Tetsutaro Uehara
Orcid: 0000-0002-8233-130X
According to our database1,
Tetsutaro Uehara
authored at least 67 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
User Verification System using Location-based Dynamic Questions for Account Recovery.
Proceedings of the IEEE Security and Privacy, 2024
2023
Multilayer Action Representation based on MITRE ATT&CK for Automated Penetration Testing.
J. Inf. Process., 2023
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023
An Agent-Based Modeling Approach to Designing and Optimizing Bug Bounty Programs for Cybersecurity in Developing Countries.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023
2022
Code Aggregate Graph: Effective Representation for Graph Neural Networks to Detect Vulnerable Code.
IEEE Access, 2022
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022
2021
Enhancing Digital Certificate Usability in Long Lifespan IoT Devices by Utilizing Private CA.
Secur. Commun. Networks, 2021
Secur. Commun. Networks, 2021
J. Inf. Process., 2021
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
The Proposal of Double Agent Architecture using Actor-critic Algorithm for Penetration Testing.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
2020
A Practical Solution Against Business Email Compromise (BEC) Attack using Invoice Checksum.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020
Proceedings of the 20th IEEE International Conference on Software Quality, 2020
Japan's Act on Wiretapping for Criminal Investigation: How the system is implemented and how it should be.
Proceedings of the 15th International Conference for Internet Technology and Secured Transactions, 2020
Proceedings of the ICFNDS '20: The 4th International Conference on Future Networks and Distributed Systems, 2020
Proceedings of the ICFNDS '20: The 4th International Conference on Future Networks and Distributed Systems, 2020
2019
J. Inf. Process., 2019
IEEE Access, 2019
2018
J. Digit. Forensics Secur. Law, 2018
Copy-move Forgery Detection Using GLCM-Based Rotation-Invariant Feature: A Preliminary Research.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
2017
Proceedings of the 2017 ACM Annual Conference on SIGUCCS, 2017
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
2016
Proceedings of the Advances in Digital Forensics XII, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
2015
Proceedings of the Fourth International Conference on Cyber Security, 2015
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
Enhancment of Image Tampering Detection Using JPEG's Quantization and Re-interpolation Processes.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
2014
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014
Proceedings of the 2nd International Workshop on Security and Forensics in Communication Systems, 2014
2013
Double Encryption for Data Authenticity and Integrity in Privacy- preserving Confidential Forensic Investigation.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013
Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Development and Evaluation of Guideline Total Support System for Evidence Preservation by Using an Android Phone.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013
2011
Wirel. Commun. Mob. Comput., 2011
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
2010
J. Digit. Forensics Secur. Law, 2010
A Web-Based Privacy-Secure Content Trading System for Small Content Providers Using Semi-Blind Digital Watermarking.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010
Proceedings of the Eighth International Conference on Creating, 2010
2009
Fingerprinting Codes for Internet-Based Live Pay-TV System Using Balanced Incomplete Block Designs.
IEICE Trans. Inf. Syst., 2009
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009
Security Analysis on Privacy-Secure Image Trading Framework Using Blind Watermarking.
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009
Proceedings of the Digital Watermarking, 8th International Workshop, 2009
Proceedings of the Advances in Digital Forensics V, 2009
Proceedings of the Computational Science and Its Applications, 2009
Proceedings of the Seventh International Conference on Creating, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
Secur. Commun. Networks, 2008
Proceedings of the 36th Annual ACM SIGUCCS Conference on User Services 2008, 2008
Proceedings of the New Frontiers in Artificial Intelligence, 2008
Proceedings of the Advances in Digital Forensics IV, 2008
2007
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007
Proceedings of the Fifth International Conference on Creating, 2007
2005
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005
2003
Design and Implementation of the Loop Restructuring Feature for the MIRAI Parallelizing Complier.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2003
2002
A Wavefront Method on Distributed Shared Memory Systems for Protein Homology Analysis.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2002
An Automatic Parallelizing Compiler MIRAI with Data Distribution Function and its Runtime Support System Fagus for Distributed Memory Architecture.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2002
2000
Wind : a Low-Costs Communication Module for Software DSM Systems.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000
1999
The Design and Implementation of cc-COMA as a Platform for Distributed-Memory Machines.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999
1997
Proceedings of the High Performance Computing, International Symposium, 1997