Shibahara, Toshiki
31  results:
Search for persons X
?
1

Noisy Label Detection for Multi-labeled Malware:

, In: 2024 IEEE 21st Consumer Communications & Networking Conference (CCNC),
 
?
2

Evaluation of Adversarial Examples Based on Original Defini..:

, In: HCI International 2024 Posters; Communications in Computer and Information Science,
Fujimori, Ko ; Shibahara, Toshiki ; Chiba, Daiki.. - p. 36-43 , 2024
 
?
3

Interpreting Graph-Based Sybil Detection Methods as Low-Pas..:

Furutani, Satoshi ; Shibahara, Toshiki ; Akiyama, Mitsuaki.
IEEE Transactions on Information Forensics and Security.  18 (2023)  - p. 1225-1236 , 2023
 
?
 
?
6

Objection!: Identifying Misclassified Malicious Activities ..:

, In: ICC 2022 - IEEE International Conference on Communications,
Fujita, Koji ; Shibahara, Toshiki ; Chiba, Daiki.. - p. 2065-2070 , 2022
 
?
7

Competitive Information Spreading on Modular Networks:

, In: Network Science; Lecture Notes in Computer Science,
 
?
 
?
9

Understanding Update of Machine-Learning-Based Malware Dete..:

, In: Advances in Information and Computer Security; Lecture Notes in Computer Science,
Fan, Yun ; Shibahara, Toshiki ; Ohsita, Yuichi... - p. 99-118 , 2021
 
?
10

Special-Purpose Model Extraction Attacks: Stealing Coarse M..:

, In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom),
Okada, Rina ; Ishikura, Zen ; Shibahara, Toshiki. - p. 1995-2000 , 2020
 
?
11

Graph Signal Processing for Directed Graphs Based on the He..:

, In: Machine Learning and Knowledge Discovery in Databases; Lecture Notes in Computer Science,
 
?
12

Sybil Detection as Graph Filtering:

, In: GLOBECOM 2020 - 2020 IEEE Global Communications Conference,
 
?
13

Timing Attack on Random Forests for Generating Adversarial ..:

, In: Advances in Information and Computer Security; Lecture Notes in Computer Science,
 
?
14

Detecting Malware-infected Hosts Using Templates of Multipl..:

, In: 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC),
 
?
15

Study on the Vulnerabilities of Free and Paid Mobile Apps A..:

WATANABE, Takuya ; AKIYAMA, Mitsuaki ; KANEI, Fumihiro...
IEICE Transactions on Information and Systems.  E103.D (2020)  2 - p. 276-291 , 2020
 
1-15