Daisuke Inoue

According to our database1, Daisuke Inoue authored at least 115 papers between 2002 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Optimal Transport-Based Coverage Control for Swarm Robot Systems: Generalization of the Voronoi Tessellation-Based Method.
IEEE Control. Syst. Lett., 2021

2020
Efficient Detection and Classification of Internet-of-Things Malware Based on Byte Sequences from Executable Files.
IEEE Open J. Comput. Soc., 2020

Real-Time Detection of Global Cyberthreat Based on Darknet by Estimating Anomalous Synchronization Using Graphical Lasso.
IEICE Trans. Inf. Syst., 2020

Optimal Coverage Control for Swarm Robot Systems using a Mean Field Game.
CoRR, 2020

Traffic Signal Optimization on a Square Lattice using the D-Wave Quantum Annealer.
CoRR, 2020

Model Predictive Control for Finite Input Systems using the D-Wave Quantum Annealer.
CoRR, 2020

Separation of pedestrian counter flows with an array of obstacles.
Artif. Life Robotics, 2020

Threat Alert Prioritization Using Isolation Forest and Stacked Auto Encoder With Day-Forward-Chaining Analysis.
IEEE Access, 2020

Physical Cell ID Detection Probability Using Synchronization Signals of NB-IoT Radio Interface in 28-GHz Band.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

Cross Platform IoT- Malware Family Classification based on Printable Strings.
Proceedings of the 19th IEEE International Conference on Trust, 2020

ELF Analyzer Demo: Online Identification for IoT Malwares with Multiple Hardware Architectures.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

Toward Automated Smart Ships: Designing Effective Cyber Risk Management.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

IoT-Malware Detection Based on Byte Sequences of Executable Files.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

2019
Inspection Test of a Tunnel with an Inspection Vehicle for Tunnel Lining Concrete.
J. Robotics Mechatronics, 2019

A Cross-Platform Study on Emerging Malicious Programs Targeting IoT Devices.
IEICE Trans. Inf. Syst., 2019

Real-Time Detection of Malware Activities by Analyzing Darknet Traffic Using Graphical Lasso.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Stochastic Self-organizing Control for Swarm Robot Systems.
Proceedings of the Advances in Swarm Intelligence - 10th International Conference, 2019

Distributed Range-based Localization for Swarm Robot Systems using Sensor-fusion Technique.
Proceedings of the 8th International Conference on Sensor Networks, 2019

A scalable and accurate feature representation method for identifying malicious mobile applications.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Real-time botnet detection using nonnegative tucker decomposition.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Automated Threat-Alert Screening for Battling Alert Fatigue with Temporal Isolation Forest.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Combating Threat-Alert Fatigue with Online Anomaly Detection Using Isolation Forest.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

Establishing Trusted and Timely Information Source using Social Media Services.
Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference, 2019

Byakko: Automatic Whitelist Generation based on Occurrence Distribution of Features of Network Traffic.
Proceedings of the 2019 IEEE International Conference on Big Data (Big Data), 2019

Measurement Study Towards a Unified Firmware Updating Scheme for Legacy IoT Devices.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

2018
Automatically Generating Malware Analysis Reports Using Sandbox Logs.
IEICE Trans. Inf. Syst., 2018

A Mechanism of Short-Term Image-Sticking Phenomenon Caused by Flexoelectric Effect in IPS LCD.
IEICE Trans. Electron., 2018

FCReducer: Locating Symmetric Cryptographic Functions on the Memory.
IEICE Trans. Inf. Syst., 2018

Usable and Secure Cloud-based Biometric Authentication Solution for IoT Devices.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

Online Max-flow Learning via Augmenting and De-augmenting Path.
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018

Employ Decision Values for Soft-Classifier Evaluation with Crispy References.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

A Cross-Platform Study on IoT Malware.
Proceedings of the Eleventh International Conference on Mobile Computing and Ubiquitous Network, 2018

NRZ and PAM-4 Direct Modulation of 1.3µm Quantum Dot Lasers Grown Directly on On-Axis (001) Si.
Proceedings of the European Conference on Optical Communication, 2018

Evasive Malware via Identifier Implanting.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

A Lightweight Host-Based Intrusion Detection Based on Process Generation Patterns.
Proceedings of the 13th Asia Joint Conference on Information Security, 2018

Evaluating Disassembly-Code Based Similarity between IoT Malware Samples.
Proceedings of the 13th Asia Joint Conference on Information Security, 2018

2017
Malicious Events Grouping via Behavior Based Darknet Traffic Flow Analysis.
Wirel. Pers. Commun., 2017

Parallel Interaction Detection Algorithms for a Particle-based Live Controlled Real-time Microtubule Gliding Simulation System Accelerated by GPGPU.
New Gener. Comput., 2017

Practical darknet traffic analysis: Methods and case studies.
Proceedings of the 2017 IEEE SmartWorld, 2017

Detection of Botnet Activities Through the Lens of a Large-Scale Darknet.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

2016
Incremental and Decremental Max-Flow for Online Semi-Supervised Learning.
IEEE Trans. Knowl. Data Eng., 2016

Intelligence of reconstructed biomolecular motor system.
EAI Endorsed Trans. Self Adapt. Syst., 2016

Real-time 3D microtubule gliding simulation accelerated by GPU computing.
Int. J. Autom. Comput., 2016

Optical Filters Based on Nano-Sized Hole and Slit Patterns in Aluminum Films.
IEICE Trans. Electron., 2016

Towards Early Detection of Novel Attack Patterns through the Lens of a Large-Scale Darknet.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

Feature subset selection by SVM ensemble.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

Generating software identifier dictionaries from Vulnerability Database.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

The Usability of Metadata for Android Application Analysis.
Proceedings of the Neural Information Processing - 23rd International Conference, 2016

Comparing Malware Samples for Unpacking: A Feasibility Study.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

Integration of Multi-modal Features for Android Malware Detection Using Linear SVM.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

An Implementation of Visualization System for Vehicles and Pedestrians.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

2015
An Original Entry Point Detection Method with Candidate-Sorting for More Effective Generic Unpacking.
IEICE Trans. Inf. Syst., 2015

GHOST Sensor: A Proactive Cyber Attack Monitoring Platform.
IEICE Trans. Inf. Syst., 2015

A federated network online network traffics analysis engine for cybersecurity.
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015

A study on association rule mining of darknet big data.
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015

Replay attack detection in control systems with quantized signals.
Proceedings of the 14th European Control Conference, 2015

Using Bayesian Decision Making to Detect Slow Scans.
Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2015

2014
An Accurate Packer Identification Method Using Support Vector Machine.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

A Learner-Independent Knowledge Transfer Approach to Multi-task Learning.
Cogn. Comput., 2014

Tracking single microtubules by using B-spline curves and Hausdorff distance.
Proceedings of the 4th International Conference on Image Processing Theory, 2014

2013
Demonstration of In-Car Doppler Laser Radar at 1.55 $ \mu\hbox{m}$ for Range and Speed Measurement.
IEEE Trans. Intell. Transp. Syst., 2013

Dynamic class imbalance learning for incremental LPSVM.
Neural Networks, 2013

Catching the Behavioral Differences between Multiple Executions for Malware Detection.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Design and Implementation of Security for HIMALIS Architecture of Future Networks.
IEICE Trans. Inf. Syst., 2013

Chunk incremental IDR/QR LDA learning.
Proceedings of the 2013 International Joint Conference on Neural Networks, 2013

Application of string kernel based support vector machine for malware packer identification.
Proceedings of the 2013 International Joint Conference on Neural Networks, 2013

Generic Unpacking Method Based on Detecting Original Entry Point.
Proceedings of the Neural Information Processing - 20th International Conference, 2013

Referential kNN Regression for Financial Time Series Forecasting.
Proceedings of the Neural Information Processing - 20th International Conference, 2013

An incremental learning approach to continuous image change detection.
Proceedings of the 10th International Conference on Fuzzy Systems and Knowledge Discovery, 2013

The Carna Botnet Through the Lens of a Network Telescope.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

Efficient Malware Packer Identification Using Support Vector Machines with Spectrum Kernel.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
Amplitude-Modulated Laser Radar for Range and Speed Measurement in Car Applications.
IEEE Trans. Intell. Transp. Syst., 2012

