Ryuya Uda
According to our database1,
Ryuya Uda
authored at least 60 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Fast Preprocessing by Suffix Arrays for Managing Byte n-grams to Detect Malware Subspecies by Machine Learning.
J. Inf. Process., 2024
Invisible Cloak to AI Recognition from All Horizontal Directions by Adversarial Patch.
Proceedings of the 18th International Conference on Ubiquitous Information Management and Communication, 2024
Investigation of The Latest Malware Detection Engines and Lightweight Byte n-Gram Methods with Real Custom Malware.
Proceedings of the 16th International Conference on Computer and Automation Engineering, 2024
2023
Consideration for Creation of Training Samples for Targeted Malware Detection by Machine Learning.
Proceedings of the 6th International Conference on Information and Computer Technologies, 2023
2021
Proceedings of the 55th Annual Conference on Information Sciences and Systems, 2021
Proceedings of the 55th Annual Conference on Information Sciences and Systems, 2021
2020
Comparison of Algorithms and Action Coordinates Sets in Detection of Slight Differences in Motions like Lock-Picking.
Proceedings of the 5th South-East Europe Design Automation, 2020
Data Protection Method with Blockchain against Fabrication of Video by Surveillance Cameras.
Proceedings of the ICBCT'20: The 2nd International Conference on Blockchain Technology, 2020
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
Proceedings of the 54th Annual Conference on Information Sciences and Systems, 2020
2019
Proceedings of the 13th International Conference on Ubiquitous Information Management and Communication, 2019
Proceedings of the 13th International Conference on Ubiquitous Information Management and Communication, 2019
Evaluation of Security and Usability of Individual Identification Using Image Preference.
Proceedings of the 13th International Conference on Ubiquitous Information Management and Communication, 2019
Proceedings of the 13th International Conference on Ubiquitous Information Management and Communication, 2019
Classification of XSS Attacks by Machine Learning with Frequency of Appearance and Co-occurrence.
Proceedings of the 53rd Annual Conference on Information Sciences and Systems, 2019
2018
J. Inf. Process., 2018
Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication, 2018
Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication, 2018
Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication, 2018
Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication, 2018
2017
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017
Biometric authentication by handwriting with single direction using self-organizing maps.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
Deep Learning Analysis of Amodal Completion CAPTCHA with Colors and Hidden Positions.
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017
2016
Challenge of Deep Learning against CAPTCHA with Amodal Completion and Aftereffects by Colors.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016
Personal Identification by Flick Input Using Self-Organizing Maps with Acceleration Sensor and Gyroscope.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016
Effective CAPTCHA with Amodal Completion and Aftereffects by Complementary Colors and Difference of Luminance.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016
Protection of Secrets by File Access Control with Common Key Cipher and Message Digests of Program Files.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016
2015
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015
Password security enhancement method by flick input with considering the floor shake.
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015
HTK analysis of text-based CAPTCHA using phonemic restoration effect and similar pronunciation with an Asian accent.
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015
Vulnerability Analysis using Network Timestamps in Full Virtualization Virtual Machine.
Proceedings of the ICISSP 2015, 2015
2014
Text-Based CAPTCHA Using Phonemic Restoration Effect and Similar Pronunciation with an Asian Accent.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014
2013
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013
2012
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
Privacy Protection on Transfer System of Automated Teller Machine from Brute Force Attack.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
Confidential Information Poisoning Methods by Considering the Information Length in Electronic Portable Devices.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
2010
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010
2009
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009
2008
Proceedings of the Towards Sustainable Society on Ubiquitous Networks, 2008
2004
Proceedings of the 2004 Symposium on Applications and the Internet (SAINT 2004), 2004
2002
E-Ticket Issuing System with 3-D Pattern Recognition for Mobile Terminals.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002