Youki Kadobayashi
According to our database1,
Youki Kadobayashi
authored at least 184 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Access, 2024
D<sup>2</sup>-PSD: Dynamic Differentially-Private Spatial Decomposition in Collaboration With Edge Server.
IEEE Access, 2024
Interdependency Attack-Aware Secure and Performant Virtual Machine Allocation Policies With Low Attack Efficiency and Coverage.
IEEE Access, 2024
FedFusion: Adaptive Model Fusion for Addressing Feature Discrepancies in Federated Credit Card Fraud Detection.
IEEE Access, 2024
Electricity Theft Detection for Smart Homes: Harnessing the Power of Machine Learning With Real and Synthetic Attacks.
IEEE Access, 2024
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Differentially-Private Data Aggregation over Encrypted Location Data for Range Counting Query.
Proceedings of the International Conference on Information Networking, 2024
Vision Based Malware Classification Using Deep Neural Network with Hybrid Data Augmentation.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
Banking Malware Detection: Leveraging Federated Learning with Conditional Model Updates and Client Data Heterogeneity.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
Meeting Latency and Jitter Demands of Beyond 5G Networking Era: Are CNFs Up to the Challenge?
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
Optimizing Voice Biometric Verification in Banking with Machine Learning for Speaker Identification.
Proceedings of the 29th IEEE Asia Pacific Conference on Communications, 2024
Proceedings of the 29th IEEE Asia Pacific Conference on Communications, 2024
2023
Appl. Artif. Intell., December, 2023
Design and implementation of a sandbox for facilitating and automating IoT malware analysis with techniques to elicit malicious behavior: case studies of functionalities for dissecting IoT malware.
J. Comput. Virol. Hacking Tech., June, 2023
IEEE Commun. Mag., June, 2023
Inf. Comput. Secur., 2023
IEEE Access, 2023
Factor Analysis of Learning Motivation Difference on Cybersecurity Training With Zero Trust Architecture.
IEEE Access, 2023
Proceedings of the 19th IEEE International Conference on Factory Communication Systems, 2023
Electricity Theft Detection for Smart Homes with Knowledge-Based Synthetic Attack Data.
Proceedings of the 19th IEEE International Conference on Factory Communication Systems, 2023
Detecting DDoS Attacks on the Network Edge: An Information-Theoretic Correlation Analysis.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
A Comparative Performance Analysis of Android Malware Classification Using Supervised and Semi-supervised Deep Learning.
Proceedings of the 16th International Conference on Security of Information and Networks, 2023
Proceedings of the 15th International Conference on Computer and Automation Engineering, 2023
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
Federated Learning-Based Credit Card Fraud Detection: Performance Analysis with Sampling Methods and Deep Learning Algorithms.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
A Risk Assessment Study: Encircling Docker Container Assets on IaaS Cloud Computing Topology.
Proceedings of the 6th Conference on Cloud and Internet of Things, 2023
2022
Internet Things, 2022
DPSD: Dynamic Private Spatial Decomposition Based on Spatial and Temporal Correlations.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022
Proceedings of the 9th Swiss Conference on Data Science, 2022
Tamer: A Sandbox for Facilitating and Automating IoT Malware Analysis with Techniques to Elicit Malicious Behavior.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2022, 2022
Proceedings of the 2022 IEEE Future Networks World Forum, 2022
Decoupling Statistical Trends from Data Volume on LDP-Based Spatio-Temporal Data Collection.
Proceedings of the 2022 IEEE Future Networks World Forum, 2022
Unauthorized Power Usage Detection Using Gradient Boosting Classifier in Disaggregated Smart Meter Home Network.
Proceedings of the 2022 IEEE Future Networks World Forum, 2022
2021
Int. J. Parallel Emergent Distributed Syst., 2021
Internet Things, 2021
Zero-Trust Access Control Focusing on Imbalanced Distribution in Browser Clickstreams.
