default search action
Daisuke Inoue
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j64]Muhammad Fakhrur Rozi, Tao Ban, Seiichi Ozawa, Akira Yamada, Takeshi Takahashi, Daisuke Inoue:
Securing Code With Context: Enhancing Vulnerability Detection Through Contextualized Graph Representations. IEEE Access 12: 142101-142126 (2024) - [j63]Daisuke Inoue, Hiroshi Yamashita, Kazuyuki Aihara, Hiroaki Yoshida:
Traffic Signal Optimization in Large-Scale Urban Road Networks: An Adaptive-Predictive Controller Using Ising Models. IEEE Access 12: 188739-188754 (2024) - [c104]Rui Tanabe, Yuta Inoue, Daigo Ichikawa, Takahiro Kasama, Daisuke Inoue, Katsunari Yoshioka, Tsutomu Matsumoto:
Customized Malware: Identifying Target Systems Using Personally Identifiable Information. COMPSAC 2024: 1007-1012 - [c103]Toshiro Sawamoto, Mio Suzuki, Yutaro Osako, Takahiro Kasama, Daisuke Inoue, Koji Nakao:
Inherited Threat Reproduction on Open Source 5G Testbed. DSC 2024: 9-16 - [c102]Ryoichi Isawa, Nobuyuki Kanaya, Daisuke Inoue:
Information Flow Tracking for Hardware Trojan Detection: a Feasibility Study. DSC 2024: 51-57 - [c101]Mizuho Hasegawa, Yamato Kawaguchi, Hiroaki Takayama, Yasuhiro Kunimine, Hidekazu Tanaka, Shintaro Kawamura, Akira Fujita, Shingo Yasuda, Daisuke Inoue, Nobuyo Fujiwara, Kazuki Takada, Rui Tanabe, Katsunari Yoshioka:
A Case Study of URL Blocklist Maintenance. DSC 2024: 100-101 - [c100]Kyohei Takao, Chika Hiraishi, Rui Tanabe, Kazuki Takada, Akira Fujita, Daisuke Inoue, Carlos Gañán, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto:
VT-SOS: A Cost-effective URL Warning utilizing VirusTotal as a Second Opinion Service. NOMS 2024: 1-5 - [c99]Ayako Akiyama Hasegawa, Daisuke Inoue, Mitsuaki Akiyama:
How WEIRD is Usable Privacy and Security Research? USENIX Security Symposium 2024 - [i11]Daisuke Inoue, Yuji Ito, Takahito Kashiwabara, Norikazu Saito, Hiroaki Yoshida:
An Uncertainty-aware, Mesh-free Numerical Method for Kolmogorov PDEs. CoRR abs/2405.05626 (2024) - [i10]Shihori Koyama, Daisuke Inoue, Hiroaki Yoshida, Kazuyuki Aihara, Gouhei Tanaka:
Predicting unobserved climate time series data at distant areas via spatial correlation using reservoir computing. CoRR abs/2406.03061 (2024) - [i9]Daisuke Inoue, Hiroshi Yamashita, Kazuyuki Aihara, Hiroaki Yoshida:
AMPIC: Adaptive Model Predictive Ising Controller for large-scale urban traffic signals. CoRR abs/2406.03690 (2024) - 2023
- [j62]Muhammad Fakhrur Rozi, Tao Ban, Seiichi Ozawa, Akira Yamada, Takeshi Takahashi, Sangwook Kim, Daisuke Inoue:
Detecting Malicious JavaScript Using Structure-Based Analysis of Graph Representation. IEEE Access 11: 102727-102745 (2023) - [j61]Prawit Buayai, Kabin Yok-In, Daisuke Inoue, Hiromitsu Nishizaki, Koji Makino, Xiaoyang Mao:
Supporting table grape berry thinning with deep neural network and augmented reality technologies. Comput. Electron. Agric. 213: 108194 (2023) - [j60]Chia-Yi Wu, Tao Ban, Shin-Ming Cheng, Takeshi Takahashi, Daisuke Inoue:
IoT malware classification based on reinterpreted function-call graphs. Comput. Secur. 125: 103060 (2023) - [j59]Kosuke Murakami, Takahiro Kasama, Daisuke Inoue:
A Large-Scale Investigation into the Possibility of Malware Infection of IoT Devices with Weak Credentials. IEICE Trans. Inf. Syst. 106(9): 1316-1325 (2023) - [j58]Ayako Akiyama Hasegawa, Mitsuaki Akiyama, Naomi Yamashita, Daisuke Inoue, Tatsuya Mori:
Analysis of Non-Experts' Security- and Privacy-Related Questions on a Q&A Site. IEICE Trans. Inf. Syst. 106(9): 1380-1396 (2023) - [j57]Daisuke Inoue, Yuji Ito, Takahito Kashiwabara, Norikazu Saito, Hiroaki Yoshida:
Partially Centralized Model-Predictive Mean Field Games for controlling multi-agent systems. IFAC J. Syst. Control. 24: 100217 (2023) - [c98]Samuel Ndichu, Tao Ban, Takeshi Takahashi, Daisuke Inoue:
Machine Learning-Based Security Alert Screening with Focal Loss. IEEE Big Data 2023: 3043-3052 - [c97]Jiaxing Zhou, Tao Ban, Tomohiro Morikawa, Takeshi Takahashi, Daisuke Inoue:
Color-coded Attribute Graph: Visual Exploration of Distinctive Traits of IoT-Malware Families. ISCC 2023: 1410-1416 - [c96]Daisuke Inoue, Kaishi Naito, Prawit Buayai, Xiaoyang Mao:
AiRcupid: Supporting Cucumber Picking for Intellectual Disabilities using Artificial Intelligence and Augmented Reality. ISMAR-Adjunct 2023: 289-295 - [c95]Daisuke Inoue, Konosuke Aoyama, Naoki Fujiwara, Daisei Shoji, Harold Kamisugi:
