Follow
Tomohiro Morikawa (Bo Sun)
Tomohiro Morikawa (Bo Sun)
Associate professor, University of Hyogo, 兵庫県立大学
Verified email at nsl.cs.waseda.ac.jp
Title
Cited by
Cited by
Year
A privacy-preserving federated learning system for android malware detection based on edge computing
RH Hsu, YC Wang, CI Fan, B Sun, T Ban, T Takahashi, TW Wu, SW Kao
2020 15th Asia Joint Conference on Information Security (AsiaJCIS), 128-136, 2020
602020
Understanding the origins of mobile app vulnerabilities: A large-scale measurement study of free and paid apps
T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishi, ...
2017 IEEE/ACM 14th International Conference on Mining Software Repositories …, 2017
562017
Automation of vulnerability classification from its description using machine learning
M Aota, H Kanehara, M Kubo, N Murata, B Sun, T Takahashi
2020 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2020
512020
Stay on-topic: Generating context-specific fake restaurant reviews
M Juuti, B Sun, T Mori, N Asokan
European Symposium on Research in Computer Security, 132-151, 2018
432018
Automating URL blacklist generation with similarity search approach
B Sun, M Akiyama, T Yagi, M Hatada, T Mori
IEICE TRANSACTIONS on Information and Systems 99 (4), 873-882, 2016
392016
Efficient detection and classification of internet-of-things malware based on byte sequences from executable files
TL Wan, T Ban, SM Cheng, YT Lee, B Sun, R Isawa, T Takahashi, D Inoue
IEEE Open Journal of the Computer Society 1, 262-275, 2020
262020
AutoBLG: Automatic URL blacklist generator using search space expansion and filters
B Sun, M Akiyama, T Yagi, M Hatada, T Mori
2015 IEEE Symposium on Computers and Communication (ISCC), 625-631, 2015
192015
Understanding the security management of global third-party android marketplaces
Y Ishii, T Watanabe, F Kanei, Y Takata, E Shioji, M Akiyama, T Yagi, ...
Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market …, 2017
142017
Poster: Toward automating the generation of malware analysis reports using the sandbox logs
B Sun, A Fujino, T Mori
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
142016
Impact of code deobfuscation and feature interaction in android malware detection
YC Chen, HY Chen, T Takahashi, B Sun, TN Lin
IEEE Access 9, 123208-123219, 2021
122021
IoT malware detection using function-call-graph embedding
CY Wu, T Ban, SM Cheng, B Sun, T Takahashi
2021 18th International Conference on Privacy, Security and Trust (PST), 1-9, 2021
92021
A scalable and accurate feature representation method for identifying malicious mobile applications
B Sun, T Ban, SC Chang, YS Sun, T Takahashi, D Inoue
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 1182-1189, 2019
82019
既知の悪性 URL 群と類似した特徴を持つ URL の検索
孫博, 秋山満昭, 八木毅, 森達哉
コンピュータセキュリティシンポジウム 2014 論文集 2014 (2), 1-8, 2014
82014
Detecting android malware and classifying its families in large-scale datasets
B Sun, T Takahashi, T Ban, D Inoue
ACM Transactions on Management Information Systems (TMIS) 13 (2), 1-21, 2021
72021
Automatically generating malware analysis reports using sandbox logs
B Sun, A Fujino, T Mori, T Ban, T Takahashi, D Inoue
IEICE TRANSACTIONS on Information and Systems 101 (11), 2622-2632, 2018
72018
Senseinput: An image-based sensitive input detection scheme for phishing website detection
SC Lin, PC Wl, HY Chen, T Morikawa, T Takahashi, TN Lin
ICC 2022-IEEE International Conference on Communications, 4180-4186, 2022
52022
Study on the vulnerabilities of free and paid mobile apps associated with software library
T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishii, ...
IEICE TRANSACTIONS on Information and Systems 103 (2), 276-291, 2020
52020
A study on the vulnerabilities of mobile apps associated with software modules
T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishi, ...
arXiv preprint arXiv:1702.03112, 2017
42017
Characterizing promotional attacks in mobile app store
B Sun, X Luo, M Akiyama, T Watanabe, T Mori
Applications and Techniques in Information Security: 8th International …, 2017
42017
Leveraging machine learning techniques to identify deceptive decoy documents associated with targeted email attacks
B Sun, T Ban, C Han, T Takahashi, K Yoshioka, J Takeuchi, ...
IEEE Access 9, 87962-87971, 2021
32021
The system can't perform the operation now. Try again later.
Articles 1–20