default search action
Takashi Koide
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Hiroki Nakano, Daiki Chiba, Takashi Koide, Naoki Fukushi, Takeshi Yagi, Takeo Hariu, Katsunari Yoshioka, Tsutomu Matsumoto:
Understanding Characteristics of Phishing Reports from Experts and Non-Experts on Twitter. IEICE Trans. Inf. Syst. 107(7): 807-824 (2024) - [c9]Naoki Fukushi, Toshiki Shibahara, Hiroki Nakano, Takashi Koide, Daiki Chiba:
Noisy Label Detection for Multi-labeled Malware. CCNC 2024: 165-171 - [i4]Takashi Koide, Naoki Fukushi, Hiroki Nakano, Daiki Chiba:
ChatSpamDetector: Leveraging Large Language Models for Effective Phishing Email Detection. CoRR abs/2402.18093 (2024) - 2023
- [c8]Hiroki Nakano, Daiki Chiba, Takashi Koide, Naoki Fukushi, Takeshi Yagi, Takeo Hariu, Katsunari Yoshioka, Tsutomu Matsumoto:
Canary in Twitter Mine: Collecting Phishing Reports from Experts and Non-experts. ARES 2023: 6:1-6:12 - [c7]Takashi Koide, Naoki Fukushi, Hiroki Nakano, Daiki Chiba:
PhishReplicant: A Language Model-based Approach to Detect Generated Squatting Domain Names. ACSAC 2023: 1-13 - [i3]Hiroki Nakano, Daiki Chiba, Takashi Koide, Naoki Fukushi, Takeshi Yagi, Takeo Hariu, Katsunari Yoshioka, Tsutomu Matsumoto:
Canary in Twitter Mine: Collecting Phishing Reports from Experts and Non-experts. CoRR abs/2303.15847 (2023) - [i2]Takashi Koide, Naoki Fukushi, Hiroki Nakano, Daiki Chiba:
Detecting Phishing Sites Using ChatGPT. CoRR abs/2306.05816 (2023) - [i1]Takashi Koide, Naoki Fukushi, Hiroki Nakano, Daiki Chiba:
PhishReplicant: A Language Model-based Approach to Detect Generated Squatting Domain Names. CoRR abs/2310.11763 (2023) - 2022
- [j5]Hiroki Nakano, Daiki Chiba, Takashi Koide, Mitsuaki Akiyama, Katsunari Yoshioka, Tsutomu Matsumoto:
Exploring Event-synced Navigation Attacks across User-generated Content Platforms in the Wild. J. Inf. Process. 30: 372-387 (2022) - [j4]Naoki Fukushi, Takashi Koide, Daiki Chiba, Hiroki Nakano, Mitsuaki Akiyama:
Understanding Security Risks of Ad-based URL Shortening Services Caused by Users' Behaviors. J. Inf. Process. 30: 865-877 (2022) - 2021
- [j3]Takashi Koide, Daiki Chiba, Mitsuaki Akiyama, Katsunari Yoshioka, Tsutomu Matsumoto:
To Get Lost is to Learn the Way: An Analysis of Multi-Step Social Engineering Attacks on the Web. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(1): 162-181 (2021) - [j2]Takashi Koide, Daiki Chiba, Mitsuaki Akiyama, Katsunari Yoshioka, Tsutomu Matsumoto:
Understanding the Fake Removal Information Advertisement Sites. J. Inf. Process. 29: 392-405 (2021) - [c6]Hiroki Nakano, Daiki Chiba, Takashi Koide, Mitsuaki Akiyama:
Detecting Event-synced Navigation Attacks across User-generated Content Platforms. COMPSAC 2021: 704-713 - [c5]Naoki Fukushi, Takashi Koide, Daiki Chiba, Hiroki Nakano, Mitsuaki Akiyama:
Analyzing Security Risks of Ad-Based URL Shortening Services Caused by Users' Behaviors. SecureComm (2) 2021: 3-22 - 2020
- [j1]Daiki Chiba, Ayako Akiyama Hasegawa, Takashi Koide, Yuta Sawabe, Shigeki Goto, Mitsuaki Akiyama:
DomainScouter: Analyzing the Risks of Deceptive Internationalized Domain Names. IEICE Trans. Inf. Syst. 103-D(7): 1493-1511 (2020) - [c4]Takashi Koide, Daiki Chiba, Mitsuaki Akiyama:
To Get Lost is to Learn the Way: Automatically Collecting Multi-step Social Engineering Attacks on the Web. AsiaCCS 2020: 394-408 - [c3]Takashi Koide, Daiki Chiba, Mitsuaki Akiyama, Katsunari Yoshioka, Tsutomu Matsumoto:
It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites. DIMVA 2020: 171-191
2010 – 2019
- 2019
- [c2]Daiki Chiba, Ayako Akiyama Hasegawa, Takashi Koide, Yuta Sawabe, Shigeki Goto, Mitsuaki Akiyama:
DomainScouter: Understanding the Risks of Deceptive IDNs. RAID 2019: 413-426 - 2015
- [c1]Lukas Krämer, Johannes Krupp, Daisuke Makita, Tomomi Nishizoe, Takashi Koide, Katsunari Yoshioka, Christian Rossow:
AmpPot: Monitoring and Defending Against Amplification DDoS Attacks. RAID 2015: 615-636
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-12 21:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint