


default search action
Yong Jin 0001
Person information
- affiliation: Institute of Science Tokyo, Center for Information Infrastructure, Japan
- affiliation (PhD 2012): Okayama University, Center of Information Technology and Management, Japan
Other persons with the same name
- Yong Jin — disambiguation page
- Yong Jin 0002
— Henan University, School of Artificial Intelligence, Faculty of Computer and Information Engineering, Kaifeng, China (and 1 more) - Yong Jin 0003
— Changshu Institute of Technology, School of Computer Science and Engineering, China (and 1 more) - Yong Jin 0004
— North University of China, School of Information and Communication Engineering, Taiyuan, China (and 1 more) - Yong Jin 0005 — Hanyang University, School of Electrical and Computer Engineering, Seoul, Korea
- Yong Jin 0006
— Shanghai University of Traditional Chinese Medicine, Department of Academic Affairs, China - Yong Jin 0007 — Zhejiang University, Department of Mathematics, Hangzhou, China
- Yong Jin 0008 — Peking University, Software Institute, School of Electronics Engineering and Computer Science, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j16]Satoru Sunahara, Yong Jin, Katsuyoshi Iida, Nariyoshi Yamai, Yoshiaki Takai:
A Privacy-Preserving Full DNS over HTTPS Architecture via Compatible NS Record Based Information Sharing. IEICE Trans. Commun. 109(2): 291-304 (2026)- 2025
[j15]Hikaru Ichise
, Yong Jin
, Katsuyoshi Iida
:
RPZ-Based Suspicious Direct Outbound DNS Traffic Detection Mechanism With Adaptive Policy Updates. IEEE Access 13: 30694-30704 (2025)
[j14]Satoru Sunahara
, Yong Jin
, Katsuyoshi Iida
, Yoshiaki Takai
:
A Framework for Institutional Privacy Considered Full DNS Over HTTPS Architecture. IEEE Access 13: 36951-36964 (2025)
[j13]Yong Jin
, Kazuya Iguchi, Nariyoshi Yamai, Rei Nakagawa, Toshio Murakami:
An Accelerated Integrity-Secured Name Resolution Architecture Using Two Full-Service Resolvers with and without DNSSEC Validation in Parallel. IEICE Trans. Inf. Syst. 108(6): 517-525 (2025)
[j12]Rikima Mitsuhashi
, Yong Jin
, Katsuyoshi Iida, Yoshiaki Takai:
DGA-Based Malware Communication Detection from DoH Traffic Using Hierarchical Machine Learning Analysis. IEICE Trans. Inf. Syst. 108(6): 526-534 (2025)- 2024
[c54]Hayato Sagara, Yong Jin, Katsuyoshi Iida, Yoshiaki Takai:
Privacy Preserved IoT Data Inquiry System using DoT. CIoT 2024: 1-6
[c53]Satoru Sunahara, Yong Jin, Katsuyoshi Iida, Nariyoshi Yamai, Yoshiaki Takai:
Privacy Preserved Achievement Method for OCSP Status and Supported Protocols in Full-DoH Architecture. COMPSAC 2024: 1554-1555
[c52]Xiuyuan Chen, Nariyoshi Yamai, Rei Nakagawa, Tomoaki Tsutsumi, Yong Jin:
Usability Enhancement of IMAP Agent System with Considering Privacy Preservation Using Docker Container. ICTC 2024: 78-83
[c51]Yong Jin
, Satoshi Matsuura
, Masahiko Tomoishi
:
How to Survive Private Data Leak Incidents in Campus IT Systems? SIGUCCS 2024: 44-46- 2023
[j11]Rikima Mitsuhashi
, Yong Jin
, Katsuyoshi Iida
, Takahiro Shinagawa
, Yoshiaki Takai
:
Malicious DNS Tunnel Tool Recognition Using Persistent DoH Traffic Analysis. IEEE Trans. Netw. Serv. Manag. 20(2): 2086-2095 (2023)
[c50]Rikima Mitsuhashi
, Yong Jin, Katsuyoshi Iida, Takahiro Shinagawa
, Yoshiaki Takai:
Detection of DGA-based Malware Communications from DoH Traffic Using Machine Learning Analysis. CCNC 2023: 224-229
[c49]Yong Jin, Masahiko Tomoishi:
A Named-Entity-based TTP-free Authentication and Authorization Architecture for IoT Systems. COMPSAC 2023: 985-986
[c48]Nariyoshi Yamai, Yong Jin, Toshio Murakami, Rei Nakagawa:
Verification Method of Associated Domain Names Using Certificates by Applying DNS over TLS to Authoritative Servers. COMPSAC 2023: 1000-1001
[c47]Toshio Murakami, Kenta Shimabukuro, Nao Sato, Rei Nakagawa, Yong Jin, Nariyoshi Yamai:
Trustworthy Name Resolution Using TLS Certificates with DoT-enabled Authoritative DNS Servers. COMPSAC 2023: 1121-1126
[c46]Satoru Sunahara
, Yong Jin
, Katsuyoshi Iida
:
Authoritative DNS Server Discovery Method to Enhance DNS Privacy Preservation. StudentWorkshop@CoNEXT 2023: 31-32
[c45]Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai:
Trigger-based Blocking Mechanism for Access to Email-derived Phishing URLs with User Alert. ICEIC 2023: 1-6
[c44]Hikaru Ichise, Yong Jin, Katsuyoshi Iida:
Policy-based Detection and Blocking System against Abnormal Applications by Analyzing DNS Traffic. ISCIT 2023: 1-6
[c43]Yong Jin
, Satoshi Matsuura
, Takao Kondo
, Tatsumi Hosokawa
, Masahiko Tomoishi
:
A Lightweight Abnormality Detection Mechanism by Stray Packets Analysis. SIGUCCS 2023: 9-11- 2022
[c42]Yong Jin, Kazuya Iguchi, Nariyoshi Yamai, Masahiko Tomoishi:
Acceleration of a Client Based DNSSEC Validation System in Parallel with Two Full-Service Resolvers. ICACT 2022: 387-392
[c41]Yong Jin, Zhengxu Jin, Nariyoshi Yamai, Rei Nakagawa:
An OpenFlow based Optimal Selection Mechanism for Multiple Web Servers. ICCCM 2022: 263-268
[c40]Satoru Sunahara, Yong Jin, Katsuyoshi Iida:
A proposal of DoH-based domain name resolution architecture including authoritative DNS servers. ITNAC 2022: 1-3- 2021
[c39]Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai:
Secure Remote Monitoring and Cipher Data Sharing for IoT Healthcare System with Privacy Preservation. ICCBDC 2021: 46-51
[c38]Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai:
Anomaly Detection on User Terminals Based on Outbound Traffic Filtering by DNS Query Monitoring and Application Program Identification. ICHMI 2021: 47-56
[c37]Rikima Mitsuhashi
, Akihiro Satoh, Yong Jin, Katsuyoshi Iida
, Takahiro Shinagawa
, Yoshiaki Takai:
Identifying Malicious DNS Tunnel Tools from DoH Traffic Using Hierarchical Machine Learning Classification. ISC 2021: 238-256- 2020
[j10]Hikaru Ichise, Yong Jin, Katsuyoshi Iida
, Yoshiaki Takai:
NS record History Based Abnormal DNS traffic Detection Considering Adaptive Botnet Communication Blocking. J. Inf. Process. 28: 112-122 (2020)
[c36]Yuki Iuchi, Yong Jin, Hikaru Ichise, Katsuyoshi Iida
, Yoshiaki Takai:
Detection and Blocking of DGA-based Bot Infected Computers by Monitoring NXDOMAIN Responses. CSCloud/EdgeCom 2020: 82-87
[c35]Masahiro Ishii, Satoshi Matsuura, Kento Mori, Masahiko Tomoishi, Yong Jin, Yoshiaki Kitaguchi:
A Study of Classification of Texts into Categories of Cybersecurity Incident and Attack with Topic Models. ICISSP 2020: 639-646
[c34]Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai:
A Detour Strategy for Visiting Phishing URLs Based on Dynamic DNS Response Policy Zone. ISNCC 2020: 1-6
2010 – 2019
- 2019
[c33]Yong Jin, Masahiko Tomoishi, Satoshi Matsuura:
Detection of Hijacked Authoritative DNS Servers by Name Resolution Traffic Classification. IEEE BigData 2019: 6084-6085
[c32]Yong Jin, Masahiko Tomoishi, Kenji Fujikawa, Ved P. Kafle
:
A Lightweight and Secure IoT Remote Monitoring Mechanism Using DNS with Privacy Preservation. CCNC 2019: 1-2
[c31]Yong Jin, Masahiko Tomoishi:
Encrypted QR Code Based Optical Challenge-Response Authentication by Mobile Devices for Mounting Concealed File System. COMPSAC (2) 2019: 676-681
[c30]Yong Jin, Masahiko Tomoishi:
A Secure End-to-End Key Exchange Mechanism by Cooperation of Multiple Devices Using QR Codes. ITNAC 2019: 1-7
[c29]Yong Jin, Masahiko Tomoishi, Satoshi Matsuura:
A Detection Method Against DNS Cache Poisoning Attacks Using Machine Learning Techniques: Work in Progress. NCA 2019: 1-3
[c28]Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai:
Anomaly Detection by Monitoring Unintended DNS Traffic on Wireless Network. PACRIM 2019: 1-6- 2018
[j9]Hikaru Ichise, Yong Jin, Katsuyoshi Iida
:
Analysis of DNS TXT Record Usage and Consideration of Botnet Communication Detection. IEICE Trans. Commun. 101-B(1): 70-79 (2018)
[j8]Yong Jin, Masahiko Tomoishi, Satoshi Matsuura, Yoshiaki Kitaguchi:
A Secure In-Depth File System Concealed by GPS-Based Mounting Authentication for Mobile Devices. IEICE Trans. Inf. Syst. 101-D(11): 2612-2621 (2018)
[j7]Hiroya Ikarashi, Yong Jin, Nariyoshi Yamai, Naoya Kitagawa, Kiyohiko Okayama:
Design and Implementation of SDN-Based Proactive Firewall System in Collaboration with Domain Name Resolution. IEICE Trans. Inf. Syst. 101-D(11): 2633-2643 (2018)
[c27]Hikaru Ichise, Yong Jin, Katsuyoshi Iida
, Yoshiaki Takai:
Detection and Blocking of Anomaly DNS Traffic by Analyzing Achieved NS Record History. APSIPA 2018: 1586-1590
[c26]Takashi Yamanoue, Hiroki Kashiwazaki, Yong Jin, Ruediger Gad:
Message from the ADMNET 2018 Workshop Organizers. COMPSAC (2) 2018: 191-192
[c25]Yong Jin, Kunitaka Kakoi, Nariyoshi Yamai, Naoya Kitagawa, Masahiko Tomoishi:
A Client Based Anomaly Traffic Detection and Blocking Mechanism by Monitoring DNS Name Resolution with User Alerting Feature. CW 2018: 351-356
[c24]Yong Jin, Masahiko Tomoishi, Satoshi Matsuura, Yoshiaki Kitaguchi:
A Secure Container-based Backup Mechanism to Survive Destructive Ransomware Attacks. ICNC 2018: 1-6
[c23]Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai:
A Client Based DNSSEC Validation Mechanism with Recursive DNS Server Separation. ICTC 2018: 148-153- 2017
[j6]Yong Jin, Kunitaka Kakoi, Nariyoshi Yamai
, Naoya Kitagawa, Masahiko Tomoishi:
A Client Based DNSSEC Validation System with Adaptive Alert Mechanism Considering Minimal Client Timeout. IEICE Trans. Inf. Syst. 100-D(8): 1751-1761 (2017)
[c22]Kunitaka Kakoi, Yong Jin, Nariyoshi Yamai, Naoya Kitagawa, Masahiko Tomoishi:
Cache Function Activation on a Client Based DNSSEC Validation and Alert System by Multithreading. COMPSAC (2) 2017: 37-42
[c21]Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai:
A Secure and Lightweight IoT Device Remote Monitoring and Control Mechanism Using DNS. COMPSAC (2) 2017: 282-283
[c20]Yong Jin, Masahiko Tomoishi, Satoshi Matsuura:
An In-depth Concealed File System with GPS Authentication Adaptable for Multiple Locations. COMPSAC (1) 2017: 608-613
[c19]Yong Jin, Kunitaka Kakoi, Masahiko Tomoishi, Nariyoshi Yamai:
Efficient detection of suspicious DNS traffic by resolver separation per application program. ICTC 2017: 87-92- 2016
[c18]Takashi Yamanoue, Hiroki Kashiwazaki, Seigo Kishiba, Yong Jin:
Message from the ADMNET Workshop Organizers. COMPSAC Workshops 2016: 1
[c17]Yong Jin, Kenji Fujikawa, Hiroaki Harai, Masataka Ohta:
Design and Implementation of Secure Prefetch Mechanism for Multi-step Name Resolution in DNS. COMPSAC Workshops 2016: 2-7
[c16]Kunitaka Kakoi, Yong Jin, Nariyoshi Yamai
, Naoya Kitagawa, Masahiko Tomoishi:
Design and Implementation of a Client Based DNSSEC Validation and Alert System. COMPSAC Workshops 2016: 8-13
[c15]Yong Jin, Masahiko Tomoishi, Satoshi Matsuura:
Design of a Concealed File System Adapted for Mobile Devices Based on GPS Information. COMPSAC 2016: 459-464
[c14]Yong Jin, Masahiko Tomoishi, Satoshi Matsuura:
Enhancement of VPN Authentication Using GPS Information with Geo-Privacy Protection. ICCCN 2016: 1-6
[c13]Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai
:
An advanced client based DNSSEC validation and preliminary evaluations toward realization. ICTC 2016: 178-183- 2015
[j5]Yong Jin, Nariyoshi Yamai
, Kiyohiko Okayama, Motonori Nakamura:
Design and Implementation of Optimal Route Selection Mechanism for Outbound Connections on IPv6 Multihoming Environment. J. Inf. Process. 23(4): 441-448 (2015)
[c12]Yong Jin, Masahiko Tomoishi:
Web server performance enhancement by suppressing network traffic for high performance client. APNOMS 2015: 448-451
[c11]Tomokazu Otsuka, Gada, Nariyoshi Yamai
, Kiyohiko Okayama, Yong Jin:
Design and Implementation of Client IP Notification Feature on DNS for Proactive Firewall System. COMPSAC Workshops 2015: 127-132
[c10]Yong Jin, Kenji Fujikawa, Hiroaki Harai, Masataka Ohta:
Secure Glue: A Cache and Zone Transfer Considering Automatic Renumbering. COMPSAC 2015: 393-398
[c9]Hikaru Ichise, Yong Jin, Katsuyoshi Iida
:
Detection Method of DNS-based Botnet Communication Using Obtained NS Record History. COMPSAC Workshops 2015: 676-677
[c8]Yong Jin, Hikaru Ichise, Katsuyoshi Iida
:
Design of Detecting Botnet Communication by Monitoring Direct Outbound DNS Queries. CSCloud 2015: 37-41
[c7]Hikaru Ichise, Yong Jin, Katsuyoshi Iida
:
Analysis of via-resolver DNS TXT queries and detection possibility of botnet communications. PACRIM 2015: 216-221- 2013
[j4]Yong Jin, Takuya Yamaguchi, Nariyoshi Yamai, Kiyohiko Okayama, Motonori Nakamura:
A Site-Exit Router Selection Method Using Routing Header in IPv6 Site Multihoming. Inf. Media Technol. 8(3): 757-765 (2013)
[j3]Yong Jin, Takuya Yamaguchi, Nariyoshi Yamai
, Kiyohiko Okayama, Motonori Nakamura:
A Site-Exit Router Selection Method Using Routing Header in IPv6 Site Multihoming. J. Inf. Process. 21(3): 441-449 (2013)
[c6]Takuya Yamaguchi, Yong Jin, Nariyoshi Yamai
, Kiyohiko Okayama, Koki Okamoto, Motonori Nakamura:
An Optimal Route Selection Mechanism for Outbound Connection on IPv6 Site Multihoming Environment. COMPSAC Workshops 2013: 575-580- 2012
[j2]Yong Jin, Nariyoshi Yamai, Kiyohiko Okayama, Motonori Nakamura:
An Adaptive Route Selection Mechanism Per Connection Based on Multipath DNS Round Trip Time on Multihomed Networks. Inf. Media Technol. 7(2): 831-840 (2012)
[j1]Yong Jin, Nariyoshi Yamai
, Kiyohiko Okayama, Motonori Nakamura:
An Adaptive Route Selection Mechanism Per Connection Based on Multipath DNS Round Trip Time on Multihomed Networks. J. Inf. Process. 20(2): 386-395 (2012)
[c5]Takuya Yamaguchi, Yong Jin, Ryoichi Tokumoto, Nariyoshi Yamai
, Kiyohiko Okayama, Motonori Nakamura:
Multihoming Method Using Routing Header in IPv6 Environment. SAINT 2012: 351-356- 2011
[c4]Yong Jin, Nariyoshi Yamai
:
Proposal of an Adaptive Firewall System in Collaboration with Extended DNS. SAINT 2011: 222-225- 2010
[c3]Yong Jin, Nariyoshi Yamai
, Kiyohiko Okayama, Motonori Nakamura:
An Adaptive Route Selection Mechanism per Connection Based on Multipath DNS Round Trip Time on Multihomed Networks. SAINT 2010: 52-58
[c2]Takumi Seike, Yong Jin, Nariyoshi Yamai
, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura:
A Solution for Mail Forwarding Problem of SPF by Tracing Recipient Addresses. SAINT 2010: 129-132
[c1]Sho Jitsuto, Yong Jin, Kiyohiko Okayama, Nariyoshi Yamai
:
A Dynamic Routing Method for Inbound E-mail Delivery Considering Route and MTA Conditions on Multihomed Environment. SAINT 2010: 245-248
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-03-06 21:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







