default search action
Toshiki Shibahara
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Takayuki Miura, Masanobu Kii, Toshiki Shibahara, Kazuki Iwahana, Tetsuya Okuda, Atsunori Ichikawa, Naoto Yanai:
SETSUBUN: Revisiting Membership Inference Game for Evaluating Synthetic Data Generation. J. Inf. Process. 32: 757-766 (2024) - [c20]Naoki Fukushi, Toshiki Shibahara, Hiroki Nakano, Takashi Koide, Daiki Chiba:
Noisy Label Detection for Multi-labeled Malware. CCNC 2024: 165-171 - [c19]Toshiki Shibahara, Takayuki Miura, Masanobu Kii, Atsunori Ichikawa:
Efficiently Calculating Stronger Lower Bound for Differentially Private SGD in Black-Box Setting. COMPSAC 2024: 970-975 - [c18]Ko Fujimori, Toshiki Shibahara, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
Evaluation of Adversarial Examples Based on Original Definition. HCI (62) 2024: 36-43 - [c17]Takayuki Miura, Toshiki Shibahara, Naoto Yanai:
MEGEX: Data-Free Model Extraction Attack Against Gradient-Based Explainable AI. SecTL@AsiaCCS 2024: 56-66 - 2023
- [j9]Satoshi Furutani, Toshiki Shibahara, Mitsuaki Akiyama, Masaki Aida:
Analysis of Homophily Effects on Information Diffusion on Social Networks. IEEE Access 11: 79974-79983 (2023) - [j8]Takayuki Miura, Toshiki Shibahara, Masanobu Kii, Atsunori Ichikawa, Juko Yamamoto, Koji Chida:
On Rényi Differential Privacy in Statistics-based Synthetic Data Generation. J. Inf. Process. 31: 812-820 (2023) - [j7]Satoshi Furutani, Toshiki Shibahara, Mitsuaki Akiyama, Masaki Aida:
Interpreting Graph-Based Sybil Detection Methods as Low-Pass Filtering. IEEE Trans. Inf. Forensics Secur. 18: 1225-1236 (2023) - [i5]Yumeki Goto, Nami Ashizawa, Toshiki Shibahara, Naoto Yanai:
Do Backdoors Assist Membership Inference Attacks? CoRR abs/2303.12589 (2023) - [i4]Takayuki Miura, Toshiki Shibahara, Masanobu Kii, Atsunori Ichikawa, Juko Yamamoto, Koji Chida:
On Rényi Differential Privacy in Statistics-Based Synthetic Data Generation. CoRR abs/2303.17849 (2023) - 2022
- [c16]Koji Fujita, Toshiki Shibahara, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
Objection!: Identifying Misclassified Malicious Activities with XAI. ICC 2022: 2065-2070 - [c15]Satoshi Furutani, Toshiki Shibahara, Mitsuaki Akiyama, Masaki Aida:
Competitive Information Spreading on Modular Networks. NetSci-X 2022: 155-168 - [i3]Satoshi Furutani, Toshiki Shibahara, Mitsuaki Akiyama, Masaki Aida:
Interpreting Graph-based Sybil Detection Methods as Low-Pass Filtering. CoRR abs/2206.10835 (2022) - 2021
- [j6]Yuichiro Dan, Toshiki Shibahara, Junko Takahashi:
Timing Attack on Random Forests: Experimental Evaluation and Detailed Analysis. J. Inf. Process. 29: 757-768 (2021) - [c14]Yun Fan, Toshiki Shibahara, Yuichi Ohsita, Daiki Chiba, Mitsuaki Akiyama, Masayuki Murata:
Understanding Update of Machine-Learning-Based Malware Detection by Clustering Changes in Feature Attributions. IWSEC 2021: 99-118 - [i2]Takayuki Miura, Satoshi Hasegawa, Toshiki Shibahara:
MEGEX: Data-Free Model Extraction Attack against Gradient-Based Explainable AI. CoRR abs/2107.08909 (2021) - 2020
- [j5]Takuya Watanabe, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, Yuta Takata, Bo Sun, Yuta Ishii, Toshiki Shibahara, Takeshi Yagi, Tatsuya Mori:
Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library. IEICE Trans. Inf. Syst. 103-D(2): 276-291 (2020) - [c13]Taiga Hokaguchi, Yuichi Ohsita, Toshiki Shibahara, Daiki Chiba, Mitsuaki Akiyama, Masayuki Murata:
Detecting Malware-infected Hosts Using Templates of Multiple HTTP Requests. CCNC 2020: 1-2 - [c12]Satoshi Furutani, Toshiki Shibahara, Kunio Hato, Mitsuaki Akiyama, Masaki Aida:
Sybil Detection as Graph Filtering. GLOBECOM 2020: 1-6 - [c11]Yuichiro Dan, Toshiki Shibahara, Junko Takahashi:
