Daisuke Inoue
According to our database1,
Daisuke Inoue
authored at least 115 papers
between 2002 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
On csauthors.net:
Bibliography
2021
Optimal Transport-Based Coverage Control for Swarm Robot Systems: Generalization of the Voronoi Tessellation-Based Method.
IEEE Control. Syst. Lett., 2021
2020
Efficient Detection and Classification of Internet-of-Things Malware Based on Byte Sequences from Executable Files.
IEEE Open J. Comput. Soc., 2020
Real-Time Detection of Global Cyberthreat Based on Darknet by Estimating Anomalous Synchronization Using Graphical Lasso.
IEICE Trans. Inf. Syst., 2020
CoRR, 2020
CoRR, 2020
Artif. Life Robotics, 2020
Threat Alert Prioritization Using Isolation Forest and Stacked Auto Encoder With Day-Forward-Chaining Analysis.
IEEE Access, 2020
Physical Cell ID Detection Probability Using Synchronization Signals of NB-IoT Radio Interface in 28-GHz Band.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
ELF Analyzer Demo: Online Identification for IoT Malwares with Multiple Hardware Architectures.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020
Proceedings of the 15th Asia Joint Conference on Information Security, 2020
2019
J. Robotics Mechatronics, 2019
IEICE Trans. Inf. Syst., 2019
Real-Time Detection of Malware Activities by Analyzing Darknet Traffic Using Graphical Lasso.
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the Advances in Swarm Intelligence - 10th International Conference, 2019
Distributed Range-based Localization for Swarm Robot Systems using Sensor-fusion Technique.
Proceedings of the 8th International Conference on Sensor Networks, 2019
A scalable and accurate feature representation method for identifying malicious mobile applications.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Automated Threat-Alert Screening for Battling Alert Fatigue with Temporal Isolation Forest.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the Neural Information Processing - 26th International Conference, 2019
Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference, 2019
Byakko: Automatic Whitelist Generation based on Occurrence Distribution of Features of Network Traffic.
Proceedings of the 2019 IEEE International Conference on Big Data (Big Data), 2019
Proceedings of the 14th Asia Joint Conference on Information Security, 2019
2018
IEICE Trans. Inf. Syst., 2018
A Mechanism of Short-Term Image-Sticking Phenomenon Caused by Flexoelectric Effect in IPS LCD.
IEICE Trans. Electron., 2018
IEICE Trans. Inf. Syst., 2018
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018
Proceedings of the Neural Information Processing - 25th International Conference, 2018
Proceedings of the Eleventh International Conference on Mobile Computing and Ubiquitous Network, 2018
NRZ and PAM-4 Direct Modulation of 1.3µm Quantum Dot Lasers Grown Directly on On-Axis (001) Si.
Proceedings of the European Conference on Optical Communication, 2018
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018
Proceedings of the 13th Asia Joint Conference on Information Security, 2018
Proceedings of the 13th Asia Joint Conference on Information Security, 2018
2017
Wirel. Pers. Commun., 2017
Parallel Interaction Detection Algorithms for a Particle-based Live Controlled Real-time Microtubule Gliding Simulation System Accelerated by GPGPU.
New Gener. Comput., 2017
Proceedings of the 2017 IEEE SmartWorld, 2017
Proceedings of the Neural Information Processing - 24th International Conference, 2017
2016
IEEE Trans. Knowl. Data Eng., 2016
EAI Endorsed Trans. Self Adapt. Syst., 2016
Int. J. Autom. Comput., 2016
IEICE Trans. Electron., 2016
Towards Early Detection of Novel Attack Patterns through the Lens of a Large-Scale Darknet.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016
SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the Neural Information Processing - 23rd International Conference, 2016
Proceedings of the 11th Asia Joint Conference on Information Security, 2016
Proceedings of the 11th Asia Joint Conference on Information Security, 2016
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016
2015
An Original Entry Point Detection Method with Candidate-Sorting for More Effective Generic Unpacking.
IEICE Trans. Inf. Syst., 2015
IEICE Trans. Inf. Syst., 2015
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015
Proceedings of the 14th European Control Conference, 2015
Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2015
2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Cogn. Comput., 2014
Proceedings of the 4th International Conference on Image Processing Theory, 2014
2013
Demonstration of In-Car Doppler Laser Radar at 1.55 $ \mu\hbox{m}$ for Range and Speed Measurement.
IEEE Trans. Intell. Transp. Syst., 2013
Catching the Behavioral Differences between Multiple Executions for Malware Detection.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
IEICE Trans. Inf. Syst., 2013
Proceedings of the 2013 International Joint Conference on Neural Networks, 2013
Application of string kernel based support vector machine for malware packer identification.
Proceedings of the 2013 International Joint Conference on Neural Networks, 2013
Proceedings of the Neural Information Processing - 20th International Conference, 2013
Proceedings of the Neural Information Processing - 20th International Conference, 2013
Proceedings of the 10th International Conference on Fuzzy Systems and Knowledge Discovery, 2013
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013
Efficient Malware Packer Identification Using Support Vector Machines with Spectrum Kernel.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013
2012
IEEE Trans. Intell. Transp. Syst., 2012
J. Inf. Process., 2012
IEICE Trans. Commun., 2012
Color Filter Based on Surface Plasmon Resonance Utilizing Sub-Micron Periodic Hole Array in Aluminum Thin Film.
IEICE Trans. Electron., 2012
IEICE Trans. Inf. Syst., 2012
Nanophotonics Based on Semiconductor-Photonic Crystal/Quantum Dot and Metal-/Semiconductor-Plasmonics.
IEICE Trans. Electron., 2012
DAEDALUS-VIZ: novel real-time 3D visualization for darknet monitoring-based alert system.
Proceedings of the 9th International Symposium on Visualization for Cyber Security, 2012
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012
Proceedings of the Neural Information Processing - 19th International Conference, 2012
Proceedings of the Neural Information Processing - 19th International Conference, 2012
Proceedings of the Neural Information Processing - 19th International Conference, 2012
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012
2011
Sorting System for Recycling of Construction Byproducts with Bayes' Theorem-Based Robot Vision.
J. Robotics Mechatronics, 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
A Novel Malware Clustering Method Using Frequency of Function Call Traces in Parallel Threads.
IEICE Trans. Inf. Syst., 2011
An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation.
IEICE Trans. Inf. Syst., 2011
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011
Proceedings of the Neural Information Processing - 18th International Conference, 2011
Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011
nicter: a large-scale network incident analysis system: case studies for understanding threat landscape.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011
2010
Tracked-Vehicle Clutching Position Detectability on Bumps by Distributed Inclination Sensors.
J. Robotics Mechatronics, 2010
A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data.
IEICE Trans. Inf. Syst., 2010
Fine-Grain Feature Extraction from Malware's Scan Behavior Based on Spectrum Analysis.
IEICE Trans. Inf. Syst., 2010
An Empirical Study of Spam : Analyzing Spam Sending Systems and Malicious Web Servers.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010
Proceedings of the Neural Information Processing. Theory and Algorithms, 2010
Working Towards a Primary Binary Analysis System.
Proceedings of the 2010 International Conference on Security & Management, 2010
2009
IEICE Trans. Inf. Syst., 2009
Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring.
IEICE Trans. Inf. Syst., 2009
Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities.
IEICE Trans. Inf. Syst., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the Neural Information Processing, 16th International Conference, 2009
A Proposal of Malware Distinction Method Based on Scan Patterns Using Spectrum Analysis.
Proceedings of the Neural Information Processing, 16th International Conference, 2009
2008
An Incident Analysis System NICTER and Its Analysis Engines Based on Data Mining Techniques.
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008
Malware Behavior Analysis in Isolated Miniature Network for Revealing Malware's Network Activity.
Proceedings of IEEE International Conference on Communications, 2008
2004
Proceedings of the Applied Cryptography and Network Security, 2004
2002
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002