Daiki Chiba

711 total citations
50 papers, 362 citations indexed

About

Daiki Chiba is a scholar working on Information Systems, Computer Networks and Communications and Signal Processing. According to data from OpenAlex, Daiki Chiba has authored 50 papers receiving a total of 362 indexed citations (citations by other indexed papers that have themselves been cited), including 41 papers in Information Systems, 34 papers in Computer Networks and Communications and 32 papers in Signal Processing. Recurrent topics in Daiki Chiba's work include Spam and Phishing Detection (35 papers), Network Security and Intrusion Detection (33 papers) and Advanced Malware Detection Techniques (32 papers). Daiki Chiba is often cited by papers focused on Spam and Phishing Detection (35 papers), Network Security and Intrusion Detection (33 papers) and Advanced Malware Detection Techniques (32 papers). Daiki Chiba collaborates with scholars based in Japan, Netherlands and Germany. Daiki Chiba's co-authors include Shigeki Goto, Mitsuaki Akiyama, Takeshi Yagi, Tatsuya Mori, Toshiki Shibahara, Masayuki Murata, Yuichi Ohsita, Masato Uchida, Katsunari Yoshioka and Tsutomu Matsumoto and has published in prestigious journals such as IEEE Access, Computers & Security and International Journal of Information Security.

In The Last Decade

Daiki Chiba

41 papers receiving 336 citations

Peers

Daiki Chiba
Limin Yang United States
Asmaa Sallam United States
Greg Banks United States
Justin Sahs United States
Martin Georgiev United States
Rishita Anubhai United States
Hojjat Aghakhani United States
Limin Yang United States
Daiki Chiba
Citations per year, relative to Daiki Chiba Daiki Chiba (= 1×) peers Limin Yang

Countries citing papers authored by Daiki Chiba

Since Specialization
Citations

This map shows the geographic impact of Daiki Chiba's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Daiki Chiba with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Daiki Chiba more than expected).

Fields of papers citing papers by Daiki Chiba

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Daiki Chiba. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Daiki Chiba. The network helps show where Daiki Chiba may publish in the future.

Co-authorship network of co-authors of Daiki Chiba

This figure shows the co-authorship network connecting the top 25 collaborators of Daiki Chiba. A scholar is included among the top collaborators of Daiki Chiba based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Daiki Chiba. Daiki Chiba is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Chiba, Daiki, et al.. (2025). DomainDynamics: Advancing lifecycle-based risk assessment of domain names. Computers & Security. 153. 104366–104366.
2.
Chiba, Daiki, et al.. (2025). DomainLynx: Advancing LLM Techniques for Robust Domain Squatting Detection. IEEE Access. 13. 29914–29931.
3.
Chiba, Daiki, et al.. (2024). Longitudinal Measurement Study of the Domain Names Associated With the Olympic Games. IEEE Access. 12. 19128–19144. 1 indexed citations
4.
Chiba, Daiki, et al.. (2024). ChatPhishDetector: Detecting Phishing Sites Using Large Language Models. IEEE Access. 12. 154381–154400. 11 indexed citations
5.
Chiba, Daiki, et al.. (2022). Understanding Security Risks of Ad-based URL Shortening Services Caused by Users' Behaviors. Journal of Information Processing. 30(0). 865–877.
6.
Fujita, Koji, Toshiki Shibahara, Daiki Chiba, Mitsuaki Akiyama, & Masato Uchida. (2022). Objection!: Identifying Misclassified Malicious Activities with XAI. ICC 2022 - IEEE International Conference on Communications. 2065–2070. 4 indexed citations
7.
Nomura, Kazuya, Daiki Chiba, Mitsuaki Akiyama, & Masato Uchida. (2021). Auto-creation of Robust Android Malware Family Trees. Journal of Information Processing. 29(0). 801–811. 1 indexed citations
8.
Nomura, Kazuya, Daiki Chiba, Mitsuaki Akiyama, & Masato Uchida. (2021). Auto-creation of Android Malware Family Tree. 1–6. 1 indexed citations
9.
Chiba, Daiki, et al.. (2021). Measuring Adoption of DNS Security Mechanisms with Cross-Sectional Approach. 2021 IEEE Global Communications Conference (GLOBECOM). 1–6.
10.
Yagi, Takeshi, et al.. (2021). Classification of diversified web crawler accesses inspired by biological adaptation. International Journal of Bio-Inspired Computation. 17(3). 165–165. 4 indexed citations
11.
Chiba, Daiki, et al.. (2020). Time-Series Measurement of Parked Domain Names. 1–6. 2 indexed citations
12.
Chiba, Daiki, et al.. (2020). A Large-scale Analysis of Cloud Service Abuse. 1–9. 1 indexed citations
13.
Chiba, Daiki, et al.. (2019). DomainScouter: Understanding the Risks of Deceptive IDNs.. 413–426. 8 indexed citations
14.
Chiba, Daiki, et al.. (2019). Precise and Robust Detection of Advertising Fraud. 776–785. 4 indexed citations
15.
Chiba, Daiki, et al.. (2019). SOCIAL ECOSYSTEM OF ARCHITECTURAL DESIGN IN THE DISCOURSE OF WOMEN ARCHITECTS IN JAPAN. AIJ Journal of Technology and Design. 25(61). 1385–1390.
16.
Shibahara, Toshiki, et al.. (2019). Cross-Vendor Knowledge Transfer for Managed Security Services with Triplet Network. 59–69. 2 indexed citations
17.
Chiba, Daiki, et al.. (2019). Detecting Dynamic IP Addresses and Cloud Blocks Using the Sequential Characteristics of PTR Records. Journal of Information Processing. 27(0). 525–535. 3 indexed citations
18.
Shibahara, Toshiki, et al.. (2016). Efficient Dynamic Malware Analysis Based on Network Behavior Using Deep Learning. 1–7. 55 indexed citations
20.
Chiba, Daiki, et al.. (2013). Detecting Android Malware by Analyzing Manifest Files. 36(0). 23–23. 52 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026