|
|
All Technical Committee Conferences (Searched in: Recent 10 Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2025-03-07 16:25 |
Okinawa |
Okinawa Prefectural Museum & Art Museum (Okinawa) |
Collecting Infrequently Accessed but Trustworthy Domain Names Daiki Chiba, Hiroki Nakano, Takashi Koide (NTT Security Holdings/NTT) |
(To be available after the conference date) [more] |
|
PRMU, IBISML, IPSJ-CVIM |
2024-03-04 09:12 |
Hiroshima |
Hiroshima Univ. Higashi-Hiroshima campus (Hiroshima, Online) (Primary: On-site, Secondary: Online) |
Creating Adversarial Examples to Deceive Both Humans and Machine Learning Models Ko Fujimori (Waseda Univ.), Toshiki Shibahara (NTT), Daiki Chiba (NTT Security), Mitsuaki Akiyama (NTT), Masato Uchida (Waseda Univ.) PRMU2023-65 |
One of the vulnerability attacks against neural networks is the generation of Adversarial Examples (AE), which induce mi... [more] |
PRMU2023-65 pp.82-87 |
ICSS, IPSJ-SPT |
2021-03-01 10:00 |
Online |
Online (Online) |
Understanding the Adoption and Operation of DNS Cookie: Current State and Future Prospects Masanori Yajima (Waseda Univ.), Daiki Chiba (NTT), Yoshiro Yoneya (JPRS), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-28 |
DNS cache poisoning attacks have received increasing attention these days.
As a countermeasure against such attacks, DN... [more] |
ICSS2020-28 pp.13-18 |
ICSS, IPSJ-SPT |
2019-03-07 16:15 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center (Okinawa) |
Analyzing Deceptive Internationalized Domain Names Daiki Chiba, Ayako Akiyama Hasegawa, Takashi Koide (NTT), Yuta Sawabe, Shigeki Goto (Waseda Univ.), Mitsuaki Akiyama (NTT) ICSS2018-76 |
Internationalized domain names (IDNs) are abused to create domain names visually similar to those of legitimate brands. ... [more] |
ICSS2018-76 pp.47-52 |
ICSS, IPSJ-SPT |
2018-03-08 09:45 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center (Hokkaido) |
Automatically Collecting User-initiated Web-based Attacks Takashi Koide, Daiki Chiba, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT) ICSS2017-66 |
Recently, web content uses social engineering techniques to lure victims into clicking on them, originating malware down... [more] |
ICSS2017-66 pp.91-96 |
ICSS, IPSJ-SPT |
2018-03-08 10:10 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center (Hokkaido) |
An Empirical Analysis of Online Advertising Fraud by analyzing User Activities Observed in the Ad Network Fumihiro Kanei, Daiki Chiba, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT) ICSS2017-67 |
With the growth of online advertising market, it has become the target of abuse, such as ad fraud by adware and bots. To... [more] |
ICSS2017-67 pp.97-102 |
ICSS, IA |
2016-06-07 09:55 |
Saga |
Saga University (Saga) |
Report on the 2016 Network and Distributed System Security Symposium Shinichi Matsumoto (ISIT), Daiki Chiba (NTT), Kuniyasu Suzaki (AIST), Mirang Park (Kanagawa Institute of Technology) IA2016-8 ICSS2016-8 |
[more] |
IA2016-8 ICSS2016-8 pp.39-44 |
ICSS, IPSJ-SPT |
2016-03-03 15:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University (Kyoto) |
Detection of Vulnerability Scanning Using Features of Collective Accesses Collected from Several Honeypots Naomi Kuze, Shu Ishikura (Osaka Univ.), Takeshi Yagi, Daiki Chiba (NTT), Masayuki Murata (Osaka Univ.) ICSS2015-55 |
Attacks against websites are increasing rapidly with the expansion of web services. Diversifying web services make it di... [more] |
ICSS2015-55 pp.47-52 |
IA, ICSS |
2015-06-12 10:50 |
Fukuoka |
Kyushu Institute of Technology Univ. (Fukuoka) |
Detecting Malicious Domain Names based on the Time-series Analysis of Attackers Network Resources Daiki Chiba (NTT/Waseda Univ.), Takeshi Yagi, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.), Takeshi Yada, Takeo Hariu (NTT), Shigeki Goto (Waseda Univ.) IA2015-10 ICSS2015-10 |
Attackers launching cyber attacks frequently change their malicious websites to evade countermeasures such as blacklisti... [more] |
IA2015-10 ICSS2015-10 pp.51-56 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|