive Channel Estimation Technique in Unknown Interference MIMO Channels.
IEEE Trans. Signal Process., 2020

Paragraph-based Estimation of Cyber Kill Chain Phase from Threat Intelligence Reports.
J. Inf. Process., 2020

A novel software-defined networking controlled vehicular named-data networking for trustworthy emergency data dissemination and content retrieval assisted by evolved interest packet.
Int. J. Distributed Sens. Networks, 2020

Secure Association Rule Mining on Vertically Partitioned Data Using Private-Set Intersection.
IEEE Access, 2020

Cross-Certification Towards Distributed Authentication Infrastructure: A Case of Hyperledger Fabric.
IEEE Access, 2020

Stabilized Clustering Enabled V2V Communication in an NDN-SDVN Environment for Content Retrieval.
IEEE Access, 2020

Transparent Provable Data Possession Scheme for Cloud Storage.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

2019
Understanding Attack Trends from Security Blog Posts Using Guided-topic Model.
J. Inf. Process., 2019

Authentication Scheme Using Pre-Registered Information on Blockchain.
IEICE Trans. Inf. Syst., 2019

CCN-Based Vehicle-to-Vehicle Communication in DSRC for Content Distribution in Urban Environments.
IEICE Trans. Inf. Syst., 2019

Character-Level Convolutional Neural Network for Predicting Severity of Software Vulnerability from Vulnerability Description.
IEICE Trans. Inf. Syst., 2019

A Malicious Web Site Identification Technique Using Web Structure Clustering.
IEICE Trans. Inf. Syst., 2019

A Signature Scheme Based on the Syndrome Decoding Problem Using LDPC Codes.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

Identification Scheme Based on the Binary Syndrome Decoding Problem Using High-Density Parity-Check Matrices.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

Designing Authentication and Authorization System with Blockchain.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

2018
Modeling Attack Activity for Integrated Analysis of Threat Information.
IEICE Trans. Inf. Syst., 2018

Zero-Knowledge Identification Scheme Using LDPC Codes.
IEICE Trans. Inf. Syst., 2018

2017
Performance Evaluation of a Cluster Based Routing Protocol for VANETs.
J. Commun., 2017

Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data.
IEICE Trans. Inf. Syst., 2017

Multi-Environment Analysis System for Evaluating the Impact of Malicious Web Sites Changing Their Behavior.
IEICE Trans. Inf. Syst., 2017

Delivering CRL with Low Bit Rate Network Coded Communication for ITS.
IEICE Trans. Inf. Syst., 2017

Attribute Revocable Multi-Authority Attribute-Based Encryption with Forward Secrecy for Cloud Storage.
IEICE Trans. Inf. Syst., 2017

Multi-Group Signature Scheme for Simultaneous Verification by Neighbor Services.
IEICE Trans. Inf. Syst., 2017

A multi-group signature scheme for local broadcasting.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

Virtual storage and area limited data delivery over named data networking.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

Efficient Method for Analyzing Malicious Websites by Using Multi-Environment Analysis System.
Proceedings of the 12th Asia Joint Conference on Information Security, 2017

2016
Partially Doubly-Encrypted Identity-Based Encryption Constructed from a Certain Scheme for Content Centric Networking.
J. Inf. Process., 2016

Leveraging In-Network Caching in Vehicular Network for Content Distribution.
Int. J. Distributed Sens. Networks, 2016

SSL Client Authentication with TPM.
IEICE Trans. Inf. Syst., 2016

Cloud storage with key-value stores over content-centric networking architecture.
Proceedings of the 7th IEEE Annual Ubiquitous Computing, 2016

2015
Ciphertext Divided Anonymous HIBE and Its Transformation to Identity-Based Encryption with Keyword Search.
J. Inf. Process., 2015

Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating.
Hum. centric Comput. Inf. Sci., 2015

LCE in-network caching on vehicular networks for content distribution in urban environments.
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015

Attribute Revocable Attribute-Based Encryption for Decentralized Disruption-Tolerant Military Networks.
Proceedings of the Third International Symposium on Computing and Networking, 2015

Storage-Efficient Tree Structure with Level-Ordered Unary Degree Sequence for Packet Classification.
Proceedings of the Third International Symposium on Computing and Networking, 2015

A Three-Party Optimistic Certified Email Protocol Using Verifiably Encrypted Signature Scheme for Line Topology.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Direct Accessible Filter Using Succinct Data Structure for Packet Filtering.
Proceedings of the Second International Symposium on Computing and Networking, 2014

2012
Controlling signature verification of network coded packet on VANET.
Proceedings of the 12th International Conference on ITS Telecommunications, 2012

A distribution scheme of certificate revocation list by inter-vehicle communication using a random network coding.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

2011
A Server-Aided Computation Protocol Revisited for Confidentiality of Cloud Service.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

2008
New Weakness in the Key-Scheduling Algorithm of RC4.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

2006
Proposal of awakening behavior detection system using neural network.
Proceedings of the Second IASTED International Conference on Computational Intelligence, 2006

2005
FMS Attack-Resistant WEP Implementation Is Still Broken.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Port randomized VPN by mobile codes.
Proceedings of the 1st IEEE Consumer Communications and Networking Conference, 2004

2003
Internal-State Reconstruction of a Stream Cipher RC4.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

A Method for Improving Fast Correlation Attack Using Parity Check Equations Modifications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

Remote Access VPN with Port Protection Function by Mobile Codes.
Proceedings of the Information Security Applications, 4th International Workshop, 2003


  Loading...