Timing Attack on Random Forests for Generating Adversarial Examples. IWSEC 2020: 285-302 - [c10]Rina Okada, Zen Ishikura, Toshiki Shibahara, Satoshi Hasegawa:
Special-purpose Model Extraction Attacks: Stealing Coarse Model with Fewer Queries. TrustCom 2020: 1995-2000
2010 – 2019
- 2019
- [j4]Toshiki Shibahara, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato, Masayuki Murata:
Evasive Malicious Website Detection by Leveraging Redirection Subgraph Similarities. IEICE Trans. Inf. Syst. 102-D(3): 430-443 (2019) - [j3]Toshiki Shibahara, Takeshi Yagi, Mitsuaki Akiyama, Daiki Chiba, Kunio Hato:
Efficient Dynamic Malware Analysis for Collecting HTTP Requests using Deep Learning. IEICE Trans. Inf. Syst. 102-D(4): 725-736 (2019) - [c9]Toshiki Shibahara, Hirokazu Kodera, Daiki Chiba, Mitsuaki Akiyama, Kunio Hato, Ola Söderström, Daniel Dalek, Masayuki Murata:
Cross-Vendor Knowledge Transfer for Managed Security Services with Triplet Network. AISec@CCS 2019: 59-69 - [c8]Takuma Koyama, Toshiki Shibahara, Keita Hasegawa, Yasushi Okano, Masashi Tanaka, Yoshihito Oshima:
Anomaly Detection for Mixed Transmission CAN Messages Using Quantized Intervals and Absolute Difference of Payloads. AutoSec@CODASPY 2019: 19-24 - [c7]Satoshi Furutani, Toshiki Shibahara, Mitsuaki Akiyama, Kunio Hato, Masaki Aida:
Graph Signal Processing for Directed Graphs Based on the Hermitian Laplacian. ECML/PKDD (1) 2019: 447-463 - 2018
- [j2]Toshiki Shibahara, Kohei Yamanishi, Yuta Takata, Daiki Chiba, Taiga Hokaguchi, Mitsuaki Akiyama, Takeshi Yagi, Yuichi Ohsita, Masayuki Murata:
Event De-Noising Convolutional Neural Network for Detecting Malicious URL Sequences from Proxy Logs. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(12): 2149-2161 (2018) - [j1]Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Toshiki Shibahara, Tatsuya Mori, Shigeki Goto:
DomainProfiler: toward accurate and early discovery of domain names abused in future. Int. J. Inf. Sec. 17(6): 661-680 (2018) - 2017
- [c6]Toshiki Shibahara, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada:
Detecting Malicious Websites by Integrating Malicious, Benign, and Compromised Redirection Subgraph Similarities. COMPSAC (1) 2017: 655-664 - [c5]Toshiki Shibahara, Kohei Yamanishi, Yuta Takata, Daiki Chiba, Mitsuaki Akiyama, Takeshi Yagi, Yuichi Ohsita, Masayuki Murata:
Malicious URL sequence detection using event de-noising convolutional neural network. ICC 2017: 1-7 - [c4]Takuya Watanabe, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, Yuta Takata, Bo Sun, Yuta Ishii, Toshiki Shibahara, Takeshi Yagi, Tatsuya Mori:
Understanding the origins of mobile app vulnerabilities: a large-scale measurement study of free and paid apps. MSR 2017: 14-24 - [i1]Takuya Watanabe, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, Yuta Takata, Bo Sun, Yuta Ishii, Toshiki Shibahara, Takeshi Yagi, Tatsuya Mori:
A Study on the Vulnerabilities of Mobiles Apps associated with Software Modules. CoRR abs/1702.03112 (2017) - 2016
- [c3]Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Toshiki Shibahara, Takeshi Yada, Tatsuya Mori, Shigeki Goto:
DomainProfiler: Discovering Domain Names Abused in Future. DSN 2016: 491-502 - [c2]Toshiki Shibahara, Takeshi Yagi, Mitsuaki Akiyama, Daiki Chiba, Takeshi Yada:
Efficient Dynamic Malware Analysis Based on Network Behavior Using Deep Learning. GLOBECOM 2016: 1-7 - 2015
- [c1]Toshiki Shibahara, Takeshi Yagi, Mitsuaki Akiyama, Yuta Takata, Takeshi Yada:
POSTER: Detecting Malicious Web Pages based on Structural Similarity of Redirection Chains. CCS 2015: 1671-1673
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 21:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint