


default search action
Tatsuya Mori
Person information
Other persons with a similar name
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j59]Ryo Kawaoka
, Daiki Chiba
, Takuya Watanabe, Mitsuaki Akiyama
, Tatsuya Mori
:
Longitudinal Measurement Study of the Domain Names Associated With the Olympic Games. IEEE Access 12: 19128-19144 (2024) - [j58]Huang Shu-Pei, Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori:
An Investigation of Privacy and Security in VR APPs through URL String Analysis. J. Inf. Process. 32: 779-788 (2024) - [j57]Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori:
Understanding the Breakdown of Same-origin Policies in Web Services That Rehost Websites. J. Inf. Process. 32: 801-816 (2024) - [c96]Ryo Iijima
, Tatsuya Takehisa
, Tetsushi Ohki
, Tatsuya Mori
:
The Catcher in the Eye: Recognizing Users by their Blinks. AsiaCCS 2024 - [c95]Yuan Chang
, Chun-Chia Huang
, Tatsuya Mori
, Hsu-Chun Hsiao
:
Poster: YFuzz: Data-Driven Fuzzing. CCS 2024: 4958-4960 - [c94]Kazuki Matsuo
, Satoshi Tanda, Kuniyasu Suzaki
, Yuhei Kawakoya
, Tatsuya Mori
:
SmmPack: Obfuscation for SMM Modules with TPM Sealed Key. DIMVA 2024: 439-459 - [c93]Hotaka Oyama, Ryo Iijima, Tatsuya Mori:
DeGhost: Unmasking Phantom Intrusions in Autonomous Recognition Systems. EuroS&P 2024: 78-94 - [c92]Tomoya Aiba
, Takahiko Arakawa
, Masakatsu Nishigaki
, Tatsuya Mori
, Tetsushi Ohki
:
MagSerea: Fingerprinting Magnetic Field of Specified Area with Wearable Sensors. MobileHCI (Companion) 2024: 6:1-6:6 - [c91]Momoka Nakayama
, Risako Kawashima
, Shintaro Murakami
, Yuta Takeuchi
, Tatsuya Mori
, Dai Takanashi
:
A Method for Generating Tactile Sensations from Textual Descriptions Using Generative AI. SIGGRAPH Asia Posters 2024: 3:1-3:2 - [c90]Lachlan Moore, Tatsuya Mori, Ayako Akiyama Hasegawa:
Negative Effects of Social Triggers on User Security and Privacy Behaviors. SOUPS @ USENIX Security Symposium 2024: 605-622 - [i12]Kazuki Matsuo, Satoshi Tanda, Kuniyasu Suzaki, Yuhei Kawakoya, Tatsuya Mori:
SmmPack: Obfuscation for SMM Modules with TPM Sealed Key. CoRR abs/2405.04355 (2024) - [i11]Rei Yamagishi, Shota Fujii, Tatsuya Mori:
Users Feel Guilty: Measurement of Illegal Software Installation Guide Videos on YouTube for Malware Distribution. CoRR abs/2407.16132 (2024) - 2023
- [j56]Ayako Akiyama Hasegawa, Mitsuaki Akiyama, Naomi Yamashita, Daisuke Inoue, Tatsuya Mori:
Analysis of Non-Experts' Security- and Privacy-Related Questions on a Q&A Site. IEICE Trans. Inf. Syst. 106(9): 1380-1396 (2023) - [j55]Kazuki Nomoto, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori:
Understanding the Inconsistencies in the Permissions Mechanism of Web Browsers. J. Inf. Process. 31: 620-642 (2023) - [j54]Ichiro Asomura, Ryo Iijima, Tatsuya Mori:
Automating the Detection of Fraudulent Activities in Online Banking Service. J. Inf. Process. 31: 643-653 (2023) - [j53]Keika Mori, Tatsuya Nagai, Yuta Takata, Masaki Kamizono, Tatsuya Mori:
Analysis of Privacy Compliance by Classifying Policies Before and After the Japanese Law Revision. J. Inf. Process. 31: 829-841 (2023) - [c89]Mei Suzuki
, Ryo Iijima
, Kazuki Nomoto
, Tetsushi Ohki
, Tatsuya Mori
:
PinchKey: A Natural and User-Friendly Approach to VR User Authentication. EuroUSEC 2023: 192-204 - [c88]Tatsuya Mori, Tomoaki Ohtsuki:
HAPS Trajectory Optimization Based on Throughput Heat Map. GLOBECOM 2023: 7291-7296 - [c87]Tatsuya Mori, Daisuke Fujita, Tomokazu Hayashi, Takashi Mizobe, Hideo Aihara, Syoji Kobashi:
Radiomics Based Prediction of Symptomatic Carotid Plaque in MR Images. ICMLC 2023: 315-320 - [c86]Kazuki Nomoto, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori:
Browser Permission Mechanisms Demystified. NDSS 2023 - [c85]Masanori Yajima, Daiki Chiba
, Yoshiro Yoneya, Tatsuya Mori
:
A First Look at Brand Indicators for Message Identification (BIMI). PAM 2023: 479-495 - [c84]Keika Mori
, Yuta Takata
, Daiki Ito
, Masaki Kamizono
, Tatsuya Mori
:
Impact Analysis of Organizational Structure of Group Companies on Privacy Policies. WPES@CCS 2023: 159-165 - 2022
- [j52]Tianying Xie
, Hayato Yamana
, Tatsuya Mori
