default search action
Ryuya Uda
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j2]Kouhei Kita, Ryuya Uda:
Fast Preprocessing by Suffix Arrays for Managing Byte n-grams to Detect Malware Subspecies by Machine Learning. J. Inf. Process. 32: 232-246 (2024) - [c58]Ryuya Uda, Shinnosuke Araki:
Investigation of The Latest Malware Detection Engines and Lightweight Byte n-Gram Methods with Real Custom Malware. ICCAE 2024: 6-11 - [c57]Takumi Imaeda, Ryuya Uda:
Invisible Cloak to AI Recognition from All Horizontal Directions by Adversarial Patch. IMCOM 2024: 1-7 - 2023
- [c56]Ryuya Uda, Taeko Kotani:
Consideration for Creation of Training Samples for Targeted Malware Detection by Machine Learning. ICICT 2023: 144-149 - 2021
- [c55]Kouhei Kita, Ryuya Uda:
Malware Subspecies Detection Method by Suffix Arrays and Machine Learning. CISS 2021: 1-6 - [c54]Tomoya Suzuki, Ryuya Uda:
Recognition of Digits on License Plate by RAISR with Changing Contrast Ratio. CISS 2021: 1-6 - 2020
- [c53]Ryuya Uda:
Vulnerable Web Server Protection by Hash Based URL Transformation. CISS 2020: 1-6 - [c52]Hiroshi Matsushita, Ryuya Uda:
Detection of Change of Users in SNS by Two Dimensional CNN. COMPSAC 2020: 839-844 - [c51]Ryuya Uda:
Data Protection Method with Blockchain against Fabrication of Video by Surveillance Cameras. ICBCT 2020: 29-33 - [c50]Masaki Shiraishi, Ryuya Uda:
Comparison of Algorithms and Action Coordinates Sets in Detection of Slight Differences in Motions like Lock-Picking. SEEDA-CECNSM 2020: 1-8
2010 – 2019
- 2019
- [c49]Sota Akaishi, Ryuya Uda:
Classification of XSS Attacks by Machine Learning with Frequency of Appearance and Co-occurrence. CISS 2019: 1-6 - [c48]Kotone Hoshina, Ryuya Uda:
Evaluation of Security and Usability of Individual Identification Using Image Preference. IMCOM 2019: 424-439 - [c47]Masaki Shiraishi, Ryuya Uda:
Detection of Suspicious Person with Kinect by Action Coordinate. IMCOM 2019: 456-472 - [c46]Toshiki Furuya, Ryuya Uda:
Personal Identification by Human Motion Using Smartphone. IMCOM 2019: 629-645 - [c45]Tomoya Suzuki, Ryuya Uda:
Classifying License Plate Numerals Using CNN. IMCOM 2019: 1063-1075 - 2018
- [j1]Tomoka Azakami, Chihiro Shibata, Ryuya Uda:
Evaluation of Ergonomically Designed CAPTCHAs using Deep Learning Technology. J. Inf. Process. 26: 625-636 (2018) - [c44]Daiki Mukai, Ryuya Uda:
Personal Identification by Behavioral Features of Pinch-in and Pinch-out. IMCOM 2018: 67:1-67:5 - [c43]Hiroya Kato, Ryuya Uda:
Texting while Walking Deterrence System by Vibration of Smartphone. IMCOM 2018: 69:1-69:5 - [c42]Hiroki Mathushima, Ryuya Uda:
Personal Identification by Tilt of Smartphone on Browsing. IMCOM 2018: 70:1-70:5 - [c41]Xueyan Liu, Ryuya Uda:
Classification of Web Site by Naive-Bayes and Convolutional Neural Networks. IMCOM 2018: 80:1-80:6 - 2017
- [c40]Tomoka Azakami, Ryuya Uda:
Deep Learning Analysis of Amodal Completion CAPTCHA with Colors and Hidden Positions. AINA Workshops 2017: 341-346 - [c39]Tomoka Azakami, Chihiro Shibata, Ryuya Uda:
Challenge to Impede Deep Learning against CAPTCHA with Ergonomic Design. COMPSAC (1) 2017: 637-642 - [c38]Yuta Nagano, Ryuya Uda:
Static analysis with paragraph vector for malware detection. IMCOM 2017: 80 - [c37]Satoshi Kamaishi, Ryuya Uda:
Biometric authentication by handwriting with single direction using self-organizing maps. IMCOM 2017: 106 - 2016
- [c36]Minoru Ichikawa, Ryuya Uda:
Protection of Secrets by File Access Control with Common Key Cipher and Message Digests of Program Files. AINA Workshops 2016: 226-231 - [c35]Ryuya Uda, Tomoka Azakami:
Effective CAPTCHA with Amodal Completion and Aftereffects by Complementary Colors and Difference of Luminance. AINA Workshops 2016: 232-237 - [c34]Satoshi Kamaishi, Ryuya Uda:
Biometric Authentication by Handwriting Using Leap Motion. IMCOM 2016: 36:1-36:5 - [c33]Kouta Sawada, Ryuya Uda:
Effective CAPTCHA with Amodal Completion and Aftereffects. IMCOM 2016: 53:1-53:5 - [c32]Takumi Nohara, Ryuya Uda:
Personal Identification by Flick Input Using Self-Organizing Maps with Acceleration Sensor and Gyroscope. IMCOM 2016: 58:1-58:6 - [c31]Tomoka Azakami, Chihiro Shibata, Ryuya Uda:
Challenge of Deep Learning against CAPTCHA with Amodal Completion and Aftereffects by Colors. NBiS 2016: 127-134 - 2015
- [c30]Matrazali Noorafiza, Hiroshi Maeda, Ryuya Uda, Toshiyuki Kinoshita, M. Shiratori:
Vulnerability Analysis using Network Timestamps in Full Virtualization Virtual Machine. ICISSP 2015: 83-89 - [c29]Nozomi Takeuchi, Ryuya Uda:
Password security enhancement method by flick input with considering the floor shake. IMCOM 2015: 5:1-5:8 - [c28]Shingo Yokoyama, Ryuya Uda:
A proposal of preventive measure of pursuit using a browser fingerprint. IMCOM 2015: 33:1-33:7 - [c27]Misako Goto, Toru Shirato, Ryuya Uda:
HTK analysis of text-based CAPTCHA using phonemic restoration effect and similar pronunciation with an Asian accent. IMCOM 2015: 38:1-38:8 - 2014
- [c26]Misako Goto, Toru Shirato, Ryuya Uda:
Text-Based CAPTCHA Using Phonemic Restoration Effect and Similar Sounds. COMPSAC Workshops 2014: 270-275 - [c25]Nozomi Takeuchi, Shuhei Kobata, Ryuya Uda:
Improvement of Personal Identification by Flick Input with Acceleration Sensor. COMPSAC Workshops 2014: 276-281 - [c24]Wan Liyana Binti Wan Osman, Ryuya Uda:
A translator website for dyslexic children. ICUIMC 2014: 46:1-46:5 - [c23]Shuhei Kobata, Shin Tezuka, Ryuya Uda:
Personal identification by flick input with acceleration sensor. ICUIMC 2014: 87:1-87:6 - [c22]Teruyuki Iijima, Shin Tezuka, Ryuya Uda:
Method for extraction of characteristics of personal characters from life log. ICUIMC 2014: 110:1-110:8 - [c21]Misako Goto, Toru Shirato, Ryuya Uda:
Text-Based CAPTCHA Using Phonemic Restoration Effect and Similar Pronunciation with an Asian Accent. NBiS 2014: 517-524 - 2013
- [c20]Ryuya Uda:
Privacy Obfuscation with Bloom Filter for Effective Advertisement. AINA Workshops 2013: 941-946 - [c19]Matrazali Noorafiza, Hiroshi Maeda, Toshiyuki Kinoshita, Ryuya Uda:
Virtual machine remote detection method using network timestamp in cloud computing. ICITST 2013: 375-380 - [c18]Takuya Oikawa, Ryuya Uda:
Proposal of automatic reporting system against unauthorized use of smart phone. ICUIMC 2013: 9 - [c17]Hiromi Iwasaki, Ryuya Uda:
Multivector e-mail filtering with shape and color impression. ICUIMC 2013: 26 - [c16]Kenta Kunitani, Ryuya Uda:
Proposal of CAPTCHA using three dimensional objects. ICUIMC 2013: 57 - 2012
- [c15]Shin Tezuka, Ryuya Uda, Ken-ichi Okada:
ADEC: Assured Deletion and Verifiable Version Control for Cloud Storage. AINA 2012: 23-30 - [c14]Sho Kurita, Kenji Komoriya, Ryuya Uda:
Privacy Protection on Transfer System of Automated Teller Machine from Brute Force Attack. AINA Workshops 2012: 72-77 - [c13]Junya Ishii, Afiza Razali, Ryuya Uda:
Confidential Information Poisoning Methods by Considering the Information Length in Electronic Portable Devices. AINA Workshops 2012: 78-84 - [c12]Yoshiyuki Tanaka, Kenji Komoriya, Ryuya Uda:
Multiview Playback with Ghost in Required Condition. AINA Workshops 2012: 203-208 - [c11]Fumiaki Murakami, Kenji Komoriya, Ryuya Uda, Seiichi Gohshi, Isao Echizen:
Preventing Surreptitious Filming by Saturation Irradiation of Infrared Rays. AINA Workshops 2012: 232-237 - [c10]Ken Kuroiwa, Ryuya Uda:
A low cost privacy protection method for SNS by using Bloom filter. ICUIMC 2012: 7:1-7:7 - [c9]Junpei Yamaguchi, Ryuya Uda:
Proposal of privacy protection system for web forms using Bloom filter. ICUIMC 2012: 11:1-11:6 - [c8]Yasuhiro Nakamura, Ryuya Uda, Yusuke Watanabe:
Proposal of document protection system by poisoning. ICUIMC 2012: 20:1-20:7 - [c7]Takuma Mori, Ryuya Uda, Masayuki Kikuchi:
Proposal of Movie CAPTCHA Method Using Amodal Completion. SAINT 2012: 11-18 - 2010
- [c6]Ken Kuroiwa, Ryuya Uda:
Proposal of electronic commerce system with cellular phones for digital forensics. ICUIMC 2010: 42
2000 – 2009
- 2009
- [c5]Shin Tezuka, Hiroko Tomori, Ryuya Uda, Ken-ichi Okada:
Distributed Secure Virtual File System Using Hysteresis Signatures. AINA 2009: 90-97 - [c4]Hirokazu Miyata, Ryuya Uda, Ken-ichi Okada:
The Efficiency Method of Sanitizable Signature Scheme for SMF. AINA 2009: 495-502 - 2008
- [c3]Shin Tezuka, Akifumi Inoue, Ryuya Uda, Ken-ichi Okada:
Distributed Secure Virtual File System Using FUSE. II3E 2008: 161-172 - [e1]Makoto Oya, Ryuya Uda, Chizuko Yasunobu:
Towards Sustainable Society on Ubiquitous Networks, The 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E 2008), September 24-26, 2008, Tokyo, Japan. IFIP Advances in Information and Communication Technology 286, Springer 2008, ISBN 978-0-387-85690-2 [contents] - 2004
- [c2]Masahito Ito, Ryuya Uda, Satoshi Ichimura, Kazuya Tago, Tohru Hoshi, Yutaka Matsushita:
A Method of Appliance Detection Based on Features of Power Waveform. SAINT 2004: 291-294 - 2002
- [c1]Ryuya Uda, Masahito Ito, Kohei Awaya, Hiroshi Shigeno, Yutaka Matsushita:
E-Ticket Issuing System with 3-D Pattern Recognition for Mobile Terminals. SEC 2002: 399-410
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-25 19:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint