Visual similarity-based phishing detection scheme using image and CSS with target website finder S Haruta, H Asahina, I Sasase GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-6, 2017 | 31 | 2017 |
Obfuscated malicious javascript detection scheme using the feature based on divided URL S Morishige, S Haruta, H Asahina, I Sasase 2017 23rd Asia-Pacific Conference on Communications (APCC), 1-6, 2017 | 17 | 2017 |
Traceroute-based target link flooding attack detection scheme by analyzing hop count to the destination K Sakuma, H Asahina, S Haruta, I Sasase 2017 23rd Asia-Pacific Conference on Communications (APCC), 1-6, 2017 | 10 | 2017 |
A preprocessing by using multiple steganography for intentional image downsampling on CNN-based steganalysis H Kato, K Osuge, S Haruta, I Sasase IEEE Access 8, 195578-195593, 2020 | 9 | 2020 |
A novel visual similarity-based phishing detection scheme using hue information with auto updating database S Haruta, F Yamazaki, H Asahina, I Sasase 2019 25th Asia-Pacific Conference on Communications (APCC), 280-285, 2019 | 9 | 2019 |
Android malware detection scheme based on level of SSL server certificate H Kato, S Haruta, I Sasase IEICE TRANSACTIONS on Information and Systems 103 (2), 379-389, 2020 | 6 | 2020 |
Debiasing graph transfer learning via item semantic clustering for cross-domain recommendations Z Li, D Amagata, Y Zhang, T Hara, S Haruta, K Yonekawa, M Kurokawa 2022 IEEE International Conference on Big Data (Big Data), 762-769, 2022 | 5 | 2022 |
A preprocessing methodology by using additional steganography on cnn-based steganalysis H Kato, K Osuge, S Haruta, I Sasase GLOBECOM 2020-2020 IEEE Global Communications Conference, 1-6, 2020 | 4 | 2020 |
Hue signature auto update system for visual similarity-based phishing detection with tolerance to zero-day attack S Haruta, H Asahina, F Yamazaki, I Sasase IEICE TRANSACTIONS on Information and Systems 102 (12), 2461-2471, 2019 | 4 | 2019 |
A server-based distributed storage using secret sharing with AES-256 for lightweight safety restoration S Choi, S Haruta, Y An, I Sasase IEICE TRANSACTIONS on Information and Systems 103 (7), 1647-1659, 2020 | 3 | 2020 |
Traffic feature-based botnet detection scheme emphasizing the importance of long patterns Y An, S Haruta, S Choi, I Sasase Image Processing and Communications: Techniques, Algorithms and Applications …, 2020 | 3 | 2020 |
Semantic Relation Transfer for Non-overlapped Cross-domain Recommendations Z Li, D Amagata, Y Zhang, T Hara, S Haruta, K Yonekawa, M Kurokawa Pacific-Asia Conference on Knowledge Discovery and Data Mining, 271-283, 2023 | 2 | 2023 |
An energy-efficient defense against message flooding attacks in delay tolerant networks H Asahina, K Arai, S Haruta, PT Mathiopoulos, I Sasase IEICE Transactions on Communications 104 (4), 348-359, 2021 | 2 | 2021 |
Encounter record reduction scheme based on theoretical contact probability for flooding attack mitigation in DTN K Arai, S Haruta, H Asahina, I Sasase 2018 24th Asia-Pacific Conference on Communications (APCC), 34-39, 2018 | 2 | 2018 |
A website fingerprinting attack based on the virtual memory of the process on Android devices T Okazaki, H Kato, S Haruta, I Sasase 2021 26th IEEE Asia-Pacific Conference on Communications (APCC), 7-12, 2021 | 1 | 2021 |
A Server-Based Distributed Storage Using Secret Sharing with AES-256 for Lightweight Safety Restoration C Sanghun, H Shuichiro, A Yichen, S Iwao IEICE Transactions on Information and Systems 103 (7), 1647-1659, 2020 | 1 | 2020 |
Android malware detection scheme based on level of SSL server certificate H Kato, S Haruta, I Sasase 2019 IEEE Global Communications Conference (GLOBECOM), 1-6, 2019 | 1 | 2019 |
Traceroute-based target link flooding attack detection scheme by analyzing hop count to the destination H Asahina, K Sakuma, S Haruta, H Kato, I Sasase IEICE Communications Express 8 (7), 251-256, 2019 | 1 | 2019 |
Trust-based Sybil nodes detection with robust seed selection and graph pruning on SNS S Haruta, K Toyoda, I Sasase IEICE Transactions on Communications 99 (5), 1002-1011, 2016 | 1 | 2016 |
Monetary Fair Battery-based Load Hiding Scheme for Multiple Households in Automatic Meter Reading System R Negishi, S Haruta, C Inamura, K Toyoda, I Sasase Journal of Telecommunications and Information Technology, 2016 | 1 | 2016 |