Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IBISML |
2022-12-23 13:00 |
Kyoto |
Kyoto University (Primary: On-site, Secondary: Online) |
Initial evaluation of node embedding using quantum walk Rei Sato, Shuichiro Haruta, Kazuhiro Saito, Mori Kurokawa (KDDI Research, Inc.) IBISML2022-57 |
DeepWalk is one of the node-embedding methods which represents node features using sequences obtained from a random walk... [more] |
IBISML2022-57 pp.101-105 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-19 10:30 |
Online |
Online |
A Website Fingerprinting Attack Based on the Virtual Memory of the Process on Android Devices Tatsuya Okazaki, Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.) ISEC2021-13 SITE2021-7 BioX2021-14 HWS2021-13 ICSS2021-18 EMM2021-18 |
[more] |
ISEC2021-13 SITE2021-7 BioX2021-14 HWS2021-13 ICSS2021-18 EMM2021-18 pp.20-27 |
CS |
2019-07-04 09:00 |
Kagoshima |
Amami City Social Welfare Center |
Trust-based Verification Attack Prevention Scheme using Tendency of Contents Request on NDN Hironori Nakano, Hiroya Kato, Shuichiro Haruta, Masashi Yoshida, Iwao Sasase (Keio Univ.) CS2019-13 |
In this paper, we propose a trust-based verification attack prevention scheme using tendency of contents request on NDN.... [more] |
CS2019-13 pp.1-6 |
CS |
2019-07-04 09:00 |
Kagoshima |
Amami City Social Welfare Center |
A Novel Visual Similarity-based Phishing Detection Methodology Using Hue Information with Auto Updating Database Shuichiro Haruta, Fumitaka Yamazaki, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2019-14 |
In this paper, we propose a novel visual similarity-based phishing detection methodology using hue information with aut... [more] |
CS2019-14 pp.7-12 |
CS |
2019-07-04 09:00 |
Kagoshima |
Amami City Social Welfare Center |
Android Malware Detection Scheme Based on Level of SSL Server Certificate Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.) CS2019-15 |
In this paper, in order to detect Android malwares which encrypt packets, we propose an Android malware detection scheme... [more] |
CS2019-15 pp.13-18 |
CS |
2019-07-04 09:00 |
Kagoshima |
Amami City Social Welfare Center |
Traffic Feature-based Botnet Detection Scheme Emphasizing the Importance of Long Patterns Yichen An, Shuichiro Haruta, Sanghun Choi, Iwao Sasase (Keio Univ.) CS2019-18 |
The botnet detection is imperative. Among several detection schemes, the promising one uses the communication sequences.... [more] |
CS2019-18 pp.31-35 |
CS |
2018-11-02 10:10 |
Ehime |
The Shiki Museum |
Feature Selection Scheme for Android ICC-related Features Based on the Gap of the Appearance Ratio Kyohei Osuge, Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.) CS2018-65 |
Android malwares are rapidly becoming a potential threat to users. Among several Android malware detection schemes, the ... [more] |
CS2018-65 pp.57-62 |
CS |
2018-11-02 10:30 |
Ehime |
The Shiki Museum |
False Density Information Attack Detection Scheme Using Overlap of Communication Range in VANET Masashi Yoshida, Hiromu Asahina, Shuichiro Haruta, Iwao Sasase (Keio Univ) CS2018-66 |
In Vehicular Ad Hoc Network (VANET), it is important to detect false information. The previously published scheme detect... [more] |
CS2018-66 pp.63-66 |
CS |
2017-11-16 10:50 |
Kumamoto |
Aso Plaza Hotel |
Traceroute-based Target Link Flooding Attack Detection Scheme by Analyzing Hop Count to the Destination Kei Sakuma, Hiromu Asahina, Shuichiro Haruta, Iwao Sasase (Keio Univ.) CS2017-56 |
[more] |
CS2017-56 pp.9-14 |
CS |
2017-07-27 09:36 |
Nagasaki |
Fukue Bunka Kaikan |
Low Cost Dummy Generation using Non-Trusted LBS Sanghun Choi, Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2017-14 |
Although LBS(Location Based Service) is quite convenient and usually used these days, The location privacy of the user i... [more] |
CS2017-14 pp.7-12 |
CS |
2017-07-27 09:39 |
Nagasaki |
Fukue Bunka Kaikan |
Obfuscated Malicious JavaScript Detection Scheme Using the Feature Based on Divided URL Shoya Morishige, Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2017-15 |
Recently, obfuscated malicious JavaScript codes which divide URL into segments to evade the pattern matching of anti-vir... [more] |
CS2017-15 pp.13-18 |
ICSS, IPSJ-SPT |
2017-03-13 16:40 |
Nagasaki |
University of Nagasaki |
Malicious PDF Detection Scheme using Keywords Feature based on Fuzzy inference Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.) ICSS2016-54 |
Detecting malicious PDFs (Portable Document Format) is imperative. In several malicious PDF detection schemes, the schem... [more] |
ICSS2016-54 pp.85-90 |
ICSS, IPSJ-SPT |
2017-03-14 09:30 |
Nagasaki |
University of Nagasaki |
Visual Similarity-based Phishing Websites Detection Scheme using Image and CSS with Target Website Finder Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ) ICSS2016-58 |
Recently, detecting phishing websites and identifying their target are imperative. In several phishing detection schemes... [more] |
ICSS2016-58 pp.111-116 |