Follow
Shuichiro Haruta
Shuichiro Haruta
KDDI Research, Inc.
Verified email at kddi.com
Title
Cited by
Cited by
Year
Visual similarity-based phishing detection scheme using image and CSS with target website finder
S Haruta, H Asahina, I Sasase
GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-6, 2017
312017
Obfuscated malicious javascript detection scheme using the feature based on divided URL
S Morishige, S Haruta, H Asahina, I Sasase
2017 23rd Asia-Pacific Conference on Communications (APCC), 1-6, 2017
172017
A preprocessing by using multiple steganography for intentional image downsampling on CNN-based steganalysis
H Kato, K Osuge, S Haruta, I Sasase
IEEE Access 8, 195578-195593, 2020
92020
A novel visual similarity-based phishing detection scheme using hue information with auto updating database
S Haruta, F Yamazaki, H Asahina, I Sasase
2019 25th Asia-Pacific Conference on Communications (APCC), 280-285, 2019
92019
Traceroute-based target link flooding attack detection scheme by analyzing hop count to the destination
K Sakuma, H Asahina, S Haruta, I Sasase
2017 23rd Asia-Pacific Conference on Communications (APCC), 1-6, 2017
92017
Android malware detection scheme based on level of SSL server certificate
H Kato, S Haruta, I Sasase
IEICE TRANSACTIONS on Information and Systems 103 (2), 379-389, 2020
62020
Debiasing graph transfer learning via item semantic clustering for cross-domain recommendations
Z Li, D Amagata, Y Zhang, T Hara, S Haruta, K Yonekawa, M Kurokawa
2022 IEEE International Conference on Big Data (Big Data), 762-769, 2022
52022
A preprocessing methodology by using additional steganography on cnn-based steganalysis
H Kato, K Osuge, S Haruta, I Sasase
GLOBECOM 2020-2020 IEEE Global Communications Conference, 1-6, 2020
42020
A server-based distributed storage using secret sharing with AES-256 for lightweight safety restoration
S Choi, S Haruta, Y An, I Sasase
IEICE TRANSACTIONS on Information and Systems 103 (7), 1647-1659, 2020
32020
Traffic feature-based botnet detection scheme emphasizing the importance of long patterns
Y An, S Haruta, S Choi, I Sasase
Image Processing and Communications: Techniques, Algorithms and Applications …, 2020
32020
Hue signature auto update system for visual similarity-based phishing detection with tolerance to zero-day attack
S Haruta, H Asahina, F Yamazaki, I Sasase
IEICE TRANSACTIONS on Information and Systems 102 (12), 2461-2471, 2019
32019
Semantic Relation Transfer for Non-overlapped Cross-domain Recommendations
Z Li, D Amagata, Y Zhang, T Hara, S Haruta, K Yonekawa, M Kurokawa
Pacific-Asia Conference on Knowledge Discovery and Data Mining, 271-283, 2023
22023
An energy-efficient defense against message flooding attacks in delay tolerant networks
H Asahina, K Arai, S Haruta, PT Mathiopoulos, I Sasase
IEICE Transactions on Communications 104 (4), 348-359, 2021
22021
Encounter record reduction scheme based on theoretical contact probability for flooding attack mitigation in DTN
K Arai, S Haruta, H Asahina, I Sasase
2018 24th Asia-Pacific Conference on Communications (APCC), 34-39, 2018
22018
A website fingerprinting attack based on the virtual memory of the process on Android devices
T Okazaki, H Kato, S Haruta, I Sasase
2021 26th IEEE Asia-Pacific Conference on Communications (APCC), 7-12, 2021
12021
A Server-Based Distributed Storage Using Secret Sharing with AES-256 for Lightweight Safety Restoration
C Sanghun, H Shuichiro, A Yichen, S Iwao
IEICE Transactions on Information and Systems 103 (7), 1647-1659, 2020
12020
Android malware detection scheme based on level of SSL server certificate
H Kato, S Haruta, I Sasase
2019 IEEE Global Communications Conference (GLOBECOM), 1-6, 2019
12019
Traceroute-based target link flooding attack detection scheme by analyzing hop count to the destination
H Asahina, K Sakuma, S Haruta, H Kato, I Sasase
IEICE Communications Express 8 (7), 251-256, 2019
12019
Trust-based Sybil nodes detection with robust seed selection and graph pruning on SNS
S Haruta, K Toyoda, I Sasase
IEICE Transactions on Communications 99 (5), 1002-1011, 2016
12016
Monetary Fair Battery-based Load Hiding Scheme for Multiple Households in Automatic Meter Reading System
R Negishi, S Haruta, C Inamura, K Toyoda, I Sasase
Journal of Telecommunications and Information Technology, 2016
12016
The system can't perform the operation now. Try again later.
Articles 1–20