Author of the publication

Building a Scalable Web Tracking Detection System: Implementation and the Empirical Study.

, , , and . IEICE Trans. Inf. Syst., 100-D (8): 1663-1670 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying Evasive Code in Malicious Websites by Analyzing Redirection Differences., , , , , and . IEICE Trans. Inf. Syst., 101-D (11): 2600-2611 (2018)Evasive Malicious Website Detection by Leveraging Redirection Subgraph Similarities., , , , , and . IEICE Trans. Inf. Syst., 102-D (3): 430-443 (2019)Risk Analysis of Cookie Sharing by Link Decoration and CNAME Cloaking., , , and . J. Inf. Process., (2021)Plausibility-Based Heuristics for Latent Space Classical Planning., and . CoRR, (2023)Building a Scalable Web Tracking Detection System: Implementation and the Empirical Study., , , and . IEICE Trans. Inf. Syst., 100-D (8): 1663-1670 (2017)Fake News Detection via Biased User Profiles in Social Networking Sites., , , , , , and . WI/IAT, page 136-145. ACM, (2021)Understanding Evasion Techniques that Abuse Differences Among JavaScript Implementations., , , , and . WISE (2), volume 10570 of Lecture Notes in Computer Science, page 278-294. Springer, (2017)Analysis of Privacy Compliance by Classifying Policies Before and After the Japanese Law Revision., , , , and . J. Inf. Process., (2023)Impact Analysis of Organizational Structure of Group Companies on Privacy Policies., , , , and . WPES@CCS, page 159-165. ACM, (2023)POSTER: Predicting Website Abuse Using Update Histories., , , , and . WWW (Companion Volume), page 9-10. ACM, (2018)