Mitsuaki Akiyama
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – today
- 2019
- [j26]Toshiki Shibahara, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato, Masayuki Murata:
Evasive Malicious Website Detection by Leveraging Redirection Subgraph Similarities. IEICE Transactions 102-D(3): 430-443 (2019) - [j25]Toshiki Shibahara, Takeshi Yagi, Mitsuaki Akiyama, Daiki Chiba, Kunio Hato:
Efficient Dynamic Malware Analysis for Collecting HTTP Requests using Deep Learning. IEICE Transactions 102-D(4): 725-736 (2019) - [j24]Tomofumi Nakamori, Daiki Chiba, Mitsuaki Akiyama, Shigeki Goto:
Detecting Dynamic IP Addresses and Cloud Blocks Using the Sequential Characteristics of PTR Records. JIP 27: 525-535 (2019) - [j23]Yuta Sawabe, Daiki Chiba, Mitsuaki Akiyama, Shigeki Goto:
Detection Method of Homograph Internationalized Domain Names with OCR. JIP 27: 536-544 (2019) - [j22]Shun Tobiyama, Yukiko Yamaguchi, Hirokazu Hasegawa, Hajime Shimada, Mitsuaki Akiyama, Takeshi Yagi:
Using Seq2Seq Model to Detect Infection Focusing on Behavioral Features of Processes. JIP 27: 545-554 (2019) - [c37]Ayako Akiyama Hasegawa, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama:
I know what you did last login: inconsistent messages tell existence of a target's account to insiders. ACSAC 2019: 732-746 - [c36]Toshiki Shibahara, Hirokazu Kodera, Daiki Chiba, Mitsuaki Akiyama, Kunio Hato, Ola Söderström, Daniel Dalek, Masayuki Murata:
Cross-Vendor Knowledge Transfer for Managed Security Services with Triplet Network. AISec@CCS 2019: 59-69 - [c35]Asuka Nakajima, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Maverick Woo:
A Pilot Study on Consumer IoT Device Vulnerability Disclosure and Patch Release in Japan and the United States. AsiaCCS 2019: 485-492 - [c34]Atsuko Natatsuka, Ryo Iijima, Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Tatsuya Mori:
Poster: A First Look at the Privacy Risks of Voice Assistant Apps. CCS 2019: 2633-2635 - [c33]Tatsuhiko Yasumatsu, Takuya Watanabe, Fumihiro Kanei, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori:
Understanding the Responsiveness of Mobile App Developers to Software Library Updates. CODASPY 2019: 13-24 - [c32]Naoki Fukushi, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
Exploration into Gray Area: Efficient Labeling for Malicious Domain Name Detection. COMPSAC (1) 2019: 770-775 - [c31]Fumihiro Kanei, Daiki Chiba, Kunio Hato, Mitsuaki Akiyama:
Precise and Robust Detection of Advertising Fraud. COMPSAC (1) 2019: 776-785 - [c30]Keika Mori, Takuya Watanabe, Yunao Zhou, Ayako Akiyama Hasegawa, Mitsuaki Akiyama, Tatsuya Mori:
Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits? EuroS&P Workshops 2019: 159-171 - [c29]Daiki Chiba, Ayako Akiyama Hasegawa, Takashi Koide, Yuta Sawabe, Shigeki Goto, Mitsuaki Akiyama:
DomainScouter: Understanding the Risks of Deceptive IDNs. RAID 2019: 413-426 - 2018
- [j21]Daiki Chiba
, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato, Tatsuya Mori, Shigeki Goto:
DomainChroma: Building actionable threat intelligence from malicious domain names. Computers & Security 77: 138-161 (2018) - [j20]Hiroki Nakano, Fumihiro Kanei, Yuta Takata, Mitsuaki Akiyama, Katsunari Yoshioka:
Towards Finding Code Snippets on a Question and Answer Website Causing Mobile App Vulnerabilities. IEICE Transactions 101-D(11): 2576-2583 (2018) - [j19]Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Hironori Washizaki, Tatsuya Mori:
Understanding the Inconsistency between Behaviors and Descriptions of Mobile Apps. IEICE Transactions 101-D(11): 2584-2599 (2018) - [j18]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Kazuhiko Ohkubo, Shigeki Goto:
Identifying Evasive Code in Malicious Websites by Analyzing Redirection Differences. IEICE Transactions 101-D(11): 2600-2611 (2018) - [j17]Toshiki Shibahara, Kohei Yamanishi, Yuta Takata, Daiki Chiba
, Taiga Hokaguchi, Mitsuaki Akiyama, Takeshi Yagi, Yuichi Ohsita, Masayuki Murata:
Event De-Noising Convolutional Neural Network for Detecting Malicious URL Sequences from Proxy Logs. IEICE Transactions 101-A(12): 2149-2161 (2018) - [j16]Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Youki Kadobayashi:
HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle. Int. J. Inf. Sec. 17(2): 135-151 (2018) - [j15]Daiki Chiba
, Takeshi Yagi, Mitsuaki Akiyama, Toshiki Shibahara, Tatsuya Mori, Shigeki Goto:
DomainProfiler: toward accurate and early discovery of domain names abused in future. Int. J. Inf. Sec. 17(6): 661-680 (2018) - [j14]Bo Sun, Xiapu Luo
, Mitsuaki Akiyama, Takuya Watanabe, Tatsuya Mori:
PADetective: A Systematic Approach to Automate Detection of Promotional Attackers in Mobile App Store. JIP 26: 212-223 (2018) - [c28]Elkana Pariwono, Daiki Chiba
, Mitsuaki Akiyama, Tatsuya Mori:
Don't throw me away: Threats Caused by the Abandoned Internet Resources Used by Android Apps. AsiaCCS 2018: 147-158 - [c27]Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Keito Sasaoka, Takeshi Yagi, Tatsuya Mori:
User Blocking Considered Harmful? An Attacker-Controllable Side Channel to Identify Social Accounts. EuroS&P 2018: 323-337 - [c26]Shun Tobiyama, Yukiko Yamaguchi, Hirokazu Hasegawa, Hajime Shimada, Mitsuaki Akiyama, Takeshi Yagi:
A method for estimating process maliciousness with Seq2Seq model. ICOIN 2018: 255-260 - [c25]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato, Shigeki Goto:
POSTER: Predicting Website Abuse Using Update Histories. WWW (Companion Volume) 2018: 9-10 - [i2]Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Keito Sasaoka, Takeshi Yagi, Tatsuya Mori:
User Blocking Considered Harmful? An Attacker-controllable Side Channel to Identify Social Accounts. CoRR abs/1805.05085 (2018) - 2017
- [j13]Mitsuaki Akiyama
, Takeshi Yagi, Takeshi Yada, Tatsuya Mori, Youki Kadobayashi:
Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots. Computers & Security 69: 155-173 (2017) - [j12]Yumehisa Haga, Yuta Takata, Mitsuaki Akiyama, Tatsuya Mori:
Building a Scalable Web Tracking Detection System: Implementation and the Empirical Study. IEICE Transactions 100-D(8): 1663-1670 (2017) - [j11]Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori:
Tracking the Human Mobility Using Mobile Device Sensors. IEICE Transactions 100-D(8): 1680-1690 (2017) - [j10]Yuta Ishii, Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori:
APPraiser: A Large Scale Analysis of Android Clone Apps. IEICE Transactions 100-D(8): 1703-1713 (2017) - [j9]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Shigeki Goto:
Fine-Grained Analysis of Compromised Websites with Redirection Graphs and JavaScript Traces. IEICE Transactions 100-D(8): 1714-1728 (2017) - [j8]Yasuyuki Tanaka, Mitsuaki Akiyama, Atsuhiro Goto:
Analysis of malware download sites by focusing on time series variation of malware. J. Comput. Science 22: 301-313 (2017) - [c24]Bo Sun, Xiapu Luo
, Mitsuaki Akiyama, Takuya Watanabe, Tatsuya Mori:
Characterizing Promotional Attacks in Mobile App Store. ATIS 2017: 113-127 - [c23]Daiki Chiba
, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Tatsuya Mori, Shigeki Goto:
DomainChroma: Providing Optimal Countermeasures against Malicious Domain Names. COMPSAC (1) 2017: 643-648 - [c22]Toshiki Shibahara, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada:
Detecting Malicious Websites by Integrating Malicious, Benign, and Compromised Redirection Subgraph Similarities. COMPSAC (1) 2017: 655-664 - [c21]Toshiki Shibahara, Kohei Yamanishi, Yuta Takata, Daiki Chiba
, Mitsuaki Akiyama, Takeshi Yagi, Yuichi Ohsita, Masayuki Murata:
Malicious URL sequence detection using event de-noising convolutional neural network. ICC 2017: 1-7 - [c20]Hideki Ogawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura, Mitsuaki Akiyama, Takeshi Yagi:
Malware originated HTTP traffic detection utilizing cluster appearance ratio. ICOIN 2017: 248-253 - [c19]Takuya Watanabe, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, Yuta Takata, Bo Sun, Yuta Ishii, Toshiki Shibahara, Takeshi Yagi, Tatsuya Mori:
Understanding the origins of mobile app vulnerabilities: a large-scale measurement study of free and paid apps. MSR 2017: 14-24 - [c18]Yuta Ishii, Takuya Watanabe, Fumihiro Kanei, Yuta Takata, Eitaro Shioji, Mitsuaki Akiyama, Takeshi Yagi, Bo Sun, Tatsuya Mori:
Understanding the security management of global third-party Android marketplaces. WAMA@ESEC/SIGSOFT FSE 2017: 12-18 - [c17]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Shigeki Goto:
Understanding Evasion Techniques that Abuse Differences Among JavaScript Implementations. WISE (2) 2017: 278-294 - [i1]Takuya Watanabe, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, Yuta Takata, Bo Sun, Yuta Ishii, Toshiki Shibahara, Takeshi Yagi, Tatsuya Mori:
A Study on the Vulnerabilities of Mobiles Apps associated with Software Modules. CoRR abs/1702.03112 (2017) - 2016
- [j7]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Shigeki Goto:
MineSpider: Extracting Hidden URLs Behind Evasive Drive-by Download Attacks. IEICE Transactions 99-D(4): 860-872 (2016) - [j6]Bo Sun, Mitsuaki Akiyama, Takeshi Yagi, Mitsuhiro Hatada, Tatsuya Mori:
Automating URL Blacklist Generation with Similarity Search Approach. IEICE Transactions 99-D(4): 873-882 (2016) - [j5]Daiki Chiba
, Takeshi Yagi, Mitsuaki Akiyama, Kazufumi Aoki, Takeo Hariu, Shigeki Goto:
BotProfiler: Detecting Malware-Infected Hosts by Profiling Variability of Malicious Infrastructure. IEICE Transactions 99-B(5): 1012-1023 (2016) - [c16]Shohei Hiruta, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura, Takeshi Yagi, Mitsuaki Akiyama:
Evaluation on Malware Classification by Session Sequence of Common Protocols. CANS 2016: 521-531 - [c15]Yuta Ishii, Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori:
Clone or Relative?: Understanding the Origins of Similar Android Apps. IWSPA@CODASPY 2016: 25-32 - [c14]Daiki Chiba
, Takeshi Yagi, Mitsuaki Akiyama, Toshiki Shibahara, Takeshi Yada, Tatsuya Mori, Shigeki Goto:
DomainProfiler: Discovering Domain Names Abused in Future. DSN 2016: 491-502 - [c13]Toshiki Shibahara, Takeshi Yagi, Mitsuaki Akiyama, Daiki Chiba
, Takeshi Yada:
Efficient Dynamic Malware Analysis Based on Network Behavior Using Deep Learning. GLOBECOM 2016: 1-7 - [c12]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Shigeki Goto:
Website Forensic Investigation to Identify Evidence and Impact of Compromise. SecureComm 2016: 431-453 - 2015
- [j4]Mitsuaki Akiyama, Takeshi Yagi, Youki Kadobayashi, Takeo Hariu, Suguru Yamaguchi:
Client Honeypot Multiplication with High Performance and Precise Detection. IEICE Transactions 98-D(4): 775-787 (2015) - [j3]Mitsuhiro Hatada, Mitsuaki Akiyama, Takahiro Matsuki, Takahiro Kasama:
Empowering Anti-malware Research in Japan by Sharing the MWS Datasets. JIP 23(5): 579-588 (2015) - [c11]Toshiki Shibahara, Takeshi Yagi, Mitsuaki Akiyama, Yuta Takata, Takeshi Yada:
POSTER: Detecting Malicious Web Pages based on Structural Similarity of Redirection Chains. ACM Conference on Computer and Communications Security 2015: 1671-1673 - [c10]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Shigeki Goto:
MineSpider: Extracting URLs from Environment-Dependent Drive-by Download Attacks. COMPSAC 2015: 444-449 - [c9]Bo Sun, Mitsuaki Akiyama, Takeshi Yagi, Mitsuhiro Hatada, Tatsuya Mori:
AutoBLG: Automatic URL blacklist generator using search space expansion and filters. ISCC 2015: 625-631 - [c8]Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Tatsuya Mori:
Understanding the Inconsistencies between Text Descriptions and the Use of Privacy-sensitive Resources of Mobile Apps. SOUPS 2015: 241-255 - [c7]Daiki Chiba
, Takeshi Yagi, Mitsuaki Akiyama, Kazufumi Aoki, Takeo Hariu, Shigeki Goto:
BotProfiler: Profiling Variability of Substrings in HTTP Requests to Detect Malware-Infected Hosts. TrustCom/BigDataSE/ISPA (1) 2015: 758-765 - [c6]Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori:
RouteDetector: Sensor-based Positioning System That Exploits Spatio-Temporal Regularity of Human Mobility. WOOT 2015 - 2013
- [j2]Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu:
Improved Blacklisting: Inspecting the Structural Neighborhood of Malicious URLs. IT Professional 15(4): 50-56 (2013) - [c5]Mitsuaki Akiyama, Takeshi Yagi, Kazufumi Aoki, Takeo Hariu, Youki Kadobayashi:
Active Credential Leakage for Observing Web-Based Attack Cycle. RAID 2013: 223-243 - 2012
- [c4]Gregory Blanc, Daisuke Miyamoto, Mitsuaki Akiyama, Youki Kadobayashi:
Characterizing Obfuscated JavaScript Using Abstract Syntax Trees: Experimenting with Malicious Scripts. AINA Workshops 2012: 344-351 - [c3]Mitsuaki Akiyama, Yuhei Kawakoya, Takeo Hariu:
Scalable and Performance-Efficient Client Honeypot on High Interaction System. SAINT 2012: 40-50 - 2011
- [c2]Mitsuaki Akiyama, Takeshi Yagi, Mitsutaka Itoh:
Searching Structural Neighborhood of Malicious URLs to Improve Blacklisting. SAINT 2011: 1-10 - 2010
- [j1]Mitsuaki Akiyama, Makoto Iwamura, Yuhei Kawakoya, Kazufumi Aoki, Mitsutaka Itoh:
Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks. IEICE Transactions 93-B(5): 1131-1139 (2010)
2000 – 2009
- 2007
- [c1]Mitsuaki Akiyama, Takanori Kawamoto, Masayoshi Shimamura, Teruaki Yokoyama, Youki Kadobayashi, Suguru Yamaguchi:
A Proposal of Metrics for Botnet Detection Based on Its Cooperative Behavior. SAINT Workshops 2007: 82
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org and opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy.
Citation data
Add a list of citing articles from to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter accout. At the same time, Twitter will persitently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2019-11-27 22:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint