From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

No persons found for author name Haruta, Shuichiro
add a person with the name Haruta, Shuichiro
 

Другие публикации лиц с тем же именем

A Preprocessing by Using Multiple Steganography for Intentional Image Downsampling on CNN-Based Steganalysis., , , и . IEEE Access, (2020)Visual Similarity-Based Phishing Detection Scheme Using Image and CSS with Target Website Finder., , и . GLOBECOM, стр. 1-6. IEEE, (2017)Trust-Based Sybil Nodes Detection with Robust Seed Selection and Graph Pruning on SNS., , и . IEICE Trans. Commun., 99-B (5): 1002-1011 (2016)A Server-Based Distributed Storage Using Secret Sharing with AES-256 for Lightweight Safety Restoration., , , и . IEICE Trans. Inf. Syst., 103-D (7): 1647-1659 (2020)Trust-based Sybil nodes detection with robust seed selection and graph pruning on SNS., , и . WIFS, стр. 1-6. IEEE, (2015)A Website Fingerprinting Attack based on the Virtual Memory of the Process on Android Devices., , , и . APCC, стр. 7-12. IEEE, (2021)Trust-based Verification Attack Prevention Scheme using Tendency of Contents Request on NDN., , , , и . APCC, стр. 159-164. IEEE, (2019)Encounter Record Reduction Scheme based on Theoretical Contact Probability for Flooding Attack Mitigation in DTN., , , и . APCC, стр. 34-39. IEEE, (2018)A Preprocessing Methodology by Using Additional Steganography on CNN-based Steganalysis., , , и . GLOBECOM, стр. 1-6. IEEE, (2020)An Empirical Study on News Recommendation in Multiple Domain Settings., и . MobiQuitous, том 419 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 529-540. Springer, (2021)