フォロー
Tetsutaro Uehara
Tetsutaro Uehara
確認したメール アドレス: cysec.cs.ritsumei.ac.jp - ホームページ
タイトル
引用先
引用先
Fog computing: Issues and challenges in security and forensics
Y Wang, T Uehara, R Sasaki
2015 IEEE 39th annual computer software and applications conference 3, 53-59, 2015
2012015
Copy-move forgery detection: A state-of-the-art technical review and analysis
S Teerakanok, T Uehara
IEEE Access 7, 40550-40568, 2019
912019
Successive Change in Conformation Caused by p-Y Groups in 1-(MeSe)-8-(p-YC6H4Se)C10H6:  Role of Linear Se···Se−C Three-Center−Four-Electron …
W Nakanishi, S Hayashi, T Uehara
The Journal of Physical Chemistry A 103 (48), 9906-9912, 1999
801999
Migrating to zero trust architecture: Reviews and challenges
S Teerakanok, T Uehara, A Inomata
Security and Communication Networks 2021, 1-10, 2021
642021
Privacy preserving confidential forensic investigation for shared or remote servers
S Hou, T Uehara, SM Yiu, LCK Hui, KP Chow
2011 Seventh International Conference on Intelligent Information Hiding and …, 2011
562011
Privacy preserving multiple keyword search for confidential investigation of remote forensics
S Hou, T Uehara, SM Yiu, LCK Hui, KP Chow
2011 Third International Conference on Multimedia Information Networking and …, 2011
532011
Structure of 1‐(Arylselanyl)naphthalenes − Y Dependence in 1‐(p‐YC6H4Se)C10H7
W Nakanishi, S Hayashi, T Uehara
European Journal of Organic Chemistry 2001 (20), 3933-3943, 2001
402001
A web-based privacy-secure content trading system for small content providers using semi-blind digital watermarking
M Okada, Y Okabe, T Uehara
2010 7th IEEE Consumer Communications and Networking Conference, 1-2, 2010
232010
A privacy-preserving approach for collecting evidence in forensic investigation
S Hou, SM Yiu, T Uehara, R Sasaki
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 2 (1 …, 2013
222013
The Proposal of Double Agent Architecture using Actor-critic Algorithm for Penetration Testing.
HV Nguyen, S Teerakanok, A Inomata, T Uehara
ICISSP, 440-449, 2021
152021
Copy-move forgery detection using GLCM-based rotation-invariant feature: A preliminary research
S Teerakanok, T Uehara
2018 IEEE 42nd annual computer software and applications conference (COMPSAC …, 2018
152018
Resource allocation optimization for GSD projects
S Doma, L Gottschalk, T Uehara, J Liu
Computational Science and Its Applications–ICCSA 2009: International …, 2009
132009
Development of a multiple user quiz system on a shared display
M Saga, K Ikeda, M Mori, T Uehara, H Kita, Y Naya, N Nagata, H Ueda, ...
2009 Seventh International Conference on Creating, Connecting and …, 2009
122009
The Comparison of Word Embedding Techniques in RNNs for Vulnerability Detection.
HN Nguyen, S Teerakanok, A Inomata, T Uehara
ICISSP, 109-120, 2021
112021
Multiple level action embedding for penetration testing
HV Nguyen, HN Nguyen, T Uehara
Proceedings of the 4th International Conference on Future Networks and …, 2020
112020
Security analysis on privacy-secure image trading framework using blind watermarking
M Okada, Y Okabe, T Uehara
2009 Ninth Annual International Symposium on Applications and the Internet …, 2009
112009
Computer ethics video clips for university students in japan from 2003 until 2013
T Yamanoue, I Fuse, S Okabe, A Nakamura, M Nakanishi, S Fukada, ...
2014 IEEE 38th International Computer Software and Applications Conference …, 2014
102014
Verifying data authenticity and integrity in server-aided confidential forensic investigation
S Hou, R Sasaki, T Uehara, S Yiu
Information and Communication Technology: International Conference, ICT …, 2013
102013
On socialization of personal computing
G Hagiwara, K Ikeda, M Mori, T Uehara, KH Kita
Fifth International Conference on Creating, Connecting and Collaborating …, 2007
102007
Benchmarking vector indirect load/store instructions
T Uehara
Supercomputer 46, 15-29, 1991
101991
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20