Yukiko Yamaguchi

According to our database1, Yukiko Yamaguchi authored at least 44 papers between 1990 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enhancing Detection of Malicious Traffic Through FPGA-Based Frequency Transformation and Machine Learning.
IEEE Access, 2024

2023
Realtime Malicious Traffic Detection Targeted for TCP Out-of-Order Packets Based on FPGA.
IEEE Access, 2023

2022
Malware Detection by Control-Flow Graph Level Representation Learning With Graph Isomorphism Network.
IEEE Access, 2022

Malware Detection Using LightGBM With a Custom Logistic Loss Function.
IEEE Access, 2022

Cyber Attack Stage Tracing System based on Attack Scenario Comparison.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

Malware Detection using Attributed CFG Generated by Pre-trained Language Model with Graph Isomorphism Network.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

2021
Malware Detection Using Gradient Boosting Decision Trees with Customized Log Loss Function.
Proceedings of the International Conference on Information Networking, 2021

Incident Response Support System for Multi-Located Network by Correlation Analysis of Individual Events.
Proceedings of the ICISS 2021: The 4th International Conference on Information Science and Systems, 2021

Potential Security Risks of Internationalized Domain Name Processing for Hyperlink.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

2020
Identification of Cybersecurity Specific Content Using Different Language Models.
J. Inf. Process., 2020

Quantifying the Significance and Relevance of Cyber-Security Text Through Textual Similarity and Cyber-Security Knowledge Graph.
IEEE Access, 2020

Rogue AP Detection using Similarity of Backbone Delay Fluctuation Histogram.
Proceedings of the 2020 International Conference on Information Networking, 2020

Quantifying the Significance of Cybersecurity Text through Semantic Similarity and Named Entity Recognition.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

2019
Using Seq2Seq Model to Detect Infection Focusing on Behavioral Features of Processes.
J. Inf. Process., 2019

Rogue Wireless AP Detection using Delay Fluctuation in Backbone Network.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Identification of Cybersecurity Specific Content Using the Doc2Vec Language Model.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

2018
Detecting Privacy Information Abuse by Android Apps from API Call Logs.
Proceedings of the Advances in Information and Computer Security, 2018

A method for estimating process maliciousness with Seq2Seq model.
Proceedings of the 2018 International Conference on Information Networking, 2018

Malware Detection based on HTTPS Characteristic via Machine Learning.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

2017
Malware originated HTTP traffic detection utilizing cluster appearance ratio.
Proceedings of the 2017 International Conference on Information Networking, 2017

2016
An incident response support system based on seriousness of infection.
Proceedings of the 2016 International Conference on Information Networking, 2016

Malware Detection with Deep Neural Network Using Process Behavior.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

An Automated ACL Generation System for Secure Internal Network.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Evaluation on Malware Classification by Session Sequence of Common Protocols.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Malware Classification Method Based on Sequence of Traffic Flow.
Proceedings of the ICISSP 2015, 2015

2014
Unknown Attack Detection by Multistage One-Class SVM Focusing on Communication Interval.
Proceedings of the Neural Information Processing - 21st International Conference, 2014

Development of a Secure Traffic Analysis System to Trace Malicious Activities on Internal Networks.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

A Countermeasure Recommendation System against Targeted Attacks with Preserving Continuity of Internal Networks.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

2013
ARIGUMA Code Analyzer: Efficient Variant Detection by Identifying Common Instruction Sequences in Malware Families.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

2012
An Adaptive Honeypot System to Capture IPv6 Address Scans.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

2011
Memory Complexity of Parsimonious Strategy in Automated Trust Negotiation.
Inf. Media Technol., 2011

2009
Memory Complexity of Automated Trust Negotiation Strategies.
Proceedings of the Principles of Practice in Multi-Agent Systems, 2009

2006
Layered Speech-Act Annotation for Spoken Dialogue Corpus.
Proceedings of the Fifth International Conference on Language Resources and Evaluation, 2006

2005
Construction of Structurally Annotated Spoken Dialogue Corpus.
Proceedings of the Fifth Workshop on Asian Language Resources and First Symposium on Asian Language Resources Network, 2005

2004
Example-based spoken dialogue system with online example augmentation.
Proceedings of the 8th International Conference on Spoken Language Processing, 2004

CIAIR in-car speech database.
Proceedings of the 8th International Conference on Spoken Language Processing, 2004

Speech intention understanding based on decision tree learning.
Proceedings of the 8th International Conference on Spoken Language Processing, 2004

Speech understanding, dialogue management and response generation in corpus-based spoken dialogue system.
Proceedings of the 8th International Conference on Spoken Language Processing, 2004

2003
Example-based Spoken Dialogue System using WOZ System Log.
Proceedings of the SIGDIAL 2003 Workshop, 2003

Construction of an advanced in-car spoken dialogue corpus and its characteristic analysis.
Proceedings of the 8th European Conference on Speech Communication and Technology, EUROSPEECH 2003, 2003

2002
Example-based Speech Intention Understanding and Its Application to In-Car Spoken Dialogue System.
Proceedings of the 19th International Conference on Computational Linguistics, 2002

1993
Syntactic analysis and letter-to-phoneme conversion using neural networks - an application of neural networks to an english text-to-speech system.
Syst. Comput. Jpn., 1993

1990
A multi-language text-to-speech system using neural networks.
Proceedings of the ESCA Workshop on Speech Synthesis, 1990

A neural network approach to multi-language text-to-speech system.
Proceedings of the First International Conference on Spoken Language Processing, 1990


  Loading...