Detecting android malware by analyzing manifest files R Sato, D Chiba, S Goto Proceedings of the Asia-Pacific Advanced Network 36 (23-31), 17, 2013 | 148 | 2013 |
Efficient dynamic malware analysis based on network behavior using deep learning T Shibahara, T Yagi, M Akiyama, D Chiba, T Yada 2016 IEEE Global Communications Conference (GLOBECOM), 1-7, 2016 | 114 | 2016 |
Detecting malicious websites by learning IP address features D Chiba, K Tobe, T Mori, S Goto 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet …, 2012 | 81 | 2012 |
DomainProfiler: Discovering domain names abused in future D Chiba, T Yagi, M Akiyama, T Shibahara, T Yada, T Mori, S Goto 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016 | 61 | 2016 |
Malicious URL sequence detection using event de-noising convolutional neural network T Shibahara, K Yamanishi, Y Takata, D Chiba, M Akiyama, T Yagi, ... 2017 IEEE International Conference on Communications (ICC), 1-7, 2017 | 56 | 2017 |
ShamFinder: An automated framework for detecting IDN homographs H Suzuki, D Chiba, Y Yoneya, T Mori, S Goto Proceedings of the Internet Measurement Conference, 449-462, 2019 | 55 | 2019 |
Magnetostrictive clad steel plates for high-performance vibration energy harvesting Z Yang, K Nakajima, R Onodera, T Tayama, D Chiba, F Narita Applied physics letters 112 (7), 2018 | 51 | 2018 |
Efficient generic constructions of signcryption with insider security in the multi-user setting D Chiba, T Matsuda, JCN Schuldt, K Matsuura Applied Cryptography and Network Security: 9th International Conference …, 2011 | 40 | 2011 |
DomainChroma: Building actionable threat intelligence from malicious domain names D Chiba, M Akiyama, T Yagi, K Hato, T Mori, S Goto Computers & Security 77, 138-161, 2018 | 36 | 2018 |
Detecting phishing sites using chatgpt T Koide, N Fukushi, H Nakano, D Chiba arXiv preprint arXiv:2306.05816, 2023 | 34 | 2023 |
DomainScouter: Understanding the Risks of Deceptive IDNs D Chiba, AA Hasegawa, T Koide, Y Sawabe, S Goto, M Akiyama 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 27 | 2019 |
Traffic feature information extraction method, traffic feature information extraction device, and traffic feature information extraction program D Chiba, T Yagi, T Sato, K Kamiya, K Nakata US Patent 10,721,244, 2020 | 22 | 2020 |
Evaluation of vibration energy harvesting using a magnetostrictive iron–cobalt/nickel-clad plate Z Yang, H Kurita, R Onodera, T Tayama, D Chiba, F Narita Smart Materials and Structures 28 (3), 034001, 2019 | 22 | 2019 |
DomainProfiler: toward accurate and early discovery of domain names abused in future D Chiba, T Yagi, M Akiyama, T Shibahara, T Mori, S Goto International Journal of Information Security 17, 661-680, 2018 | 18 | 2018 |
Don't throw me away: Threats caused by the abandoned internet resources used by android apps E Pariwono, D Chiba, M Akiyama, T Mori Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 18 | 2018 |
To get lost is to learn the way: Automatically collecting multi-step social engineering attacks on the web T Koide, D Chiba, M Akiyama Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 16 | 2020 |
Canary in twitter mine: collecting phishing reports from experts and non-experts H Nakano, D Chiba, T Koide, N Fukushi, T Yagi, T Hariu, K Yoshioka, ... Proceedings of the 18th International Conference on Availability …, 2023 | 14 | 2023 |
Detection method of homograph internationalized domain names with OCR Y Sawabe, D Chiba, M Akiyama, S Goto Journal of Information Processing 27, 536-544, 2019 | 14 | 2019 |
Analysis rule adjustment device, analysis rule adjustment system, analysis rule adjustment method, and analysis rule adjustment program K Nakata, K Kamiya, T Yagi, T Sato, D Chiba US Patent 10,104,124, 2018 | 14 | 2018 |
Analysis apparatus, analysis method, and analysis program T Koide, D Chiba US Patent 11,361,073, 2022 | 13 | 2022 |