:
CHE: Channel-Wise Homomorphic Encryption for Ciphertext Inference in Convolutional Neural Network. IEEE Access 10: 107446-107458 (2022) - [j51]Ayako Akiyama Hasegawa, Naomi Yamashita, Mitsuaki Akiyama, Tatsuya Mori:
Experiences, Behavioral Tendencies, and Concerns of Non-Native English Speakers in Identifying Phishing Emails. J. Inf. Process. 30: 841-858 (2022) - [j50]Kazuki Nomoto, Mitsuaki Akiyama, Masashi Eto, Atsuo Inomata, Tatsuya Mori:
On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework. Proc. Priv. Enhancing Technol. 2022(4): 140-161 (2022) - [c83]Kentaro Sako, Shin'ichiro Matsuo, Tatsuya Mori:
Distributed Random Number Generation Method on Smart Contracts. BIOTC 2022: 1-10 - [c82]Ryo Iijima, Tatsuya Takehisa, Tatsuya Mori:
Cyber-physical firewall: monitoring and controlling the threats caused by malicious analog signals. CF 2022: 296-304 - [c81]Atsuko Natatsuka, Ryo Iijima, Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Tatsuya Mori:
Understanding the Behavior Transparency of Voice Assistant Applications Using the ChatterBox Framework. RAID 2022: 143-159 - [c80]Ayako Akiyama Hasegawa, Naomi Yamashita, Tatsuya Mori, Daisuke Inoue, Mitsuaki Akiyama:
Understanding Non-Experts' Security- and Privacy-Related Questions on a Q&A Site. SOUPS @ USENIX Security Symposium 2022: 39-56 - [c79]Yuji Yano, Hisashi Iwamoto, Takuma Yoshimura, Yoshihiro Nishida, Tatsuya Mori, Kiyotaka Komoku, Hidekuni Takao, Kazutami Arimoto:
28-m W Fully Embedded AI Techniques with On-site Learning for Low-Power Handy Tactile Sensing System. VLSI-DAT 2022: 1-4 - [c78]Chun-Ming Chang, Hsu-Chun Hsiao, Timothy M. Lynar
, Tatsuya Mori:
Know Your Victim: Tor Browser Setting Identification via Network Traffic Analysis. WWW (Companion Volume) 2022: 201-204 - 2021
- [j49]Yuji Sakurai
, Takuya Watanabe
, Tetsuya Okuda, Mitsuaki Akiyama
, Tatsuya Mori
:
Identifying the Phishing Websites Using the Patterns of TLS Certificates. J. Cyber Secur. Mobil. 10(2): 451-486 (2021) - [j48]Ryo Iijima
, Shota Minami
, Yunao Zhou, Tatsuya Takehisa
, Takeshi Takahashi
, Yasuhiro Oikawa
, Tatsuya Mori
:
Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams and its Feasibility. IEEE Trans. Emerg. Top. Comput. 9(4): 2004-2018 (2021) - [c77]Tenga Matsuura, Ayako Akiyama Hasegawa, Mitsuaki Akiyama, Tatsuya Mori:
Careless Participants Are Essential for Our Phishing Study: Understanding the Impact of Screening Methods. EuroUSEC 2021: 36-47 - [c76]Masanori Yajima, Daiki Chiba, Yoshiro Yoneya, Tatsuya Mori:
Measuring Adoption of DNS Security Mechanisms with Cross-Sectional Approach. GLOBECOM 2021: 1-6 - [c75]Ryo Kawaoka
, Daiki Chiba
, Takuya Watanabe, Mitsuaki Akiyama
, Tatsuya Mori
:
A First Look at COVID-19 Domain Names: Origin and Implications. PAM 2021: 39-53 - [c74]Ayako Akiyama Hasegawa, Naomi Yamashita, Mitsuaki Akiyama, Tatsuya Mori:
Why They Ignore English Emails: The Challenges of Non-Native Speakers in Identifying Phishing Emails. SOUPS @ USENIX Security Symposium 2021: 319-338 - [i10]Ryo Kawaoka, Daiki Chiba, Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori:
A First Look at COVID-19 Domain Names: Origin and Implications. CoRR abs/2102.05290 (2021) - [i9]Taiga Ono, Takeshi Sugawara, Jun Sakuma, Tatsuya Mori:
Application of Adversarial Examples to Physical ECG Signals. CoRR abs/2108.08972 (2021) - 2020
- [j47]Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Keito Sasaoka, Takeshi Yagi, Tatsuya Mori
:
Follow Your Silhouette: Identifying the Social Account of Website Visitors through User-Blocking Side Channel. IEICE Trans. Inf. Syst. 103-D(2): 239-255 (2020) - [j46]Mitsuhiro Hatada, Tatsuya Mori
:
CLAP: Classification of Android PUAs by Similarity of DNS Queries. IEICE Trans. Inf. Syst. 103-D(2): 265-275 (2020) - [j45]Takuya Watanabe, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, Yuta Takata, Bo Sun, Yuta Ishii, Toshiki Shibahara, Takeshi Yagi, Tatsuya Mori
:
Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library. IEICE Trans. Inf. Syst. 103-D(2): 276-291 (2020) - [j44]Keika Mori, Takuya Watanabe, Yunao Zhou, Ayako Akiyama Hasegawa, Mitsuaki Akiyama, Tatsuya Mori:
Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits? IEICE Trans. Inf. Syst. 103-D(7): 1541-1555 (2020) - [j43]Ayako Akiyama Hasegawa, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori
:
Addressing the Privacy Threat to Identify Existence of a Target's Account on Sensitive Services. J. Inf. Process. 28: 1030-1046 (2020) - [c73]Yuji Sakurai, Takuya Watanabe, Tetsuya Okuda, Mitsuaki Akiyama, Tatsuya Mori
:
Discovering HTTPSified Phishing Websites Using the TLS Certificates Footprints. EuroS&P Workshops 2020: 522-531 - [c72]Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori:
Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites. NDSS 2020 - [p1]Bo Sun, Takeshi Takahashi, Lei Zhu, Tatsuya Mori
:
Discovering Malicious URLs Using Machine Learning Techniques. Data Science in Cybersecurity and Cyberthreat Intelligence 2020: 33-60
2010 – 2019
- 2019
- [j42]Kanae Yoshida, Hironori Imai, Nana Serizawa, Tatsuya Mori
, Akira Kanaoka:
Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps. J. Inf. Process. 27: 593-602 (2019) - [c71]Yuma Kurogome, Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Syogo Hayashi, Tatsuya Mori
, Koushik Sen:
EIGER: automated IOC generation for accurate and interpretable endpoint malware detection. ACSAC 2019: 687-701 - [c70]Atsuko Natatsuka, Ryo Iijima, Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Tatsuya Mori
:
Poster: A First Look at the Privacy Risks of Voice Assistant Apps. CCS 2019: 2633-2635 - [c69]Tatsuhiko Yasumatsu, Takuya Watanabe, Fumihiro Kanei, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori
:
Understanding the Responsiveness of Mobile App Developers to Software Library Updates. CODASPY 2019: 13-24 - [c68]Keika Mori, Takuya Watanabe, Yunao Zhou, Ayako Akiyama Hasegawa, Mitsuaki Akiyama, Tatsuya Mori
:
Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits? EuroS&P Workshops 2019: 159-171 - [c67]Hiroaki Suzuki, Daiki Chiba
, Yoshiro Yoneya, Tatsuya Mori
, Shigeki Goto:
ShamFinder: An Automated Framework for Detecting IDN Homographs. Internet Measurement Conference 2019: 449-462 - [c66]Takuya Hiraoka, Takahisa Imagawa, Tatsuya Mori, Takashi Onishi, Yoshimasa Tsuruoka:
Learning Robust Options by Conditional Value at Risk Optimization. NeurIPS 2019: 2615-2625 - [c65]Seita Maruyama, Satohiro Wakabayashi, Tatsuya Mori
:
Tap 'n Ghost: A Compilation of Novel Attack Techniques against Smartphone Touchscreens. IEEE Symposium on Security and Privacy 2019: 620-637 - [i8]Takuya Hiraoka, Takahisa Imagawa, Tatsuya Mori, Takashi Onishi, Yoshimasa Tsuruoka:
Learning Robust Options by Conditional Value at Risk Optimization. CoRR abs/1905.09191 (2019) - [i7]Hiroaki Suzuki, Daiki Chiba, Yoshiro Yoneya, Tatsuya Mori, Shigeki Goto:
ShamFinder: An Automated Framework for Detecting IDN Homographs. CoRR abs/1909.07539 (2019) - 2018
- [j41]Daiki Chiba
, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato, Tatsuya Mori
, Shigeki Goto:
DomainChroma: Building actionable threat intelligence from malicious domain names. Comput. Secur. 77: 138-161 (2018) - [j40]Sho Mizuno, Mitsuhiro Hatada, Tatsuya Mori
, Shigeki Goto:
Detecting Malware-Infected Devices Using the HTTP Header Patterns. IEICE Trans. Inf. Syst. 101-D(5): 1370-1379 (2018) - [j39]Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Hironori Washizaki, Tatsuya Mori
:
Understanding the Inconsistency between Behaviors and Descriptions of Mobile Apps. IEICE Trans. Inf. Syst. 101-D(11): 2584-2599 (2018) - [j38]Bo Sun, Akinori Fujino, Tatsuya Mori
, Tao Ban, Takeshi Takahashi, Daisuke Inoue:
Automatically Generating Malware Analysis Reports Using Sandbox Logs. IEICE Trans. Inf. Syst. 101-D(11): 2622-2632 (2018) - [j37]Daiki Chiba
, Takeshi Yagi, Mitsuaki Akiyama, Toshiki Shibahara, Tatsuya Mori
, Shigeki Goto:
DomainProfiler: toward accurate and early discovery of domain names abused in future. Int. J. Inf. Sec. 17(6): 661-680 (2018) - [j36]Bo Sun, Xiapu Luo
, Mitsuaki Akiyama, Takuya Watanabe, Tatsuya Mori
:
PADetective: A Systematic Approach to Automate Detection of Promotional Attackers in Mobile App Store. J. Inf. Process. 26: 212-223 (2018) - [c64]Elkana Pariwono, Daiki Chiba
