Loading [MathJax]/extensions/MathMenu.js
Takaya Watanabe - IEEE Xplore Author Profile

Showing 1-5 of 5 results

Filter Results

Show

Results

The success of graph neural networks stimulates the prosperity of graph mining and the corresponding downstream tasks including graph anomaly detection (GAD). However, it has been explored that those graph mining methods are vulnerable to structural manipulations on relational data. That is, the attacker can maliciously perturb the graph structures to assist the target nodes in evading anomaly det...Show More
Android system's features, such as support for peer-to-peer networking, cloud computing services, and various communication protocols and network technologies, make it a suitable platform for distributed computing systems that require efficient resource management and coordination. The widespread popularity of Android, as one of the most widely-used mobile operating systems [1], is attributed to i...Show More
The privacy of personal information has received significant attention in mobile software. Although researchers have designed methods to identify the conflict between app behavior and privacy policies, little is known about the privacy compliance issues relevant to third-party libraries (TPLs). The regulators enacted articles to regulate the usage of personal information for TPLs (e.g., the CCPA r...Show More
Graph-based Anomaly Detection (GAD) is becoming prevalent due to the powerful representation abilities of graphs as well as recent advances in graph mining techniques. These GAD tools, however, expose a new attacking surface, ironically due to their unique advantage of being able to exploit the relations among data. That is, attackers now can manipulate those relations (i.e., the structure of the ...Show More
Driver identification is of fundamental importance in many vehicle-related applications, such as fleet monitoring and anti-theft system. The vast majority of existing methods work under the closed-world assumption, which may be unrealistic in practice. In this paper, we consider a more practical but challenging scenario, i.e., open-world driver recognition, and propose a systematic method dubbed D...Show More