Detecting android malware by analyzing manifest files R Sato, D Chiba, S Goto Proceedings of the Asia-Pacific Advanced Network 36 (23-31), 17, 2013 | 146 | 2013 |
Efficient dynamic malware analysis based on network behavior using deep learning T Shibahara, T Yagi, M Akiyama, D Chiba, T Yada 2016 IEEE Global Communications Conference (GLOBECOM), 1-7, 2016 | 110 | 2016 |
Detecting malicious websites by learning IP address features D Chiba, K Tobe, T Mori, S Goto 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet …, 2012 | 74 | 2012 |
Domainprofiler: Discovering domain names abused in future D Chiba, T Yagi, M Akiyama, T Shibahara, T Yada, T Mori, S Goto 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016 | 58 | 2016 |
Magnetostrictive clad steel plates for high-performance vibration energy harvesting Z Yang, K Nakajima, R Onodera, T Tayama, D Chiba, F Narita Applied physics letters 112 (7), 2018 | 51 | 2018 |
Malicious URL sequence detection using event de-noising convolutional neural network T Shibahara, K Yamanishi, Y Takata, D Chiba, M Akiyama, T Yagi, ... 2017 IEEE International Conference on Communications (ICC), 1-7, 2017 | 51 | 2017 |
ShamFinder: An automated framework for detecting IDN homographs H Suzuki, D Chiba, Y Yoneya, T Mori, S Goto Proceedings of the Internet Measurement Conference, 449-462, 2019 | 50 | 2019 |
Efficient generic constructions of signcryption with insider security in the multi-user setting D Chiba, T Matsuda, JCN Schuldt, K Matsuura Applied Cryptography and Network Security: 9th International Conference …, 2011 | 38 | 2011 |
DomainChroma: Building actionable threat intelligence from malicious domain names D Chiba, M Akiyama, T Yagi, K Hato, T Mori, S Goto Computers & Security 77, 138-161, 2018 | 32 | 2018 |
DomainScouter: Understanding the Risks of Deceptive IDNs D Chiba, AA Hasegawa, T Koide, Y Sawabe, S Goto, M Akiyama 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 23 | 2019 |
Traffic feature information extraction method, traffic feature information extraction device, and traffic feature information extraction program D Chiba, T Yagi, T Sato, K Kamiya, K Nakata US Patent 10,721,244, 2020 | 21 | 2020 |
Evaluation of vibration energy harvesting using a magnetostrictive iron–cobalt/nickel-clad plate Z Yang, H Kurita, R Onodera, T Tayama, D Chiba, F Narita Smart Materials and Structures 28 (3), 034001, 2019 | 20 | 2019 |
Don't throw me away: Threats caused by the abandoned internet resources used by android apps E Pariwono, D Chiba, M Akiyama, T Mori Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 17 | 2018 |
Detecting phishing sites using chatgpt T Koide, N Fukushi, H Nakano, D Chiba arXiv preprint arXiv:2306.05816, 2023 | 15 | 2023 |
DomainProfiler: toward accurate and early discovery of domain names abused in future D Chiba, T Yagi, M Akiyama, T Shibahara, T Mori, S Goto International Journal of Information Security 17, 661-680, 2018 | 15 | 2018 |
Analysis rule adjustment device, analysis rule adjustment system, analysis rule adjustment method, and analysis rule adjustment program K Nakata, K Kamiya, T Yagi, T Sato, D Chiba US Patent 10,104,124, 2018 | 14 | 2018 |
To get lost is to learn the way: Automatically collecting multi-step social engineering attacks on the web T Koide, D Chiba, M Akiyama Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 13 | 2020 |
Analysis apparatus, analysis method, and analysis program T Koide, D Chiba US Patent 11,361,073, 2022 | 12 | 2022 |
Detection method of homograph internationalized domain names with OCR Y Sawabe, D Chiba, M Akiyama, S Goto Journal of Information Processing 27, 536-544, 2019 | 12 | 2019 |
Botprofiler: Profiling variability of substrings in http requests to detect malware-infected hosts D Chiba, T Yagi, M Akiyama, K Aoki, T Hariu, S Goto 2015 IEEE Trustcom/BigDataSE/ISPA 1, 758-765, 2015 | 12 | 2015 |