, Mitsuaki Akiyama, Tatsuya Mori
:
Don't throw me away: Threats Caused by the Abandoned Internet Resources Used by Android Apps. AsiaCCS 2018: 147-158 - [c63]Ryo Iijima, Shota Minami, Yunao Zhou, Tatsuya Takehisa, Takeshi Takahashi, Yasuhiro Oikawa, Tatsuya Mori:
Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams. CCS 2018: 2222-2224 - [c62]Kanae Yoshida, Hironori Imai, Nana Serizawa, Tatsuya Mori
, Akira Kanaoka:
Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps. COMPSAC (2) 2018: 713-718 - [c61]Mika Juuti, Bo Sun, Tatsuya Mori
, N. Asokan:
Stay On-Topic: Generating Context-Specific Fake Restaurant Reviews. ESORICS (1) 2018: 132-151 - [c60]Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Keito Sasaoka, Takeshi Yagi, Tatsuya Mori
:
User Blocking Considered Harmful? An Attacker-Controllable Side Channel to Identify Social Accounts. EuroS&P 2018: 323-337 - [c59]Satohiro Wakabayashi, Seita Maruyama, Tatsuya Mori, Shigeki Goto, Masahiro Kinugawa, Yu-ichi Hayashi:
A Feasibility Study of Radio-frequency Retroreflector Attack. WOOT @ USENIX Security Symposium 2018 - [i6]Mika Juuti, Bo Sun, Tatsuya Mori, N. Asokan:
Stay On-Topic: Generating Context-specific Fake Restaurant Reviews. CoRR abs/1805.02400 (2018) - [i5]Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Keito Sasaoka, Takeshi Yagi, Tatsuya Mori:
User Blocking Considered Harmful? An Attacker-controllable Side Channel to Identify Social Accounts. CoRR abs/1805.05085 (2018) - 2017
- [j35]Mitsuaki Akiyama
, Takeshi Yagi, Takeshi Yada, Tatsuya Mori
, Youki Kadobayashi:
Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots. Comput. Secur. 69: 155-173 (2017) - [j34]Yumehisa Haga, Yuta Takata, Mitsuaki Akiyama, Tatsuya Mori
:
Building a Scalable Web Tracking Detection System: Implementation and the Empirical Study. IEICE Trans. Inf. Syst. 100-D(8): 1663-1670 (2017) - [j33]Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori
:
Tracking the Human Mobility Using Mobile Device Sensors. IEICE Trans. Inf. Syst. 100-D(8): 1680-1690 (2017) - [j32]Mitsuhiro Hatada, Tatsuya Mori
:
Finding New Varieties of Malware with the Classification of Network Behavior. IEICE Trans. Inf. Syst. 100-D(8): 1691-1702 (2017) - [j31]Yuta Ishii, Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori
:
APPraiser: A Large Scale Analysis of Android Clone Apps. IEICE Trans. Inf. Syst. 100-D(8): 1703-1713 (2017) - [j30]Tatsuaki Kimura, Keisuke Ishibashi, Tatsuya Mori
, Hiroshi Sawada, Tsuyoshi Toyono, Ken Nishimatsu, Akio Watanabe, Akihiro Shimoda, Kohei Shiomoto:
Network Event Extraction from Log Data with Nonnegative Tensor Factorization. IEICE Trans. Commun. 100-B(10): 1865-1878 (2017) - [c58]Bo Sun, Xiapu Luo
, Mitsuaki Akiyama, Takuya Watanabe, Tatsuya Mori
:
Characterizing Promotional Attacks in Mobile App Store. ATIS 2017: 113-127 - [c57]Seita Maruyama, Satohiro Wakabayashi, Tatsuya Mori
:
POSTER: TOUCHFLOOD: A Novel Class of Attacks against Capacitive Touchscreens. CCS 2017: 2551-2553 - [c56]Satohiro Wakabayashi, Seita Maruyama, Tatsuya Mori
, Shigeki Goto, Masahiro Kinugawa, Yu-ichi Hayashi:
POSTER: Is Active Electromagnetic Side-channel Attack Practical? CCS 2017: 2587-2589 - [c55]Mitsuhiro Hatada, Tatsuya Mori
:
Detecting and Classifying Android PUAs by Similarity of DNS queries. COMPSAC (2) 2017: 590-595 - [c54]Daiki Chiba
, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Tatsuya Mori
, Shigeki Goto:
DomainChroma: Providing Optimal Countermeasures against Malicious Domain Names. COMPSAC (1) 2017: 643-648 - [c53]Shinji Hotta, Tatsuya Mori, Daisuke Uchida, Kazuho Maeda, Yoshinori Yaginuma, Akihiro Inomata:
Eating moment recognition using heart rate responses. UbiComp/ISWC Adjunct 2017: 69-72 - [c52]Sho Mizuno, Mitsuhiro Hatada, Tatsuya Mori
, Shigeki Goto:
BotDetector: A robust and scalable approach toward detecting malware-infected devices. ICC 2017: 1-7 - [c51]Takuya Watanabe, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, Yuta Takata, Bo Sun, Yuta Ishii, Toshiki Shibahara, Takeshi Yagi, Tatsuya Mori
:
Understanding the origins of mobile app vulnerabilities: a large-scale measurement study of free and paid apps. MSR 2017: 14-24 - [c50]Yuta Ishii, Takuya Watanabe, Fumihiro Kanei, Yuta Takata, Eitaro Shioji, Mitsuaki Akiyama, Takeshi Yagi, Bo Sun, Tatsuya Mori
:
Understanding the security management of global third-party Android marketplaces. WAMA@ESEC/SIGSOFT FSE 2017: 12-18 - [i4]Takuya Watanabe, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, Yuta Takata, Bo Sun, Yuta Ishii, Toshiki Shibahara, Takeshi Yagi, Tatsuya Mori:
A Study on the Vulnerabilities of Mobiles Apps associated with Software Modules. CoRR abs/1702.03112 (2017) - [i3]Seita Maruyama, Satohiro Wakabayashi, Tatsuya Mori:
Trojan of Things: Embedding Malicious NFC Tags into Common Objects. CoRR abs/1702.07124 (2017) - 2016
- [j29]Tatsuya Mori
, Takeru Inoue
, Akihiro Shimoda, Kazumichi Sato, Shigeaki Harada, Keisuke Ishibashi, Shigeki Goto:
Statistical estimation of the names of HTTPS servers with domain name graphs. Comput. Commun. 94: 104-113 (2016) - [j28]Bo Sun, Mitsuaki Akiyama, Takeshi Yagi, Mitsuhiro Hatada, Tatsuya Mori
:
Automating URL Blacklist Generation with Similarity Search Approach. IEICE Trans. Inf. Syst. 99-D(4): 873-882 (2016) - [c49]Tatsuya Mori, Daisuke Uchida, Masato Sakata, Takuro Oya, Yasuyuki Nakata, Kazuho Maeda, Yoshinori Yaginuma, Akihiro Inomata:
Continuous Real-time Heart Rate Monitoring from Face Images. BIOSIGNALS 2016: 52-56 - [c48]Daisuke Uchida, Tatsuya Mori, Masato Sakata, Takuro Oya, Yasuyuki Nakata, Kazuho Maeda, Yoshinori Yaginuma, Akihiro Inomata:
Continuous Real-Time Measurement Method for Heart Rate Monitoring Using Face Images. BIOSTEC (Selected Papers) 2016: 224-235 - [c47]Bo Sun, Akinori Fujino, Tatsuya Mori
:
POSTER: Toward Automating the Generation of Malware Analysis Reports Using the Sandbox Logs. CCS 2016: 1814-1816 - [c46]Yuta Ishii, Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori
:
Clone or Relative?: Understanding the Origins of Similar Android Apps. IWSPA@CODASPY 2016: 25-32 - [c45]Daiki Chiba
, Takeshi Yagi, Mitsuaki Akiyama, Toshiki Shibahara, Takeshi Yada, Tatsuya Mori
, Shigeki Goto:
DomainProfiler: Discovering Domain Names Abused in Future. DSN 2016: 491-502 - [c44]Guifen Tian, Tatsuya Mori, Yuji Okuda:
Spoofing detection for embedded face recognition system using a low cost stereo camera. ICPR 2016: 1017-1022 - 2015
- [c43]Akinori Fujino, Junichi Murakami, Tatsuya Mori
:
Discovering similar malware samples using API call topics. CCNC 2015: 140-147 - [c42]Yumehisa Haga, Akira Saso, Tatsuya Mori
, Shigeki Goto:
Increasing the Darkness of Darknet Traffic. GLOBECOM 2015: 1-7 - [c41]Akihiro Shimoda, Keisuke Ishibashi, Kazumichi Sato, Masayuki Tsujino, Takeru Inoue, Masaki Shimura, Takanori Takebe, Kazuki Takahashi, Tatsuya Mori
, Shigeki Goto:
Inferring Popularity of Domain Names with DNS Traffic: Exploiting Cache Timeout Heuristics. GLOBECOM 2015: 1-6 - [c40]Bo Sun, Mitsuaki Akiyama, Takeshi Yagi, Mitsuhiro Hatada, Tatsuya Mori
:
AutoBLG: Automatic URL blacklist generator using search space expansion and filters. ISCC 2015: 625-631 - [c39]Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Tatsuya Mori:
Understanding the Inconsistencies between Text Descriptions and the Use of Privacy-sensitive Resources of Mobile Apps. SOUPS 2015: 241-255 - [c38]Tatsuya Mori
, Takeru Inoue, Akihiro Shimoda, Kazumichi Sato, Keisuke Ishibashi, Shigeki Goto:
SFMap: Inferring Services over Encrypted Web Flows Using Dynamical Domain Name Graphs. TMA 2015: 126-139 - [c37]Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori:
RouteDetector: Sensor-based Positioning System That Exploits Spatio-Temporal Regularity of Human Mobility. WOOT 2015 - 2014
- [c36]Mitsuhiro Hatada, Masato Terada, Tatsuya Mori
:
POSTER: Seven Years in MWS: Experiences of Sharing Datasets with Anti-malware Research Community in Japan. CCS 2014: 1433-1435 - [c35]Tatsuaki Kimura, Keisuke Ishibashi, Tatsuya Mori
, Hiroshi Sawada, Tsuyoshi Toyono, Ken Nishimatsu, Akio Watanabe, Akihiro Shimoda, Kohei Shiomoto
:
Spatio-temporal factorization of log data for understanding network events. INFOCOM 2014: 610-618 - 2013
