Yoshiaki Shiraishi
Orcid: 0000-0002-8970-9408
According to our database1,
Yoshiaki Shiraishi
authored at least 74 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Early mitigation of CPU-optimized ransomware using monitoring encryption instructions.
Int. J. Inf. Sec., October, 2024
Digit., June, 2024
IACR Cryptol. ePrint Arch., 2024
Personalized federated learning-based intrusion detection system: Poisoning attack and defense.
Future Gener. Comput. Syst., 2024
Can We Determine Whether a Set of Ethereum Transaction Data Contains Fraudulent Transactions?
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2024
Systematic Construction of Adaptively Decodable Visual Secret Sharing Scheme on Background Color.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2024
2023
IEICE Trans. Inf. Syst., September, 2023
Few-Shot Learning-Based Malicious IoT Traffic Detection with Prototypical Graph Neural Networks.
IEICE Trans. Inf. Syst., September, 2023
IEICE Trans. Inf. Syst., September, 2023
Design of Enclosing Signing Keys by All Issuers in Distributed Public Key Certificate-Issuing Infrastructure.
IEICE Trans. Inf. Syst., September, 2023
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, Matsue, Japan, November 28, 2023
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, Matsue, Japan, November 28, 2023
Model Selection for Continuous Operation of Automated Vulnerability Assessment System.
Proceedings of the 2023 Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks, 2023
2022
DOC-IDS: A Deep Learning-Based Method for Feature Extraction and Anomaly Detection in Network Traffic.
Sensors, 2022
Editor's Message to Special Issue of Information Security and Trust for the IT Infrastructure of a Sustainable Society.
J. Inf. Process., 2022
Three Layered Architecture for Driver Behavior Analysis and Personalized Assistance with Alert Message Dissemination in 5G Envisioned Fog-IoCV.
Future Internet, 2022
Ann. des Télécommunications, 2022
Proceedings of the Security and Privacy in Communication Networks, 2022
Proceedings of the 2022 IEEE 33rd Annual International Symposium on Personal, 2022
Proceedings of the Tenth International Symposium on Computing and Networking, 2022
2021
Partition-then-Overlap Method for Labeling Cyber Threat Intelligence Reports by Topics over Time.
IEICE Trans. Inf. Syst., 2021
Proceedings of the WI-IAT '21: IEEE/WIC/ACM International Conference on Web Intelligence, Melbourne VIC Australia, December 14, 2021
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
Designing Comprehensive Cyber Threat Analysis Platform: Can We Orchestrate Analysis Engines?
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021
Simplifying Dynamic Public Key Certificate Graph for Certification Path Building in Distributed Public Key Infrastructure.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2021
2020
A Spatial-Temporal Subspace-Based Compressive Channel Estimation Technique in Unknown Interference MIMO Channels.
IEEE Trans. Signal Process., 2020
Paragraph-based Estimation of Cyber Kill Chain Phase from Threat Intelligence Reports.
J. Inf. Process., 2020
A novel software-defined networking controlled vehicular named-data networking for trustworthy emergency data dissemination and content retrieval assisted by evolved interest packet.
Int. J. Distributed Sens. Networks, 2020
Secure Association Rule Mining on Vertically Partitioned Data Using Private-Set Intersection.
IEEE Access, 2020
Cross-Certification Towards Distributed Authentication Infrastructure: A Case of Hyperledger Fabric.
IEEE Access, 2020
Stabilized Clustering Enabled V2V Communication in an NDN-SDVN Environment for Content Retrieval.
IEEE Access, 2020
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020
2019
J. Inf. Process., 2019
IEICE Trans. Inf. Syst., 2019
CCN-Based Vehicle-to-Vehicle Communication in DSRC for Content Distribution in Urban Environments.
IEICE Trans. Inf. Syst., 2019
Character-Level Convolutional Neural Network for Predicting Severity of Software Vulnerability from Vulnerability Description.
IEICE Trans. Inf. Syst., 2019
IEICE Trans. Inf. Syst., 2019
Proceedings of the 14th Asia Joint Conference on Information Security, 2019
Identification Scheme Based on the Binary Syndrome Decoding Problem Using High-Density Parity-Check Matrices.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019
Proceedings of the 14th Asia Joint Conference on Information Security, 2019
2018
IEICE Trans. Inf. Syst., 2018
2017
J. Commun., 2017
Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data.
IEICE Trans. Inf. Syst., 2017
Multi-Environment Analysis System for Evaluating the Impact of Malicious Web Sites Changing Their Behavior.
IEICE Trans. Inf. Syst., 2017
IEICE Trans. Inf. Syst., 2017
Attribute Revocable Multi-Authority Attribute-Based Encryption with Forward Secrecy for Cloud Storage.
IEICE Trans. Inf. Syst., 2017
IEICE Trans. Inf. Syst., 2017
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017
Efficient Method for Analyzing Malicious Websites by Using Multi-Environment Analysis System.
Proceedings of the 12th Asia Joint Conference on Information Security, 2017
2016
Partially Doubly-Encrypted Identity-Based Encryption Constructed from a Certain Scheme for Content Centric Networking.
J. Inf. Process., 2016
Int. J. Distributed Sens. Networks, 2016
Proceedings of the 7th IEEE Annual Ubiquitous Computing, 2016
2015
Ciphertext Divided Anonymous HIBE and Its Transformation to Identity-Based Encryption with Keyword Search.
J. Inf. Process., 2015
Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating.
Hum. centric Comput. Inf. Sci., 2015
LCE in-network caching on vehicular networks for content distribution in urban environments.
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015
Attribute Revocable Attribute-Based Encryption for Decentralized Disruption-Tolerant Military Networks.
Proceedings of the Third International Symposium on Computing and Networking, 2015
Storage-Efficient Tree Structure with Level-Ordered Unary Degree Sequence for Packet Classification.
Proceedings of the Third International Symposium on Computing and Networking, 2015
A Three-Party Optimistic Certified Email Protocol Using Verifiably Encrypted Signature Scheme for Line Topology.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
2014
Proceedings of the Second International Symposium on Computing and Networking, 2014
2012
Proceedings of the 12th International Conference on ITS Telecommunications, 2012
A distribution scheme of certificate revocation list by inter-vehicle communication using a random network coding.
Proceedings of the International Symposium on Information Theory and its Applications, 2012
2011
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011
2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
2006
Proposal of awakening behavior detection system using neural network.
Proceedings of the Second IASTED International Conference on Computational Intelligence, 2006
2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
2004
Proceedings of the 1st IEEE Consumer Communications and Networking Conference, 2004
2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
A Method for Improving Fast Correlation Attack Using Parity Check Equations Modifications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
Proceedings of the Information Security Applications, 4th International Workshop, 2003