Seguir
Tetsutaro Uehara
Tetsutaro Uehara
Dirección de correo verificada de cysec.cs.ritsumei.ac.jp - Página principal
Título
Citado por
Citado por
Año
Fog computing: Issues and challenges in security and forensics
Y Wang, T Uehara, R Sasaki
2015 IEEE 39th annual computer software and applications conference 3, 53-59, 2015
2022015
Copy-move forgery detection: A state-of-the-art technical review and analysis
S Teerakanok, T Uehara
IEEE Access 7, 40550-40568, 2019
922019
Successive Change in Conformation Caused by p-Y Groups in 1-(MeSe)-8-(p-YC6H4Se)C10H6:  Role of Linear Se···Se−C Three-Center−Four-Electron …
W Nakanishi, S Hayashi, T Uehara
The Journal of Physical Chemistry A 103 (48), 9906-9912, 1999
801999
Migrating to zero trust architecture: Reviews and challenges
S Teerakanok, T Uehara, A Inomata
Security and Communication Networks 2021, 1-10, 2021
672021
Privacy preserving confidential forensic investigation for shared or remote servers
S Hou, T Uehara, SM Yiu, LCK Hui, KP Chow
2011 Seventh International Conference on Intelligent Information Hiding and …, 2011
562011
Privacy preserving multiple keyword search for confidential investigation of remote forensics
S Hou, T Uehara, SM Yiu, LCK Hui, KP Chow
2011 Third International Conference on Multimedia Information Networking and …, 2011
532011
Structure of 1‐(Arylselanyl)naphthalenes − Y Dependence in 1‐(p‐YC6H4Se)C10H7
W Nakanishi, S Hayashi, T Uehara
European Journal of Organic Chemistry 2001 (20), 3933-3943, 2001
402001
A web-based privacy-secure content trading system for small content providers using semi-blind digital watermarking
M Okada, Y Okabe, T Uehara
2010 7th IEEE Consumer Communications and Networking Conference, 1-2, 2010
232010
A privacy-preserving approach for collecting evidence in forensic investigation
S Hou, SM Yiu, T Uehara, R Sasaki
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 2 (1 …, 2013
222013
The Proposal of Double Agent Architecture using Actor-critic Algorithm for Penetration Testing.
HV Nguyen, S Teerakanok, A Inomata, T Uehara
ICISSP, 440-449, 2021
152021
Copy-move forgery detection using GLCM-based rotation-invariant feature: A preliminary research
S Teerakanok, T Uehara
2018 IEEE 42nd annual computer software and applications conference (COMPSAC …, 2018
152018
Resource allocation optimization for GSD projects
S Doma, L Gottschalk, T Uehara, J Liu
Computational Science and Its Applications–ICCSA 2009: International …, 2009
132009
Development of a multiple user quiz system on a shared display
M Saga, K Ikeda, M Mori, T Uehara, H Kita, Y Naya, N Nagata, H Ueda, ...
2009 Seventh International Conference on Creating, Connecting and …, 2009
122009
The Comparison of Word Embedding Techniques in RNNs for Vulnerability Detection.
HN Nguyen, S Teerakanok, A Inomata, T Uehara
ICISSP, 109-120, 2021
112021
Multiple level action embedding for penetration testing
HV Nguyen, HN Nguyen, T Uehara
Proceedings of the 4th International Conference on Future Networks and …, 2020
112020
Security analysis on privacy-secure image trading framework using blind watermarking
M Okada, Y Okabe, T Uehara
2009 Ninth Annual International Symposium on Applications and the Internet …, 2009
112009
Verifying data authenticity and integrity in server-aided confidential forensic investigation
S Hou, R Sasaki, T Uehara, S Yiu
Information and Communication Technology: International Conference, ICT …, 2013
102013
On socialization of personal computing
G Hagiwara, K Ikeda, M Mori, T Uehara, KH Kita
Fifth International Conference on Creating, Connecting and Collaborating …, 2007
102007
Benchmarking vector indirect load/store instructions
T Uehara
Supercomputer 46, 15-29, 1991
101991
A Practical Solution Against Business Email Compromise (BEC) Attack using Invoice Checksum
S Teerakanok, H Yasuki, T Uehara
2020 IEEE 20th International Conference on Software Quality, Reliability and …, 2020
92020
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20