Yuta Takata
Orcid: 0009-0008-2773-0659
According to our database1,
Yuta Takata
authored at least 29 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024
2023
IEICE Trans. Inf. Syst., September, 2023
Analysis of Privacy Compliance by Classifying Policies Before and After the Japanese Law Revision.
J. Inf. Process., 2023
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023
2022
Money Talks: Detection of Disposable Phishing Websites by Analyzing Its Building Costs.
Proceedings of the 4th IEEE International Conference on Trust, 2022
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
2021
J. Inf. Process., 2021
IEICE Trans. Inf. Syst., 2021
Proceedings of the WI-IAT '21: IEEE/WIC/ACM International Conference on Web Intelligence, Melbourne VIC Australia, December 14, 2021
2020
Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library.
IEICE Trans. Inf. Syst., 2020
2019
IEICE Trans. Inf. Syst., 2019
2018
IEICE Trans. Inf. Syst., 2018
Event De-Noising Convolutional Neural Network for Detecting Malicious URL Sequences from Proxy Logs.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Towards Finding Code Snippets on a Question and Answer Website Causing Mobile App Vulnerabilities.
IEICE Trans. Inf. Syst., 2018
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018
2017
Fine-Grained Analysis of Compromised Websites with Redirection Graphs and JavaScript Traces.
IEICE Trans. Inf. Syst., 2017
Building a Scalable Web Tracking Detection System: Implementation and the Empirical Study.
IEICE Trans. Inf. Syst., 2017
CoRR, 2017
Understanding Evasion Techniques that Abuse Differences Among JavaScript Implementations.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017
Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market Analytics, 2017
Understanding the origins of mobile app vulnerabilities: a large-scale measurement study of free and paid apps.
Proceedings of the 14th International Conference on Mining Software Repositories, 2017
Malicious URL sequence detection using event de-noising convolutional neural network.
Proceedings of the IEEE International Conference on Communications, 2017
Detecting Malicious Websites by Integrating Malicious, Benign, and Compromised Redirection Subgraph Similarities.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
2016
IEICE Trans. Inf. Syst., 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
2015
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
POSTER: Detecting Malicious Web Pages based on Structural Similarity of Redirection Chains.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015