Sign in
Yuta Takata
ORCID
Publication Activity (10 Years)
Years Active: 2015-2023
Publications (10 Years): 27
Top Topics
Website
Detecting Malicious
Convolutional Neural Network
Risk Analysis
Top Venues
IEICE Trans. Inf. Syst.
CoRR
J. Inf. Process.
COMPSAC
</>
Publications
</>
Kenta Nomura
,
Yuta Takata
,
Hiroshi Kumagai
,
Masaki Kamizono
,
Yoshiaki Shiraishi
,
Masami Mohri
,
Masakatu Morii
Investigations of Electronic Signatures for Construction of Trust Services.
IEICE Trans. Inf. Syst.
106 (9) (2023)
Keika Mori
,
Yuta Takata
,
Daiki Ito
,
Masaki Kamizono
,
Tatsuya Mori
Impact Analysis of Organizational Structure of Group Companies on Privacy Policies.
WPES@CCS
(2023)
Keika Mori
,
Tatsuya Nagai
,
Yuta Takata
,
Masaki Kamizono
,
Tatsuya Mori
Analysis of Privacy Compliance by Classifying Policies Before and After the Japanese Law Revision.
J. Inf. Process.
31 (2023)
Yuta Takata
,
Alex Fukunaga
Plausibility-Based Heuristics for Latent Space Classical Planning.
CoRR
(2023)
Daiki Ito
,
Yuta Takata
,
Masaki Kamizono
Money Talks: Detection of Disposable Phishing Websites by Analyzing Its Building Costs.
TPS-ISA
(2022)
Keika Mori
,
Tatsuya Nagai
,
Yuta Takata
,
Masaki Kamizono
Analysis of Privacy Compliance by Classifying Multiple Policies on the Web.
COMPSAC
(2022)
Yuta Takata
,
Hiroshi Kumagai
,
Masaki Kamizono
The Uncontrolled Web: Measuring Security Governance on the Web.
IEICE Trans. Inf. Syst.
(11) (2021)
Ryoya Furukawa
,
Daiki Ito
,
Yuta Takata
,
Hiroshi Kumagai
,
Masaki Kamizono
,
Yoshiaki Shiraishi
,
Masakatu Morii
Fake News Detection via Biased User Profiles in Social Networking Sites.
WI/IAT
(2021)
Yuta Takata
,
Daiki Ito
,
Hiroshi Kumagai
,
Masaki Kamizono
Risk Analysis of Cookie Sharing by Link Decoration and CNAME Cloaking.
J. Inf. Process.
29 (2021)
Takuya Watanabe
,
Mitsuaki Akiyama
,
Fumihiro Kanei
,
Eitaro Shioji
,
Yuta Takata
,
Bo Sun
,
Yuta Ishii
,
Toshiki Shibahara
,
Takeshi Yagi
,
Tatsuya Mori
Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library.
IEICE Trans. Inf. Syst.
(2) (2020)
Toshiki Shibahara
,
Yuta Takata
,
Mitsuaki Akiyama
,
Takeshi Yagi
,
Kunio Hato
,
Masayuki Murata
Evasive Malicious Website Detection by Leveraging Redirection Subgraph Similarities.
IEICE Trans. Inf. Syst.
(3) (2019)
Yuta Takata
,
Mitsuaki Akiyama
,
Takeshi Yagi
,
Takeo Hariu
,
Kazuhiko Ohkubo
,
Shigeki Goto
Identifying Evasive Code in Malicious Websites by Analyzing Redirection Differences.
IEICE Trans. Inf. Syst.
(11) (2018)
Hiroki Nakano
,
Fumihiro Kanei
,
Yuta Takata
,
Mitsuaki Akiyama
,
Katsunari Yoshioka
Towards Finding Code Snippets on a Question and Answer Website Causing Mobile App Vulnerabilities.
IEICE Trans. Inf. Syst.
(11) (2018)
Yuta Takata
,
Mitsuaki Akiyama
,
Takeshi Yagi
,
Kunio Hato
,
Shigeki Goto
POSTER: Predicting Website Abuse Using Update Histories.
WWW (Companion Volume)
(2018)
Toshiki Shibahara
,
Kohei Yamanishi
,
Yuta Takata
,
Daiki Chiba
,
Taiga Hokaguchi
,
Mitsuaki Akiyama
,
Takeshi Yagi
,
Yuichi Ohsita
,
Masayuki Murata
Event De-Noising Convolutional Neural Network for Detecting Malicious URL Sequences from Proxy Logs.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(12) (2018)
Yumehisa Haga
,
Yuta Takata
,
Mitsuaki Akiyama
,
Tatsuya Mori
Building a Scalable Web Tracking Detection System: Implementation and the Empirical Study.
IEICE Trans. Inf. Syst.
(8) (2017)
Toshiki Shibahara
,
Yuta Takata
,
Mitsuaki Akiyama
,
Takeshi Yagi
,
Takeshi Yada
Detecting Malicious Websites by Integrating Malicious, Benign, and Compromised Redirection Subgraph Similarities.
COMPSAC (1)
(2017)
Takuya Watanabe
,
Mitsuaki Akiyama
,
Fumihiro Kanei
,
Eitaro Shioji
,
Yuta Takata
,
Bo Sun
,
Yuta Ishii
,
Toshiki Shibahara
,
Takeshi Yagi
,
Tatsuya Mori
Understanding the origins of mobile app vulnerabilities: a large-scale measurement study of free and paid apps.
MSR
(2017)
Takuya Watanabe
,
Mitsuaki Akiyama
,
Fumihiro Kanei
,
Eitaro Shioji
,
Yuta Takata
,
Bo Sun
,
Yuta Ishii
,
Toshiki Shibahara
,
Takeshi Yagi
,
Tatsuya Mori
A Study on the Vulnerabilities of Mobiles Apps associated with Software Modules.
CoRR
(2017)
Yuta Ishii
,
Takuya Watanabe
,
Fumihiro Kanei
,
Yuta Takata
,
Eitaro Shioji
,
Mitsuaki Akiyama
,
Takeshi Yagi
,
Bo Sun
,
Tatsuya Mori
Understanding the security management of global third-party Android marketplaces.
WAMA@ESEC/SIGSOFT FSE
(2017)
Yuta Takata
,
Mitsuaki Akiyama
,
Takeshi Yagi
,
Takeshi Yada
,
Shigeki Goto
Fine-Grained Analysis of Compromised Websites with Redirection Graphs and JavaScript Traces.
IEICE Trans. Inf. Syst.
(8) (2017)
Yuta Takata
,
Mitsuaki Akiyama
,
Takeshi Yagi
,
Takeo Hariu
,
Shigeki Goto
Understanding Evasion Techniques that Abuse Differences Among JavaScript Implementations.
WISE (2)
(2017)
Toshiki Shibahara
,
Kohei Yamanishi
,
Yuta Takata
,
Daiki Chiba
,
Mitsuaki Akiyama
,
Takeshi Yagi
,
Yuichi Ohsita
,
Masayuki Murata
Malicious URL sequence detection using event de-noising convolutional neural network.
ICC
(2017)
Yuta Takata
,
Mitsuaki Akiyama
,
Takeshi Yagi
,
Takeo Hariu
,
Shigeki Goto
MineSpider: Extracting Hidden URLs Behind Evasive Drive-by Download Attacks.
IEICE Trans. Inf. Syst.
(4) (2016)
Yuta Takata
,
Mitsuaki Akiyama
,
Takeshi Yagi
,
Takeshi Yada
,
Shigeki Goto
Website Forensic Investigation to Identify Evidence and Impact of Compromise.
SecureComm
(2016)
Yuta Takata
,
Mitsuaki Akiyama
,
Takeshi Yagi
,
Takeo Hariu
,
Shigeki Goto
MineSpider: Extracting URLs from Environment-Dependent Drive-by Download Attacks.
COMPSAC
(2015)
Toshiki Shibahara
,
Takeshi Yagi
,
Mitsuaki Akiyama
,
Yuta Takata
,
Takeshi Yada
POSTER: Detecting Malicious Web Pages based on Structural Similarity of Redirection Chains.
CCS
(2015)