Takata, Yuta
90  results:
Search for persons X
?
1

Investigations of Top-Level Domain Name Collisions in Block..:

, In: Proceedings of the ACM on Web Conference 2024,
Ito, Daiki ; Takata, Yuta ; Kumagai, Hiroshi. - p. 2926-2935 , 2024
 
?
2

Account Discovery: Identifying Web3 SNS Accounts at Risk of..:

, In: Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing,
Ito, Daiki ; Takata, Yuta ; Mori, Keika... - p. 259-268 , 2024
 
?
3

Analysis of Privacy Compliance by Classifying Policies Befo..:

Mori, Keika ; Nagai, Tatsuya ; Takata, Yuta..
Journal of Information Processing.  31 (2023)  0 - p. 829-841 , 2023
 
?
4

Impact Analysis of Organizational Structure of Group Compan..:

, In: Proceedings of the 22nd Workshop on Privacy in the Electronic Society,
Mori, Keika ; Takata, Yuta ; Ito, Daiki.. - p. 159-165 , 2023
 
?
5

Investigations of Electronic Signatures for Construction of..:

NOMURA, Kenta ; TAKATA, Yuta ; KUMAGAI, Hiroshi...
IEICE Transactions on Information and Systems.  E106.D (2023)  9 - p. 1436-1451 , 2023
 
?
6

Money Talks: Detection of Disposable Phishing Websites by A..:

, In: 2022 IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA),
Ito, Daiki ; Takata, Yuta ; Kamizono, Masaki - p. 97-106 , 2022
 
?
7

Analysis of Privacy Compliance by Classifying Multiple Poli..:

, In: 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC),
Mori, Keika ; Nagai, Tatsuya ; Takata, Yuta. - p. 1734-1741 , 2022
 
?
8

Risk Analysis of Cookie Sharing by Link Decoration and CNAM..:

Takata, Yuta ; Ito, Daiki ; Kumagai, Hiroshi.
Journal of Information Processing.  29 (2021)  0 - p. 649-656 , 2021
 
?
9

The Uncontrolled Web: Measuring Security Governance on the ..:

TAKATA, Yuta ; KUMAGAI, Hiroshi ; KAMIZONO, Masaki
IEICE Transactions on Information and Systems.  E104.D (2021)  11 - p. 1828-1838 , 2021
 
?
10

Fake News Detection via Biased User Profiles in Social Netw..:

, In: IEEE/WIC/ACM International Conference on Web Intelligence,
Furukawa, Ryoya ; Ito, Daiki ; Takata, Yuta... - p. 136-145 , 2021
 
?
11

Study on the Vulnerabilities of Free and Paid Mobile Apps A..:

WATANABE, Takuya ; AKIYAMA, Mitsuaki ; KANEI, Fumihiro...
IEICE Transactions on Information and Systems.  E103.D (2020)  2 - p. 276-291 , 2020
 
?
 
?
13

Evasive Malicious Website Detection by Leveraging Redirecti..:

SHIBAHARA, Toshiki ; TAKATA, Yuta ; AKIYAMA, Mitsuaki...
IEICE Transactions on Information and Systems.  E102.D (2019)  3 - p. 430-443 , 2019
 
?
14

Towards Finding Code Snippets on a Question and Answer Webs..:

NAKANO, Hiroki ; KANEI, Fumihiro ; TAKATA, Yuta..
IEICE Transactions on Information and Systems.  E101.D (2018)  11 - p. 2576-2583 , 2018
 
?
15

Identifying Evasive Code in Malicious Websites by Analyzing..:

TAKATA, Yuta ; AKIYAMA, Mitsuaki ; YAGI, Takeshi...
IEICE Transactions on Information and Systems.  E101.D (2018)  11 - p. 2600-2611 , 2018
 
1-15