Journal Papers

List of journal articles published since 2013.

  1. Taiga Ono, Takeshi Sugawara, Jun Sakuma, and Tatsuya Mori. “Adversarial Beats: Feasibility Study of Spoofed Arrhythmia in Automated Electrocardiogram Diagnosis.” ACM Transactions on Cyber-Physical Systems, Volume 10, Issue 1, Article No.: 12, Pages 1–30 (Jan 2026)
  2. Ryo Iijima, Takayuki Takehisa, and Tatsuya Mori. “Software and Hardware Implementations of a Cyber-Physical Firewall.” ACM Transactions on Cyber-Physical Systems, Volume 10, Issue 1, Article No.: 9, Pages 1–27 (Jan 2026)
  3. Kentaro Sako, Shinichiro Matsuo, and Tatsuya Mori. “N-choice Game: Building a Smart Contract for Accurate Pseudo-random Number Generation.” ACM Distributed Ledger Technologies: Research and Practice,Volume XX, Issue XX, Article No.: XX, Pages XX – XX (accepted for publication)
  4. Mei Suzuki, Ryo Iijima, Kazuki Nomoto, Tetsushi Ohki, and Tatsuya Mori. “PinchKey: A Highly Accurate and Usable Behavioral Biometric Authentication Method for VR Users.” Journal of Information Processing, Vol. 33, pp. 1154–1171 (2025).
  5. Lachlan Moore, Tatsuya Mori, and Ayako A. Hasegawa. “Negative Aspects of Social Triggers for Security and Privacy: Chains of Risky User Behaviors.” Journal of Information Processing, Vol. 33, pp. 1128–1142 (2025).
  6. Ryusei Watanabe, Mamoru Mimura, Takahiro Matsuki, and Tatsuya Mori. “BrandSpotter: A Framework for Identifying Targeted Brand Names in Phishing Attacks Using Task-Optimized Lightweight LLMs,” IEICE Transactions on Information and Systems, Special Section on Information and Communication System Security (accepted for publication)
  7. Junji Wu, Tomohiro Morikawa, and Tatsuya Mori. “Noise-Augmented Transferability: A Low-Query-Budget Transfer Attack on Android Malware Detectors.” IEEE Access, Vol. 13 (2025).
  8. Shu-pei Huang, Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori, “An Investigation of Privacy and Security in VR APPs through URL String Analysis,” Journal of Information Processing, Vol. 32, pp. 779–788 (2024) [PDF]
  9. T. Watanabe, E. Shioji, M. Akiyama, T. Mori, “Understanding the Breakdown of Same-Origin Policies in Web Services That Rehost Websites,” Journal of Information Processing, Vol. 32, pp. 801–816 (2024) [PDFJIP Specially Selected Paper certificate
  10. R. Kawaoka, D. Chiba, T. Watanabe, M. Akiyama, and T. Mori, “Longitudinal Measurement Study of the Domain Names Associated with Olympic Games,” IEEE ACCESS, Vol. 12, pp. 19128–19144, Jan. 2024 [Early access version]
  11. Keika Mori, Tatsuya Nagai, Yuta Takata, Masaki Kamizono, and Tatsuya Mori, “Analysis of Privacy Compliance by Classifying Policies Before and After the Japanese Law Revision,” Journal of Information Processing, Vol. 31, pp. 829–841 (2023)
  12. Kazuki Nomoto, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori, “Understanding the Inconsistencies in the Permissions Mechanism of Web Browsers,” Journal of Information Processing, 2023, Volume 31, Pages 620-642, September 2023 [PDF]  IPSJ Outstanding Paper / JIP Specially Selected Paper certificate 
  13. Ichiro Asomura, Ryo Iijima, Tatsuya Mori, “Automating the Detection of Fraudulent Activities in Online Banking Service,” Journal of Information Processing, Vol. 31, pp. 643–653 (2023) [PDF]
  14. Ayako A. HASEGAWA, Mitsuaki AKIYAMA, Naomi YAMASHITA, Daisuke INOUE, Tatsuya MORI, “Analysis of Non-Experts’ Security- and Privacy-Related Questions on a Q&A Site,” IEICE TRANSACTIONS on Information and Systems, Vol. E106-D, No. 9, pp.1380–1396 [PDF]
  15. Ayako A. Hasegawa, Naomi Yamashita, Mitsuaki Akiyama, and Tatsuya Mori.
    Experiences, Behavioral Tendencies, and Concerns of Non-Native English Speakers in Identifying Phishing Emails,” In Journal of Information Processing, Vol. 30, pp. 841–858 (2022).
  16. Tianying Xie, Hayato Yamana, and Tatsuya Mori, “CHE: Channel-wise Homomorphic Encryption for Ciphertext Inference in Convolutional Neural Network,” IEEE ACCESS, Volume: 10, pp. 107446–107458, September 2022 [PDF]
  17. Yuji Sakurai, Takuya Watanabe, Tetsuya Okuda, Mitsuaki Akiyama, Tatsuya Mori, “Identifying the Phishing Websites Using the Patterns of TLS Certificates, ” Journal of Cyber Security and Mobility,  Volume 10, Issue 2, pp. 451–486, 2021 [PDF]
  18. Ayako Akiyama Hasegawa, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, and Tatsuya Mori, “Addressing the Privacy Threat to Identify Existence of a Target’s Account on Sensitive Services,” Journal of Information Processing, Vol.28, pages 1030-1046. December 2020. [PDF]
  19. K. Mori, T. Watanabe, Y. Zhou, A. A. Hasegawa, M. Akiyama, and T. Mori, “Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?,” IEICE Transactions on Information and Systems, Vol. 103-D, No. 7, pp. 1541-1555, July 2020 [PDF]
  20. Mitsuhiro HATADA Tatsuya MORI, “CLAP: Classification of Android PUAs by Similarity of DNS Queries,” IEICE TRANSACTIONS on Information and Systems, Vol. 103-D, No. 2, pp. 265–275, January 2020 [PDF]
  21. Takuya WATANABE Mitsuaki AKIYAMA Fumihiro KANEI Eitaro SHIOJI Yuta TAKATA Bo SUN Yuta ISHII Toshiki SHIBAHARA Takeshi YAGI Tatsuya MORI, “Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library,” IEICE TRANSACTIONS on Information and Systems, Vol. 103-D, No. 2, pp. 276–291,  January 2020 [PDF]
  22. Takuya WATANABE Eitaro SHIOJI Mitsuaki AKIYAMA Keito SASAOKA Takeshi YAGI Tatsuya MORI, “Follow Your Silhouette: Identifying the Social Account of Website Visitors through User-Blocking Side Channel,” IEICE TRANSACTIONS on Information and Systems, Vol. 103-D, No. 2, pp. 239–255, January 2020 [PDF]
  23. R. Iijima, S. Minami, Y. Zhou, T. Takehisa, T. Takahashi, Y. Oikawa, and T. Mori, “Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams and its Feasibility,” IEEE Transactions on Emerging Topics in Computing PP(99):1-1 · November 2019 [PDF]
  24. Kanae Yoshida, Hironori Imai, Nana Serizawa, Tatsuya Mori, Akira Kanaoka, “Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps,” Journal of Information Processing, Vol. 27, pp. 593-602, September 2019 [PDF]
  25. Bo Sun, Akinori Fujino, Tatsuya Mori, Tao Ban, Takeshi Takahashi, and Daisuke Inoue, “Automatically Generating Malware Analysis Reports Using Sandbox Logs,” IEICE Transactions on Information and Systems, Vol. E101-D, No. 11, pp. 2622–2632, November 2018. [PDF]
  26. T. Watanabe, M. Akiyama, T. Sakai, H. Washizaki, and T. Mori, “Understanding the Inconsistency between Behaviors and Descriptions of Mobile Apps,” IEICE Transactions on Information and Systems, Vol. Vol.E101-D, No. 11, pp. 2584–2599, November 2018. [PDF]
  27. 長谷川彩子, 秋山満昭, 八木毅, 森達哉, “オンラインオークションにおける購入履歴漏洩のリスクとユーザ認識の調査,” 情報処理学会論文誌, Vol. 59, No. 9, pp. 1689–1698, 2018年9月 [PDF]
  28. D. Chiba, M. Akiyama, T. Yagi, K. Hato, T. Mori, and S. Goto, “DomainChroma: Building Actionable Threat Intelligence from Malicious Domain Names,” Elsevier Computers & Security, Volume 77, Pages 138-161, August 2018 [PDF]
  29. S. Mizuno, M. Hatada, T. Mori, and S. Goto, “Detecting Malware-infected Devices Using the HTTP Header Patterns,” IEICE Transactions on Information and Systems, Vol. E101-D, No.5, pp.1370-1379, May. 2018. [PDF]
  30. B. Sun, X. Luo, M. Akiyama, T. Watanabe and T. Mori, “PADetective: A Systematic Approach to Automate Detection of Promotional Attackers in Mobile App Store,” Journal of Information Processing, vol. 26, pp. 212-223, April 2018 https://doi.org/10.2197/ipsjjip.26.212
  31. D. Chiba, T. Yagi, M. Akiyama, T. Shibahara, T. Mori, and S. Goto, “DomainProfiler: Towards Accurate and Early Discovery of Domain Names Abused in Future,” International Journal of Information Security, Volume 17, Issue 6, pp 661–680, 2018 [PDF] DOI:10.1007/s10207-017-0396-7
  32. T. Kimura, K. Ishibashi, T. Mori, H. Sawada, T. Toyono, K. Nishimatsu, A. Watanabe, A. Shimoda, and K. Shiomoto, “Network Event Extraction from Log Data with Nonnegative Tensor Factorization,” IEICE Transactions on Communications, Vol.E100-B, No.10, pp.1865-1878, Oct. 2017.
  33. M. Hatada and T. Mori, “Finding New Varieties of Malware with the Classification of Network Behavior,” IEICE Transactions on Information and Systems, Vol. E100-D, No. 8, pp. 1691–1702, Aug. 2017 [PDF]
  34. T. Watanabe, M. Akiyama, and T. Mori, “Tracking the Human Mobility Using Mobile Device Sensors,” IEICE Transactions on Information and Systems, Vol. E100-D, No. 8, pp. 1680–1690, Aug. 2017 [PDF]
  35. Y. Haga, Y. Takata, M. Akiyama, and T. Mori, “Building a Scalable Web Tracking Detection System: Implementation and the Empirical Study,” IEICE Transactions on Information and Systems, Vol. 100-D, No.
    8, pp. 1663–1670, Aug. 2017 [PDF]
  36. Y. Ishii, T. Watanabe, M. Akiyama, and T. Mori, “APPraiser: A large scale analysis of Android clone apps,” IEICE Transactions on Information and Systems, Vol. E100-D, No. 8, pp. 1703–1713, Aug. 2017 [PDF]
  37. M. Akiyama, T. Yagi, T. Yada, T. Mori, and Y. Kadobayashi, “Analyzing the Ecosystem of Malicious URL Redirection Through Longitudinal Observation from Honeypots,” Elsevier Computers & Security, vol. 69, pp. 155–173, Aug. 2017 [abstract]
  38. 衣川昌宏,林優一,森達哉 “意図的な電磁妨害時にハードウェアトロイよって引き起こされる情報漏えい評価電気学会論文誌A,Vol. 137, No. 3, pp. 153–157, 2017年3月 [JSTAGE]
  39. T. Mori, T. Inoue, A. Shimoda, K. Sato, K. Ishibashi, and S. Goto, “Statistical Estimation of the Names of HTTPS Servers with Domain Name Graphs,” Computer Communications, Volume 94, Pages 104–113, November 2016. [abstract]
  40. B. Sun, M. Akiyama, T. Yagi, M. Hatada, and T. Mori, “Automating URL Blacklist Generation with Similarity Search Approach,” IEICE Transactions on Information and Systems, Vol.E99-D, No.4, pp. 873–882, April 2016 [IEICE].
  41. Daiki Chiba, Kazuhiro Tobe, Tatsuya Mori, Shigeki Goto: Analyzing Spatial Structure of IP Addresses for Detecting Malicious Websites. Journal of Information Processing 21(3): 539-550 (2013) [PDF][bibtex]