学術論文 |
- "FedFusion: Adaptive Model Fusion for Addressing Feature Discrepancies in Federated Credit Card Fraud Detection," IEEE Access, Sep. 2024
- Nahid Ferdous Aurna, Md Delwar Hossain, Latifur Khan, Yuzo Taenaka, Youki Kadobayashi
[ doi:10.1109/ACCESS.2024.3464333 ]
- "Web-Biometrics for User Authenticity Verification in Zero Trust Access Control," IEEE Access, vol.12, pp129611-129622, Jun. 2024
- Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi, Doudou Fall
[ doi:10.1109/ACCESS.2024.3413696 ]
- "Interdependency Attack-aware Secure and Performant Virtual Machine Allocation Policies with Low Attack Efficiency and Coverage," IEEE Access, vol.12, pp74944-74960, May. 2024
- Bernard Ousmane Sane, Mandicou Ba, Doudou Fall, Yuzo Taenaka, Ibrahima Niang, Youki Kadobayashi
[ doi:10.1109/ACCESS.2024.3404949 ]
- "Electricity Theft Detection for Smart Homes: Harnessing the Power of Machine Learning with Real and Synthetic Attacks," IEEE Access, vol.12, pp26023-26045, Feb. 2024
- Olufemi Abiodun Abraham, Hideya Ochiai, HOSSAIN Md Delwar, Yuzo Taenaka, Youki Kadobayashi
[ NAISTレポジトリ ] [ doi:10.1109/ACCESS.2024.3366493 ]
- "Modbus/RS-485 Attack Detection on Communication Signals with Machine Learning," IEEE Communications Magazine, 2023.6
- Hideya Ochiai, HOSSAIN Md Delwar, Pawissakan Chirupphapa, 門林 雄基, Hiroshi Esaki
- "Mitigation of ADS-B Spoofing Attack Impact on Departure Sequencing through Modulated Synchronous Taxiing Approach," IEEE Open Journal of Intelligent Transportation Systems, Jun. 2023
- Mohd Ruzeiny Kamaruzzaman, HOSSAIN Md Delwar, Yuzo Taenaka, Youki Kadobayashi
[ doi:10.1109/OJITS.2023.3286881 ]
- "Smart home cybersecurity awareness and behavioral incentives," Information & Computer Security, Jun. 2023
- N'guessan Yves-Roland Douha, Karen Renaud, Yuzo Taenaka, Youki Kadobayashi
[ doi:10.1108/ICS-03-2023-0032 ]
- "Design and implementation of a sandbox for facilitating and automating IoT malware analysis with techniques to elicit malicious behavior: case studies of functionalities for dissecting IoT malware," Journal of Computer Virology and Hacking Techniques, vol.19, pp149-163, May. 2023
- Shun Yonamine, Yuzo Taenaka, Youki Kadobayashi, Daisuke Miyamoto
[ doi:10.1007/s11416-023-00478-x ]
- "An Evolutionary Game Theoretic Analysis of Cybersecurity Investment Strategies for Smart-Home Users against Cyberattacks," Applied Sciences, vol.13, no.7, Apr. 2023
- N’guessan Yves-Roland Douha, Masahiro Sasabe, Yuzo Taenaka, Youki Kadobayashi
[ doi:10.3390/app13074645 ]
- "Towards Autonomous Driving Model Resistant to Adversarial Attack," Applied Artificial Intelligence, Mar. 2023
- Kabid Hassan Shibly, HOSSAIN Md Delwar, 井上 博之, 妙中 雄三, 門林 雄基
[ doi:10.1080/08839514.2023.2193461 ]
- "Oblivious Statistic Collection with Local Differential Privacy in Mutual Distrust," IEEE Access, vol.11, pp21374-21386, Mar. 2023
- Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi
[ doi:10.1109/ACCESS.2023.3251560 ]
- "A Survey on Blockchain, SDN and NFV for the Smart-Home Security," Internet of Things, Aug. 2022