Proceedings of the Eighth International Conference on Software Defined Systems, 2021
Proceedings of the Advances and Trends in Artificial Intelligence. Artificial Intelligence Practices, 2021
Differentially-Private Text Generation via Text Preprocessing to Reduce Utility Loss.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2021
Proceedings of the 8th International Conference on Future Internet of Things and Cloud, 2021
Analyzing Cascading Effects of Spoofing Attacks on ADS-B Using a Discrete Model of Air Traffic Control Responses and AGMOD Dynamics.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
2020
IEEE Access, 2020
IEEE Access, 2020
Proceedings of the iiWAS '20: The 22nd International Conference on Information Integration and Web-based Applications & Services, Virtual Event / Chiang Mai, Thailand, November 30, 2020
Proceedings of the Artificial Intelligence Applications and Innovations, 2020
Proceedings of the Neural Information Processing - 27th International Conference, 2020
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
An Effective In-Vehicle CAN Bus Intrusion Detection System Using CNN Deep Learning Approach.
Proceedings of the IEEE Global Communications Conference, 2020
LSTM-based Network Attack Detection: Performance Comparison by Hyper-parameter Values Tuning.
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020
Long Short-Term Memory-Based Intrusion Detection System for In-Vehicle Controller Area Network Bus.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
SSH and FTP brute-force Attacks Detection in Computer Networks: LSTM and Machine Learning Approaches.
Proceedings of the 5th International Conference on Computer and Communication Systems, 2020
Solving the Interdependency Problem: A Secure Virtual Machine Allocation Method Relying on the Attacker's Efficiency and Coverage.
Proceedings of the 20th IEEE/ACM International Symposium on Cluster, 2020
The Best of Both Worlds: A New Composite Framework Leveraging PoS and PoW for Blockchain Security and Governance.
Proceedings of the 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2020
2019
J. Inf. Process., 2019
Comprehensive Survey of IPv6 Transition Technologies: A Subjective Classification for Security Analysis.
IEICE Trans. Commun., 2019
An Empirical Approach to Phishing Countermeasures Through Smart Glasses and Validation Agents.
IEEE Access, 2019
Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019
IoT-Poly: An IoT Security Game Practice Tool for Learners Motivation and Skills Acquisition.
Proceedings of the Koli Calling '19: 19th Koli Calling International Conference on Computing Education Research, 2019
To Coerce or Not to Coerce? A Quantitative Investigation on Cybersecurity and Cybercrime Legislations Towards Large-Scale Vulnerability Notifications.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019
Towards Automated Characterization of Malware's High-level Mechanism using Virtual Machine Introspection.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
The Common Vulnerability Scoring System vs. Rock Star Vulnerabilities: Why the Discrepancy?
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
A Method for Designing Proximity-Aware Regular Graph-Based Structured Overlay Networks.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019
2018
Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment.
Secur. Commun. Networks, 2018
HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle.
Int. J. Inf. Sec., 2018
Web of cybersecurity: Linking, locating, and discovering structured cybersecurity information.
Int. J. Commun. Syst., 2018
Methodology for the identification of potential security issues of different IPv6 transition technologies: Threat analysis of DNS64 and stateful NAT64.
Comput. Secur., 2018
The continued risks of unsecured public Wi-Fi and why users keep using it: Evidence from Japan.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Proceedings of the 2018 Workshop on Theory and Practice for Integrated Cloud, 2018
Home Edge Computing (HEC): Design of a New Edge Computing Technology for Achieving Ultra-Low Latency.
Proceedings of the Edge Computing - EDGE 2018, 2018
A comparative study of smartphone-user security perception and preference towards redesigned security notifications.
Proceedings of the Second African Conference for Human Computer Interaction: Thriving Communities, 2018
2017
Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots.
Comput. Secur., 2017
Proceedings of the European Project Space on Networks, 2017
UnPhishMe: Phishing Attack Detection by Deceptive Login Simulation through an Android Mobile App.
Proceedings of the 12th Asia Joint Conference on Information Security, 2017
2016
J. Inf. Process., 2016
The STRIDE Towards IPv6: A Comprehensive Threat Model for IPv6 Transition Technologies.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Sequence-Based Analysis of Static Probe Instrumentation Data for a VMM-Based Anomaly Detection System.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016
2015
Security Risk Quantification Mechanism for Infrastructure as a Service Cloud Computing Platforms.
