Yuta TAKATA
Yuta TAKATA
Security Researcher
Verified email at goto.info.waseda.ac.jp
Title
Cited by
Cited by
Year
Understanding the origins of mobile app vulnerabilities: A large-scale measurement study of free and paid apps
T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishi, ...
2017 IEEE/ACM 14th International Conference on Mining Software Repositories …, 2017
292017
Malicious URL sequence detection using event de-noising convolutional neural network
T Shibahara, K Yamanishi, Y Takata, D Chiba, M Akiyama, T Yagi, ...
2017 IEEE International Conference on Communications (ICC), 1-7, 2017
222017
Minespider: Extracting urls from environment-dependent drive-by download attacks
Y Takata, M Akiyama, T Yagi, T Hariu, S Goto
2015 IEEE 39th Annual Computer Software and Applications Conference 2, 444-449, 2015
142015
Analysis of redirection caused by web-based malware
Y Takata, S Goto, T Mori
Proceedings of the Asia-Pacific advanced network 32, 53-62, 2011
132011
マルウェア対策のための研究用データセット~ MWS Datasets 2018~
高田雄太, 寺田真敏, 松木隆宏, 笠間貴弘, 荒木粧子, 畑田充弘
研究報告セキュリティ心理学とトラスト (SPT) 2018 (38), 1-8, 2018
112018
Understanding the security management of global third-party Android marketplaces
Y Ishii, T Watanabe, F Kanei, Y Takata, E Shioji, M Akiyama, T Yagi, ...
Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market …, 2017
92017
Datasets for Anti-Malware Research MWS Datasets 2018
Y Takata, M Terada, T Matsuki, T Kasama, S Araki, M Hatada
Information Processing Society of Japan 2018 (38), 2018
82018
Website forensic investigation to identify evidence and impact of compromise
Y Takata, M Akiyama, T Yagi, T Yada, S Goto
International Conference on Security and Privacy in Communication Systems …, 2016
72016
Detecting malicious websites by integrating malicious, benign, and compromised redirection subgraph similarities
T Shibahara, Y Takata, M Akiyama, T Yagi, T Yada
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC …, 2017
62017
MineSpider: Extracting hidden URLs behind evasive drive-by download attacks
Y Takata, M Akiyama, T Yagi, T Hariu, S Goto
IEICE TRANSACTIONS on Information and Systems 99 (4), 860-872, 2016
62016
Building a Scalable Web Tracking Detection System: Implementation and the Empirical Study
Y Haga, Y Takata, M Akiyama, T Mori
IEICE TRANSACTIONS on Information and Systems 100 (8), 1663-1670, 2017
42017
A study on the vulnerabilities of mobile apps associated with software modules
T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishi, ...
arXiv preprint arXiv:1702.03112, 2017
42017
実践サイバーセキュリティモニタリング
八木毅, 青木一史, 秋山満昭, 幾世知範, 高田雄太, 千葉大紀
コロナ社, 2016
42016
ドライブバイダウンロード攻撃に使用される悪性な JavaScript の実態調査 (情報通信システムセキュリティ)
高田雄太, 秋山満昭, 針生剛男
電子情報通信学会技術研究報告= IEICE technical report: 信学技報 113 (502), 59-64, 2014
42014
Analysis device, analysis method, and analysis program
Y Takata, M Akiyama, T Yagi
US Patent 10,416,970, 2019
32019
Event de-noising convolutional neural network for detecting malicious url sequences from proxy logs
T Shibahara, K Yamanishi, Y Takata, D Chiba, T Hokaguchi, M Akiyama, ...
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2018
32018
Fine-grained analysis of compromised websites with redirection graphs and javascript traces
Y Takata, M Akiyama, T Yagi, T Yada, S Goto
IEICE TRANSACTIONS on Information and Systems 100 (8), 1714-1728, 2017
32017
Redirect analysis of web-based malware
Y Takata, T Mori, S Goto
The 73rd National Convention of IPSJ 3, 2011
32011
Understanding Evasion Techniques that Abuse Differences among JavaScript Implementations
Y Takata, M Akiyama, T Yagi, T Hariu, S Goto
International Conference on Web Information Systems Engineering, 278-294, 2017
22017
Poster: Protecting Android Apps from Repackaging by Self-Protection Code
F Kanei, Y Takata, M Akiyama, T Yagi, T Yada
22017
The system can't perform the operation now. Try again later.
Articles 1–20