Yuta Takata

Orcid: 0009-0008-2773-0659

According to our database1, Yuta Takata authored at least 27 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Investigations of Electronic Signatures for Construction of Trust Services.
IEICE Trans. Inf. Syst., September, 2023

Analysis of Privacy Compliance by Classifying Policies Before and After the Japanese Law Revision.
J. Inf. Process., 2023

Plausibility-Based Heuristics for Latent Space Classical Planning.
CoRR, 2023

Impact Analysis of Organizational Structure of Group Companies on Privacy Policies.
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023

2022
Money Talks: Detection of Disposable Phishing Websites by Analyzing Its Building Costs.
Proceedings of the 4th IEEE International Conference on Trust, 2022

Analysis of Privacy Compliance by Classifying Multiple Policies on the Web.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

2021
Risk Analysis of Cookie Sharing by Link Decoration and CNAME Cloaking.
J. Inf. Process., 2021

The Uncontrolled Web: Measuring Security Governance on the Web.
IEICE Trans. Inf. Syst., 2021

Fake News Detection via Biased User Profiles in Social Networking Sites.
Proceedings of the WI-IAT '21: IEEE/WIC/ACM International Conference on Web Intelligence, Melbourne VIC Australia, December 14, 2021

2020
Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library.
IEICE Trans. Inf. Syst., 2020

2019
Evasive Malicious Website Detection by Leveraging Redirection Subgraph Similarities.
IEICE Trans. Inf. Syst., 2019

2018
Identifying Evasive Code in Malicious Websites by Analyzing Redirection Differences.
IEICE Trans. Inf. Syst., 2018

Event De-Noising Convolutional Neural Network for Detecting Malicious URL Sequences from Proxy Logs.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Towards Finding Code Snippets on a Question and Answer Website Causing Mobile App Vulnerabilities.
IEICE Trans. Inf. Syst., 2018

POSTER: Predicting Website Abuse Using Update Histories.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

2017
Fine-Grained Analysis of Compromised Websites with Redirection Graphs and JavaScript Traces.
IEICE Trans. Inf. Syst., 2017

Building a Scalable Web Tracking Detection System: Implementation and the Empirical Study.
IEICE Trans. Inf. Syst., 2017

A Study on the Vulnerabilities of Mobiles Apps associated with Software Modules.
CoRR, 2017

Understanding Evasion Techniques that Abuse Differences Among JavaScript Implementations.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

Understanding the security management of global third-party Android marketplaces.
Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market Analytics, 2017

Understanding the origins of mobile app vulnerabilities: a large-scale measurement study of free and paid apps.
Proceedings of the 14th International Conference on Mining Software Repositories, 2017

Malicious URL sequence detection using event de-noising convolutional neural network.
Proceedings of the IEEE International Conference on Communications, 2017

Detecting Malicious Websites by Integrating Malicious, Benign, and Compromised Redirection Subgraph Similarities.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
MineSpider: Extracting Hidden URLs Behind Evasive Drive-by Download Attacks.
IEICE Trans. Inf. Syst., 2016

Website Forensic Investigation to Identify Evidence and Impact of Compromise.
Proceedings of the Security and Privacy in Communication Networks, 2016

2015
MineSpider: Extracting URLs from Environment-Dependent Drive-by Download Attacks.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

POSTER: Detecting Malicious Web Pages based on Structural Similarity of Redirection Chains.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015


  Loading...