- N'guessan Yves-Roland Douha, Monowar Bhuyan, Shigeru Kashihara, Doudou Fall, Yuzo Taenaka, Youki Kadobayashi
[ doi:10.1016/j.iot.2022.100588 ]
- "DeL-IoT: A deep ensemble learning approach to uncover anomalies in IoT," Internet of Things, vol.14, pp100391, Jun. 2021
- Enkhtur Tsogbaatar, Monowar H. Bhuyan, Yuzo Taenaka, Doudou Fall, Fall Doudou, Erik Elmroth, Youki Kadobayashi
[ doi:10.1016/j.iot.2021.100391 ]
- "LSTM-Based Intrusion Detection System for In-Vehicle Can Bus Communications," IEEE Access, vol.8, pp185489-185502, Nov. 2020
- Md Delwar Hossain, Hiroyuki Inoue, Hideya Ochiai, Fall Doudou, Youki Kadobayashi
[ doi:10.1109/ACCESS.2020.3029307 ]
- "LSTM-based Intrusion Detection System for In-Vehicle CAN Bus Communications," IEEE Access, Sep. 2020
- Md Delwar Hossain, Hiroyuki Inoue, Hideya Ochiai, Fall Doudou, Youki Kadobayashi
- "Hierarchical Load Balancing and Clustering Technique for Home Edge Computing," IEEE Access, Jul. 2020
- Cheikh Saliou Mbacke Babou, Fall Doudou, Shigeru Kashihara, Yuzo Taenaka, Monowar H. Bhuyan, Ibrahima Niang, Youki Kadobayashi
[ doi:10.1109/ACCESS.2020.3007944 ]
- "A Demographic Perspective of Smartphone Security and its Redesigned Notifications," Journal of Information Processing (JIP), Dec. 2019
- Jema David Ndibwile, Edith Talina Luhanga, Fall Doudou, Youki Kadobayashi
- "Comprehensive Survey of IPv6 Transition Technologies: A Subjective Classification for Security Analysis," IEICE Transactions on Communications, vol.E102-B, no.10, Oct. 2019
- Gábor Lencse, Youki Kadobayashi
- "An Empirical Approach to Phishing Countermeasures through Smart Glasses and Validation Agents," IEEE Access, vol.7, pp130758-130771, Sep. 2019
- Jema David Ndibwile, Edith Talina Luhanga, Fall Doudou, Daisuke Miyamoto, Gregory Blanc, Youki Kadobayashi
[ doi:10.1109/ACCESS.2019.2940669 ]
- "A normative decision-making model for cyber security", Information & Computer Security," Information & Computer Security, Jun. 2019
- Andrew M'manga, Shamal Faily, John McAlaney, Chris Williams, Youki Kadobayashi, Daisuke Miyamoto
[ doi:10.1108/ICS-01-2019-0021 ]
- "Proposal of Cyber Security Game Practice Tool Secure-One," Transactions of Information Processing Society of Japan, vol.41, no.12, pp2264-2271, Dec. 2018
- Tan Omiya, Daisuke Miyamoto, Youki Kadobayashi
- "Methodology for DNS Cache Poisoning Vulnerability Analysis of DNS64 Implementations," Infocommunications Journal, vol.10, no.2, pp13-25, Jun. 2018
- Gábor Lencse, Youki Kadobayashi
- "Benchmarking DNS64 Implementations: Theory and Practice," Computer Communications, vol.127, no.1, pp61-74, May. 2018
- Gábor Lencse, Youki Kadobayashi
- "Methodology for the identification of potential security issues of different IPv6 transition technologies: Threat analysis of DNS64 and stateful NAT64," Computers & Security, vol.77, no.1, pp397-411, Apr. 2018
- Gábor Lencse, Youki Kadobayashi
- "Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment," Security and Communication Networks, vol.2018, Feb. 2018
- Ady Wahyudi Paundu, Fall Doudou, Daisuke Miyamoto, Youki Kadobayashi