Model Tests of Regolith Packaging Mechanism.
J. Robotics Mechatronics, 2012

Malware Sandbox Analysis with Efficient Observation of Herder's Behavior.
J. Inf. Process., 2012

Laser Radar Receiver Performance Improvement by Inter Symbol Interference.
IEICE Trans. Commun., 2012

Color Filter Based on Surface Plasmon Resonance Utilizing Sub-Micron Periodic Hole Array in Aluminum Thin Film.
IEICE Trans. Electron., 2012

Towards Cost-Effective P2P Traffic Classification in Cloud Environment.
IEICE Trans. Inf. Syst., 2012

Nanophotonics Based on Semiconductor-Photonic Crystal/Quantum Dot and Metal-/Semiconductor-Plasmonics.
IEICE Trans. Electron., 2012

DAEDALUS-VIZ: novel real-time 3D visualization for darknet monitoring-based alert system.
Proceedings of the 9th International Symposium on Visualization for Cyber Security, 2012

Malware Detection Method by Catching Their Random Behavior in Multiple Executions.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

A study on cost-effective P2P traffic classification.
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012

Training Minimum Enclosing Balls for Cross Tasks Knowledge Transfer.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

SDE-Driven Service Provision Control.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

Behavior Analysis of Long-term Cyber Attacks in the Darknet.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

An integrated security scheme for ID/locator split architecture of future network.
Proceedings of IEEE International Conference on Communications, 2012

Multipurpose Network Monitoring Platform Using Dynamic Address Assignment.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
Sorting System for Recycling of Construction Byproducts with Bayes' Theorem-Based Robot Vision.
J. Robotics Mechatronics, 2011

O-means: An Optimized Clustering Method for Analyzing Spam Based Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

A Novel Malware Clustering Method Using Frequency of Function Call Traces in Parallel Threads.
IEICE Trans. Inf. Syst., 2011

An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation.
IEICE Trans. Inf. Syst., 2011

Correlation Analysis between Spamming Botnets and Malware Infected Hosts.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

Entropy Based Discriminators for P2P Teletraffic Characterization.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011

nicter: a large-scale network incident analysis system: case studies for understanding threat landscape.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011

2010
Tracked-Vehicle Clutching Position Detectability on Bumps by Distributed Inclination Sensors.
J. Robotics Mechatronics, 2010

A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data.
IEICE Trans. Inf. Syst., 2010

Fine-Grain Feature Extraction from Malware's Scan Behavior Based on Spectrum Analysis.
IEICE Trans. Inf. Syst., 2010

An Empirical Study of Spam : Analyzing Spam Sending Systems and Malicious Web Servers.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

How to Locate a Target Binary Process and Its Derivatives in System Emulator.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

A Heuristic-Based Feature Selection Method for Clustering Spam Emails.
Proceedings of the Neural Information Processing. Theory and Algorithms, 2010

Working Towards a Primary Binary Analysis System.
Proceedings of the 2010 International Conference on Security & Management, 2010

2009
Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation.
IEICE Trans. Inf. Syst., 2009

Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring.
IEICE Trans. Inf. Syst., 2009

Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities.
IEICE Trans. Inf. Syst., 2009

Symmetricity of the Protocols Related to Oblivious Transfer.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

A Methodology for Analyzing Overall Flow of Spam-Based Attacks.
Proceedings of the Neural Information Processing, 16th International Conference, 2009

A Proposal of Malware Distinction Method Based on Scan Patterns Using Spectrum Analysis.
Proceedings of the Neural Information Processing, 16th International Conference, 2009

2008
Conditional Converge Cast.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

An Incident Analysis System NICTER and Its Analysis Engines Based on Data Mining Techniques.
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008

Malware Behavior Analysis in Isolated Miniature Network for Revealing Malware's Network Activity.
Proceedings of IEEE International Conference on Communications, 2008

2004
FDLKH: Fully Decentralized Key Management Scheme on Logical Key Hierarchy.
Proceedings of the Applied Cryptography and Network Security, 2004

2002
Scheme of standard MIDI files steganography and its evaluation.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002


  Loading...