J. Inf. Process., 2015
Empirical analysis of IPv6 transition technologies using the IPv6 Network Evaluation Testbed.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2015
Conceptualizing Player-Side Emergence in Interactive Games: Between Hardcoded Software and the Human Mind in Papers, Please and Gone Home.
Int. J. Gaming Comput. Mediat. Simulations, 2015
Detecting Anomalies in Massive Traffic Streams Based on S-Transform Analysis of Summarized Traffic Entropies.
IEICE Trans. Inf. Syst., 2015
IEICE Trans. Inf. Syst., 2015
Proceedings of the International Symposium on Networks, Computers and Communications, 2015
Benchmarking the load scalability of IPv6 transition technologies: A black-box analysis.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015
Proceedings of the Neural Information Processing - 22nd International Conference, 2015
Proceedings of the Information and Communications Security - 17th International Conference, 2015
Web Server Protection against Application Layer DDoS Attacks Using Machine Learning and Traffic Authentication.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
AJNA: Anti-phishing JS-based Visual Analysis, to Mitigate Users' Excessive Trust in SSL/TLS.
Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2015
2014
An Incident Object Description Exchange Format (IODEF) Extension for Structured Cybersecurity Information.
RFC, April, 2014
J. Inf. Process., 2014
Cogn. Comput., 2014
Towards a Vulnerability Tree Security Evaluation of OpenStack's Logical Architecture.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014
Mechanism for Linking and Discovering Structured Cybersecurity Information over Networks.
Proceedings of the 2014 IEEE International Conference on Semantic Computing, 2014
Investigating the utility of S-transform for detecting Denial-of-Service and probe attacks.
Proceedings of the International Conference on Information Networking 2014, 2014
Proceedings of the International Conference of Future Internet 2014, 2014
Proceedings of the International Conference of Future Internet 2014, 2014
Proceedings of the International Conference of Future Internet 2014, 2014
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014
Classification of SSL Servers based on their SSL Handshake for Automated Security Assessment.
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014
2013
Exploring attack graph for cost-benefit security hardening: A probabilistic approach.
Comput. Secur., 2013
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Security Quantification of Complex Attacks in Infrastructure as a Service Cloud Computing.
Proceedings of the CLOSER 2013, 2013
Proceedings of the 19th Asia-Pacific Conference on Communications, 2013
2012
LDA Merging and Splitting With Applications to Multiagent Cooperative Learning and System Alteration.
IEEE Trans. Syst. Man Cybern. Part B, 2012
Proceedings of the Neural Information Processing - 19th International Conference, 2012
Proceedings of the 2nd Baltic Congress on Future Internet Communications, 2012
Characterizing Obfuscated JavaScript Using Abstract Syntax Trees: Experimenting with Malicious Scripts.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
2011
A Step towards Static Script Malware Abstraction: Rewriting Obfuscated Script with Maude.
IEICE Trans. Inf. Syst., 2011
Toward cost-sensitive self-optimizing anomaly detection and response in autonomic networks.
Comput. Secur., 2011
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
Proceedings of the 4th IFIP International Conference on New Technologies, 2011
Proceedings of the ITU Kaleidoscope 2011: The Fully Networked Human?, 2011
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011
2010
HumanBoost: Utilization of Users' Past Trust Decision for Identifying Fraudulent Websites.
J. Intell. Learn. Syst. Appl., 2010
Comput. Commun. Rev., 2010
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010
Blink: Large-scale P2P network monitoring and visualization system using VM introspection.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010
Proceedings of the International Joint Conference on Neural Networks, 2010
Fast Implementation of String-Kernel-Based Support Vector Classifiers by GPU Computing.
Proceedings of the Neural Information Processing. Models and Applications, 2010
A Fast Kernel on Hierarchial Tree Structures and Its Application to Windows Application Behavior Analysis.
Proceedings of the Neural Information Processing. Models and Applications, 2010
Log Analysis of Exploitation in Cloud Computing Environment Using Automated Reasoning.
Proceedings of the Neural Information Processing. Models and Applications, 2010
STARS: A Simple and Efficient <i>S</i>cheme for Providing Transparent <i>T</i>raceability and <i>A</i>nonymity to <i>R</i>eputation <i>S</i>ystems.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
Proceedings of the AINTEC '10, 2010
2009
Expediting Experiments across Testbeds with AnyBed: A Testbed-Independent Topology Configuration System and Its Tool Set.
IEICE Trans. Inf. Syst., 2009
Handover Management for VoWLAN Based on Estimation of AP Queue Length and Frame Retries.
IEICE Trans. Inf. Syst., 2009
Proceedings of the 1st ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures, 2009
Seamless VoWLAN Handoff Management based on Estimation of AP Queue Length and Frame Retries.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the International Joint Conference on Neural Networks, 2009
Proceedings of the Neural Information Processing, 16th International Conference, 2009
Proceedings of the Neural Information Processing, 16th International Conference, 2009
Proceedings of the Neural Information Processing, 16th International Conference, 2009
Proceedings of the Artificial Neural Networks, 2009
Proceedings of the Eighth IEEE International Conference on Dependable, 2009
Wireless Measurement Framework to Survey an Area with Required Communication Quality.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009
2008
Hose Bandwidth Allocation Method to Achieve a Minimum Throughput Assurance Service for Provider Provisioned VPNs.
J. Inf. Process., 2008
Adaptive Bloom Filter: A Space-Efficient Counting Algorithm for Unpredictable Network Traffic.
IEICE Trans. Inf. Syst., 2008
Outfitting an Inter-AS Topology to a Network Emulation TestBed for Realistic Performance Tests of DDoS Countermeasures.
Proceedings of the Workshop on Cyber Security and Test, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
Proceedings of the The Third International Conference on Availability, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
A Generic API for Retrieving Human-Oriented Information from Social Network Services.
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007
N-TAP: A Platform of Large-Scale Distributed Measurement for Overlay Network Applications.
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007
Message from the Organizers of the Workshop on Dependable and Sustainable Peer-to-Peer Systems (DAS-P2P 2007).
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007
Proceedings of the Passive and Active Network Measurement, 8th Internatinoal Conference, 2007
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007
Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module.
Proceedings of the Information Security and Cryptology, 2007
Proceedings of the Sustainable Internet, Third Asian Internet Engineering Conference, 2007
2006
Inf. Media Technol., 2006
Expediting experiments across testbeds with AnyBed: A testbed-independent topology configuration tool.
Proceedings of the 2nd International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2006), 2006
An Autonomous Architecture for Inter-Domain Traceback across the Borders of Network Operation.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006
2005
IEICE Trans. Commun., 2005
Reducing Processor Usage on Heavily-Loaded Network Servers with POSIX Real-Time Scheduling Control.
IEICE Trans. Inf. Syst., 2005
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet (SAINT 2005), 31 January, 2005
Proceedings of the Web and Communication Technologies and Internet-Related Social Issues, 2005
Proceedings of the Technologies for Advanced Heterogeneous Networks, 2005
2004
Proceedings of the ACM SIGCOMM Workshop on Network Troubleshooting, 2004
Proceedings of the 2004 Symposium on Applications and the Internet (SAINT 2004), 2004
Proceedings of the 2004 Symposium on Applications and the Internet Workshops (SAINT 2004 Workshops), 2004
Improving scalability of processor utilization on heavily-loaded servers with real-time scheduling.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2004
Zoned federation of game servers: a peer-to-peer approach to scalable multi-player online games.
Proceedings of the 3rd Workshop on Network and System Support for Games, 2004
Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), 30 August, 2004
A Proposal and Implementation of Automatic Detection/Collection System for Cross-Site Scripting Vulnerability.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
2003
Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003, 2003
Multi-path Transmission Algorithm for End-to-End Seamless Handover across Heterogeneous Wireless Access Networks.
Proceedings of the Distributed Computing, 2003
2002
A Grid Application for an Evaluation of Brain Function using Independent Component Analysis (ICA).
Proceedings of the 2nd IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2002), 2002
2001
Proceedings of the IEEE International Conference on Systems, 2001
2000
IEEE Trans. Inf. Technol. Biomed., 2000
Proceedings of the Quality of Future Internet Services, 2000