Shuichiro HARUTA


A Server-Based Distributed Storage Using Secret Sharing with AES-256 for Lightweight Safety Restoration
Sanghun CHOI Shuichiro HARUTA Yichen AN Iwao SASASE 
Publication:   
Publication Date: 2020/07/01
Vol. E103-D  No. 7  pp. 1647-1659
Type of Manuscript:  PAPER
Category: Data Engineering, Web Information Systems
Keyword: 
distributed storagereed solomonSecret Sharing
 Summary | Full Text:PDF(1.6MB)

Android Malware Detection Scheme Based on Level of SSL Server Certificate
Hiroya KATO Shuichiro HARUTA Iwao SASASE 
Publication:   
Publication Date: 2020/02/01
Vol. E103-D  No. 2  pp. 379-389
Type of Manuscript:  PAPER
Category: Dependable Computing
Keyword: 
Android malwaresSSL certificatemachine learning
 Summary | Full Text:PDF(1.6MB)

Hue Signature Auto Update System for Visual Similarity-Based Phishing Detection with Tolerance to Zero-Day Attack
Shuichiro HARUTA Hiromu ASAHINA Fumitaka YAMAZAKI Iwao SASASE 
Publication:   
Publication Date: 2019/12/01
Vol. E102-D  No. 12  pp. 2461-2471
Type of Manuscript:  PAPER
Category: Dependable Computing
Keyword: 
phishing detectionvisual similarityzero-day attack
 Summary | Full Text:PDF(2.8MB)

An Effective Feature Selection Scheme for Android ICC-Based Malware Detection Using the Gap of the Appearance Ratio
Kyohei OSUGE Hiroya KATO Shuichiro HARUTA Iwao SASASE 
Publication:   
Publication Date: 2019/06/01
Vol. E102-D  No. 6  pp. 1136-1144
Type of Manuscript:  PAPER
Category: Dependable Computing
Keyword: 
androidmalware detectionICCfeature selection
 Summary | Full Text:PDF(1.1MB)

Trust-Based Sybil Nodes Detection with Robust Seed Selection and Graph Pruning on SNS
Shuichiro HARUTA Kentaroh TOYODA Iwao SASASE 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2016/05/01
Vol. E99-B  No. 5  pp. 1002-1011
Type of Manuscript:  Special Section PAPER (Special Section on Internet Architectures and Management Methods that Enable Flexible and Secure Deployment of Network Services)
Category: 
Keyword: 
Social Networking ServicesSybil detectiontrust
 Summary | Full Text:PDF(652.7KB)