A privacy-preserving federated learning system for android malware detection based on edge computing RH Hsu, YC Wang, CI Fan, B Sun, T Ban, T Takahashi, TW Wu, SW Kao 2020 15th Asia Joint Conference on Information Security (AsiaJCIS), 128-136, 2020 | 60 | 2020 |
Understanding the origins of mobile app vulnerabilities: A large-scale measurement study of free and paid apps T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishi, ... 2017 IEEE/ACM 14th International Conference on Mining Software Repositories …, 2017 | 56 | 2017 |
Automation of vulnerability classification from its description using machine learning M Aota, H Kanehara, M Kubo, N Murata, B Sun, T Takahashi 2020 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2020 | 51 | 2020 |
Stay on-topic: Generating context-specific fake restaurant reviews M Juuti, B Sun, T Mori, N Asokan European Symposium on Research in Computer Security, 132-151, 2018 | 43 | 2018 |
Automating URL blacklist generation with similarity search approach B Sun, M Akiyama, T Yagi, M Hatada, T Mori IEICE TRANSACTIONS on Information and Systems 99 (4), 873-882, 2016 | 39 | 2016 |
Efficient detection and classification of internet-of-things malware based on byte sequences from executable files TL Wan, T Ban, SM Cheng, YT Lee, B Sun, R Isawa, T Takahashi, D Inoue IEEE Open Journal of the Computer Society 1, 262-275, 2020 | 26 | 2020 |
AutoBLG: Automatic URL blacklist generator using search space expansion and filters B Sun, M Akiyama, T Yagi, M Hatada, T Mori 2015 IEEE Symposium on Computers and Communication (ISCC), 625-631, 2015 | 19 | 2015 |
Understanding the security management of global third-party android marketplaces Y Ishii, T Watanabe, F Kanei, Y Takata, E Shioji, M Akiyama, T Yagi, ... Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market …, 2017 | 14 | 2017 |
Poster: Toward automating the generation of malware analysis reports using the sandbox logs B Sun, A Fujino, T Mori Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 14 | 2016 |
Impact of code deobfuscation and feature interaction in android malware detection YC Chen, HY Chen, T Takahashi, B Sun, TN Lin IEEE Access 9, 123208-123219, 2021 | 12 | 2021 |
IoT malware detection using function-call-graph embedding CY Wu, T Ban, SM Cheng, B Sun, T Takahashi 2021 18th International Conference on Privacy, Security and Trust (PST), 1-9, 2021 | 9 | 2021 |
Detecting android malware and classifying its families in large-scale datasets B Sun, T Takahashi, T Ban, D Inoue ACM Transactions on Management Information Systems (TMIS) 13 (2), 1-21, 2021 | 8 | 2021 |
A scalable and accurate feature representation method for identifying malicious mobile applications B Sun, T Ban, SC Chang, YS Sun, T Takahashi, D Inoue Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 1182-1189, 2019 | 8 | 2019 |
既知の悪性 URL 群と類似した特徴を持つ URL の検索 孫博, 秋山満昭, 八木毅, 森達哉 コンピュータセキュリティシンポジウム 2014 論文集 2014 (2), 1-8, 2014 | 8 | 2014 |
Automatically generating malware analysis reports using sandbox logs B Sun, A Fujino, T Mori, T Ban, T Takahashi, D Inoue IEICE TRANSACTIONS on Information and Systems 101 (11), 2622-2632, 2018 | 7 | 2018 |
Senseinput: An image-based sensitive input detection scheme for phishing website detection SC Lin, PC Wl, HY Chen, T Morikawa, T Takahashi, TN Lin ICC 2022-IEEE International Conference on Communications, 4180-4186, 2022 | 5 | 2022 |
Study on the vulnerabilities of free and paid mobile apps associated with software library T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishii, ... IEICE TRANSACTIONS on Information and Systems 103 (2), 276-291, 2020 | 5 | 2020 |
A study on the vulnerabilities of mobile apps associated with software modules T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishi, ... arXiv preprint arXiv:1702.03112, 2017 | 4 | 2017 |
Characterizing promotional attacks in mobile app store B Sun, X Luo, M Akiyama, T Watanabe, T Mori Applications and Techniques in Information Security: 8th International …, 2017 | 4 | 2017 |
Leveraging machine learning techniques to identify deceptive decoy documents associated with targeted email attacks B Sun, T Ban, C Han, T Takahashi, K Yoshioka, J Takeuchi, ... IEEE Access 9, 87962-87971, 2021 | 3 | 2021 |