Fog computing: Issues and challenges in security and forensics Y Wang, T Uehara, R Sasaki 2015 IEEE 39th annual computer software and applications conference 3, 53-59, 2015 | 201 | 2015 |
Copy-move forgery detection: A state-of-the-art technical review and analysis S Teerakanok, T Uehara IEEE Access 7, 40550-40568, 2019 | 91 | 2019 |
Successive Change in Conformation Caused by p-Y Groups in 1-(MeSe)-8-(p-YC6H4Se)C10H6: Role of Linear Se···Se−C Three-Center−Four-Electron … W Nakanishi, S Hayashi, T Uehara The Journal of Physical Chemistry A 103 (48), 9906-9912, 1999 | 80 | 1999 |
Migrating to zero trust architecture: Reviews and challenges S Teerakanok, T Uehara, A Inomata Security and Communication Networks 2021, 1-10, 2021 | 64 | 2021 |
Privacy preserving confidential forensic investigation for shared or remote servers S Hou, T Uehara, SM Yiu, LCK Hui, KP Chow 2011 Seventh International Conference on Intelligent Information Hiding and …, 2011 | 56 | 2011 |
Privacy preserving multiple keyword search for confidential investigation of remote forensics S Hou, T Uehara, SM Yiu, LCK Hui, KP Chow 2011 Third International Conference on Multimedia Information Networking and …, 2011 | 53 | 2011 |
Structure of 1‐(Arylselanyl)naphthalenes − Y Dependence in 1‐(p‐YC6H4Se)C10H7 W Nakanishi, S Hayashi, T Uehara European Journal of Organic Chemistry 2001 (20), 3933-3943, 2001 | 40 | 2001 |
A web-based privacy-secure content trading system for small content providers using semi-blind digital watermarking M Okada, Y Okabe, T Uehara 2010 7th IEEE Consumer Communications and Networking Conference, 1-2, 2010 | 23 | 2010 |
A privacy-preserving approach for collecting evidence in forensic investigation S Hou, SM Yiu, T Uehara, R Sasaki International Journal of Cyber-Security and Digital Forensics (IJCSDF) 2 (1 …, 2013 | 22 | 2013 |
The Proposal of Double Agent Architecture using Actor-critic Algorithm for Penetration Testing. HV Nguyen, S Teerakanok, A Inomata, T Uehara ICISSP, 440-449, 2021 | 15 | 2021 |
Copy-move forgery detection using GLCM-based rotation-invariant feature: A preliminary research S Teerakanok, T Uehara 2018 IEEE 42nd annual computer software and applications conference (COMPSAC …, 2018 | 15 | 2018 |
Resource allocation optimization for GSD projects S Doma, L Gottschalk, T Uehara, J Liu Computational Science and Its Applications–ICCSA 2009: International …, 2009 | 13 | 2009 |
Development of a multiple user quiz system on a shared display M Saga, K Ikeda, M Mori, T Uehara, H Kita, Y Naya, N Nagata, H Ueda, ... 2009 Seventh International Conference on Creating, Connecting and …, 2009 | 12 | 2009 |
The Comparison of Word Embedding Techniques in RNNs for Vulnerability Detection. HN Nguyen, S Teerakanok, A Inomata, T Uehara ICISSP, 109-120, 2021 | 11 | 2021 |
Multiple level action embedding for penetration testing HV Nguyen, HN Nguyen, T Uehara Proceedings of the 4th International Conference on Future Networks and …, 2020 | 11 | 2020 |
Security analysis on privacy-secure image trading framework using blind watermarking M Okada, Y Okabe, T Uehara 2009 Ninth Annual International Symposium on Applications and the Internet …, 2009 | 11 | 2009 |
Computer ethics video clips for university students in japan from 2003 until 2013 T Yamanoue, I Fuse, S Okabe, A Nakamura, M Nakanishi, S Fukada, ... 2014 IEEE 38th International Computer Software and Applications Conference …, 2014 | 10 | 2014 |
Verifying data authenticity and integrity in server-aided confidential forensic investigation S Hou, R Sasaki, T Uehara, S Yiu Information and Communication Technology: International Conference, ICT …, 2013 | 10 | 2013 |
On socialization of personal computing G Hagiwara, K Ikeda, M Mori, T Uehara, KH Kita Fifth International Conference on Creating, Connecting and Collaborating …, 2007 | 10 | 2007 |
Benchmarking vector indirect load/store instructions T Uehara Supercomputer 46, 15-29, 1991 | 10 | 1991 |