Tetsutaro Uehara

Orcid: 0000-0002-8233-130X

According to our database1, Tetsutaro Uehara authored at least 66 papers between 1997 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Multilayer Action Representation based on MITRE ATT&CK for Automated Penetration Testing.
J. Inf. Process., 2023

ResTran: Long Distance Relationship on Image Forgery Detection.
IEEE Access, 2023

Enhancing Account Recovery with Location-based Dynamic Questions.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

An Ontology-Based Framework for Medical IoT Forensic Evidence.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

On Collecting Onion Server Fingerprints and Identification of Their Operators.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

Detecting Vulnerable OAuth 2.0 Implementations in Android Applications.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

An Agent-Based Modeling Approach to Designing and Optimizing Bug Bounty Programs for Cybersecurity in Developing Countries.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

2022
Code Aggregate Graph: Effective Representation for Graph Neural Networks to Detect Vulnerable Code.
IEEE Access, 2022

Hierarchical Action Embedding for Effective Autonomous Penetration Testing.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

2021
Enhancing Digital Certificate Usability in Long Lifespan IoT Devices by Utilizing Private CA.
Secur. Commun. Networks, 2021

Migrating to Zero Trust Architecture: Reviews and Challenges.
Secur. Commun. Networks, 2021

A Secure Cloud-centric IoT Framework for Smart Device Registration.
J. Inf. Process., 2021

Implementation of an extended FIDO2 authenticator using Attribute-Based Signatures.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

The Proposal of Double Agent Architecture using Actor-critic Algorithm for Penetration Testing.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

The Comparison of Word Embedding Techniques in RNNs for Vulnerability Detection.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

2020
A Practical Solution Against Business Email Compromise (BEC) Attack using Invoice Checksum.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

Towards a Holistic Approach to Medical IoT Forensics.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

Japan's Act on Wiretapping for Criminal Investigation: How the system is implemented and how it should be.
Proceedings of the 15th International Conference for Internet Technology and Secured Transactions, 2020

Multiple Level Action Embedding for Penetration Testing.
Proceedings of the ICFNDS '20: The 4th International Conference on Future Networks and Distributed Systems, 2020

An Extended Benchmark System of Word Embedding Methods for Vulnerability Detection.
Proceedings of the ICFNDS '20: The 4th International Conference on Future Networks and Distributed Systems, 2020

2019
A Histogram and GLCM-based Approach for Image Copy-Move Forgery Detection.
J. Inf. Process., 2019

Copy-Move Forgery Detection: A State-of-the-Art Technical Review and Analysis.
IEEE Access, 2019

2018
Enhancement of Media Splicing Detection: A General Framework.
J. Digit. Forensics Secur. Law, 2018

Copy-move Forgery Detection Using GLCM-Based Rotation-Invariant Feature: A Preliminary Research.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Message from the CFSE 2018 Workshop Organizers.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
Producing Video Clips for Information Ethics and Security in Higher Education.
Proceedings of the 2017 ACM Annual Conference on SIGUCCS, 2017

Malware Behavior Ontology for Digital Evidence.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

Digital Media Tampering Detection Techniques: An Overview.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Enhancing Image Forgery Detection Using 2-D Cross Products.
Proceedings of the Advances in Digital Forensics XII, 2016

Message from the CFSE Workshop Organizers.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
Development of Intellectual Network Forensic System LIFT against Targeted Attacks.
Proceedings of the Fourth International Conference on Cyber Security, 2015

Fog Computing: Issues and Challenges in Security and Forensics.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

Enhancment of Image Tampering Detection Using JPEG's Quantization and Re-interpolation Processes.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

Message from the CFSE 2015 Workshop Organizers.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

2014
Computer Ethics Video Clips for University Students in Japan from 2003 until 2013.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

Secure streaming forensic data transmission for trusted cloud.
Proceedings of the 2nd International Workshop on Security and Forensics in Communication Systems, 2014

2013
Double Encryption for Data Authenticity and Integrity in Privacy- preserving Confidential Forensic Investigation.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Development and Evaluation of Guideline Total Support System for Evidence Preservation by Using an Android Phone.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

2011
Development of digital forensics practice and research in Japan.
Wirel. Commun. Mob. Comput., 2011

Privacy Preserving Confidential Forensic Investigation for Shared or Remote Servers.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

2010
HiGate (High Grade Anti-Tamper Equipment) Prototype and Application to e-Discovery.
J. Digit. Forensics Secur. Law, 2010

A Web-Based Privacy-Secure Content Trading System for Small Content Providers Using Semi-Blind Digital Watermarking.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

An Agent-Based Approach to Evaluation of Workflow Support Systems.
Proceedings of the Eighth International Conference on Creating, 2010

2009
Fingerprinting Codes for Internet-Based Live Pay-TV System Using Balanced Incomplete Block Designs.
IEICE Trans. Inf. Syst., 2009

A Turing Machine-Based Model for Computer Forensic Reconstruction.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009

A Comparative Study of Forensic Science and Computer Forensics.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009

Security Analysis on Privacy-Secure Image Trading Framework Using Blind Watermarking.
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009

Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009

Implementing Boot Control for Windows Vista.
Proceedings of the Advances in Digital Forensics V, 2009

Resource Allocation Optimization for GSD Projects.
Proceedings of the Computational Science and Its Applications, 2009

Development of a Multiple User Quiz System on a Shared Display.
Proceedings of the Seventh International Conference on Creating, 2009

Computer Forensics in Japan: A Preliminary Study.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Integrating fingerprint with cryptosystem for internet-based live pay-TV system.
Secur. Commun. Networks, 2008

Improving computer ethics video clips for higher education.
Proceedings of the 36th Annual ACM SIGUCCS Conference on User Services 2008, 2008

Socialized Computers and Collaborative Learning.
Proceedings of the New Frontiers in Artificial Intelligence, 2008

Using Boot Control to Preserve the Integrity of Evidence.
Proceedings of the Advances in Digital Forensics IV, 2008

2007
Fingerprinting Codes for Live Pay-Television Broadcast Via Internet.
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007

On Socialization of Personal Computing.
Proceedings of the Fifth International Conference on Creating, 2007

2005
IP Multicast Video Broadcasting System with User Authentication.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

2003
Design and Implementation of the Loop Restructuring Feature for the MIRAI Parallelizing Complier.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2003

2002
A Wavefront Method on Distributed Shared Memory Systems for Protein Homology Analysis.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2002

An Automatic Parallelizing Compiler MIRAI with Data Distribution Function and its Runtime Support System Fagus for Distributed Memory Architecture.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2002

2000
Wind : a Low-Costs Communication Module for Software DSM Systems.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000

1999
The Design and Implementation of cc-COMA as a Platform for Distributed-Memory Machines.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

1997
An Automatic Vectorizing/Parallelizing Pascal Compiler V-Pascal V.3.
Proceedings of the High Performance Computing, International Symposium, 1997


  Loading...