Lightweight classification of IoT malware based on image recognition J Su, DV Vasconcellos, S Prasad, D Sgandurra, Y Feng, K Sakurai 2018 IEEE 42Nd annual computer software and applications conference (COMPSAC …, 2018 | 380 | 2018 |
Machine learning-based IoT-botnet attack detection with sequential architecture YN Soe, Y Feng, PI Santosa, R Hartanto, K Sakurai Sensors 20 (16), 4372, 2020 | 174 | 2020 |
Towards a lightweight detection system for cyber attacks in the IoT environment using corresponding features YN Soe, Y Feng, PI Santosa, R Hartanto, K Sakurai Electronics 9 (1), 144, 2020 | 102 | 2020 |
Implementing lightweight iot-ids on raspberry pi using correlation-based feature selection and its performance evaluation YN Soe, Y Feng, PI Santosa, R Hartanto, K Sakurai Advanced Information Networking and Applications: Proceedings of the 33rd …, 2020 | 52 | 2020 |
Packet in message based DDoS attack detection in SDN network using OpenFlow X You, Y Feng, K Sakurai 2017 Fifth International Symposium on Computing and Networking (CANDAR), 522-528, 2017 | 42 | 2017 |
Rule generation for signature based detection systems of cyber attacks in iot environments YN Soe, Y Feng, PI Santosa, R Hartanto, K Sakurai Bulletin of Networking, Computing, Systems, and Software 8 (2), 93-97, 2019 | 41 | 2019 |
Feature selection for machine learning-based early detection of distributed cyber attacks Y Feng, H Akiyama, L Lu, K Sakurai 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th …, 2018 | 41 | 2018 |
A keypoint-based approach toward scenery character detection S Uchida, Y Shigeyoshi, Y Kunishige, F Yaokai 2011 International Conference on Document Analysis and Recognition, 819-823, 2011 | 40 | 2011 |
A machine learning based approach for detecting DRDoS attacks and its performance evaluation Y Gao, Y Feng, J Kawamoto, K Sakurai 2016 11th Asia joint conference on information security (AsiaJCIS), 80-86, 2016 | 28 | 2016 |
A behavior-based method for detecting distributed scan attacks in darknets Y Feng, Y Hori, K Sakurai, J Takeuchi Journal of information processing 21 (3), 527-538, 2013 | 24 | 2013 |
A sequential scheme for detecting cyber attacks in IoT environment YN Soe, Y Feng, PI Santosa, R Hartanto, K Sakurai 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2019 | 23 | 2019 |
Scenery character detection with environmental context Y Kunishige, F Yaokai, S Uchida 2011 International Conference on Document Analysis and Recognition, 1049-1053, 2011 | 23 | 2011 |
C&C session detection using random forest L Lu, Y Feng, K Sakurai Proceedings of the 11th International Conference on Ubiquitous Information …, 2017 | 20 | 2017 |
A survey on feature selection techniques based on filtering methods for cyber attack detection Y Lyu, Y Feng, K Sakurai Information 14 (3), 191, 2023 | 19 | 2023 |
Character image patterns as big data S Uchida, R Ishida, A Yoshida, W Cai, Y Feng 2012 International Conference on Frontiers in Handwriting Recognition, 479-484, 2012 | 16 | 2012 |
A part-based skew estimation method S Shiraishi, Y Feng, S Uchida 2012 10th IAPR international workshop on document analysis systems, 185-189, 2012 | 16 | 2012 |
Analytical dynamic programming tracker S Uchida, I Fujimura, H Kawano, Y Feng Computer Vision–ACCV 2010: 10th Asian Conference on Computer Vision …, 2011 | 16 | 2011 |
Cyberbullying detection using parent-child relationship between comments Z Li, J Kawamoto, Y Feng, K Sakurai Proceedings of the 18th International Conference on Information Integration …, 2016 | 15 | 2016 |
Selective concealment of characters for privacy protection K Inai, M Pålsson, V Frinken, Y Feng, S Uchida 2014 22nd International Conference on Pattern Recognition, 333-338, 2014 | 15 | 2014 |
Statistical contact potentials in protein coarse-grained modeling: from pair to multi-body potentials SP Leelananda, Y Feng, P Gniewek, A Kloczkowski, RL Jernigan Multiscale Approaches to Protein Modeling: Structure Prediction, Dynamics …, 2011 | 14 | 2011 |