- [j27]Noriaki Kamiyama, Tatsuya Mori
, Ryoichi Kawahara:
Autonomic load balancing of flow monitors. Comput. Networks 57(3): 741-761 (2013) - [j26]Ryoichi Kawahara, Tetsuya Takine, Tatsuya Mori
, Noriaki Kamiyama, Keisuke Ishibashi:
Mean-variance relationship of the number of flows in traffic aggregation and its application to traffic management. Comput. Networks 57(6): 1560-1576 (2013) - [j25]Noriaki Kamiyama, Ryoichi Kawahara, Tatsuya Mori
, Haruhisa Hasegawa:
Effect of Limiting Pre-Distribution and Clustering Users on Multicast Pre-Distribution VoD. IEICE Trans. Commun. 96-B(1): 143-154 (2013) - [j24]Yasuhiro Ikeda, Ryoichi Kawahara, Noriaki Kamiyama, Tatsuaki Kimura, Tatsuya Mori
:
Analyzing Characteristics of TCP Quality Metrics with Respect to Type of Connection through Measured Traffic Data. IEICE Trans. Commun. 96-B(2): 533-542 (2013) - [j23]Noriaki Kamiyama, Tatsuya Mori
, Ryoichi Kawahara, Haruhisa Hasegawa:
Optimally Designing ISP-Operated CDN. IEICE Trans. Commun. 96-B(3): 790-801 (2013) - [j22]Noriaki Kamiyama, Ryoichi Kawahara, Tatsuya Mori
, Haruhisa Hasegawa:
Multicast Pre-Distribution VoD System. IEICE Trans. Commun. 96-B(6): 1459-1471 (2013) - [j21]Kazuya Takahashi, Tatsuya Mori, Yusuke Hirota, Hideki Tode, Koso Murakami:
A Resilient Forest-Based Application Level Multicast for Real-Time Streaming. IEICE Trans. Commun. 96-B(7): 1874-1885 (2013) - [j20]Noriaki Kamiyama, Tatsuya Mori
, Ryoichi Kawahara, Shigeaki Harada:
Optimally Identifying Worm-Infected Hosts. IEICE Trans. Commun. 96-B(8): 2084-2094 (2013) - [j19]Daiki Chiba, Kazuhiro Tobe, Tatsuya Mori, Shigeki Goto:
Analyzing Spatial Structure of IP Addresses for Detecting Malicious Websites. Inf. Media Technol. 8(3): 855-866 (2013) - [j18]Daiki Chiba
, Kazuhiro Tobe, Tatsuya Mori
, Shigeki Goto:
Analyzing Spatial Structure of IP Addresses for Detecting Malicious Websites. J. Inf. Process. 21(3): 539-550 (2013) - [j17]Noriaki Kamiyama, Tatsuya Mori
, Ryoichi Kawahara, Shigeaki Harada, Haruhisa Hasegawa:
Analyzing influence of network topology on designing ISP-operated CDN. Telecommun. Syst. 52(2): 969-977 (2013) - [c34]Naoya Maki, Takayuki Nishio, Ryoichi Shinkuma
, Tatsuro Takahashi, Tatsuya Mori
, Noriaki Kamiyama, Ryoichi Kawahara:
Expected traffic reduction by content-oriented incentive in peer-assisted content delivery networks. ICOIN 2013: 450-455 - [c33]Naoya Maki, Ryoichi Shinkuma, Tatsuya Mori, Noriaki Kamiyama, Ryoichi Kawahara:
A periodic combined-content distribution mechanism in peer-assisted content delivery networks. Kaleidoscope 2013: 1-8 - 2012
- [j16]Tatsuya Mori, Yoshikazu Maekawa, Yoko Akiyama, Fumihito Mishima, Koichi Sutani, Sunao Iwaki
, Shigehiro Nishijima:
Fundamental Study for Controlling Environment using Biological signal. Control. Intell. Syst. 40(3) (2012) - [j15]Keisuke Ishibashi, Ryoichi Kawahara, Tatsuya Mori
, Tsuyoshi Kondoh, Shoichiro Asano:
Effects of Sampling and Spatio/Temporal Granularity in Traffic Monitoring on Anomaly Detectability. IEICE Trans. Commun. 95-B(2): 466-476 (2012) - [j14]Akihiro Shimoda, Tatsuya Mori
, Shigeki Goto:
Extended Darknet: Multi-Dimensional Internet Threat Monitoring System. IEICE Trans. Commun. 95-B(6): 1915-1923 (2012) - [j13]Ryoichi Kawahara, Tatsuya Mori
, Takeshi Yada, Noriaki Kamiyama:
Analyzing and Reducing the Impact of Traffic on Large-Scale NAT. IEICE Trans. Commun. 95-B(9): 2815-2827 (2012) - [j12]Naoya Maki, Takayuki Nishio, Ryoichi Shinkuma
, Tatsuya Mori
, Noriaki Kamiyama, Ryoichi Kawahara, Tatsuro Takahashi:
Traffic Engineering of Peer-Assisted Content Delivery Network with Content-Oriented Incentive Mechanism. IEICE Trans. Inf. Syst. 95-D(12): 2860-2869 (2012) - [j11]Tatsuya Mori, Makoto Nakashima, Tetsuro Ito:
SpACCE: a sophisticated ad hoc cloud computing environment built by server migration to facilitate distributed collaboration. Int. J. Space Based Situated Comput. 2(4): 230-239 (2012) - [c32]Tatsuya Mori, Makoto Nakashima, Tetsuro Ito:
A Sophisticated Ad Hoc Cloud Computing Environment Built by the Migration of a Server to Facilitate Distributed Collaboration. AINA Workshops 2012: 1196-1202 - [c31]Noriaki Kamiyama, Tatsuya Mori
, Ryoichi Kawahara:
Autonomic load balancing for flow monitoring. ICC 2012: 2684-2688 - [c30]Daiki Chiba
, Kazuhiro Tobe, Tatsuya Mori
, Shigeki Goto:
Detecting Malicious Websites by Learning IP Address Features. SAINT 2012: 29-39 - 2011
- [j10]Noriaki Kamiyama, Ryoichi Kawahara, Tatsuya Mori
, Shigeaki Harada, Haruhisa Hasegawa:
Optimally designing caches to reduce P2P traffic. Comput. Commun. 34(7): 883-897 (2011) - [j9]Noriaki Kamiyama, Ryoichi Kawahara, Tatsuya Mori
, Shigeaki Harada, Haruhisa Hasegawa:
Parallel video streaming optimizing network throughput. Comput. Commun. 34(10): 1182-1194 (2011) - [j8]Ryoichi Kawahara, Keisuke Ishibashi, Tatsuya Mori
, Noriaki Kamiyama, Shigeaki Harada, Haruhisa Hasegawa, Shoichiro Asano:
Detection accuracy of network anomalies using sampled flow statistics. Int. J. Netw. Manag. 21(6): 513-535 (2011) - [c29]Ryoichi Kawahara, Noriaki Kamiyama, Tatsuya Mori
, Haruhisa Hasegawa:
Performance evaluation of peer-assisted content distribution. CCNC 2011: 725-729 - [c28]Tatsuya Mori
, Kazumichi Sato, Yousuke Takahashi, Keisuke Ishibashi:
How is e-mail sender authentication used and misused? CEAS 2011: 31-37 - [c27]Ryoichi Kawahara, Shigeaki Harada, Noriaki Kamiyama, Tatsuya Mori
, Haruhisa Hasegawa, Akihiro Nakao
:
Traffic Engineering Using Overlay Network. ICC 2011: 1-6 - [c26]Noriaki Kamiyama, Ryoichi Kawahara, Tatsuya Mori
, Haruhisa Hasegawa:
Limiting pre-distribution and clustering users on multicast pre-distribution VoD. Integrated Network Management 2011: 706-709 - 2010
- [c25]Holly Esquivel, Aditya Akella, Tatsuya Mori
:
On the effectiveness of IP reputation for spam filtering. COMSNETS 2010: 1-10 - [c24]Noriaki Kamiyama, Ryoichi Kawahara, Tatsuya Mori
, Shigeaki Harada, Haruhisa Hasegawa:
Optimally Designing Capacity and Location of Caches to Reduce P2P Traffic. ICC 2010: 1-6 - [c23]Noriaki Kamiyama, Ryoichi Kawahara, Tatsuya Mori
, Shigeaki Harada, Haruhisa Hasegawa:
Impact of topology on parallel video streaming. NOMS 2010: 607-614 - [c22]Akihiro Shimoda, Tatsuya Mori
, Shigeki Goto:
Sensor in the Dark: Building Untraceable Large-Scale Honeypots Using Virtualization Technologies. SAINT 2010: 22-30 - [c21]Tatsuya Mori
, Ryoichi Kawahara, Haruhisa Hasegawa, Shinsuke Shimogawa:
Characterizing Traffic Flows Originating from Large-Scale Video Sharing Services. TMA 2010: 17-31
2000 – 2009
- 2009
- [j7]Tatsuya Mori, Yasuyuki Ueda, Nobuhiro Nonogaki, Toshihiro Terazawa, Milosz Sroka, Tetsuya Fujita, Takeshi Kodaka, Takayuki Mori, Kumiko Morita, Hideho Arakida, Takashi Miura, Yuji Okuda, Toshiki Kizu, Yoshiro Tsuboi:
A Power, Performance Scalable Eight-Cores Media Processor for Mobile Multimedia Applications. IEEE J. Solid State Circuits 44(11): 2957-2965 (2009) - [c20]Takeshi Kodaka, Shunsuke Sasaki, Takahiro Tokuyoshi, Ryuichiro Ohyama, Nobuhiro Nonogaki, Koji Kitayama, Tatsuya Mori, Yasuyuki Ueda, Hideho Arakida, Yuji Okuda, Toshiki Kizu, Yoshiro Tsuboi, Nobu Matsumoto:
Design and implementation of scalable, transparent threads for multi-core media processor. DATE 2009: 1035-1039 - [c19]Tatsuya Mori
, Noriaki Kamiyama, Shigeaki Harada, Haruhisa Hasegawa, Ryoichi Kawahara:
Improving Deployability of Peer-Assisted CDN Platform with Incentive. GLOBECOM 2009: 1-7 - [c18]Ryoichi Kawahara, Tatsuya Mori
, Noriaki Kamiyama, Shigeaki Harada, Haruhisa Hasegawa:
Adaptive Bandwidth Control to Handle Long-Duration Large Flows. ICC 2009: 1-6 - [c17]Yoji Kiyota, Hiroshi Nakagawa, Satoshi Sakai, Tatsuya Mori, Hidetaka Masuda:
Exploitation of the wikipedia category system for enhancing the value of LCSH. JCDL 2009: 411-412 - 2008
- [j6]Ryoichi Kawahara, Tatsuya Mori
, Keisuke Ishibashi, Noriaki Kamiyama, Hideaki Yoshino:
Packet Sampling TCP Flow Rate Estimation and Performance Degradation Detection Method. IEICE Trans. Commun. 91-B(5): 1309-1319 (2008) - [j5]Keisuke Ishibashi, Tatsuya Mori
, Ryoichi Kawahara, Yutaka Hirokawa, Atsushi Kobayashi, Kimihiro Yamamoto, Hitoaki Sakamoto, Shoichiro Asano:
Finding Cardinality Heavy-Hitters in Massive Traffic Data and Its Application to Anomaly Detection. IEICE Trans. Commun. 91-B(5): 1331-1339 (2008) - [c16]Shigeaki Harada, Ryoichi Kawahara, Tatsuya Mori
, Noriaki Kamiyama, Haruhisa Hasegawa, Hideaki Yoshino:
A Method of Detecting Network Anomalies in Cyclic Traffic. GLOBECOM 2008: 2057-2061 - [c15]Tatsuya Mori, Hideki Tode, Koso Murakami:
Integrated Method for Loss-Resilient Multicast Source Authentication and Data Reconstruction. ICC 2008: 5844-5848 - [c14]Noriaki Kamiyama, Tatsuya Mori
, Ryoichi Kawahara, Shigeaki Harada:
Optimum Identification of Worm-Infected Hosts. IPOM 2008: 103-116 - [c13]Noriaki Kamiyama, Tatsuya Mori
, Ryoichi Kawahara, Shigeaki Harada, Hideaki Yoshino:
Extracting Worm-Infected Hosts Using White List. SAINT 2008: 68-75 - 2007
- [j4]Tatsuya Mori
, Tetsuya Takine, Jianping Pan
, Ryoichi Kawahara, Masato Uchida
, Shigeki Goto:
Identifying Heavy-Hitter Flows from Sampled Flow Statistics. IEICE Trans. Commun. 90-B(11): 3061-3072 (2007) - [c12]Ryoichi Kawahara, Keisuke Ishibashi, Tatsuya Mori
, Noriaki Kamiyama, Shigeaki Harada, Shoichiro Asano:
Detection Accuracy of Network Anomalies Using Sampled Flow Statistics. GLOBECOM 2007: 1959-1964 - [c11]Noriaki Kamiyama, Tatsuya Mori
, Ryoichi Kawahara, Eng Keong Lua:
Efficient Timeout Checking Mechanism for Traffic Control. ICCCN 2007: 327-333 - [c10]Noriaki Kamiyama, Tatsuya Mori
, Ryoichi Kawahara:
Simple and Adaptive Identification of Superspreaders by Flow Sampling. INFOCOM 2007: 2481-2485 - [c9]Ryoichi Kawahara, Tatsuya Mori
, Noriaki Kamiyama, Shigeaki Harada, Shoichiro Asano:
A Study on Detecting Network Anomalies Using Sampled Flow Statistics. SAINT Workshops 2007: 81 - [c8]Keisuke Ishibashi, Tatsuya Mori
, Ryoichi Kawahara, Katsuyasu Toyama, Shunichi Osawa, Shoichiro Asano:
2-D Bitmap for Summarizing Inter-Host Communication Patterns. SAINT Workshops 2007: 83 - [c7]Tatsuya Mori
, Ryoichi Kawahara, Noriaki Kamiyama, Shigeaki Harada:
Inferring Original Traffic Pattern from Sampled Flow Statistics. SAINT Workshops 2007: 85 - 2006
- [c6]Ryoichi Kawahara, Tatsuya Mori
, Keisuke Ishibashi, Noriaki Kamiyama, Takeo Abe:
Estimating Flow Rate from Sampled Packet Streams for Detection of Performance Degradation at TCP Flow Level. GLOBECOM 2006 - [c5]Ryoichi Kawahara, Tatsuya Mori
, Takeo Abe:
QoS control to handle long-duration large flows and its performance evaluation. ICC 2006: 579-584 - [c4]Keisuke Ishibashi, Tatsuya Mori
, Ryoichi Kawahara, Yutaka Hirokawa, Atsushi Kobayashi, Kimihiro Yamamoto, Hitoaki Sakamoto:
Estimating Top N Hosts in Cardinality Using Small Memory Resources. ICDE Workshops 2006: 29 - [c3]Noriaki Kamiyama, Tatsuya Mori
:
Simple and Accurate Identification of High-Rate Flows by Packet Sampling. INFOCOM 2006 - 2005
- [j3]Ryoichi Kawahara, Keisuke Ishibashi, Tatsuya Mori
, Toshihisa Ozawa, Takeo Abe:
Method of Bandwidth Dimensioning and Management for Aggregated TCP Flows with Heterogeneous Access Links. IEICE Trans. Commun. 88-B(12): 4605-4615 (2005) - [j2]Tatsuya Mori
, Masato Uchida
, Shigeki Goto:
Flow analysis of internet traffic: World Wide Web versus peer-to-peer. Syst. Comput. Jpn. 36(11): 70-81 (2005) - 2004
- [j1]Tatsuya Mori, Ryoichi Kawahara, Shozo Naito, Shigeki Goto:
On the Characteristics of Internet Traffic Variability: Spikes and Elephants. IEICE Trans. Inf. Syst. 87-D(12): 2644-2653 (2004) - [c2]Tatsuya Mori
, Masato Uchida
, Ryoichi Kawahara, Jianping Pan
, Shigeki Goto:
Identifying elephant flows through periodically sampled packets. Internet Measurement Conference 2004: 115-120 - [c1]Tatsuya Mori
, Ryoichi Kawahara, Shozo Naito, Shigeki Goto:
On the Characteristics of Internet Traffic Variability: Spikes and Elephants. SAINT 2004: 99-106 - 2002
- [i2]Tatsuya Mori, Ryoichi Kawahara, Shozo Naito:
Analysis of Non-Gaussian Nature of Network Traffic. CoRR cs.NI/0201004 (2002) - [i1]Tatsuya Mori, Ryoichi Kawahara, Shozo Naito:
Analysis of Non-Gaussian Nature of Network Traffic and its Implication on Network Performance. CoRR cs.NI/0209004 (2002)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:54 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint