Fog computing: Issues and challenges in security and forensics Y Wang, T Uehara, R Sasaki 2015 IEEE 39th annual computer software and applications conference 3, 53-59, 2015 | 201 | 2015 |
Copy-move forgery detection: A state-of-the-art technical review and analysis S Teerakanok, T Uehara IEEE Access 7, 40550-40568, 2019 | 91 | 2019 |
Successive Change in Conformation Caused by p-Y Groups in 1-(MeSe)-8-(p-YC6H4Se)C10H6: Role of Linear Se···Se−C Three-Center−Four-Electron … W Nakanishi, S Hayashi, T Uehara The Journal of Physical Chemistry A 103 (48), 9906-9912, 1999 | 80 | 1999 |
Migrating to zero trust architecture: Reviews and challenges S Teerakanok, T Uehara, A Inomata Security and Communication Networks 2021, 1-10, 2021 | 64 | 2021 |
Privacy preserving confidential forensic investigation for shared or remote servers S Hou, T Uehara, SM Yiu, LCK Hui, KP Chow 2011 Seventh International Conference on Intelligent Information Hiding and …, 2011 | 56 | 2011 |
Privacy preserving multiple keyword search for confidential investigation of remote forensics S Hou, T Uehara, SM Yiu, LCK Hui, KP Chow 2011 Third International Conference on Multimedia Information Networking and …, 2011 | 53 | 2011 |
10 EFFECT OF CREEP IN CONCRETE AT EARLY AGES ON THERMAL STRESS H Umehara, T Uehara, T Iisaka, A Sugiyama Thermal Cracking in Concrete at Early Ages: Proceedings of the International …, 1994 | 43 | 1994 |
Structure of 1‐(Arylselanyl)naphthalenes − Y Dependence in 1‐(p‐YC6H4Se)C10H7 W Nakanishi, S Hayashi, T Uehara European Journal of Organic Chemistry 2001 (20), 3933-3943, 2001 | 40 | 2001 |
A comparative study of forensic science and computer forensics R Hankins, T Uehara, J Liu 2009 Third IEEE International Conference on Secure Software Integration and …, 2009 | 29 | 2009 |
A web-based privacy-secure content trading system for small content providers using semi-blind digital watermarking M Okada, Y Okabe, T Uehara 2010 7th IEEE Consumer Communications and Networking Conference, 1-2, 2010 | 23 | 2010 |
A privacy-preserving approach for collecting evidence in forensic investigation S Hou, SM Yiu, T Uehara, R Sasaki International Journal of Cyber-Security and Digital Forensics (IJCSDF) 2 (1 …, 2013 | 22 | 2013 |
マルウェア観測のための仮想計算機モニタを用いたシステムコールトレース手法 大月勇人, 瀧本栄二, 齋藤彰一, 毛利公一 情報処理学会論文誌 55 (9), 2034-2046, 2014 | 21 | 2014 |
情報教育に関する大学新入生の状況変化―京都大学新入生アンケートの結果から 森幹彦, 池田心, 上原哲太郎, 喜多一, 竹尾賢一, 植木徹, 石橋由子, ... 情報処理学会論文誌 51 (10), 1961-1973, 2010 | 21 | 2010 |
携帯情報端末を用いた発想一貫支援システムの開発と適用 吉野孝, 宗森純, 湯ノ口万友, 泉裕, 上原哲太郎, 吉本富士市 情報処理学会論文誌 41 (9), 2382-2393, 2000 | 16 | 2000 |
The Proposal of Double Agent Architecture using Actor-critic Algorithm for Penetration Testing. HV Nguyen, S Teerakanok, A Inomata, T Uehara ICISSP, 440-449, 2021 | 15 | 2021 |
Copy-move forgery detection using GLCM-based rotation-invariant feature: A preliminary research S Teerakanok, T Uehara 2018 IEEE 42nd annual computer software and applications conference (COMPSAC …, 2018 | 15 | 2018 |
情報倫理教育 中村純, 岡部成玄, 布施泉, 村田育也, 辰己丈夫, 上原哲太郎, 中西通雄, ... メディア教育研究 6 (2), S33-S43, 2010 | 14 | 2010 |
Resource allocation optimization for GSD projects S Doma, L Gottschalk, T Uehara, J Liu Computational Science and Its Applications–ICCSA 2009: International …, 2009 | 13 | 2009 |
Development of a multiple user quiz system on a shared display M Saga, K Ikeda, M Mori, T Uehara, H Kita, Y Naya, N Nagata, H Ueda, ... 2009 Seventh International Conference on Creating, Connecting and …, 2009 | 12 | 2009 |
The Comparison of Word Embedding Techniques in RNNs for Vulnerability Detection. HN Nguyen, S Teerakanok, A Inomata, T Uehara ICISSP, 109-120, 2021 | 11 | 2021 |