Follow
Yuta TAKATA
Yuta TAKATA
Security Researcher
Verified email at goto.info.waseda.ac.jp
Title
Cited by
Cited by
Year
Understanding the origins of mobile app vulnerabilities: A large-scale measurement study of free and paid apps
T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishi, ...
2017 IEEE/ACM 14th International Conference on Mining Software Repositories …, 2017
552017
Malicious URL sequence detection using event de-noising convolutional neural network
T Shibahara, K Yamanishi, Y Takata, D Chiba, M Akiyama, T Yagi, ...
2017 IEEE International Conference on Communications (ICC), 1-7, 2017
512017
マルウェア対策のための研究用データセット~ MWS Datasets 2018~
高田雄太, 寺田真敏, 松木隆宏, 笠間貴弘, 荒木粧子, 畑田充弘
研究報告セキュリティ心理学とトラスト (SPT) 2018 (38), 1-8, 2018
372018
Detecting malicious websites by integrating malicious, benign, and compromised redirection subgraph similarities
T Shibahara, Y Takata, M Akiyama, T Yagi, T Yada
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC …, 2017
202017
Minespider: Extracting urls from environment-dependent drive-by download attacks
Y Takata, M Akiyama, T Yagi, T Hariu, S Goto
2015 IEEE 39th Annual Computer Software and Applications Conference 2, 444-449, 2015
182015
Analysis of redirection caused by web-based malware
Y Takata, S Goto, T Mori
Proceedings of the Asia-Pacific advanced network 32, 53-62, 2011
172011
Datasets for anti-malware research mws datasets 2018
Y Takata, M Terada, T Matsuki, T Kasama, S Araki, M Hatada
Information Processing Society of Japan 2018 (38), 2018
152018
Understanding the security management of global third-party android marketplaces
Y Ishii, T Watanabe, F Kanei, Y Takata, E Shioji, M Akiyama, T Yagi, ...
Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market …, 2017
142017
Analysis device, analysis method, and analysis program
Y Takata, M Akiyama, T Yagi
US Patent 10,416,970, 2019
92019
Website forensic investigation to identify evidence and impact of compromise
Y Takata, M Akiyama, T Yagi, T Yada, S Goto
Security and Privacy in Communication Networks: 12th International …, 2017
92017
Access classification device, access classification method, and recording medium
T Shibahara, T Yagi, M Akiyama, Y Takata
US Patent 11,212,297, 2021
82021
Event de-noising convolutional neural network for detecting malicious url sequences from proxy logs
T Shibahara, K Yamanishi, Y Takata, D Chiba, T Hokaguchi, M Akiyama, ...
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2018
72018
Fine-grained analysis of compromised websites with redirection graphs and javascript traces
Y Takata, M Akiyama, T Yagi, T Yada, S Goto
IEICE TRANSACTIONS on Information and Systems 100 (8), 1714-1728, 2017
72017
実践サイバーセキュリティモニタリング
八木毅, 青木一史, 秋山満昭, 幾世知範, 高田雄太, 千葉大紀
コロナ社, 2016
72016
POSTER: Detecting Malicious Web Pages based on Structural Similarity of Redirection Chains
T Shibahara, T Yagi, M Akiyama, Y Takata, T Yada
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
72015
Identifying evasive code in malicious websites by analyzing redirection differences
Y Takata, M Akiyama, T Yagi, T Hariu, K Ohkubo, S Goto
IEICE TRANSACTIONS on Information and Systems 101 (11), 2600-2611, 2018
62018
Building a scalable web tracking detection system: Implementation and the empirical study
Y Haga, Y Takata, M Akiyama, T Mori
IEICE TRANSACTIONS on Information and Systems 100 (8), 1663-1670, 2017
62017
MineSpider: Extracting hidden URLs behind evasive drive-by download attacks
Y Takata, M Akiyama, T Yagi, T Hariu, S Goto
IEICE TRANSACTIONS on Information and Systems 99 (4), 860-872, 2016
62016
ドライブバイダウンロード攻撃に使用される悪性な JavaScript の実態調査
高田雄太, 秋山満昭, 針生剛男
研究報告セキュリティ心理学とトラスト (SPT) 2014 (11), 1-6, 2014
62014
Browser emulator device, construction device, browser emulation method, browser emulation program, construction method, and construction program
Y Takata, M Akiyama, T Yagi
US Patent 10,621,347, 2020
52020
The system can't perform the operation now. Try again later.
Articles 1–20