A high-power, power-efficient 1.3-μm SOA-integrated DFB laser for CPO applications. OFC 2023: 1-3 - [c94]Nissy Sombatruang, Tristan Caulfield, Ingolf Becker, Akira Fujita, Takahiro Kasama, Koji Nakao, Daisuke Inoue:
Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT. USENIX Security Symposium 2023: 1541-1558 - [i8]Daisuke Inoue, Yuji Ito, Takahito Kashiwabara, Norikazu Saito, Hiroaki Yoshida:
Convergence Analysis of the Upwind Difference Methods for Hamilton-Jacobi-Bellman Equations. CoRR abs/2301.06415 (2023) - [i7]Ayako Akiyama Hasegawa, Daisuke Inoue, Mitsuaki Akiyama:
A Survey on the Geographic Diversity of Usable Privacy and Security Research. CoRR abs/2305.05004 (2023) - 2022
- [j56]Chansu Han, Jun'ichi Takeuchi, Takeshi Takahashi, Daisuke Inoue:
Dark-TRACER: Early Detection Framework for Malware Activity Based on Anomalous Spatiotemporal Patterns. IEEE Access 10: 13038-13058 (2022) - [j55]Kyogo Ota, Daisuke Inoue, Mamoru Sawahashi, Satoshi Nagata:
Radio Frame Timing Detection Method Using Demodulation Reference Signals Based on PCID Detection for NR Initial Access. IEICE Trans. Commun. 105-B(6): 775-787 (2022) - [j54]Björn Sommer, Daisuke Inoue, Marc Baaden:
Design X Bioinformatics: a community-driven initiative to connect bioinformatics and design. J. Integr. Bioinform. 19(2) (2022) - [j53]Mousumi Akter, J. J. Keya, K. Kayano, Arif Rashedul Kabir, Daisuke Inoue, Henry Hess, K. Sada, Akinori Kuzuya, Hiroyuki Asanuma, Akira Kakugo:
Cooperative cargo transportation by a swarm of molecular machines. Sci. Robotics 7(65) (2022) - [j52]Bo Sun, Takeshi Takahashi, Tao Ban, Daisuke Inoue:
Detecting Android Malware and Classifying Its Families in Large-scale Datasets. ACM Trans. Manag. Inf. Syst. 13(2): 12:1-12:21 (2022) - [c93]Samuel Ndichu, Tao Ban, Takeshi Takahashi, Daisuke Inoue:
Security-Alert Screening with Oversampling Based on Conditional Generative Adversarial Networks. AsiaJCIS 2022: 1-7 - [c92]Ryoichi Isawa, Nobuyuki Kanaya, Yoshitada Fujiwara, Tatsuya Takehisa, Hayato Ushimaru, Dai Arisue, Daisuke Makita, Satoshi Mimura, Daisuke Inoue:
An HDL Simulator with Direct Register Access for Improving Code Coverage. AsiaJCIS 2022: 49-55 - [c91]Nobuyuki Kanaya, Yu Tsuda, Yuuki Takano, Yoshitada Fujiwara, Ryoichi Isawa, Daisuke Inoue:
NEMIANA: Cross-Platform Execution Migration for Debugging. AST@ICSE 2022: 138-147 - [c90]Samuel Ndichu, Tao Ban, Takeshi Takahashi, Daisuke Inoue:
Critical-Threat-Alert Detection using Online Machine Learning. IEEE Big Data 2022: 3007-3014 - [c89]Kaishi Naito, Daisuke Inoue, Prawit Buayai, Xiaoyang Mao:
A Pilot Study on the AR Interface Design for People with Intellectual Disabilities. CW 2022: 203-208 - [c88]Mitsuhiro Umizaki, Tomohiro Morikawa, Akira Fujita, Takeshi Takahashi, Tsung-Nan Lin, Daisuke Inoue:
Understanding the Characteristics of Public Blocklist Providers. ISCC 2022: 1-7 - [c87]Ayako Akiyama Hasegawa, Naomi Yamashita, Tatsuya Mori, Daisuke Inoue, Mitsuaki Akiyama:
Understanding Non-Experts' Security- and Privacy-Related Questions on a Q&A Site. SOUPS @ USENIX Security Symposium 2022: 39-56 - [i6]Daisuke Inoue, Yuji Ito, Takahito Kashiwabara, Norikazu Saito, Hiroaki Yoshida:
A Fictitious-play Finite-difference Method for Linearly Solvable Mean Field Games. CoRR abs/2204.07278 (2022) - [i5]Nissy Sombatruang, Tristan Caulfield, Ingolf Becker, Akira Fujita, Takahiro Kasama, Koji Nakao, Daisuke Inoue:
Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT. CoRR abs/2210.02137 (2022) - 2021
- [j51]Bo Sun, Tao Ban, Chansu Han, Takeshi Takahashi, Katsunari Yoshioka, Jun'ichi Takeuchi, Abdolhossein Sarrafzadeh, Meikang Qiu, Daisuke Inoue:
Leveraging Machine Learning Techniques to Identify Deceptive Decoy Documents Associated With Targeted Email Attacks. IEEE Access 9: 87962-87971 (2021) - [j50]Daisuke Inoue, Yuji Ito, Hiroaki Yoshida:
Optimal Transport-Based Coverage Control for Swarm Robot Systems: Generalization of the Voronoi Tessellation-Based Method. IEEE Control. Syst. Lett. 5(4): 1483-1488 (2021) - [j49]Elsa Turcios Rodriguez, Susanne Verstegen, Arman Noroozian, Daisuke Inoue, Takahiro Kasama, Michel van Eeten, Carlos Hernandez Gañán:
User compliance and remediation success after IoT malware notifications. J. Cybersecur. 7(1) (2021) - [j48]Daisuke Inoue, Kyogo Ota, Mamoru Sawahashi, Satoshi Nagata:
Physical Cell ID Detection Probability Using NB-IoT Synchronization Signals in 28-GHz Band. IEICE Trans. Commun. 104-B(9): 1110-1119 (2021) - [j47]Daisuke Inoue, Kyogo Ota, Mamoru Sawahashi, Satoshi Nagata:
Physical Cell ID Detection Using Joint Estimation of Frequency Offset and SSS Sequence for NR Initial Access. IEICE Trans. Commun. 104-B(9): 1120-1128 (2021) - [j46]Daisuke Inoue, Tomomi Miyake, Mitsuhiro Sugimoto:
Flexoelectric Effect on Image Sticking Caused by Residual Direct Current Voltage and Flicker Phenomenon in Fringe-Field Switching Mode Liquid Crystal Display. IEICE Trans. Electron. 104-C(2): 45-51 (2021) - [c86]Daisuke Inoue, Yuji Ito, Hiroaki Yoshida:
Optimal Transport-based Coverage Control for Swarm Robot Systems: Generalization of the Voronoi Tessellation-based Method. ACC 2021: 3032-3037 - [c85]Samuel Ndichu, Tao Ban, Takeshi Takahashi, Daisuke Inoue:
A Machine Learning Approach to Detection of Critical Alerts from Imbalanced Multi-Appliance Threat Alert Logs. IEEE BigData 2021: 2119-2127 - [c84]Prawit Buayai, Kabin Yok-In, Daisuke Inoue, Chee Siang Leow, Hiromitsu Nishizaki, Koji Makino, Xiaoyang Mao:
End-to-End Inflorescence Measurement for Supporting Table Grape Trimming with Augmented Reality. CW 2021: 101-108 - [c83]Daisuke Inoue, Prawit Buayai, Hiromitsu Nishizaki, Koji Makino, Xiaoyang Mao:
Supporting Vine Vegetation Status Observation Using AR. CW 2021: 147-150 - [c82]Muhammad Fakhrur Rozi, Tao Ban, Seiichi Ozawa, Sangwook Kim, Takeshi Takahashi, Daisuke Inoue:
JStrack: Enriching Malicious JavaScript Detection Based on AST Graph Analysis and Attention Mechanism. ICONIP (2) 2021: 669-680 - [c81]Keisuke Furumoto, Mitsuhiro Umizaki, Akira Fujita, Takahiko Nagata, Takeshi Takahashi, Daisuke Inoue:
Extracting Threat Intelligence Related IoT Botnet From Latest Dark Web Data Collection. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2021: 138-145 - [c80]Daisuke Inoue, Yuji Ito, Takahito Kashiwabara, Norikazu Saito, Hiroaki Yoshida:
Model Predictive Mean Field Games for Controlling Multi-Agent Systems. SMC 2021: 982-987 - [c79]Chansu Han, Jun'ichi Takeuchi, Takeshi Takahashi, Daisuke Inoue:
Automated Detection of Malware Activities Using Nonnegative Matrix Factorization. TrustCom 2021: 548-556 - [c78]Akira Fujita, Tao Ban, Takeshi Takahashi, Daisuke Inoue:
On-premises Analysis of Advanced Threat Prevention Appliances. CSET @ USENIX Security Symposium 2021: 1-8 - [c77]Tao Ban, Samuel Ndichu, Takeshi Takahashi, Daisuke Inoue:
Combat Security Alert Fatigue with AI-Assisted Techniques. CSET @ USENIX Security Symposium 2021: 9-16 - [c76]Daisuke Inoue, Kyogo Ota, Mamoru Sawahashi, Satoshi Nagata:
Physical Cell ID Detection Using Joint Estimation of Frequency Offset and SSS Sequence for NR Initial Access. VTC Spring 2021: 1-6 - [c75]Daisuke Inoue, Kyogo Ota, Mamoru Sawahashi, Satoshi Nagata:
Synchronization Signal Design Using Single-Carrier Waveform for Physical- Layer Cell ID Detection. VTC Fall 2021: 1-6 - [c74]Shun Yoneda, Daisuke Inoue, Mamoru Sawahashi, Satoshi Nagata:
Physical Cell ID Detection Performance Using Polarization Receiver Diversity for NR in 3GPP CDL Channel Models. WPMC 2021: 1-6 - 2020
- [j45]Muhamad Erza Aminanto, Tao Ban, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue:
Threat Alert Prioritization Using Isolation Forest and Stacked Auto Encoder With Day-Forward-Chaining Analysis. IEEE Access 8: 217977-217986 (2020) - [j44]Shihori Koyama, Daisuke Inoue, Akihisa Okada, Hiroaki Yoshida:
Separation of pedestrian counter flows with an array of obstacles. Artif. Life Robotics 25(4): 529-536 (2020) - [j43]Chansu Han, Jumpei Shimamura, Takeshi Takahashi, Daisuke Inoue, Jun'ichi Takeuchi, Koji Nakao:
Real-Time Detection of Global Cyberthreat Based on Darknet by Estimating Anomalous Synchronization Using Graphical Lasso. IEICE Trans. Inf. Syst. 103-D(10): 2113-2124 (2020) - [j42]Tzu-Ling Wan, Tao Ban, Shin-Ming Cheng, Yen-Ting Lee, Bo Sun, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue:
Efficient Detection and Classification of Internet-of-Things Malware Based on Byte Sequences from Executable Files. IEEE Open J. Comput. Soc. 1: 262-275 (2020) - [c73]Tzu-Ling Wan, Tao Ban, Yen-Ting Lee, Shin-Ming Cheng, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue:
IoT-Malware Detection Based on Byte Sequences of Executable Files. AsiaJCIS 2020: 143-150 - [c72]Keisuke Furumoto, Antti Kolehmainen, Bilhanan Silverajan, Takeshi Takahashi, Daisuke Inoue, Koji Nakao:
Toward Automated Smart Ships: Designing Effective Cyber Risk Management. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 100-105 - [c71]Takeshi Takahashi, Christopher Kruegel, Giovanni Vigna, Katsunari Yoshioka, Daisuke Inoue:
Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs? RAID 2020: 93-106 - [c70]Shin-Ming Cheng, Tao Ban, Jr-Wei Huang, Bing-Kai Hong, Daisuke Inoue:
ELF Analyzer Demo: Online Identification for IoT Malwares with Multiple Hardware Architectures. SP (Workshops) 2020: 126 - [c69]Yen-Ting Lee, Tao Ban, Tzu-Ling Wan, Shin-Ming Cheng, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue:
Cross Platform IoT- Malware Family Classification based on Printable Strings. TrustCom 2020: 775-784 - [c68]Daisuke Inoue, Kyogo Ota, Mamoru Sawahashi, Satoshi Nagata:
Physical Cell ID Detection Probability Using Synchronization Signals of NB-IoT Radio Interface in 28-GHz Band. VTC Spring 2020: 1-6 - [i4]Daisuke Inoue, Hiroaki Yoshida:
Model Predictive Control for Finite Input Systems using the D-Wave Quantum Annealer. CoRR abs/2001.01400 (2020) - [i3]Daisuke Inoue, Akihisa Okada, Tadayoshi Matsumori, Kazuyuki Aihara, Hiroaki Yoshida:
Traffic Signal Optimization on a Square Lattice using the D-Wave Quantum Annealer. CoRR abs/2003.07527 (2020) - [i2]Daisuke Inoue, Hiroaki Yoshida:
Optimal Coverage Control for Swarm Robot Systems using a Mean Field Game. CoRR abs/2004.07994 (2020) - [i1]Daisuke Inoue, Yuji Ito, Hiroaki Yoshida:
Optimal Transport-based Coverage Control for Swarm Robot Systems: Generalization of the Voronoi Tessellation-based Method. CoRR abs/2011.08337 (2020)
2010 – 2019
- 2019
- [j41]Tao Ban, Ryoichi Isawa, Shin-Ying Huang, Katsunari Yoshioka, Daisuke Inoue:
A Cross-Platform Study on Emerging Malicious Programs Targeting IoT Devices. IEICE Trans. Inf. Syst. 102-D(9): 1683-1685 (2019) - [j40]Satoru Nakamura, Atsushi Yamashita, Fumihiro Inoue, Daisuke Inoue, Yusuke Takahashi, Nobukazu Kamimura, Takao Ueno:
Inspection Test of a Tunnel with an Inspection Vehicle for Tunnel Lining Concrete. J. Robotics Mechatronics 31(6): 762-771 (2019) - [c67]Bing-Kai Hong, Jr-Wei Huang, Tao Ban, Ryoichi Isawa, Shin-Ming Cheng, Daisuke Inoue, Koji Nakao:
Measurement Study Towards a Unified Firmware Updating Scheme for Legacy IoT Devices. AsiaJCIS 2019: 9-15 - [c66]Nobuyuki Kanaya, Yu Tsuda, Yuuki Takano, Daisuke Inoue:
Byakko: Automatic Whitelist Generation based on Occurrence Distribution of Features of Network Traffic. IEEE BigData 2019: 3190-3199 - [c65]Ryutaro Ushigome, Mio Suzuki, Tao Ban, Takeshi Takahashi, Daisuke Inoue, Takeshi Matsuda, Michio Sonoda:
Establishing Trusted and Timely Information Source using Social Media Services. CCNC 2019: 1-2 - [c64]Muhamad Erza Aminanto, Lei Zhu, Tao Ban, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue:
Combating Threat-Alert Fatigue with Online Anomaly Detection Using Isolation Forest. ICONIP (1) 2019: 756-765 - [c63]Orçun Çetin, Carlos Gañán, Lisette Altena, Takahiro Kasama, Daisuke Inoue, Kazuki Tamiya, Ying Tie, Katsunari Yoshioka, Michel van Eeten:
Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai. NDSS 2019 - [c62]Muhamad Erza Aminanto, Lei Zhu, Tao Ban, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue:
Automated Threat-Alert Screening for Battling Alert Fatigue with Temporal Isolation Forest. PST 2019: 1-3 - [c61]Bo Sun, Tao Ban, Shun-Chieh Chang, Yeali S. Sun, Takeshi Takahashi, Daisuke Inoue:
A scalable and accurate feature representation method for identifying malicious mobile applications. SAC 2019: 1182-1189 - [c60]Hideaki Kanehara, Yuma Murakami, Jumpei Shimamura, Takeshi Takahashi, Daisuke Inoue, Noboru Murata:
Real-time botnet detection using nonnegative tucker decomposition. SAC 2019: 1337-1344 - [c59]Daisuke Inoue, Daisuke Murai, Yasuhiro Ikuta, Hiroaki Yoshida:
Distributed Range-based Localization for Swarm Robot Systems using Sensor-fusion Technique. SENSORNETS 2019: 13-22 - [c58]Daisuke Inoue, Daisuke Murai, Hiroaki Yoshida:
Stochastic Self-organizing Control for Swarm Robot Systems. ICSI (1) 2019: 405-416 - [c57]Chansu Han, Jumpei Shimamura, Takeshi Takahashi, Daisuke Inoue, Masanori Kawakita, Jun'ichi Takeuchi, Koji Nakao:
Real-Time Detection of Malware Activities by Analyzing Darknet Traffic Using Graphical Lasso. TrustCom/BigDataSE 2019: 144-151 - 2018
- [j39]Ryoya Furukawa, Ryoichi Isawa, Masakatu Morii, Daisuke Inoue, Koji Nakao:
FCReducer: Locating Symmetric Cryptographic Functions on the Memory. IEICE Trans. Inf. Syst. 101-D(3): 685-697 (2018) - [j38]Daisuke Inoue, Tomomi Miyake, Mitsuhiro Sugimoto:
A Mechanism of Short-Term Image-Sticking Phenomenon Caused by Flexoelectric Effect in IPS LCD. IEICE Trans. Electron. 101-C(11): 846-850 (2018) - [j37]Bo Sun, Akinori Fujino, Tatsuya Mori, Tao Ban, Takeshi Takahashi, Daisuke Inoue:
Automatically Generating Malware Analysis Reports Using Sandbox Logs. IEICE Trans. Inf. Syst. 101-D(11): 2622-2632 (2018) - [c56]Ryoichi Isawa, Tao Ban, Ying Tie, Katsunari Yoshioka, Daisuke Inoue:
Evaluating Disassembly-Code Based Similarity between IoT Malware Samples. AsiaJCIS 2018: 89-94 - [c55]Yu Tsuda, Junji Nakazato, Yaichiro Takagi, Daisuke Inoue, Koji Nakao, Kenjiro Terada:
A Lightweight Host-Based Intrusion Detection Based on Process Generation Patterns. AsiaJCIS 2018: 102-108 - [c54]Rui Tanabe, Wataru Ueno, Kou Ishii, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, Christian Rossow:
Evasive Malware via Identifier Implanting. DIMVA 2018: 162-184 - [c53]Daisuke Inoue, Daehwan Jung, Justin Norman, Yating Wan, Nobuhiko Nishiyama, Shigehisa Arai, Arthur C. Gossard, John E. Bowers:
NRZ and PAM-4 Direct Modulation of 1.3µm Quantum Dot Lasers Grown Directly on On-Axis (001) Si. ECOC 2018: 1-3 - [c52]Tao Ban, Ryoichi Isawa, Katsunari Yoshioka, Daisuke Inoue:
A Cross-Platform Study on IoT Malware. ICMU 2018: 1-2 - [c51]Lei Zhu, Tao Ban, Takeshi Takahashi, Daisuke Inoue:
Employ Decision Values for Soft-Classifier Evaluation with Crispy References. ICONIP (4) 2018: 392-402 - [c50]Shaoning Pang, Lei Zhu, Tao Ban, Kazushi Ikeda, Wangfei Zhang, Abdolhossein Sarrafzadeh, Takeshi Takahashi, Daisuke Inoue:
Online Max-flow Learning via Augmenting and De-augmenting Path. IJCNN 2018: 1-8 - [c49]Chalee Vorakulpipat, Takeshi Takahashi, Ekkachan Rattanalerdnusorn, Phithak Thaenkaew, Daisuke Inoue:
Usable and Secure Cloud-based Biometric Authentication Solution for IoT Devices. ISCC 2018: 274-277 - 2017
- [j36]Gregory Gutmann, Daisuke Inoue, Akira Kakugo, Akihiko Konagaya:
Parallel Interaction Detection Algorithms for a Particle-based Live Controlled Real-time Microtubule Gliding Simulation System Accelerated by GPGPU. New Gener. Comput. 35(2): 157-180 (2017) - [j35]Shaoning Pang, Dan Komosny, Lei Zhu, Ruibin Zhang, Abdolhossein Sarrafzadeh, Tao Ban, Daisuke Inoue:
Malicious Events Grouping via Behavior Based Darknet Traffic Flow Analysis. Wirel. Pers. Commun. 96(4): 5335-5353 (2017) - [c48]Tao Ban, Lei Zhu, Jumpei Shimamura, Shaoning Pang, Daisuke Inoue, Koji Nakao:
Detection of Botnet Activities Through the Lens of a Large-Scale Darknet. ICONIP (5) 2017: 442-451 - [c47]Tao Ban, Daisuke Inoue:
Practical darknet traffic analysis: Methods and case studies. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-8 - 2016
- [j34]Daisuke Inoue, Atsushi Miura, Tsuyoshi Nomura, Hisayoshi Fujikawa, Kazuo Sato, Naoki Ikeda, Daiju Tsuya, Yoshimasa Sugimoto, Yasuo Koide:
Optical Filters Based on Nano-Sized Hole and Slit Patterns in Aluminum Films. IEICE Trans. Electron. 99-C(3): 358-364 (2016) - [j33]Gregory Gutmann, Daisuke Inoue, Akira Kakugo, Akihiko Konagaya:
Real-time 3D microtubule gliding simulation accelerated by GPU computing. Int. J. Autom. Comput. 13(2): 108-116 (2016) - [j32]Daisuke Inoue, Arif Rashedul Kabir, Akira Kakugo:
Intelligence of reconstructed biomolecular motor system. EAI Endorsed Trans. Self Adapt. Syst. 2(8): e4 (2016) - [j31]Lei Zhu, Shaoning Pang, Abdolhossein Sarrafzadeh, Tao Ban, Daisuke Inoue:
Incremental and Decremental Max-Flow for Online Semi-Supervised Learning. IEEE Trans. Knowl. Data Eng. 28(8): 2115-2127 (2016) - [c46]Akio Koyama, Daisuke Inoue, Shuji Shoji:
An Implementation of Visualization System for Vehicles and Pedestrians. AINA Workshops 2016: 633-637 - [c45]Tao Ban, Takeshi Takahashi, Shanqing Guo, Daisuke Inoue, Koji Nakao:
Integration of Multi-modal Features for Android Malware Detection Using Linear SVM. AsiaJCIS 2016: 141-146 - [c44]Ryoichi Isawa, Masakatu Morii, Daisuke Inoue:
Comparing Malware Samples for Unpacking: A Feasibility Study. AsiaJCIS 2016: 155-160 - [c43]Takeshi Takahashi, Tao Ban, Chin-Wei Tien, Chih-Hung Lin, Daisuke Inoue, Koji Nakao:
The Usability of Metadata for Android Application Analysis. ICONIP (1) 2016: 546-554 - [c42]Gregory Gutmann, Daisuke Inoue, Akira Kakugo, Akihiko Konagaya:
Using a master and slave approach for GPGPU computing to achieve optimal scaling in a 3D real-time simulation. NEMS 2016: 95-100 - [c41]Bulibuli Mahemuti, Daisuke Inoue, Akira Kakugo, Akihiko Konagaya:
Investigation of the microtubule dynamics with probabilistic data association filter. NEMS 2016: 101-106 - [c40]Takeshi Takahashi, Daisuke Inoue:
Generating software identifier dictionaries from Vulnerability Database. PST 2016: 417-420 - [c39]Akira Yokoyama, Kou Ishii, Rui Tanabe, Yinmin Papa, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, Michael Brengel, Michael Backes, Christian Rossow:
SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion. RAID 2016: 165-187 - [c38]Tao Ban, Daisuke Inoue:
Feature subset selection by SVM ensemble. SSCI 2016: 1-8 - [c37]Tao Ban, Shaoning Pang, Masashi Eto, Daisuke Inoue, Koji Nakao, Runhe Huang:
Towards Early Detection of Novel Attack Patterns through the Lens of a Large-Scale Darknet. UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld 2016: 341-349 - 2015
- [j30]Masashi Eto, Tomohide Tanaka, Koei Suzuki, Mio Suzuki, Daisuke Inoue, Koji Nakao:
GHOST Sensor: A Proactive Cyber Attack Monitoring Platform. IEICE Trans. Inf. Syst. 98-D(4): 788-795 (2015) - [j29]Ryoichi Isawa, Daisuke Inoue, Koji Nakao:
An Original Entry Point Detection Method with Candidate-Sorting for More Effective Generic Unpacking. IEICE Trans. Inf. Syst. 98-D(4): 883-893 (2015) - [c36]Ichiro Shimada, Yu Tsuda, Masashi Eto, Daisuke Inoue:
Using Bayesian Decision Making to Detect Slow Scans. BADGERS@RAID 2015: 32-41 - [c35]Daisuke Inoue, Arif Rashedul Kabir, Akira Kakugo:
Intelligence of reconstructed biomolecular motor system. BICT 2015: 381-382 - [c34]Kenji Kashima, Daisuke Inoue:
Replay attack detection in control systems with quantized signals. ECC 2015: 782-787 - [c33]Tao Ban, Masashi Eto, Shanqing Guo, Daisuke Inoue, Koji Nakao, Runhe Huang:
A study on association rule mining of darknet big data. IJCNN 2015: 1-7 - [c32]Shaoning Pang, Yiming Peng, Tao Ban, Daisuke Inoue, Abdolhossein Sarrafzadeh:
A federated network online network traffics analysis engine for cybersecurity. IJCNN 2015: 1-8 - 2014
- [j28]Shaoning Pang, Fan Liu, Youki Kadobayashi, Tao Ban, Daisuke Inoue:
A Learner-Independent Knowledge Transfer Approach to Multi-task Learning. Cogn. Comput. 6(3): 304-320 (2014) - [j27]Ryoichi Isawa, Tao Ban, Shanqing Guo, Daisuke Inoue, Koji Nakao:
An Accurate Packer Identification Method Using Support Vector Machine. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 253-263 (2014) - [c31]Yuexing Han, Daisuke Inoue, Akira Kakugo, Akihiko Konagaya:
Tracking single microtubules by using B-spline curves and Hausdorff distance. IPTA 2014: 193-198 - 2013
- [j26]Takahiro Kasama, Katsunari Yoshioka, Daisuke Inoue, Tsutomu Matsumoto:
Catching the Behavioral Differences between Multiple Executions for Malware Detection. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 225-232 (2013) - [j25]Ved P. Kafle, Ruidong Li, Daisuke Inoue, Hiroaki Harai:
Design and Implementation of Security for HIMALIS Architecture of Future Networks. IEICE Trans. Inf. Syst. 96-D(2): 226-237 (2013) - [j24]Shaoning Pang, Lei Zhu, Gang Chen, Abdolhossein Sarrafzadeh, Tao Ban, Daisuke Inoue:
Dynamic class imbalance learning for incremental LPSVM. Neural Networks 44: 87-100 (2013) - [j23]Xuesong Mao, Daisuke Inoue, Hiroyuki Matsubara, Manabu Kagami:
Demonstration of In-Car Doppler Laser Radar at 1.55 $ \mu\hbox{m}$ for Range and Speed Measurement. IEEE Trans. Intell. Transp. Syst. 14(2): 599-607 (2013) - [c30]Tao Ban, Ryoichi Isawa, Shanqing Guo, Daisuke Inoue, Koji Nakao:
Efficient Malware Packer Identification Using Support Vector Machines with Spectrum Kernel. AsiaJCIS 2013: 69-76 - [c29]Erwan Le Malécot, Daisuke Inoue:
The Carna Botnet Through the Lens of a Network Telescope. FPS 2013: 426-441 - [c28]Lei Song, Shaoning Pang, Gang Chen, Abdolhossein Sarrafzadeh, Tao Ban, Daisuke Inoue:
An incremental learning approach to continuous image change detection. FSKD 2013: 747-752 - [c27]Ryoichi Isawa, Masaki Kamizono, Daisuke Inoue:
Generic Unpacking Method Based on Detecting Original Entry Point. ICONIP (1) 2013: 593-600 - [c26]Tao Ban, Ruibin Zhang, Shaoning Pang, Abdolhossein Sarrafzadeh, Daisuke Inoue:
Referential kNN Regression for Financial Time Series Forecasting. ICONIP (1) 2013: 601-608 - [c25]Tao Ban, Ryoichi Isawa, Shanqing Guo, Daisuke Inoue, Koji Nakao:
Application of string kernel based support vector machine for malware packer identification. IJCNN 2013: 1-8 - [c24]Yiming Peng, Shaoning Pang, Gang Chen, Abdolhossein Sarrafzadeh, Tao Ban, Daisuke Inoue:
Chunk incremental IDR/QR LDA learning. IJCNN 2013: 1-8 - 2012
- [j22]Kiyoshi Asakawa, Yoshimasa Sugimoto, Naoki Ikeda, Daiju Tsuya, Yasuo Koide, Yoshinori Watanabe, Nobuhiko Ozaki, Shunsuke Ohkouchi, Tsuyoshi Nomura, Daisuke Inoue, Takayuki Matsui, Atsushi Miura, Hisayoshi Fujikawa, Kazuo Sato:
Nanophotonics Based on Semiconductor-Photonic Crystal/Quantum Dot and Metal-/Semiconductor-Plasmonics. IEICE Trans. Electron. 95-C(2): 178-187 (2012) - [j21]Naoki Ikeda, Yoshimasa Sugimoto, Masayuki Ochiai, Daiju Tsuya, Yasuo Koide, Daisuke Inoue, Atsushi Miura, Tsuyoshi Nomura, Hisayoshi Fujikawa, Kazuo Sato:
Color Filter Based on Surface Plasmon Resonance Utilizing Sub-Micron Periodic Hole Array in Aluminum Thin Film. IEICE Trans. Electron. 95-C(2): 251-254 (2012) - [j20]Xuesong Mao, Daisuke Inoue, Hiroyuki Matsubara, Manabu Kagami:
Laser Radar Receiver Performance Improvement by Inter Symbol Interference. IEICE Trans. Commun. 95-B(8): 2631-2637 (2012) - [j19]Tao Ban, Shanqing Guo, Masashi Eto, Daisuke Inoue, Koji Nakao:
Towards Cost-Effective P2P Traffic Classification in Cloud Environment. IEICE Trans. Inf. Syst. 95-D(12): 2888-2897 (2012) - [j18]Takahiro Kasama, Katsunari Yoshioka, Tsutomu Matsumoto, Masaya Yamagata, Masashi Eto, Daisuke Inoue, Koji Nakao:
Malware Sandbox Analysis with Efficient Observation of Herder's Behavior. Inf. Media Technol. 7(4): 1577-1587 (2012) - [j17]Takahiro Kasama, Katsunari Yoshioka, Tsutomu Matsumoto, Masaya Yamagata, Masashi Eto, Daisuke Inoue, Koji Nakao:
Malware Sandbox Analysis with Efficient Observation of Herder's Behavior. J. Inf. Process. 20(4): 835-845 (2012) - [j16]Daisuke Inoue, Yoshitaka Yanagihara, Hiroshi Ueno, Shin'ichiro Nishida:
Model Tests of Regolith Packaging Mechanism. J. Robotics Mechatronics 24(6): 1023-1030 (2012) - [j15]Xuesong Mao, Daisuke Inoue, Satoru Kato, Manabu Kagami:
Amplitude-Modulated Laser Radar for Range and Speed Measurement in Car Applications. IEEE Trans. Intell. Transp. Syst. 13(1): 408-413 (2012) - [c23]Masashi Eto, Daisuke Inoue, Mio Suzuki, Koji Nakao:
Multipurpose Network Monitoring Platform Using Dynamic Address Assignment. AsiaJCIS 2012: 79-84 - [c22]Ved P. Kafle, Ruidong Li, Daisuke Inoue, Hiroaki Harai:
An integrated security scheme for ID/locator split architecture of future network. ICC 2012: 5866-5871 - [c21]Gang Chen, Shaoning Pang, Abdolhossein Sarrafzadeh, Tao Ban, Daisuke Inoue:
SDE-Driven Service Provision Control. ICONIP (1) 2012: 260-268 - [c20]Shaoning Pang, Fan Liu, Youki Kadobayashi, Tao Ban, Daisuke Inoue:
Training Minimum Enclosing Balls for Cross Tasks Knowledge Transfer. ICONIP (1) 2012: 375-382 - [c19]Tao Ban, Lei Zhu, Jumpei Shimamura, Shaoning Pang, Daisuke Inoue, Koji Nakao:
Behavior Analysis of Long-term Cyber Attacks in the Darknet. ICONIP (5) 2012: 620-628 - [c18]Tao Ban, Shanqing Guo, Masashi Eto, Daisuke Inoue, Koji Nakao:
A study on cost-effective P2P traffic classification. IJCNN 2012: 1-7 - [c17]Takahiro Kasama, Katsunari Yoshioka, Daisuke Inoue, Tsutomu Matsumoto:
Malware Detection Method by Catching Their Random Behavior in Multiple Executions. SAINT 2012: 262-266 - [c16]Daisuke Inoue, Masashi Eto, Koei Suzuki, Mio Suzuki, Koji Nakao:
DAEDALUS-VIZ: novel real-time 3D visualization for darknet monitoring-based alert system. VizSEC 2012: 72-79 - 2011
- [j14]Jungsuk Song, Daisuke Inoue, Masashi Eto, Hyung Chan Kim, Koji Nakao:
O-means: An Optimized Clustering Method for Analyzing Spam Based Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 245-254 (2011) - [j13]Hyung Chan Kim, Tatsunori Orii, Katsunari Yoshioka, Daisuke Inoue, Jungsuk Song, Masashi Eto, Junji Shikata, Tsutomu Matsumoto, Koji Nakao:
An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation. IEICE Trans. Inf. Syst. 94-D(9): 1778-1791 (2011) - [j12]Junji Nakazato, Jungsuk Song, Masashi Eto, Daisuke Inoue, Koji Nakao:
A Novel Malware Clustering Method Using Frequency of Function Call Traces in Parallel Threads. IEICE Trans. Inf. Syst. 94-D(11): 2150-2158 (2011) - [j11]Takuya Gokyuu, Satoru Nakamura, Takao Ueno, Munetaka Nakamura, Daisuke Inoue, Yoshitaka Yanagihara:
Sorting System for Recycling of Construction Byproducts with Bayes' Theorem-Based Robot Vision. J. Robotics Mechatronics 23(6): 1066-1072 (2011) - [c15]Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Masashi Eto, Daisuke Inoue, Koji Nakao:
Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation. BADGERS@EuroSys 2011: 29-36 - [c14]Masashi Eto, Daisuke Inoue, Jungsuk Song, Junji Nakazato, Kazuhiro Ohtaka, Koji Nakao:
nicter: a large-scale network incident analysis system: case studies for understanding threat landscape. BADGERS@EuroSys 2011: 37-45 - [c13]Tao Ban, Shanqing Guo, Masashi Eto, Daisuke Inoue, Koji Nakao:
Entropy Based Discriminators for P2P Teletraffic Characterization. ICONIP (2) 2011: 18-27 - [c12]Jungsuk Song, Jumpei Shimamura, Masashi Eto, Daisuke Inoue, Koji Nakao:
Correlation Analysis between Spamming Botnets and Malware Infected Hosts. SAINT 2011: 372-375 - 2010
- [j10]Masashi Eto, Kotaro Sonoda, Daisuke Inoue, Katsunari Yoshioka, Koji Nakao:
Fine-Grain Feature Extraction from Malware's Scan Behavior Based on Spectrum Analysis. IEICE Trans. Inf. Syst. 93-D(5): 1106-1116 (2010) - [j9]Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Daisuke Inoue, Masashi Eto, Koji Nakao:
A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data. IEICE Trans. Inf. Syst. 93-D(9): 2544-2554 (2010) - [j8]Daisuke Inoue, Kazunori Ohno, Masashi Konyo, Satoshi Tadokoro:
Tracked-Vehicle Clutching Position Detectability on Bumps by Distributed Inclination Sensors. J. Robotics Mechatronics 22(3): 293-300 (2010) - [c11]Hyung Chan Kim, Daisuke Inoue, Masashi Eto, Jungsuk Song, Koji Nakao:
Working Towards a Primary Binary Analysis System. Security and Management 2010: 459-465 - [c10]Jungsuk Song, Masashi Eto, Hyung Chan Kim, Daisuke Inoue, Koji Nakao:
A Heuristic-Based Feature Selection Method for Clustering Spam Emails. ICONIP (1) 2010: 290-297 - [c9]Jungsuk Song, Daisuke Inoue, Masashi Eto, Hyung Chan Kim, Koji Nakao:
An Empirical Study of Spam : Analyzing Spam Sending Systems and Malicious Web Servers. SAINT 2010: 257-260 - [c8]Hyung Chan Kim, Daisuke Inoue, Masashi Eto, Jungsuk Song, Koji Nakao:
How to Locate a Target Binary Process and Its Derivatives in System Emulator. SAINT 2010: 273-276
2000 – 2009
- 2009
- [j7]Daisuke Inoue, Keisuke Tanaka:
Symmetricity of the Protocols Related to Oblivious Transfer. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 217-221 (2009) - [j6]Koji Nakao, Daisuke Inoue, Masashi Eto, Katsunari Yoshioka:
Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring. IEICE Trans. Inf. Syst. 92-D(5): 787-798 (2009) - [j5]Daisuke Inoue, Katsunari Yoshioka, Masashi Eto, Yuji Hoshizawa, Koji Nakao:
Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities. IEICE Trans. Inf. Syst. 92-D(5): 945-954 (2009) - [j4]Katsunari Yoshioka, Daisuke Inoue, Masashi Eto, Yuji Hoshizawa, Hiroki Nogawa, Koji Nakao:
Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation. IEICE Trans. Inf. Syst. 92-D(5): 955-966 (2009) - [c7]Jungsuk Song, Daisuke Inoue, Masashi Eto, Mio Suzuki, Satoshi Hayashi, Koji Nakao:
A Methodology for Analyzing Overall Flow of Spam-Based Attacks. ICONIP (2) 2009: 556-564 - [c6]Masashi Eto, Kotaro Sonoda, Daisuke Inoue, Katsunari Yoshioka, Koji Nakao:
A Proposal of Malware Distinction Method Based on Scan Patterns Using Spectrum Analysis. ICONIP (2) 2009: 565-572 - [c5]Daisuke Inoue, Mio Suzuki, Masashi Eto, Katsunari Yoshioka, Koji Nakao:
DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks. RAID 2009: 381-382 - 2008
- [j3]Daisuke Inoue, Keisuke Tanaka:
Conditional Converge Cast. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(6): 1537-1540 (2008) - [c4]Daisuke Inoue, Katsunari Yoshioka, Masashi Eto, Yuji Hoshizawa, Koji Nakao:
Malware Behavior Analysis in Isolated Miniature Network for Revealing Malware's Network Activity. ICC 2008: 1715-1721 - [c3]Daisuke Inoue, Katsunari Yoshioka, Masashi Eto, Masaya Yamagata, Eisuke Nishino, Jun'ichi Takeuchi, Kazuya Ohkouchi, Koji Nakao:
An Incident Analysis System NICTER and Its Analysis Engines Based on Data Mining Techniques. ICONIP (1) 2008: 579-586 - 2004
- [c2]Daisuke Inoue, Masahiro Kuroda:
FDLKH: Fully Decentralized Key Management Scheme on Logical Key Hierarchy. ACNS 2004: 339-354 - 2003
- [j2]Daisuke Inoue, Masataka Suzuki, Tsutomu Matsumoto:
Detection-Resistant Steganography for Standard MIDI Files. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(8): 2099-2106 (2003) - 2002
- [j1]Daisuke Inoue, Tsutomu Matsumoto:
Rivulet: An Anonymous Communication Method Based on Group Communication. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1): 94-101 (2002) - [c1]Daisuke Inoue, Tsutomu Matsumoto:
Scheme of standard MIDI files steganography and its evaluation. Security and Watermarking of Multimedia Contents 2002: 194-205
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 19:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint