default search action
Daiki Chiba 0001
Person information
- affiliation: NTT, Tokyo, Japan
- affiliation (PhD 2017): Waseda University, Tokyo, Japan
Other persons with the same name
- Daiki Chiba 0002 — The University of Tokyo, Japan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Ryo Kawaoka, Daiki Chiba, Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori:
Longitudinal Measurement Study of the Domain Names Associated With the Olympic Games. IEEE Access 12: 19128-19144 (2024) - [j21]Hiroki Nakano, Daiki Chiba, Takashi Koide, Naoki Fukushi, Takeshi Yagi, Takeo Hariu, Katsunari Yoshioka, Tsutomu Matsumoto:
Understanding Characteristics of Phishing Reports from Experts and Non-Experts on Twitter. IEICE Trans. Inf. Syst. 107(7): 807-824 (2024) - [c31]Naoki Fukushi, Toshiki Shibahara, Hiroki Nakano, Takashi Koide, Daiki Chiba:
Noisy Label Detection for Multi-labeled Malware. CCNC 2024: 165-171 - [c30]Ko Fujimori, Toshiki Shibahara, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
Evaluation of Adversarial Examples Based on Original Definition. HCI (62) 2024: 36-43 - [i6]Takashi Koide, Naoki Fukushi, Hiroki Nakano, Daiki Chiba:
ChatSpamDetector: Leveraging Large Language Models for Effective Phishing Email Detection. CoRR abs/2402.18093 (2024) - 2023
- [c29]Hiroki Nakano, Daiki Chiba, Takashi Koide, Naoki Fukushi, Takeshi Yagi, Takeo Hariu, Katsunari Yoshioka, Tsutomu Matsumoto:
Canary in Twitter Mine: Collecting Phishing Reports from Experts and Non-experts. ARES 2023: 6:1-6:12 - [c28]Takashi Koide, Naoki Fukushi, Hiroki Nakano, Daiki Chiba:
PhishReplicant: A Language Model-based Approach to Detect Generated Squatting Domain Names. ACSAC 2023: 1-13 - [c27]Masanori Yajima, Daiki Chiba, Yoshiro Yoneya, Tatsuya Mori:
A First Look at Brand Indicators for Message Identification (BIMI). PAM 2023: 479-495 - [i5]Hiroki Nakano, Daiki Chiba, Takashi Koide, Naoki Fukushi, Takeshi Yagi, Takeo Hariu, Katsunari Yoshioka, Tsutomu Matsumoto:
Canary in Twitter Mine: Collecting Phishing Reports from Experts and Non-experts. CoRR abs/2303.15847 (2023) - [i4]Takashi Koide, Naoki Fukushi, Hiroki Nakano, Daiki Chiba:
Detecting Phishing Sites Using ChatGPT. CoRR abs/2306.05816 (2023) - [i3]Takashi Koide, Naoki Fukushi, Hiroki Nakano, Daiki Chiba:
PhishReplicant: A Language Model-based Approach to Detect Generated Squatting Domain Names. CoRR abs/2310.11763 (2023) - 2022
- [j20]Daiki Chiba, Mitsuaki Akiyama, Yuto Otsuki, Hiroki Hada, Takeshi Yagi, Tobias Fiebig, Michel van Eeten:
DomainPrio: Prioritizing Domain Name Investigations to Improve SOC Efficiency. IEEE Access 10: 34352-34368 (2022) - [j19]Hiroki Nakano, Daiki Chiba, Takashi Koide, Mitsuaki Akiyama, Katsunari Yoshioka, Tsutomu Matsumoto:
Exploring Event-synced Navigation Attacks across User-generated Content Platforms in the Wild. J. Inf. Process. 30: 372-387 (2022) - [j18]Naoki Fukushi, Takashi Koide, Daiki Chiba, Hiroki Nakano, Mitsuaki Akiyama:
Understanding Security Risks of Ad-based URL Shortening Services Caused by Users' Behaviors. J. Inf. Process. 30: 865-877 (2022) - [c26]Koji Fujita, Toshiki Shibahara, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
Objection!: Identifying Misclassified Malicious Activities with XAI. ICC 2022: 2065-2070 - 2021
- [j17]Takashi Koide, Daiki Chiba, Mitsuaki Akiyama, Katsunari Yoshioka, Tsutomu Matsumoto:
To Get Lost is to Learn the Way: An Analysis of Multi-Step Social Engineering Attacks on the Web. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(1): 162-181 (2021) - [j16]Naomi Kuze, Shu Ishikura, Takeshi Yagi, Daiki Chiba, Masayuki Murata:
Classification of diversified web crawler accesses inspired by biological adaptation. Int. J. Bio Inspired Comput. 17(3): 165-173 (2021) - [j15]Naoki Fukushi, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
A Comprehensive Measurement of Cloud Service Abuse. J. Inf. Process. 29: 93-102 (2021) - [j14]Takashi Koide, Daiki Chiba, Mitsuaki Akiyama, Katsunari Yoshioka, Tsutomu Matsumoto:
Understanding the Fake Removal Information Advertisement Sites. J. Inf. Process. 29: 392-405 (2021) - [j13]Kazuya Nomura, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
Auto-creation of Robust Android Malware Family Trees. J. Inf. Process. 29: 801-811 (2021) - [c25]Hiroki Nakano, Daiki Chiba, Takashi Koide, Mitsuaki Akiyama:
Detecting Event-synced Navigation Attacks across User-generated Content Platforms. COMPSAC 2021: 704-713 - [c24]Masanori Yajima, Daiki Chiba, Yoshiro Yoneya, Tatsuya Mori:
Measuring Adoption of DNS Security Mechanisms with Cross-Sectional Approach. GLOBECOM 2021: 1-6 - [c23]Kazuya Nomura, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
Auto-creation of Android Malware Family Tree. ICC 2021: 1-6 - [c22]Yun Fan, Toshiki Shibahara, Yuichi Ohsita, Daiki Chiba, Mitsuaki Akiyama, Masayuki Murata:
Understanding Update of Machine-Learning-Based Malware Detection by Clustering Changes in Feature Attributions. IWSEC 2021: 99-118 - [c21]Ryo Kawaoka, Daiki Chiba, Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori:
A First Look at COVID-19 Domain Names: Origin and Implications. PAM 2021: 39-53 - [c20]Naoki Fukushi, Takashi Koide, Daiki Chiba, Hiroki Nakano, Mitsuaki Akiyama:
Analyzing Security Risks of Ad-Based URL Shortening Services Caused by Users' Behaviors. SecureComm (2) 2021: 3-22 - [i2]Ryo Kawaoka, Daiki Chiba, Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori:
A First Look at COVID-19 Domain Names: Origin and Implications. CoRR abs/2102.05290 (2021) - 2020
- [j12]Naoki Fukushi, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
Exploration into Gray Area: Toward Efficient Labeling for Detecting Malicious Domain Names. IEICE Trans. Commun. 103-B(4): 375-388 (2020) - [j11]Daiki Chiba, Ayako Akiyama Hasegawa, Takashi Koide, Yuta Sawabe, Shigeki Goto, Mitsuaki Akiyama:
DomainScouter: Analyzing the Risks of Deceptive Internationalized Domain Names. IEICE Trans. Inf. Syst. 103-D(7): 1493-1511 (2020) - [j10]Fumihiro Kanei, Daiki Chiba, Kunio Hato, Katsunari Yoshioka, Tsutomu Matsumoto, Mitsuaki Akiyama:
Detecting and Understanding Online Advertising Fraud in the Wild. IEICE Trans. Inf. Syst. 103-D(7): 1512-1523 (2020) - [c19]Taiga Hokaguchi, Yuichi Ohsita, Toshiki Shibahara, Daiki Chiba, Mitsuaki Akiyama, Masayuki Murata:
Detecting Malware-infected Hosts Using Templates of Multiple HTTP Requests. CCNC 2020: 1-2 - [c18]Takashi Koide, Daiki Chiba, Mitsuaki Akiyama:
To Get Lost is to Learn the Way: Automatically Collecting Multi-step Social Engineering Attacks on the Web. AsiaCCS 2020: 394-408 - [c17]Naoki Fukushi, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
A Large-scale Analysis of Cloud Service Abuse. CNS 2020: 1-9 - [c16]Takashi Koide, Daiki Chiba, Mitsuaki Akiyama, Katsunari Yoshioka, Tsutomu Matsumoto:
It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites. DIMVA 2020: 171-191 - [c15]Takayuki Tomatsuri, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
Time-series Measurement of Parked Domain Names. GLOBECOM 2020: 1-6
2010 – 2019
- 2019
- [j9]Toshiki Shibahara, Takeshi Yagi, Mitsuaki Akiyama, Daiki Chiba, Kunio Hato:
Efficient Dynamic Malware Analysis for Collecting HTTP Requests using Deep Learning. IEICE Trans. Inf. Syst. 102-D(4): 725-736 (2019) - [j8]Tomofumi Nakamori, Daiki Chiba, Mitsuaki Akiyama, Shigeki Goto:
Detecting Dynamic IP Addresses and Cloud Blocks Using the Sequential Characteristics of PTR Records. J. Inf. Process. 27: 525-535 (2019) - [j7]Yuta Sawabe, Daiki Chiba, Mitsuaki Akiyama, Shigeki Goto:
Detection Method of Homograph Internationalized Domain Names with OCR. J. Inf. Process. 27: 536-544 (2019) - [c14]Toshiki Shibahara, Hirokazu Kodera, Daiki Chiba, Mitsuaki Akiyama, Kunio Hato, Ola Söderström, Daniel Dalek, Masayuki Murata:
Cross-Vendor Knowledge Transfer for Managed Security Services with Triplet Network. AISec@CCS 2019: 59-69 - [c13]Naoki Fukushi, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
Exploration into Gray Area: Efficient Labeling for Malicious Domain Name Detection. COMPSAC (1) 2019: 770-775 - [c12]Fumihiro Kanei, Daiki Chiba, Kunio Hato, Mitsuaki Akiyama:
Precise and Robust Detection of Advertising Fraud. COMPSAC (1) 2019: 776-785 - [c11]Hiroaki Suzuki, Daiki Chiba, Yoshiro Yoneya, Tatsuya Mori, Shigeki Goto:
ShamFinder: An Automated Framework for Detecting IDN Homographs. Internet Measurement Conference 2019: 449-462 - [c10]Daiki Chiba, Ayako Akiyama Hasegawa, Takashi Koide, Yuta Sawabe, Shigeki Goto, Mitsuaki Akiyama:
DomainScouter: Understanding the Risks of Deceptive IDNs. RAID 2019: 413-426 - [i1]Hiroaki Suzuki, Daiki Chiba, Yoshiro Yoneya, Tatsuya Mori, Shigeki Goto:
ShamFinder: An Automated Framework for Detecting IDN Homographs. CoRR abs/1909.07539 (2019) - 2018
- [j6]Daiki Chiba, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato, Tatsuya Mori, Shigeki Goto:
DomainChroma: Building actionable threat intelligence from malicious domain names. Comput. Secur. 77: 138-161 (2018) - [j5]Toshiki Shibahara, Kohei Yamanishi, Yuta Takata, Daiki Chiba, Taiga Hokaguchi, Mitsuaki Akiyama, Takeshi Yagi, Yuichi Ohsita, Masayuki Murata:
Event De-Noising Convolutional Neural Network for Detecting Malicious URL Sequences from Proxy Logs. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(12): 2149-2161 (2018) - [j4]Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Toshiki Shibahara, Tatsuya Mori, Shigeki Goto:
DomainProfiler: toward accurate and early discovery of domain names abused in future. Int. J. Inf. Sec. 17(6): 661-680 (2018) - [c9]Elkana Pariwono, Daiki Chiba, Mitsuaki Akiyama, Tatsuya Mori:
Don't throw me away: Threats Caused by the Abandoned Internet Resources Used by Android Apps. AsiaCCS 2018: 147-158 - 2017
- [c8]Daiki Chiba, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Tatsuya Mori, Shigeki Goto:
DomainChroma: Providing Optimal Countermeasures against Malicious Domain Names. COMPSAC (1) 2017: 643-648 - [c7]Toshiki Shibahara, Kohei Yamanishi, Yuta Takata, Daiki Chiba, Mitsuaki Akiyama, Takeshi Yagi, Yuichi Ohsita, Masayuki Murata:
Malicious URL sequence detection using event de-noising convolutional neural network. ICC 2017: 1-7 - 2016
- [j3]Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Kazufumi Aoki, Takeo Hariu, Shigeki Goto:
BotProfiler: Detecting Malware-Infected Hosts by Profiling Variability of Malicious Infrastructure. IEICE Trans. Commun. 99-B(5): 1012-1023 (2016) - [c6]Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Toshiki Shibahara, Takeshi Yada, Tatsuya Mori, Shigeki Goto:
DomainProfiler: Discovering Domain Names Abused in Future. DSN 2016: 491-502 - [c5]Toshiki Shibahara, Takeshi Yagi, Mitsuaki Akiyama, Daiki Chiba, Takeshi Yada:
Efficient Dynamic Malware Analysis Based on Network Behavior Using Deep Learning. GLOBECOM 2016: 1-7 - [c4]Naomi Kuze, Shu Ishikura, Takeshi Yagi, Daiki Chiba, Masayuki Murata:
Detection of vulnerability scanning using features of collective accesses based on information collected from multiple honeypots. NOMS 2016: 1067-1072 - 2015
- [c3]Naomi Kuze, Shu Ishikura, Takeshi Yagi, Daiki Chiba, Masayuki Murata:
Crawler classification using ant-based clustering scheme. ICITST 2015: 84-89 - [c2]Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Kazufumi Aoki, Takeo Hariu, Shigeki Goto:
BotProfiler: Profiling Variability of Substrings in HTTP Requests to Detect Malware-Infected Hosts. TrustCom/BigDataSE/ISPA (1) 2015: 758-765 - 2013
- [j2]Daiki Chiba, Kazuhiro Tobe, Tatsuya Mori, Shigeki Goto:
Analyzing Spatial Structure of IP Addresses for Detecting Malicious Websites. Inf. Media Technol. 8(3): 855-866 (2013) - [j1]Daiki Chiba, Kazuhiro Tobe, Tatsuya Mori, Shigeki Goto:
Analyzing Spatial Structure of IP Addresses for Detecting Malicious Websites. J. Inf. Process. 21(3): 539-550 (2013) - 2012
- [c1]Daiki Chiba, Kazuhiro Tobe, Tatsuya Mori, Shigeki Goto:
Detecting Malicious Websites by Learning IP Address Features. SAINT 2012: 29-39
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-02 01:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint