281 results on '"Yoshiura, Hiroshi"'
Search Results
2. Personal Authentication for Periocular Region in Thermal and Visible Light Images by Using CNN
3. Modeling Malicious Behaviors and Fake News Dissemination on Social Networks
4. Explainable Multimodal Fake Posts Detection Using Feature Extraction with Attention Mechanisms
5. Breaking Anonymity of Social Network Accounts by Using Coordinated and Extensible Classifiers Based on Machine Learning
6. A Rule-Based Approach for Detecting Location Leaks of Short Text Messages
7. De-anonymising Social Network Posts by Linking with Résumé
8. Anonymizing Temporal Phrases in Natural Language Text to be Posted on Social Networking Services
9. Evaluation of Secular Changes in Statistical Features of Traffic for the Purpose of Malware Detection
10. Automatic Anonymous Fingerprinting of Text Posted on Social Networking Services
11. Securing a B+tree for Use with Secret-Shared Databases
12. New Approach to Anonymity of User Information on Social Networking Services
13. Batching Multiple Protocols to Improve Efficiency of Multi-Party Computation
14. PC-Based Real-Time Video Watermark Embedding System Independent of Platform for Parallel Computing
15. Accelerating Multiparty Computation by Efficient Random Number Bitwise-Sharing Protocols
16. Approach to Privacy-Preserve Data in Two-Tiered Wireless Sensor Network Based on Linear System and Histogram
17. In-depth Evaluation of Content-Based Phishing Detection to Clarify Its Strengths and Limitations
18. Measuring Accumulated Revelations of Private Information by Multiple Media
19. Disclosure Control of Natural Language Information to Enable Secure and Enjoyable Communication over the Internet
20. DCNL: Disclosure Control of Natural Language Information to Enable Secure and Enjoyable E-Communications
21. Dual-Plane Correlation-Based Video Watermarking for Immunity to Rotation, Scale, Translation, and Random Distortion
22. Evaluation and Improvement of Digital Watermarking Algorithm Based on Cryptographic Security Models
23. Evaluation of Integrity Verification System for Video Content Using Digital Watermarking
24. Evaluation of PC-Based Real-Time Watermark Embedding System for Standard-Definition Video Stream
25. Adaptive Embedding and Detection for Improved Video Watermarking
26. Development Concept for and Trial Application of a 'Mulutiplex Risk Communicator'
27. Improved Video Watermark Detection Using Statistically-Adaptive Accumulation
28. Time Series Analysis of SHAP Values by Automobile Manufacturers Recovery Rates
29. Combinatorial Optimization of Countermeasures against Illegal Copying
30. Legally Authorized and Unauthorized Digital Evidence
31. Use of Motion Estimation to Improve Video Watermarking for MPEG Encoders
32. A Multi-OS Approach to Trusted Computer Systems
33. Authentication Web-Based Virtual Shops Using Signature-Embedded Marks — A Practical Analysis — : Transcript of Discussion
34. INTERNET-MARKs: Clear, Secure, and Portable Visual Marks for the Cyber Worlds
35. Secure Fingerprinting Using Public-Key Cryptography : Position Paper
36. Breaking Anonymity of Social Network Accounts by Using Coordinated and Extensible Classifiers Based on Machine Learning
37. An Evaluation Point Culling Algorithm for Radio Propagation Simulation based on the Imaging Method
38. Reliability-Disguised Attacks on Social Network to Accelerate Fake News Dissemination
39. A Rule-Based Approach for Detecting Location Leaks of Short Text Messages
40. De-anonymising Social Network Posts by Linking with Résumé
41. Periocular Recognition Based on Features from Thermal and Visible-Light Images
42. Anonymizing Temporal Phrases in Natural Language Text to be Posted on Social Networking Services
43. Disclosure Control of Natural Language Information to Enable Secure and Enjoyable Communication over the Internet : (Transcript of Discussion)
44. Use of Human Visual System to Improve Video Watermarking for Immunity to Rotation, Scale, Translation, and Random Distortion
45. Securing a B+tree for Use with Secret-Shared Databases
46. Automatic Anonymous Fingerprinting of Text Posted on Social Networking Services
47. A Fake News Dissemination Model Based on Updating Reliability and Doubt among Individuals
48. Time-aware multi-resolutional approach to re-identifying location histories by using social networks
49. Batching Multiple Protocols to Improve Efficiency of Multi-Party Computation
50. Accelerating Multiparty Computation by Efficient Random Number Bitwise-Sharing Protocols
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.