Akira Yamada

Orcid: 0000-0001-7213-5834

Affiliations:
  • KDD Research and Development Laboratories, Inc., Saitama, Japan
  • University of Tohoku, Graduate School of Information Sciences, Miyagi, Japan (former)


According to our database1, Akira Yamada authored at least 31 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Designing a Location Trace Anonymization Contest.
Proc. Priv. Enhancing Technol., January, 2023

Detecting Malicious JavaScript Using Structure-Based Analysis of Graph Representation.
IEEE Access, 2023

2022
On recruiting and retaining users for security-sensitive longitudinal measurement panels.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

2021
Designing Personalized OS Update Message based on Security Behavior Stage Model.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

Phishing Site Detection Using Similarity of Website Structure.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

SeBeST: Security Behavior Stage Model and Its Application to OS Update.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
Human Factors in Homograph Attack Recognition.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Peek-a-boo, I Can See You, Forger: Influences of Human Demographics, Brand Familiarity and Security Backgrounds on Homograph Recognition.
CoRR, 2019

Detecting Malicious Websites by Query Templates.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2019

Hunting Brand Domain Forgery: A Scalable Classification for Homograph Attack.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

2018
Predicting Impending Exposure to Malicious Content from User Behavior.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Classification of Landing and Distribution Domains Using Whois' Text Mining.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

AI Web-Contents Analyzer for Monitoring Underground Marketplace.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

Self-Confidence Trumps Knowledge: A Cross-Cultural Study of Security Behavior.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
Empirical analysis of customer behavior for tiered data plans in mobile market.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

A Comprehensive Security Analysis Checksheet for OpenFlow Networks.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

On the implementation of path-based dynamic pricing in edge-directed routing.
Proceedings of the 2016 22nd Asia-Pacific Conference on Communications (APCC), 2016

2013
RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication.
Proceedings of the Financial Cryptography and Data Security, 2013

Passive OS Fingerprinting by DNS Traffic Analysis.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
LAP: Lightweight Anonymity and Privacy.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Understanding the time-series behavioral characteristics of evolutionally advanced email spammers.
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, 2012

2011
Web Tracking Site Detection Based on Temporal Link Analysis and Automatic Blacklist Generation.
J. Inf. Process., 2011

2010
Web Tracking Site Detection Based on Temporal Link Analysis.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2009
Service Independent Access Control Architecture for User Generated Content (UGC) and Its Implementation.
IEICE Trans. Inf. Syst., 2009

Visual similarity-based phishing detection without victim site information.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

Anomaly Detection for DNS Servers Using Frequent Host Selection.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Service Independent Access Control Architecture for User Generated Content (UGC).
Proceedings of the 2008 International Conference on Security & Management, 2008

2007
Intrusion Detection for Encrypted Web Accesses.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
L2VPN over Chord: Hosting Millions of Small Zeroconf Networks over DHT Nodes.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

2004
New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004


  Loading...