default search action
Shuichiro Haruta
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c24]Rei Sato, Shuichiro Haruta, Kazuhiro Saito, Mori Kurokawa:
QWalkVec: Node Embedding by Quantum Walk. PAKDD (1) 2024: 93-104 - [c23]Julio Vizcarra, Shuichiro Haruta, Mori Kurokawa:
Representing the Interaction between Users and Products via LLM-assisted Knowledge Graph Construction. ICSC 2024: 231-232 - [c22]Zhi Li, Daichi Amagata, Yihong Zhang, Takahiro Hara, Shuichiro Haruta, Kei Yonekawa, Mori Kurokawa:
Mutual Information-based Preference Disentangling and Transferring for Non-overlapped Multi-target Cross-domain Recommendations. SIGIR 2024: 2124-2133 - [i3]Yanan Wang, Shuichiro Haruta, Donghuo Zeng, Julio Vizcarra, Mori Kurokawa:
Multi-object event graph representation learning for Video Question Answering. CoRR abs/2409.07747 (2024) - [i2]Yanan Wang, Shuichiro Haruta, Donghuo Zeng, Julio Vizcarra, Mori Kurokawa:
Top-down Activity Representation Learning for Video Question Answering. CoRR abs/2409.07748 (2024) - 2023
- [c21]Rikuto Tsubouchi, Takahiro Hara, Kei Yonekawa, Shuichiro Haruta:
Unvisited Out-Of-Town POI Recommendation with Simultaneous Learning of Multiple Regions. IEEE Big Data 2023: 915-924 - [c20]Tatsuya Konishi, Shuichiro Haruta, Mori Kurokawa, Kenta Tsukatsune, Yuto Mizutani, Tomoaki Saito, Hideki Asoh, Chihiro Ono:
CG-GNN: A Novel Compiled Graphs-based Feature Extraction Method for Enterprise Social Networks. ICDAR@ICMR 2023: 24-31 - [c19]Yuma Dose, Shuichiro Haruta, Takahiro Hara:
A Graph-Based Recommendation Model Using Contrastive Learning for Inductive Scenario. ICMLA 2023: 174-181 - [c18]Zhi Li, Daichi Amagata, Yihong Zhang, Takahiro Hara, Shuichiro Haruta, Kei Yonekawa, Mori Kurokawa:
Semantic Relation Transfer for Non-overlapped Cross-domain Recommendations. PAKDD (3) 2023: 271-283 - 2022
- [c17]Shuichiro Haruta, Tatsuya Konishi, Mori Kurokawa:
A Novel Graph Aggregation Method Based on Feature Distribution Around Each Ego-node for Heterophily. ACML 2022: 452-466 - [c16]Zhi Li, Daichi Amagata, Yihong Zhang, Takahiro Hara, Shuichiro Haruta, Kei Yonekawa, Mori Kurokawa:
Debiasing Graph Transfer Learning via Item Semantic Clustering for Cross-Domain Recommendations. IEEE Big Data 2022: 762-769 - [c15]Mori Kurokawa, Kei Yonekawa, Shuichiro Haruta, Tatsuya Konishi, Hideki Asoh, Chihiro Ono, Masafumi Hagiwara:
Multi-view Contrastive Multiple Knowledge Graph Embedding for Knowledge Completion. ICMLA 2022: 1412-1418 - [i1]Zhi Li, Daichi Amagata, Yihong Zhang, Takahiro Hara, Shuichiro Haruta, Kei Yonekawa, Mori Kurokawa:
Debiasing Graph Transfer Learning via Item Semantic Clustering for Cross-Domain Recommendations. CoRR abs/2211.03390 (2022) - 2021
- [j7]Hiromu Asahina, Keisuke Arai, Shuichiro Haruta, P. Takis Mathiopoulos, Iwao Sasase:
An Energy-Efficient Defense against Message Flooding Attacks in Delay Tolerant Networks. IEICE Trans. Commun. 104-B(4): 348-359 (2021) - [c14]Tatsuya Okazaki, Hiroya Kato, Shuichiro Haruta, Iwao Sasase:
A Website Fingerprinting Attack based on the Virtual Memory of the Process on Android Devices. APCC 2021: 7-12 - [c13]Shuichiro Haruta, Mori Kurokawa:
An Empirical Study on News Recommendation in Multiple Domain Settings. MobiQuitous 2021: 529-540 - [c12]Kei Yonekawa, Shuichiro Haruta, Tatsuya Konishi, Kazuhiro Saito, Hideki Asoh, Mori Kurokawa:
A Study on Metrics for Concept Drift Detection Based on Predictions and Parameters of Ensemble Model. MobiQuitous 2021: 568-581 - [c11]Kenta Tsukatsune, Tatsuya Konishi, Yuto Mizutani, Mori Kurokawa, Shuichiro Haruta, Tomoaki Saito:
Does Activeness Originate in Individuals or Groups? Analysis of the Interrelationships between Network Indices and Posts Using Multilevel Cross-Lagged Model. WI/IAT (Workshop/Special Session) 2021: 117-125 - 2020
- [j6]Hiroya Kato, Kyohei Osuge, Shuichiro Haruta, Iwao Sasase:
A Preprocessing by Using Multiple Steganography for Intentional Image Downsampling on CNN-Based Steganalysis. IEEE Access 8: 195578-195593 (2020) - [j5]Hiroya Kato, Shuichiro Haruta, Iwao Sasase:
Android Malware Detection Scheme Based on Level of SSL Server Certificate. IEICE Trans. Inf. Syst. 103-D(2): 379-389 (2020) - [j4]Sanghun Choi, Shuichiro Haruta, Yichen An, Iwao Sasase:
A Server-Based Distributed Storage Using Secret Sharing with AES-256 for Lightweight Safety Restoration. IEICE Trans. Inf. Syst. 103-D(7): 1647-1659 (2020) - [c10]Hiroya Kato, Kyohei Osuge, Shuichiro Haruta, Iwao Sasase:
A Preprocessing Methodology by Using Additional Steganography on CNN-based Steganalysis. GLOBECOM 2020: 1-6
2010 – 2019
- 2019
- [j3]Kyohei Osuge, Hiroya Kato, Shuichiro Haruta, Iwao Sasase:
An Effective Feature Selection Scheme for Android ICC-Based Malware Detection Using the Gap of the Appearance Ratio. IEICE Trans. Inf. Syst. 102-D(6): 1136-1144 (2019) - [j2]Shuichiro Haruta, Hiromu Asahina, Fumitaka Yamazaki, Iwao Sasase:
Hue Signature Auto Update System for Visual Similarity-Based Phishing Detection with Tolerance to Zero-Day Attack. IEICE Trans. Inf. Syst. 102-D(12): 2461-2471 (2019) - [c9]Hironori Nakano, Hiroya Kato, Shuichiro Haruta, Masashi Yoshida, Iwao Sasase:
Trust-based Verification Attack Prevention Scheme using Tendency of Contents Request on NDN. APCC 2019: 159-164 - [c8]Shuichiro Haruta, Fumitaka Yamazaki, Hiromu Asahina, Iwao Sasase:
A Novel Visual Similarity-based Phishing Detection Scheme using Hue Information with Auto Updating Database. APCC 2019: 280-285 - [c7]Hiroya Kato, Shuichiro Haruta, Iwao Sasase:
Android Malware Detection Scheme Based on Level of SSL Server Certificate. GLOBECOM 2019: 1-6 - [c6]Yichen An, Shuichiro Haruta, Sanghun Choi, Iwao Sasase:
Traffic Feature-Based Botnet Detection Scheme Emphasizing the Importance of Long Patterns. IP&C 2019: 181-188 - 2018
- [c5]Keisuke Arai, Shuichiro Haruta, Hiromu Asahina, Iwao Sasase:
Encounter Record Reduction Scheme based on Theoretical Contact Probability for Flooding Attack Mitigation in DTN. APCC 2018: 34-39 - 2017
- [c4]Shoya Morishige, Shuichiro Haruta, Hiromu Asahina, Iwao Sasase:
Obfuscated malicious javascript detection scheme using the feature based on divided URL. APCC 2017: 1-6 - [c3]Kei Sakuma, Hiromu Asahina, Shuichiro Haruta, Iwao Sasase:
Traceroute-based target link flooding attack detection scheme by analyzing hop count to the destination. APCC 2017: 1-6 - [c2]Shuichiro Haruta, Hiromu Asahina, Iwao Sasase:
Visual Similarity-Based Phishing Detection Scheme Using Image and CSS with Target Website Finder. GLOBECOM 2017: 1-6 - 2016
- [j1]Shuichiro Haruta, Kentaroh Toyoda, Iwao Sasase:
Trust-Based Sybil Nodes Detection with Robust Seed Selection and Graph Pruning on SNS. IEICE Trans. Commun. 99-B(5): 1002-1011 (2016) - 2015
- [c1]Shuichiro Haruta, Kentaroh Toyoda, Iwao Sasase:
Trust-based Sybil nodes detection with robust seed selection and graph pruning on SNS. WIFS 2015: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 21:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint