• 37 Citations
  • 3 h-Index
20092019

Research output per year

If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Toshihiro Uchibayashi is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 6 Similar Profiles

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output

  • 37 Citations
  • 3 h-Index
  • 23 Conference contribution
  • 2 Article
  • 1 Editorial

On Embedding Backdoor in Malware Detectors Using Machine Learning

Sasaki, S., Hidano, S., Uchibayashi, T., Suganuma, T., Hiji, M. & Kiyomoto, S., Aug 2019, 2019 17th International Conference on Privacy, Security and Trust, PST 2019 - Proceedings. Ghorbani, A., Ray, I., Lashkari, A. H., Zhang, J. & Lu, R. (eds.). Institute of Electrical and Electronics Engineers Inc., 8949034. (2019 17th International Conference on Privacy, Security and Trust, PST 2019 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Policy management technique using blockchain for cloud VM migration

    Uchibayashi, T., Apduhan, B. O., Shiratori, N., Suganuma, T. & Hiji, M., Aug 2019, Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019. Institute of Electrical and Electronics Engineers Inc., p. 360-362 3 p. 8890425. (Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 1 Citation (Scopus)

    Access control for cross-border transfer of sensor data

    Hidano, S., Kiyomoto, S., Biswas, A. R., Uchibayashi, T. & Suganuma, T., Jan 1 2018, Mobile Internet Security - 1st International Symposium, MobiSec 2016, Revised Selected Papers. Leu, F-Y., Kotenko, I., You, I. & Chen, H-C. (eds.). Springer Verlag, p. 143-153 11 p. (Communications in Computer and Information Science; vol. 797).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 1 Citation (Scopus)

    Toward a secure VM migration control mechanism using blockchain technique for cloud computing environment

    Uchibayashi, T., Apduhan, B., Suganuma, T. & Hiji, M., Jan 1 2018, Computational Science and Its Applications – ICCSA 2018 - 18th International Conference, 2018, Proceedings. Rocha, A. M., Taniar, D., Stankova, E., Torre, C. M., Ryu, Y., Tarantino, E., Gervasi, O., Murgante, B., Misra, S. & Apduhan, B. O. (eds.). Springer Verlag, p. 177-186 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10962 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 3 Citations (Scopus)

    A control mechanism for live migration with data regulations preservation

    Uchibayashi, T., Hashi, Y., Hidano, S., Kiyomoto, S., Apduhan, B., Abe, T., Suganuma, T. & Hiji, M., Jan 1 2017, Computational Science and Its Applications - ICCSA 2017 - 17th International Conference, 2017. Murgante, B., Apduhan, B. O., Borruso, G., Stankova, E., Gervasi, O., Misra, S., Taniar, D., Rocha, A. M. A. C., Cuzzocrea, A. & Torre, C. M. (eds.). Springer Verlag, p. 509-522 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10404).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2 Citations (Scopus)