default search action
Yuta Takata
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j12]Kenta Nomura, Yuta Takata, Hiroshi Kumagai, Masaki Kamizono, Yoshiaki Shiraishi, Masami Mohri, Masakatu Morii:
Investigations of Electronic Signatures for Construction of Trust Services. IEICE Trans. Inf. Syst. 106(9): 1436-1451 (2023) - [j11]Keika Mori, Tatsuya Nagai, Yuta Takata, Masaki Kamizono, Tatsuya Mori:
Analysis of Privacy Compliance by Classifying Policies Before and After the Japanese Law Revision. J. Inf. Process. 31: 829-841 (2023) - 2021
- [j10]Yuta Takata, Hiroshi Kumagai, Masaki Kamizono:
The Uncontrolled Web: Measuring Security Governance on the Web. IEICE Trans. Inf. Syst. 104-D(11): 1828-1838 (2021) - [j9]Yuta Takata, Daiki Ito, Hiroshi Kumagai, Masaki Kamizono:
Risk Analysis of Cookie Sharing by Link Decoration and CNAME Cloaking. J. Inf. Process. 29: 649-656 (2021) - 2020
- [j8]Takuya Watanabe, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, Yuta Takata, Bo Sun, Yuta Ishii, Toshiki Shibahara, Takeshi Yagi, Tatsuya Mori:
Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library. IEICE Trans. Inf. Syst. 103-D(2): 276-291 (2020) - 2019
- [j7]Toshiki Shibahara, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato, Masayuki Murata:
Evasive Malicious Website Detection by Leveraging Redirection Subgraph Similarities. IEICE Trans. Inf. Syst. 102-D(3): 430-443 (2019) - 2018
- [j6]Hiroki Nakano, Fumihiro Kanei, Yuta Takata, Mitsuaki Akiyama, Katsunari Yoshioka:
Towards Finding Code Snippets on a Question and Answer Website Causing Mobile App Vulnerabilities. IEICE Trans. Inf. Syst. 101-D(11): 2576-2583 (2018) - [j5]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Kazuhiko Ohkubo, Shigeki Goto:
Identifying Evasive Code in Malicious Websites by Analyzing Redirection Differences. IEICE Trans. Inf. Syst. 101-D(11): 2600-2611 (2018) - [j4]Toshiki Shibahara, Kohei Yamanishi, Yuta Takata, Daiki Chiba, Taiga Hokaguchi, Mitsuaki Akiyama, Takeshi Yagi, Yuichi Ohsita, Masayuki Murata:
Event De-Noising Convolutional Neural Network for Detecting Malicious URL Sequences from Proxy Logs. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(12): 2149-2161 (2018) - 2017
- [j3]Yumehisa Haga, Yuta Takata, Mitsuaki Akiyama, Tatsuya Mori:
Building a Scalable Web Tracking Detection System: Implementation and the Empirical Study. IEICE Trans. Inf. Syst. 100-D(8): 1663-1670 (2017) - [j2]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Shigeki Goto:
Fine-Grained Analysis of Compromised Websites with Redirection Graphs and JavaScript Traces. IEICE Trans. Inf. Syst. 100-D(8): 1714-1728 (2017) - 2016
- [j1]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Shigeki Goto:
MineSpider: Extracting Hidden URLs Behind Evasive Drive-by Download Attacks. IEICE Trans. Inf. Syst. 99-D(4): 860-872 (2016)
Conference and Workshop Papers
- 2024
- [c15]Daiki Ito, Yuta Takata, Keika Mori, Ryoya Furukawa, Hiroshi Kumagai, Masaki Kamizono:
Account Discovery: Identifying Web3 SNS Accounts at Risk of De-anonymization. SAC 2024: 259-268 - [c14]Daiki Ito, Yuta Takata, Hiroshi Kumagai, Masaki Kamizono:
Investigations of Top-Level Domain Name Collisions in Blockchain Naming Services. WWW 2024: 2926-2935 - 2023
- [c13]Keika Mori, Yuta Takata, Daiki Ito, Masaki Kamizono, Tatsuya Mori:
Impact Analysis of Organizational Structure of Group Companies on Privacy Policies. WPES@CCS 2023: 159-165 - 2022
- [c12]Keika Mori, Tatsuya Nagai, Yuta Takata, Masaki Kamizono:
Analysis of Privacy Compliance by Classifying Multiple Policies on the Web. COMPSAC 2022: 1734-1741 - [c11]Daiki Ito, Yuta Takata, Masaki Kamizono:
Money Talks: Detection of Disposable Phishing Websites by Analyzing Its Building Costs. TPS-ISA 2022: 97-106 - 2021
- [c10]Ryoya Furukawa, Daiki Ito, Yuta Takata, Hiroshi Kumagai, Masaki Kamizono, Yoshiaki Shiraishi, Masakatu Morii:
Fake News Detection via Biased User Profiles in Social Networking Sites. WI/IAT 2021: 136-145 - 2018
- [c9]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato, Shigeki Goto:
POSTER: Predicting Website Abuse Using Update Histories. WWW (Companion Volume) 2018: 9-10 - 2017
- [c8]Toshiki Shibahara, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada:
Detecting Malicious Websites by Integrating Malicious, Benign, and Compromised Redirection Subgraph Similarities. COMPSAC (1) 2017: 655-664 - [c7]Toshiki Shibahara, Kohei Yamanishi, Yuta Takata, Daiki Chiba, Mitsuaki Akiyama, Takeshi Yagi, Yuichi Ohsita, Masayuki Murata:
Malicious URL sequence detection using event de-noising convolutional neural network. ICC 2017: 1-7 - [c6]Takuya Watanabe, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, Yuta Takata, Bo Sun, Yuta Ishii, Toshiki Shibahara, Takeshi Yagi, Tatsuya Mori:
Understanding the origins of mobile app vulnerabilities: a large-scale measurement study of free and paid apps. MSR 2017: 14-24 - [c5]Yuta Ishii, Takuya Watanabe, Fumihiro Kanei, Yuta Takata, Eitaro Shioji, Mitsuaki Akiyama, Takeshi Yagi, Bo Sun, Tatsuya Mori:
Understanding the security management of global third-party Android marketplaces. WAMA@ESEC/SIGSOFT FSE 2017: 12-18 - [c4]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Shigeki Goto:
Understanding Evasion Techniques that Abuse Differences Among JavaScript Implementations. WISE (2) 2017: 278-294 - 2016
- [c3]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Shigeki Goto:
Website Forensic Investigation to Identify Evidence and Impact of Compromise. SecureComm 2016: 431-453 - 2015
- [c2]Toshiki Shibahara, Takeshi Yagi, Mitsuaki Akiyama, Yuta Takata, Takeshi Yada:
POSTER: Detecting Malicious Web Pages based on Structural Similarity of Redirection Chains. CCS 2015: 1671-1673 - [c1]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Shigeki Goto:
MineSpider: Extracting URLs from Environment-Dependent Drive-by Download Attacks. COMPSAC 2015: 444-449
Informal and Other Publications
- 2023
- [i2]Yuta Takata, Alex Fukunaga:
Plausibility-Based Heuristics for Latent Space Classical Planning. CoRR abs/2306.11434 (2023) - 2017
- [i1]Takuya Watanabe, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, Yuta Takata, Bo Sun, Yuta Ishii, Toshiki Shibahara, Takeshi Yagi, Tatsuya Mori:
A Study on the Vulnerabilities of Mobiles Apps associated with Software Modules. CoRR abs/1702.03112 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-03 00:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint