Takuya Watanabe
Takuya Watanabe
NTT
Verified email at nsl.cs.waseda.ac.jp
Title
Cited by
Cited by
Year
Understanding the inconsistencies between text descriptions and the use of privacy-sensitive resources of mobile apps
T Watanabe, M Akiyama, T Sakai, T Mori
Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015), 241-255, 2015
332015
Understanding the origins of mobile app vulnerabilities: A large-scale measurement study of free and paid apps
T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishi, ...
2017 IEEE/ACM 14th International Conference on Mining Software Repositories …, 2017
292017
Clone or Relative? Understanding the Origins of Similar Android Apps
Y Ishii, T Watanabe, M Akiyama, T Mori
Proceedings of the 2016 ACM on International Workshop on Security And …, 2016
142016
RouteDetector: Sensor-based positioning system that exploits spatio-temporal regularity of human mobility
T Watanabe, M Akiyama, T Mori
9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15), 2015
122015
Understanding the security management of global third-party Android marketplaces
Y Ishii, T Watanabe, F Kanei, Y Takata, E Shioji, M Akiyama, T Yagi, ...
Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market …, 2017
92017
A pilot study on consumer IoT device vulnerability disclosure and patch release in Japan and the United States
A Nakajima, T Watanabe, E Shioji, M Akiyama, M Woo
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
52019
User Blocking Considered Harmful? An Attacker-Controllable Side Channel to Identify Social Accounts
T Watanabe, E Shioji, M Akiyama, K Sasaoka, T Yagi, T Mori
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 323-337, 2018
42018
A study on the vulnerabilities of mobile apps associated with software modules
T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishi, ...
arXiv preprint arXiv:1702.03112, 2017
42017
Poster: A First Look at the Privacy Risks of Voice Assistant Apps
A Natatsuka, R Iijima, T Watanabe, M Akiyama, T Sakai, T Mori
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
32019
Understanding the Inconsistency between Behaviors and Descriptions of Mobile Apps
T Watanabe, M Akiyama, T Sakai, H Washizaki, T Mori
IEICE Transactions on Information and Systems 101 (11), 2584-2599, 2018
22018
Appraiser: A large scale analysis of android clone apps
Y Ishii, T Watanabe, M Akiyama, T Mori
IEICE TRANSACTIONS on Information and Systems 100 (8), 1703-1713, 2017
22017
Tracking the Human Mobility Using Mobile Device Sensors
T Watanabe, M Akiyama, T Mori
IEICE TRANSACTIONS on Information and Systems 100 (8), 1680-1690, 2017
22017
Characterizing promotional attacks in mobile app store
B Sun, X Luo, M Akiyama, T Watanabe, T Mori
International Conference on Applications and Techniques in Information …, 2017
22017
Characterizing promotional attacks in mobile app store
B Sun, X Luo, M Akiyama, T Watanabe, T Mori
International Conference on Applications and Techniques in Information …, 2017
22017
Study on the vulnerabilities of free and paid mobile apps associated with software library
T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishii, ...
IEICE TRANSACTIONS on Information and Systems 103 (2), 276-291, 2020
12020
I know what you did last login: inconsistent messages tell existence of a target's account to insiders
AA Hasegawa, T Watanabe, E Shioji, M Akiyama
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
12019
Understanding the Responsiveness of Mobile App Developers to Software Library Updates
T Yasumatsu, T Watanabe, F Kanei, E Shioji, M Akiyama, T Mori
Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019
12019
Padetective: A systematic approach to automate detection of promotional attackers in mobile app store
B Sun, X Luo, M Akiyama, T Watanabe, T Mori
Journal of Information Processing 26, 212-223, 2018
12018
正規アプリに類似した Android アプリの実態解明 (情報通信システムセキュリティ)
石井悠太, 渡邉卓弥, 秋山満昭, 森達哉
電子情報通信学会技術研究報告= IEICE technical report: 信学技報 114 (489 …, 2015
12015
Comparative analysis of three language spheres: Are linguistic and cultural differences reflected in password selection habits?
K Mori, T Watanabe, Y Zhou, AA Hasegawa, M Akiyama, T Mori
IEICE Transactions on Information and Systems 103 (7), 1541-1555, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20