Journal Papers

Since 2013.

[Google Scholar][DBLP][Microsoft Academic Search]

  1. Shu-pei Huang, Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori, “An Investigation of Privacy and Security in VR APPs through URL String Analysis,” Journal of Information Processing, vol. 32, pp. 779-788 (Sep. 2024) [PDF]
  2. T. Watanabe, E. Shioji, M. Akiyama, T. Mori, “Understanding the Breakdown of Same-Origin Policies in Web Services That Rehost Websites,” Journal of Information Processing, Vol.32 pp. 801–816 (Sep. 2024) [PDFJIP Specially Selected Paper certificate
  3. R. Kawaoka, D. Chiba, T. Watanabe, M. Akiyama, and T. Mori, “Longitudinal Measurement Study of the Domain Names Associated with Olympic Games,” IEEE ACCESS, Vol. 12, pp. 19128–19144, Jan. 2024 [Early access version]
  4. Keika Mori, Tatsuya Nagai, Yuta Takata, Masaki Kamizono, and Tatsuya Mori, “Analysis of Privacy Compliance by Classifying Policies Before and After the Japanese Law Revision,” Journal of Information Processing, vol. xx, no. xx., pp. xxxx-xxxxx (in press)
  5. Kazuki Nomoto, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori, “Understanding the Inconsistencies in the Permissions Mechanism of Web Browsers,” Journal of Information Processing, 2023, Volume 31, Pages 620-642, September 2023 [PDF]  IPSJ Outstanding Paper / JIP Specially Selected Paper certificate 
  6. Ichiro Asomura, Ryo Iijima, Tatsuya Mori, “Automating the Detection of Fraudulent Activities in Online Banking Service,” Journal of Information Processing, Volume 31, Pages 643-653, September 2023 [PDF]
  7. Ayako A. HASEGAWA, Mitsuaki AKIYAMA, Naomi YAMASHITA, Daisuke INOUE, Tatsuya MORI, “Analysis of Non-Experts’ Security- and Privacy-Related Questions on a Q&A Site,” Journal IEICE TRANSACTIONS on Information and Systems, Vol.E106-D, No.9, pp.1380–1396 [PDF]
  8. Ayako A. Hasegawa, Naomi Yamashita, Mitsuaki Akiyama, and Tatsuya Mori.
    Experiences, Behavioral Tendencies, and Concerns of Non-Native English Speakers in Identifying Phishing Emails,” In Journal of Information Processing, Vol.30, pages 841-858. 2022.
  9. Tianying Xie, Hayato Yamana, and Tatsuya Mori, “CHE: Channel-wise Homomorphic Encryption for Ciphertext Inference in Convolutional Neural Network,” IEEE ACCESS, Volume: 10, pp. 107446–107458, September 2022 [PDF]
  10. Yuji Sakurai, Takuya Watanabe, Tetsuya Okuda, Mitsuaki Akiyama, Tatsuya Mori, “Identifying the Phishing Websites Using the Patterns of TLS Certificates, ” Journal of Cyber Security and Mobility,  Volume 10, Issue 2, pp. 451–486, 2021 [PDF]
  11. Ayako Akiyama Hasegawa, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, and Tatsuya Mori, “Addressing the Privacy Threat to Identify Existence of a Target’s Account on Sensitive Services,” Journal of Information Processing, Vol.28, pages 1030-1046. December 2020. [PDF]
  12. K. Mori, T. Watanabe, Y. Zhou, A. A. Hasegawa, M. Akiyama, and T. Mori, “Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?,” IEICE Transactions on Information and Systems, Vol. 103-D, No. 7, pp. 1541-1555, July 2020 [PDF]
  13. Mitsuhiro HATADA Tatsuya MORI, “CLAP: Classification of Android PUAs by Similarity of DNS Queries,” IEICE TRANSACTIONS on Information and Systems, Vol. 103-D, No. 2, pp. 265–275, January 2020 [PDF]
  14. Takuya WATANABE Mitsuaki AKIYAMA Fumihiro KANEI Eitaro SHIOJI Yuta TAKATA Bo SUN Yuta ISHII Toshiki SHIBAHARA Takeshi YAGI Tatsuya MORI, “Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library,” IEICE TRANSACTIONS on Information and Systems, Vol. 103-D, No. 2, pp. 276–291,  January 2020 [PDF]
  15. Takuya WATANABE Eitaro SHIOJI Mitsuaki AKIYAMA Keito SASAOKA Takeshi YAGI Tatsuya MORI, “Follow Your Silhouette: Identifying the Social Account of Website Visitors through User-Blocking Side Channel,” IEICE TRANSACTIONS on Information and Systems, Vol. 103-D, No. 2, pp. 239–255, January 2020 [PDF]
  16. R. Iijima, S. Minami, Y. Zhou, T. Takehisa, T. Takahashi, Y. Oikawa, and T. Mori, “Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams and its Feasibility,” IEEE Transactions on Emerging Topics in Computing PP(99):1-1 · November 2019 [PDF]
  17. Kanae Yoshida, Hironori Imai, Nana Serizawa, Tatsuya Mori, Akira Kanaoka, “Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps,” Journal of Information Processing, Vol. 27, pp. 593-602, September 2019 [PDF]
  18. Bo Sun, Akinori Fujino, Tatsuya Mori, Tao Ban, Takeshi Takahashi, and Daisuke Inoue, “Automatically Generating Malware Analysis Reports Using Sandbox Logs,” IEICE Transactions on Information and Systems, Vol. E101-D, No. 11, pp. 2622–2632, November 2018. [PDF]
  19. T. Watanabe, M. Akiyama, T. Sakai, H. Washizaki, and T. Mori, “Understanding the Inconsistency between Behaviors and Descriptions of Mobile Apps,” IEICE Transactions on Information and Systems, Vol. Vol.E101-D, No. 11, pp. 2584–2599, November 2018. [PDF]
  20. 長谷川彩子, 秋山満昭, 八木毅, 森達哉, “オンラインオークションにおける購入履歴漏洩のリスクとユーザ認識の調査,” 情報処理学会論文誌, Vol. 59, No. 9, pp. 1689–1698, 2018年9月 [PDF]
  21. D. Chiba, M. Akiyama, T. Yagi, K. Hato, T. Mori, and S. Goto, “DomainChroma: Building Actionable Threat Intelligence from Malicious Domain Names,” Elsevier Computers & Security, Volume 77, Pages 138-161, August 2018 [PDF]
  22. S. Mizuno, M. Hatada, T. Mori, and S. Goto, “Detecting Malware-infected Devices Using the HTTP Header Patterns,” IEICE Transactions on Information and Systems, Vol. E101-D, No.5, pp.1370-1379, May. 2018. [PDF]
  23. B. Sun, X. Luo, M. Akiyama, T. Watanabe and T. Mori, “PADetective: A Systematic Approach to Automate Detection of Promotional Attackers in Mobile App Store,” Journal of Information Processing, vol. 26, pp. 212-223, April 2018 https://doi.org/10.2197/ipsjjip.26.212
  24. D. Chiba, T. Yagi, M. Akiyama, T. Shibahara, T. Mori, and S. Goto, “DomainProfiler: Towards Accurate and Early Discovery of Domain Names Abused in Future,” International Journal of Information Security, Volume 17, Issue 6, pp 661–680, 2018 [PDF] DOI:10.1007/s10207-017-0396-7
  25. T. Kimura, K. Ishibashi, T. Mori, H. Sawada, T. Toyono, K. Nishimatsu, A. Watanabe, A. Shimoda, and K. Shiomoto, “Network Event Extraction from Log Data with Nonnegative Tensor Factorization,” IEICE Transactions on Communications, Vol.E100-B, No.10, pp.1865-1878, Oct. 2017.
  26. M. Hatada and T. Mori, “Finding New Varieties of Malware with the Classification of Network Behavior,” IEICE Transactions on Information and Systems, Vol. E100-D, No. 8, pp. 1691–1702, Aug. 2017 [PDF]
  27. T. Watanabe, M. Akiyama, and T. Mori, “Tracking the Human Mobility Using Mobile Device Sensors,” IEICE Transactions on Information and Systems, Vol. E100-D, No. 8, pp. 1680–1690, Aug. 2017 [PDF]
  28. Y. Haga, Y. Takata, M. Akiyama, and T. Mori, “Building a Scalable Web Tracking Detection System: Implementation and the Empirical Study,” IEICE Transactions on Information and Systems, Vol. 100-D, No.
    8, pp. 1663–1670, Aug. 2017 [PDF]
  29. Y. Ishii, T. Watanabe, M. Akiyama, and T. Mori, “APPraiser: A large scale analysis of Android clone apps,” IEICE Transactions on Information and Systems, Vol. E100-D, No. 8, pp. 1703–1713, Aug. 2017 [PDF]
  30. M. Akiyama, T. Yagi, T. Yada, T. Mori, and Y. Kadobayashi, “Analyzing the Ecosystem of Malicious URL Redirection Through Longitudinal Observation from Honeypots,” Elsevier Computers & Security, vol. 69, pp. 155–173, Aug. 2017 [abstract]
  31. 衣川昌宏,林優一,森達哉 “意図的な電磁妨害時にハードウェアトロイよって引き起こされる情報漏えい評価電気学会論文誌A,Vol. 137, No. 3, pp. 153–157, 2017年3月 [JSTAGE]
  32. T. Mori, T. Inoue, A. Shimoda, K. Sato, K. Ishibashi, and S. Goto, “Statistical Estimation of the Names of HTTPS Servers with Domain Name Graphs,” Computer Communications, Volume 94, Pages 104–113, November 2016. [abstract]
  33. B. Sun, M. Akiyama, T. Yagi, M. Hatada, and T. Mori, “Automating URL Blacklist Generation with Similarity Search Approach,” IEICE Transactions on Information and Systems, Vol.E99-D, No.4, pp. 873–882, April 2016 [IEICE].
  34. Daiki Chiba, Kazuhiro Tobe, Tatsuya Mori, Shigeki Goto: Analyzing Spatial Structure of IP Addresses for Detecting Malicious Websites. Journal of Information Processing 21(3): 539-550 (2013) [PDF][bibtex]