Follow
Tetsutaro UEHARA
Tetsutaro UEHARA
Professor, College of Information Science and Engineering, Ritsumeikan University.
Verified email at fc.ritsumei.ac.jp - Homepage
Title
Cited by
Cited by
Year
Fog computing: Issues and challenges in security and forensics
Y Wang, T Uehara, R Sasaki
2015 IEEE 39th annual computer software and applications conference 3, 53-59, 2015
2012015
Copy-move forgery detection: A state-of-the-art technical review and analysis
S Teerakanok, T Uehara
IEEE Access 7, 40550-40568, 2019
912019
Successive Change in Conformation Caused by p-Y Groups in 1-(MeSe)-8-(p-YC6H4Se)C10H6:  Role of Linear Se···Se−C Three-Center−Four-Electron …
W Nakanishi, S Hayashi, T Uehara
The Journal of Physical Chemistry A 103 (48), 9906-9912, 1999
801999
Migrating to zero trust architecture: Reviews and challenges
S Teerakanok, T Uehara, A Inomata
Security and Communication Networks 2021, 1-10, 2021
642021
Privacy preserving confidential forensic investigation for shared or remote servers
S Hou, T Uehara, SM Yiu, LCK Hui, KP Chow
2011 Seventh International Conference on Intelligent Information Hiding and …, 2011
562011
Privacy preserving multiple keyword search for confidential investigation of remote forensics
S Hou, T Uehara, SM Yiu, LCK Hui, KP Chow
2011 Third International Conference on Multimedia Information Networking and …, 2011
532011
10 EFFECT OF CREEP IN CONCRETE AT EARLY AGES ON THERMAL STRESS
H Umehara, T Uehara, T Iisaka, A Sugiyama
Thermal Cracking in Concrete at Early Ages: Proceedings of the International …, 1994
431994
Structure of 1‐(Arylselanyl)naphthalenes − Y Dependence in 1‐(p‐YC6H4Se)C10H7
W Nakanishi, S Hayashi, T Uehara
European Journal of Organic Chemistry 2001 (20), 3933-3943, 2001
402001
A comparative study of forensic science and computer forensics
R Hankins, T Uehara, J Liu
2009 Third IEEE International Conference on Secure Software Integration and …, 2009
292009
A web-based privacy-secure content trading system for small content providers using semi-blind digital watermarking
M Okada, Y Okabe, T Uehara
2010 7th IEEE Consumer Communications and Networking Conference, 1-2, 2010
232010
A privacy-preserving approach for collecting evidence in forensic investigation
S Hou, SM Yiu, T Uehara, R Sasaki
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 2 (1 …, 2013
222013
マルウェア観測のための仮想計算機モニタを用いたシステムコールトレース手法
大月勇人, 瀧本栄二, 齋藤彰一, 毛利公一
情報処理学会論文誌 55 (9), 2034-2046, 2014
212014
情報教育に関する大学新入生の状況変化―京都大学新入生アンケートの結果から
森幹彦, 池田心, 上原哲太郎, 喜多一, 竹尾賢一, 植木徹, 石橋由子, ...
情報処理学会論文誌 51 (10), 1961-1973, 2010
212010
携帯情報端末を用いた発想一貫支援システムの開発と適用
吉野孝, 宗森純, 湯ノ口万友, 泉裕, 上原哲太郎, 吉本富士市
情報処理学会論文誌 41 (9), 2382-2393, 2000
162000
The Proposal of Double Agent Architecture using Actor-critic Algorithm for Penetration Testing.
HV Nguyen, S Teerakanok, A Inomata, T Uehara
ICISSP, 440-449, 2021
152021
Copy-move forgery detection using GLCM-based rotation-invariant feature: A preliminary research
S Teerakanok, T Uehara
2018 IEEE 42nd annual computer software and applications conference (COMPSAC …, 2018
152018
情報倫理教育
中村純, 岡部成玄, 布施泉, 村田育也, 辰己丈夫, 上原哲太郎, 中西通雄, ...
メディア教育研究 6 (2), S33-S43, 2010
142010
Resource allocation optimization for GSD projects
S Doma, L Gottschalk, T Uehara, J Liu
Computational Science and Its Applications–ICCSA 2009: International …, 2009
132009
Development of a multiple user quiz system on a shared display
M Saga, K Ikeda, M Mori, T Uehara, H Kita, Y Naya, N Nagata, H Ueda, ...
2009 Seventh International Conference on Creating, Connecting and …, 2009
122009
The Comparison of Word Embedding Techniques in RNNs for Vulnerability Detection.
HN Nguyen, S Teerakanok, A Inomata, T Uehara
ICISSP, 109-120, 2021
112021
The system can't perform the operation now. Try again later.
Articles 1–20