Hajime Shimada

According to our database1, Hajime Shimada authored at least 43 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enhancing Detection of Malicious Traffic Through FPGA-Based Frequency Transformation and Machine Learning.
IEEE Access, 2024

2023
Realtime Malicious Traffic Detection Targeted for TCP Out-of-Order Packets Based on FPGA.
IEEE Access, 2023

2022
Malware Detection by Control-Flow Graph Level Representation Learning With Graph Isomorphism Network.
IEEE Access, 2022

Malware Detection Using LightGBM With a Custom Logistic Loss Function.
IEEE Access, 2022

Cyber Attack Stage Tracing System based on Attack Scenario Comparison.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

Malware Detection using Attributed CFG Generated by Pre-trained Language Model with Graph Isomorphism Network.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

2021
Japanese Activities to bring online academic meetings against COVID-19: How We Learned to Stop Worrying and Love the Online Meetings.
Proceedings of the 2021 ACM SIGUCCS Annual Conference, 2021

Malware Detection Using Gradient Boosting Decision Trees with Customized Log Loss Function.
Proceedings of the International Conference on Information Networking, 2021

Incident Response Support System for Multi-Located Network by Correlation Analysis of Individual Events.
Proceedings of the ICISS 2021: The 4th International Conference on Information Science and Systems, 2021

Potential Security Risks of Internationalized Domain Name Processing for Hyperlink.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

2020
Identification of Cybersecurity Specific Content Using Different Language Models.
J. Inf. Process., 2020

Quantifying the Significance and Relevance of Cyber-Security Text Through Textual Similarity and Cyber-Security Knowledge Graph.
IEEE Access, 2020

Rogue AP Detection using Similarity of Backbone Delay Fluctuation Histogram.
Proceedings of the 2020 International Conference on Information Networking, 2020

Quantifying the Significance of Cybersecurity Text through Semantic Similarity and Named Entity Recognition.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

2019
Using Seq2Seq Model to Detect Infection Focusing on Behavioral Features of Processes.
J. Inf. Process., 2019

Rogue Wireless AP Detection using Delay Fluctuation in Backbone Network.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Identification of Cybersecurity Specific Content Using the Doc2Vec Language Model.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

2018
Detecting Privacy Information Abuse by Android Apps from API Call Logs.
Proceedings of the Advances in Information and Computer Security, 2018

A method for estimating process maliciousness with Seq2Seq model.
Proceedings of the 2018 International Conference on Information Networking, 2018

Malware Detection based on HTTPS Characteristic via Machine Learning.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

2017
Malware originated HTTP traffic detection utilizing cluster appearance ratio.
Proceedings of the 2017 International Conference on Information Networking, 2017

2016
Energy Reduction of BTB by Focusing on Number of Branches per Cache Line.
J. Inf. Process., 2016

Improvement of Data Utilization Efficiency for Cache Memory by Compressing Frequent Bit Sequences.
IEICE Trans. Electron., 2016

An incident response support system based on seriousness of infection.
Proceedings of the 2016 International Conference on Information Networking, 2016

Malware Detection with Deep Neural Network Using Process Behavior.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

An Automated ACL Generation System for Secure Internal Network.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Evaluation on Malware Classification by Session Sequence of Common Protocols.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
BTB Energy Reduction by Focusing on Useless Accesses.
IEICE Trans. Electron., 2015

Malware Classification Method Based on Sequence of Traffic Flow.
Proceedings of the ICISSP 2015, 2015

Reliability-configurable mixed-grained reconfigurable array compatible with high-level synthesis.
Proceedings of the 20th Asia and South Pacific Design Automation Conference, 2015

2014
Reliability-Configurable Mixed-Grained Reconfigurable Array Supporting C-Based Design and Its Irradiation Testing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Unknown Attack Detection by Multistage One-Class SVM Focusing on Communication Interval.
Proceedings of the Neural Information Processing - 21st International Conference, 2014

Development of a Secure Traffic Analysis System to Trace Malicious Activities on Internal Networks.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

A Countermeasure Recommendation System against Targeted Attacks with Preserving Continuity of Internal Networks.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

2011
A Fine-Grained Runtime Power/Performance Optimization Method for Processors with Adaptive Pipeline Depth.
J. Comput. Sci. Technol., 2011

An Instruction Mapping Scheme for FU Array Accelerator.
IEICE Trans. Inf. Syst., 2011

An efficient and reliable 1.5-way processor by fusion of space and time redundancies.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2011), 2011

2010
A Minimal Roll-Back Based Recovery Scheme for Fault Toleration in Pipeline Processors.
Proceedings of the 16th IEEE Pacific Rim International Symposium on Dependable Computing, 2010

A Stage-Level Recovery Scheme in Scalable Pipeline Modules for High Dependability.
Proceedings of the International Workshop on Innovative Architecture for Future Generation High Performance Processors and Systems, 2010

2008
A Dynamic Control Mechanism for Pipeline Stage Unification by Identifying Program Phases.
IEICE Trans. Inf. Syst., 2008

2007
Optimal pipeline depth with pipeline stage unification adoption.
SIGARCH Comput. Archit. News, 2007

2005
Program Phase Detection Based Dynamic Control Mechanisms for Pipeline Stage Unification Adoption.
Proceedings of the High-Performance Computing - 6th International Symposium, 2005

2003
Pipeline stage unification: a low-energy consumption technique for future mobile processors.
Proceedings of the 2003 International Symposium on Low Power Electronics and Design, 2003


  Loading...