Ryuya Uda

According to our database1, Ryuya Uda authored at least 59 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Fast Preprocessing by Suffix Arrays for Managing Byte n-grams to Detect Malware Subspecies by Machine Learning.
J. Inf. Process., 2024

Invisible Cloak to AI Recognition from All Horizontal Directions by Adversarial Patch.
Proceedings of the 18th International Conference on Ubiquitous Information Management and Communication, 2024

2023
Consideration for Creation of Training Samples for Targeted Malware Detection by Machine Learning.
Proceedings of the 6th International Conference on Information and Computer Technologies, 2023

2021
Recognition of Digits on License Plate by RAISR with Changing Contrast Ratio.
Proceedings of the 55th Annual Conference on Information Sciences and Systems, 2021

Malware Subspecies Detection Method by Suffix Arrays and Machine Learning.
Proceedings of the 55th Annual Conference on Information Sciences and Systems, 2021

2020
Comparison of Algorithms and Action Coordinates Sets in Detection of Slight Differences in Motions like Lock-Picking.
Proceedings of the 5th South-East Europe Design Automation, 2020

Data Protection Method with Blockchain against Fabrication of Video by Surveillance Cameras.
Proceedings of the ICBCT'20: The 2nd International Conference on Blockchain Technology, 2020

Detection of Change of Users in SNS by Two Dimensional CNN.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Vulnerable Web Server Protection by Hash Based URL Transformation.
Proceedings of the 54th Annual Conference on Information Sciences and Systems, 2020

2019
Classifying License Plate Numerals Using CNN.
Proceedings of the 13th International Conference on Ubiquitous Information Management and Communication, 2019

Detection of Suspicious Person with Kinect by Action Coordinate.
Proceedings of the 13th International Conference on Ubiquitous Information Management and Communication, 2019

Evaluation of Security and Usability of Individual Identification Using Image Preference.
Proceedings of the 13th International Conference on Ubiquitous Information Management and Communication, 2019

Personal Identification by Human Motion Using Smartphone.
Proceedings of the 13th International Conference on Ubiquitous Information Management and Communication, 2019

Classification of XSS Attacks by Machine Learning with Frequency of Appearance and Co-occurrence.
Proceedings of the 53rd Annual Conference on Information Sciences and Systems, 2019

2018
Evaluation of Ergonomically Designed CAPTCHAs using Deep Learning Technology.
J. Inf. Process., 2018

Personal Identification by Behavioral Features of Pinch-in and Pinch-out.
Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication, 2018

Personal Identification by Tilt of Smartphone on Browsing.
Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication, 2018

Classification of Web Site by Naive-Bayes and Convolutional Neural Networks.
Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication, 2018

Texting while Walking Deterrence System by Vibration of Smartphone.
Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication, 2018

2017
Static analysis with paragraph vector for malware detection.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

Biometric authentication by handwriting with single direction using self-organizing maps.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

Challenge to Impede Deep Learning against CAPTCHA with Ergonomic Design.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Deep Learning Analysis of Amodal Completion CAPTCHA with Colors and Hidden Positions.
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017

2016
Challenge of Deep Learning against CAPTCHA with Amodal Completion and Aftereffects by Colors.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

Effective CAPTCHA with Amodal Completion and Aftereffects.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

Personal Identification by Flick Input Using Self-Organizing Maps with Acceleration Sensor and Gyroscope.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

Biometric Authentication by Handwriting Using Leap Motion.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

Effective CAPTCHA with Amodal Completion and Aftereffects by Complementary Colors and Difference of Luminance.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

Protection of Secrets by File Access Control with Common Key Cipher and Message Digests of Program Files.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

2015
A proposal of preventive measure of pursuit using a browser fingerprint.
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015

Password security enhancement method by flick input with considering the floor shake.
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015

HTK analysis of text-based CAPTCHA using phonemic restoration effect and similar pronunciation with an Asian accent.
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015

Vulnerability Analysis using Network Timestamps in Full Virtualization Virtual Machine.
Proceedings of the ICISSP 2015, 2015

2014
Text-Based CAPTCHA Using Phonemic Restoration Effect and Similar Pronunciation with an Asian Accent.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

A translator website for dyslexic children.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

Personal identification by flick input with acceleration sensor.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

Method for extraction of characteristics of personal characters from life log.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

Improvement of Personal Identification by Flick Input with Acceleration Sensor.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

Text-Based CAPTCHA Using Phonemic Restoration Effect and Similar Sounds.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

2013
Proposal of automatic reporting system against unauthorized use of smart phone.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013

Proposal of CAPTCHA using three dimensional objects.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013

Multivector e-mail filtering with shape and color impression.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013

Virtual machine remote detection method using network timestamp in cloud computing.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Privacy Obfuscation with Bloom Filter for Effective Advertisement.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
Proposal of Movie CAPTCHA Method Using Amodal Completion.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

Proposal of privacy protection system for web forms using Bloom filter.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

Proposal of document protection system by poisoning.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

A low cost privacy protection method for SNS by using Bloom filter.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

ADEC: Assured Deletion and Verifiable Version Control for Cloud Storage.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

Multiview Playback with Ghost in Required Condition.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

Preventing Surreptitious Filming by Saturation Irradiation of Infrared Rays.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

Privacy Protection on Transfer System of Automated Teller Machine from Brute Force Attack.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

Confidential Information Poisoning Methods by Considering the Information Length in Electronic Portable Devices.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2010
Proposal of electronic commerce system with cellular phones for digital forensics.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010

2009
Distributed Secure Virtual File System Using Hysteresis Signatures.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

The Efficiency Method of Sanitizable Signature Scheme for SMF.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Distributed Secure Virtual File System Using FUSE.
Proceedings of the Towards Sustainable Society on Ubiquitous Networks, 2008

2004
A Method of Appliance Detection Based on Features of Power Waveform.
Proceedings of the 2004 Symposium on Applications and the Internet (SAINT 2004), 2004

2002
E-Ticket Issuing System with 3-D Pattern Recognition for Mobile Terminals.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002


  Loading...