Login / Signup
Akira Yamada
ORCID
Publication Activity (10 Years)
Years Active: 2004-2023
Publications (10 Years): 19
Top Topics
Class Conditional
Empirical Analysis
User Browsing
Graph Representation
Top Venues
CoRR
SOUPS @ USENIX Security Symposium
PST
ACNS (2)
</>
Publications
</>
Takao Murakami
,
Hiromi Arai
,
Koki Hamada
,
Takuma Hatano
,
Makoto Iguchi
,
Hiroaki Kikuchi
,
Atsushi Kuromasa
,
Hiroshi Nakagawa
,
Yuichi Nakamura
,
Kenshiro Nishiyama
,
Ryo Nojima
,
Hidenobu Oguri
,
Chiemi Watanabe
,
Akira Yamada
,
Takayasu Yamaguchi
,
Yuji Yamaoka
Designing a Location Trace Anonymization Contest.
Proc. Priv. Enhancing Technol.
2023 (1) (2023)
Yukiko Sawaya
,
Ayane Sano
,
Takamasa Isohara
,
Akira Yamada
,
Ayako Komatsu
Does the Anchoring Effect Influence Individuals' Anti-phishing Behavior Intentions?
FPS (1)
(2023)
Muhammad Fakhrur Rozi
,
Tao Ban
,
Seiichi Ozawa
,
Akira Yamada
,
Takeshi Takahashi
,
Sangwook Kim
,
Daisuke Inoue
Detecting Malicious JavaScript Using Structure-Based Analysis of Graph Representation.
IEEE Access
11 (2023)
Akira Yamada
,
Kyle Crichton
,
Yukiko Sawaya
,
Jin-Dong Dong
,
Sarah Pearman
,
Ayumu Kubota
,
Nicolas Christin
On recruiting and retaining users for security-sensitive longitudinal measurement panels.
SOUPS @ USENIX Security Symposium
(2022)
Ayane Sano
,
Yukiko Sawaya
,
Akira Yamada
,
Ayumu Kubota
SeBeST: Security Behavior Stage Model and Its Application to OS Update.
AINA (2)
(2021)
Ayane Sano
,
Yukiko Sawaya
,
Akira Yamada
,
Ayumu Kubota
,
Takamasa Isohara
Designing Personalized OS Update Message based on Security Behavior Stage Model.
PST
(2021)
Shoma Tanaka
,
Takashi Matsunaka
,
Akira Yamada
,
Ayumu Kubota
Phishing Site Detection Using Similarity of Website Structure.
DSC
(2021)
Takao Murakami
,
Hiromi Arai
,
Koki Hamada
,
Takuma Hatano
,
Makoto Iguchi
,
Hiroaki Kikuchi
,
Atsushi Kuromasa
,
Hiroshi Nakagawa
,
Yuichi Nakamura
,
Kenshiro Nishiyama
,
Ryo Nojima
,
Hidenobu Oguri
,
Chiemi Watanabe
,
Akira Yamada
,
Takayasu Yamaguchi
,
Yuji Yamaoka
Designing a Location Trace Anonymization Contest.
CoRR
(2021)
Tran Phuong Thao
,
Yukiko Sawaya
,
Hoang-Quoc Nguyen-Son
,
Akira Yamada
,
Ayumu Kubota
,
Tran Van Sang
,
Rie Shigetomi Yamaguchi
Human Factors in Homograph Attack Recognition.
ACNS (2)
(2020)
Satomi Kaneko
,
Akira Yamada
,
Yukiko Sawaya
,
Tran Phuong Thao
,
Ayumu Kubota
,
Kazumasa Omote
Detecting Malicious Websites by Query Templates.
SECITC
(2019)
Tran Phuong Thao
,
Yukiko Sawaya
,
Hoang-Quoc Nguyen-Son
,
Akira Yamada
,
Ayumu Kubota
Peek-a-boo, I Can See You, Forger: Influences of Human Demographics, Brand Familiarity and Security Backgrounds on Homograph Recognition.
CoRR
(2019)
Tran Phuong Thao
,
Yukiko Sawaya
,
Hoang-Quoc Nguyen-Son
,
Akira Yamada
,
Kazumasa Omote
,
Ayumu Kubota
Hunting Brand Domain Forgery: A Scalable Classification for Homograph Attack.
SEC
(2019)
Mahmood Sharif
,
Jumpei Urakawa
,
Nicolas Christin
,
Ayumu Kubota
,
Akira Yamada
Predicting Impending Exposure to Malicious Content from User Behavior.
CCS
(2018)
Yuki Kawaguchi
,
Akira Yamada
,
Seiichi Ozawa
AI Web-Contents Analyzer for Monitoring Underground Marketplace.
ICONIP (5)
(2017)
Yukiko Sawaya
,
Mahmood Sharif
,
Nicolas Christin
,
Ayumu Kubota
,
Akihiro Nakarai
,
Akira Yamada
Self-Confidence Trumps Knowledge: A Cross-Cultural Study of Security Behavior.
CHI
(2017)
Tran Phuong Thao
,
Akira Yamada
,
Kosuke Murakami
,
Jumpei Urakawa
,
Yukiko Sawaya
,
Ayumu Kubota
Classification of Landing and Distribution Domains Using Whois' Text Mining.
TrustCom/BigDataSE/ICESS
(2017)
Kohei Sugiyama
,
Jumpei Urakawa
,
Masato Taya
,
Akira Yamada
,
Arei Kobayashi
,
Atsushi Tagami
Empirical analysis of customer behavior for tiered data plans in mobile market.
INFOCOM Workshops
(2016)
Yoshiaki Hori
,
Seiichiro Mizoguchi
,
Ryosuke Miyazaki
,
Akira Yamada
,
Yaokai Feng
,
Ayumu Kubota
,
Kouichi Sakurai
A Comprehensive Security Analysis Checksheet for OpenFlow Networks.
BWCCA
(2016)
Jumpei Urakawa
,
Cristina Basescu
,
Kohei Sugiyama
,
Christos Pappas
,
Akira Yamada
,
Ayumu Kubota
,
Adrian Perrig
On the implementation of path-based dynamic pricing in edge-directed routing.
APCC
(2016)
Tiffany Hyun-Jin Kim
,
Akira Yamada
,
Virgil D. Gligor
,
Jason I. Hong
,
Adrian Perrig
RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication.
Financial Cryptography
(2013)
Takashi Matsunaka
,
Akira Yamada
,
Ayumu Kubota
Passive OS Fingerprinting by DNS Traffic Analysis.
AINA
(2013)
Yukiko Sawaya
,
Ayumu Kubota
,
Akira Yamada
Understanding the time-series behavioral characteristics of evolutionally advanced email spammers.
AISec
(2012)
Hsu-Chun Hsiao
,
Tiffany Hyun-Jin Kim
,
Adrian Perrig
,
Akira Yamada
,
Samuel C. Nelson
,
Marco Gruteser
,
Wei Meng
LAP: Lightweight Anonymity and Privacy.
IEEE Symposium on Security and Privacy
(2012)
Akira Yamada
,
Hara Masanori
,
Yutaka Miyake
Web Tracking Site Detection Based on Temporal Link Analysis and Automatic Blacklist Generation.
J. Inf. Process.
19 (2011)
Akira Yamada
,
Hara Masanori
,
Yutaka Miyake
Web Tracking Site Detection Based on Temporal Link Analysis and Automatic Blacklist Generation.
Inf. Media Technol.
6 (2) (2011)
Akira Yamada
,
Hara Masanori
,
Yutaka Miyake
Web Tracking Site Detection Based on Temporal Link Analysis.
AINA Workshops
(2010)
Akira Yamada
,
Ayumu Kubota
,
Yutaka Miyake
,
Kazuo Hashimoto
Service Independent Access Control Architecture for User Generated Content (UGC) and Its Implementation.
IEICE Trans. Inf. Syst.
(10) (2009)
Masanoei Hara
,
Akira Yamada
,
Yutaka Miyake
Visual similarity-based phishing detection without victim site information.
CICS
(2009)
Akira Yamada
,
Yutaka Miyake
,
Masahiro Terabe
,
Kazuo Hashimoto
,
Nei Kato
Anomaly Detection for DNS Servers Using Frequent Host Selection.
AINA
(2009)
Akira Yamada
,
Ayumu Kubota
,
Yutaka Miyake
Service Independent Access Control Architecture for User Generated Content (UGC).
Security and Management
(2008)
Akira Yamada
,
Yutaka Miyake
,
Keisuke Takemori
,
Ahren Studer
,
Adrian Perrig
Intrusion Detection for Encrypted Web Accesses.
AINA Workshops (1)
(2007)
Ayumu Kubota
,
Akira Yamada
,
Yutaka Miyake
L2VPN over Chord: Hosting Millions of Small Zeroconf Networks over DHT Nodes.
GLOBECOM
(2006)
Akira Yamada
,
Yutaka Miyake
,
Keisuke Takemori
,
Toshiaki Tanaka
Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data.
ITCC (1)
(2005)
Akira Yamada
,
Shinsaku Kiyomoto
,
Toshiaki Tanaka
,
Koji Nakao
New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(1) (2004)