- "Web of Cybersecurity: Linking, Locating, and Discovering Structured Cybersecurity Information," International Journal of Communication Systems, Oct. 2017
- Takeshi Takahashi, Bhola Panta, Youki Kadobayashi, Koji Nakao
- "Benchmarking Methodology for DNS64 Servers," Computer Communications, vol.109, no.1, pp162-175, Jun. 2017
- G. Lencse, M. Georgescu, Youki Kadobayashi
- "HoneyCirculator: Distributing Credential Honeytoken for Introspection of Web-based Attack Cycle," International Journal of Information Security 2017, Jan. 2017
- Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Tatsuya Mori, Youki Kadobayashi
- "Risk Adaptive Authorization Mechanism (RAdAM) for Cloud Computing," Journal of Information Processing (JIP), vol.24, no.2, Mar. 2016
- Fall Doudou, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi
- "Conceptualizing Player-Side Emergence in Interactive Games: Between Hardcoded Software and the Human Mind in Papers, Please and Gone Home," International Journal of Gaming and Computer-Mediated Simulations (IJGCMS), vol.7, no.3, Aug. 2015
- Christopher Michael Yap, Youki Kadobayashi, Suguru Yamaguchi
- "Security Risk Quantification Mechanism for Infrastructure as a Service Cloud Computing Platforms," Journal of Information Processing, vol.23, no.4, pp465-475, Jul. 2015
- Doudou Fall, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi
- "Client Honeypot Multiplication with High Performance and Precise Detection," IEICE Transactions on Information and Systems, vol.E98-D, no.4, Apr. 2015
- Mitsuaki Akiyama, Takeshi Yagi, Youki Kadobayashi, Takeo Hariu, Suguru Yamaguchi
- "Detecting Anomalies in Massive Traffic Streams based on S-transform Analysis of Summarized Traffic Entropies," IEICE Transactions on Information and Systems, vol.E98-D, no.3, pp588-595, Mar. 2015
- Sirikarn Pukkawanna, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi
- "Empirical analysis of IPv6 transition technologies using the IPv6 Network Evaluation Testbed," EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, vol.15, no.2, Feb. 2015
- Marius Georgescu, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi
- "Reference Ontology for Cybersecurity Operational Information," The Computer Journal, Oct. 2014
- Takeshi Takahashi, Youki Kadobayashi
- " Sip flooding attack detection using a trust model and statistical algorithms," Journal of Information Processing, vol.22, no.2, pp118-129, 15 Apr. 2014
- Noppawat Chaisamran, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi
- "位置依存情報配信を目的としたipv6マルチキャストアドレスの設計と評価," 情報処理学会論文誌, vol.55, no.2, pp619-629, 2014.2
- 岡田和也, 奥田剛, 門林雄基, 山口英
- "A Learner-Independent Knowledge Transfer Approach to Multi-task Learning," Cognitive Computation, vol.6, no.3, pp304-320, Nov. 2013
- Shaoning Pang, Fan Liu, Youki Kadobayashi, Tao Ban, Daisuke Inoue
- "Behind HumanBoost: Analysis of Users' Trust Decision Patterns for Identifying Fraudulent Websites," Journal of Intelligent Learning Systems and Applications, vol.4, pp319-329, Nov. 2012
- Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi, Takeshi Takahashi
- "Exploring Attack Graph for Cost-Benefit Security Hardening: a Probabilistic Approach," Elsevier Computers & Security, vol.32, pp158-169, Oct. 2012
- Zonghua Zhang, Shuzhen Wang, Youki Kadobayashi
- "LDA Merging and Splitting With Applications to Multiagent Cooperative Learning and System Alteration," IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, vol.42, no.2, pp552-564, Apr. 2012
- Shaoning Pang, Tao Ban, Youki Kadobayashi, N.K. Kasabov
- "A Step Towards Static Script Malware Abstraction: Rewriting Obfuscated Script with Maude.," IEICE Transactions on Information and Systems, vol. E94-D, no.11, Nov. 2011
- Gregory Blanc, Youki Kadobayashi
- "Towards Cost-sensitive Self-optimizing Anomaly Detection and Response in Autonomic Networks.," Computers & Security , vol.30, no.6-7, pp525-537, Oct. 2011
- Zonghua Zhang, Farid Nait-Abdesselam, Pin-Han Ho, Youki Kadobayashi
- "Personalized mode transductive spanning SVM classification tree," Information Sciences, vol.181, no.11, pp2071-2085, Jun. 2011
- Shaoning Pang, Tao Ban, Youki Kadobayashi, Nicola Kasabov
- "HumanBoost: Utilization of Users' Past Trust Decision for Identifying Fraudulent Websites," Journal of Intelligent Learning Systems and Applications, vol.2, no.4, pp190-199, Oct. 2010
- Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi
- "Introduction to AdaIndex - an Adaptive Similarity Search Algorithm in General Metric Spaces," Advances in Computer Science and IT, In-Teh, pp381-391, Dec. 2009
- Tao Ban, Youki Kadobayashi
- "Handover Management for VoWLAN based on Estimation of AP Queue Length and Frame Retries," IEICE Transactions on Information and System, vol.E92-D, no.10, pp1847-1856, Oct. 2009
- Muhammad Niswar, Shigeru Kashihara, Kazuya Tsukamoto, Youki Kadobayashi, Suguru Yamaguchi
[ NAISTレポジトリ ]
- "Expediting Experiments across Testbeds with AnyBed: A Testbed-Independent Topology Configuration System and Its Tool Set," IEICE TRANSACTIONS on Information and Systems, vol.E92-D, no.10, pp1877-1887, Oct. 2009
- Mio Suzuki, Hiroaki Hazeyama, Daisuke Miyamoto, Shinsuke Miwa, Youki Kadobayashi
[ NAISTレポジトリ ]
- "階層型p2pネットワークを用いたインターネット計測基盤の性能評価と実展開シナリオの考察," 情報処理学会論文誌, vol.50, no.2, pp709-720, 2009.2
- 益井 賢次, 門林 雄基
- "徹底攻略!トレースバック技術," ThinkIT 連載記事2009年2月特集「セキュリティーのツボ」, 2009.2
- 門林 雄基, 櫖山 寛章
- "Hose bandwidth allocation method to achieve minimum throughput assurance service for provider provisioned VPNs," IPSJ Journal, vol.49, no.12, pp3967-3984, Dec. 2008
- Masayoshi Shimamura, Katsuyoshi Iida, Hiroyuki Koga, Youki Kadobayashi, Suguru Yamaguchi
- "An Evaluation of Machine Learning-based Methods for Detection of Phishing Sites," Australian Journal of Intelligent Information Processing Systems, vol.10, no.2, pp54-63, Nov. 2008
- Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi
- "トレーサブルネットワークの研究開発," 情報通信研究機構 季報, vol.54, no.2/3, 2008.9
- 門林 雄基
- "On tighter inequalities for efficient similarity search in metric spaces," IAENG International Journal of Computer Science, International Association of Engineering, vol.35, no.3, Aug. 2008
- Tao Ban, Youki Kadobayashi
- "Incident-driven memory snapshot for full-virtualized OS using interruptive debugging techniques," International Journal of Security and Its Applications (IJSIA), Science & Engineering Research Support Center, vol.2, no.3, pp41-47, Jul. 2008
- Ruo Ando, Youki Kadobayashi, Yoichi Shinoda
- "Adaptive bloom filter : Space efficient counting algorithm for unpredictable network traffic," IEICE Transactions on Information and Systems, vol.91-D, no.5, May. 2008
- Yoshihide Matsumoto, Hiroaki Hazeyama, Youki Kadobayashi
- "オーバーレイ・ネットワーク," コンピュータソフトウェア, 日本ソフトウェア科学会, vol.Vol.23, no.No.1, pp15-23, 2006.1
- 門林雄基
- "Improvement of Consistency among AS Policies on IRR Database," Journal of IPSJ, vol.Vo.46, No.6, pp1456-1465, Jun. 2005
- Masasi Eto, Youki Kadobayashi, Suguru Yamaguchi
- "Reducing Processor Usage on Heavily-loaded Network Servers with POSIX Real-time Scheduling Control," IEICE Transactions on Information and Systems, vol.Vol. E88-D, no.No. 6, pp1168-1177, Jun. 2005
- Eiji Kawai, Youki Kadobayashi, Suguru Yamaguchi
- "Performance Study and Deployment Strategies on the Sender-InitiatedMulticast," Special issue on Internet Technology V, IEICETrans. on Commun, vol.Vol.E88-B, , no.No.4, pp1383-1394, Apr. 2005
- V. Visoottiviseth, H. Kido, K. Iida, Y. Kadobayashi, S. Yamaguchi
- "実時間シグナルを用いたポーリングI/Oライブラリの設計," 情報処理学会論文誌コンピューティングシステム, vol.Vol.46, no.No. SIG4 , pp22-32, 2005.3
- 河合 栄治, 門林 雄基, 山口 英
- "Distributed Scalable Multi-Player Online Game Servers on Peer-to-Peer Networks," 情報処理学会論文誌, vol.Vol.46, no.No.2, pp376-391, Feb. 2005
- Takuji Iimura, Hiroaki Hazeyama, Youki Kadobayashi
- "ポリシによる複数ファイアウォールの一括設定方式の提案と実装," 電子情報通信学会論文誌, vol.Vol.J87-B, no.No.10, pp1616-1625, 2004.10
- 下條敏男, 衛藤将史, 門林雄基
- "Multi-path Transmission Algorithm for End-to-End Seamless Handover across Heterogeneous Wireless Access Networks," IEICE Transactions on Communications, vol.E87-B, no.3, pp490-496, Mar. 2004
- Shigeru Kashihara, Katsuyoshi Iida, Hiroyuki Koga, Youki Kadobayashi, Suguru Yamaguchi
[ NAISTレポジトリ ]
- "ネットワークサーバにおける多重化I/Oの実行間隔制御による性能向上手法," 情報処理学会論文誌, vol.Vol.45, no.No.2, pp391-401, 2004.2
- 河合栄治, 門林雄基, 山口英
[ NAISTレポジトリ ]
- "ネットワークプロセッサ技術の研究開発動向," 情報処理学会論文誌, vol.Vol.45, no.No. SIG1, pp54-65, 2004.1
- 河合栄治, 門林雄基, 山口英
- "A Layer-2 Extention to Hash-bsaed IP Traceback," IEICE Transactions on Information and Systems, vol.Vol.E86-D, no.No.11, Nov. 2003
- Hiroaki Hazeyama, Masafumi Oe, Youki Kadobayashi
- "階層型IPトレースバック機構の実装と検証," 電子情報通信学会論文誌, vol.Vol.J86-B, no.No.8, pp1313-1322, 2003.8
- 大江将史, 門林雄基
- "An Early Experience in Content Internetworking with Content RoutingNetwork," IEICE Transactions on Communications, vol.Vol.E86-B, no.No.2, Feb. 2003
- Youki Kadobayashi, Satoshi Abe, Yasuhiro Ohara, Masaki Minami
- "少人数を対象とした送信者指定型マルチキャストプロトコルSIM," 電子情報通信学会論文誌, vol.j85-B, no.8, pp1215-1226, 2002.8
- ワサカ ヴィスーティヴィセット, 門林 雄基, 山口 英
- "階層型IPトレースバック機構の提案," 電子情報通信学会論文誌, vol.j85-B, no.8, pp1313-1322, 2002.8
- 大江 将史, 門林 雄基, 山口 英
- "CDNとエッジサービス," 情報処理学会誌, vol.43, no.4, pp454-460, 2002.4
- 門林 雄基
- "IPトレースバック技術.," 情報処理学会学会誌, vol.42, no.12, pp1175-1180, 2001.12
- 門林 雄基, 大江 将史
- "グローバルコンピューティングの実際," Computer Today, pp56-62, 2001.3
- 門林 雄基, 伊達 進
|