IEICE TRANSACTIONS on Information and Systems    (open access publishing)
Online ISSN : 1745-1361
[Whole issue]:PDF (41.1MB)
Previous | 
Top 10 downloads
To the Latest Issue

Advance publication (published online immediately after acceptance)


RECOGNITION OF MULTIPLE FOOD ITEMS IN A SINGLE PHOTO FOR USE IN A BUFFET-STYLE RESTAURANT
Masashi ANZAWA  Sosuke AMANO  Yoko YAMAKATA  Keiko MOTONAGA  Akiko KAMEI  Kiyoharu AIZAWA  
Summary | Full Text:PDF(1.6MB)


Automatic Speech Recognition System with Output-Gate Projected Gated Recurrent Unit
Gaofeng CHENG  Pengyuan ZHANG  Ji XU  
Summary | Full Text:PDF(986.6KB)


Speaker-phonetic i-vector Modeling for Text-dependent Speaker Verification with Random Digit Strings
Shengyu YAO  Ruohua ZHOU  Pengyuan ZHANG  
Summary | Full Text:PDF(664.8KB)


Probabilistic analysis of differential fault attack on MIBS
Yang GAO  Yong-juan WANG  Qing-jun YUAN  Tao WANG  Xiang-bin WANG  
Summary | Full Text:PDF(523.4KB)


Optimizing Slot Utilization and Network Topology for Communication Pattern on Circuit-switched Parallel Computing Systems
Yao HU  Michihiro KOIBUCHI  
Summary | Full Text:PDF(1.7MB)


Neural Oscillation-based Classification of Japanese Spoken Sentences during Speech Perception
Hiroki WATANABE  Hiroki TANAKA  Sakriani SAKTI  Satoshi NAKAMURA  
Summary | Full Text:PDF(244.2KB)


FSCRank: A Failure-sensitive Structure-based Component Ranking Approach for Cloud Applications
Na WU  Decheng ZUO  Zhan ZHANG  Peng ZHOU  Yan ZHAO  
Summary | Full Text:PDF(628.2KB)


Multi-Context Automated Lemma Generation for Term Rewriting Induction with Divergence Detection
Chengcheng JI  Masahito KURIHARA  Haruhiko SATO  
Summary | Full Text:PDF(206.4KB)


Development of Acoustic Nonverbal Information Estimation System for Unconstrained Long-term Monitoring of Daily Office Activity
Hitomi YOKOYAMA  Masano NAKAYAMA  Hiroaki MURATA  Kinya FUJITA  
Summary | Full Text:PDF(4MB)


Hotspot Modeling of Hand-machine Interaction Experiences from a Head-mounted RGB-D Camera
Longfei CHEN  Yuichi NAKAMURA  Kazuaki KONDO  Walterio MAYOL-CUEVAS  
Summary | Full Text:PDF(3.3MB)


Preordering for Chinese-Vietnamese statistical machine translation
Anh TRAN HUU  Heyan HUANG  Phuoc TRAN  Shumin SHI  Huu NGUYEN  
Summary | Full Text:PDF(387.4KB)


Quantum Query Complexity of Unitary Operator Discrimination
Akinori KAWACHI  Kenichi KAWANO  François LE GALL  Suguru TAMAKI  
Summary | Full Text:PDF(466.3KB)


File Systems are Hard to Test ― Learning from xfstests
Naohiro AOTA  Kenji KONO  
Summary | Full Text:PDF(3.1MB)


Discriminative Learning of Filterbank Layer within Deep Neural Network Based Speech Recognition for Speaker Adaptation
Hiroshi SEKI  Kazumasa YAMAMOTO  Tomoyosi AKIBA  Seiichi NAKAGAWA  
Summary | Full Text:PDF(1.6MB)


Comprehensive Damage Assessment of Cyberattacks on Defense Mission Systems
Seung Keun YOO  Doo-Kwon BAIK  
Summary | Full Text:PDF(365.5KB)


A Statistical Reputation Approach for Reliable Packet Routing in Ad-Hoc Sensor Networks
Fang WANG  Zhe WEI  
Summary | Full Text:PDF(674.7KB)


Cloud-Assisted Peer-to-Peer Video Streaming with Minimum Latency
Satoshi FUJITA  
Summary | Full Text:PDF(208.7KB)


Missing-Value Imputation of Continuous Missing Based on Deep Imputation Network using Correlations among Multiple IoT Data Streams in a Smart Space
Minseok LEE  Jihoon AN  Younghee LEE  
Summary | Full Text:PDF(1.2MB)


Partial gathering of mobile agents in arbitrary networks
Masahiro SHIBATA  Daisuke NAKAMURA  Fukuhito OOSHITA  Hirotsugu KAKUGAWA  Toshimitsu MASUZAWA  
Summary | Full Text:PDF(532KB)


Efficient Enumeration of Flat-Foldable Single Vertex Crease Patterns
Koji OUCHI  Ryuhei UEHARA  
Summary | Full Text:PDF(966.1KB)


Exact Exponential Algorithm for Distance-3 Independent Set Problem
Katsuhisa YAMANAKA  Shogo KAWARAGI  Takashi HIRAYAMA  
Summary | Full Text:PDF(453.8KB)


A Simple Heuristic for Order-Preserving Matching
Joong Chae NA  Inbok LEE  
Summary | Full Text:PDF(293.2KB)


The Coloring Reconfiguration Problem on Specific Graph Classes
Tatsuhiko HATANAKA  Takehiro ITO  Xiao ZHOU  
Summary | Full Text:PDF(234.7KB)


Evasive Malicious Website Detection by Leveraging Redirection Subgraph Similarities
Toshiki SHIBAHARA  Yuta TAKATA  Mitsuaki AKIYAMA  Takeshi YAGI  Kunio HATO  Masayuki MURATA  
Summary | Full Text:PDF(716KB)


Space-optimal population protocols for uniform bipartition under global fairness
Hiroto YASUMI  Fukuhito OOSHITA  Ken'ichi YAMAGUCHI  Michiko INOUE  
Summary | Full Text:PDF(2.7MB)


The Complexity of Induced Tree Reconfiguration Problems
Kunihiro WASA  Katsuhisa YAMANAKA  Hiroki ARIMURA  
Summary | Full Text:PDF(1.3MB)


Exact Learning of Primitive Formal Systems Defining Labeled Ordered Tree Languages via Queries
Tomoyuki UCHIDA  Satoshi MATSUMOTO  Takayoshi SHOUDAI  Yusuke SUZUKI  Tetsuhiro MIYAHARA  
Summary | Full Text:PDF(622.9KB)


The Explicit Formula of the Presumed Optimal Recurrence Relation for the Star Tower of Hanoi
Akihiro MATSUURA  Yoshiaki SHOJI  
Summary | Full Text:PDF(127.7KB)


Robust Face Sketch Recognition Using Locality Sensitive Histograms
Hanhoon PARK  
Summary | Full Text:PDF(3MB)


Flash Crowd Absorber for P2P Video Streaming
Satoshi FUJITA  
Summary | Full Text:PDF(291.9KB)


Personal Data Retrieval and Disambiguation in Web Person Search
Wei YULIANG  Xin GUODONG  Wang WEI  Lv FANG  Wang BAILING  
Summary | Full Text:PDF(938KB)


An Empirical Study of README contents for JavaScript Packages
Shohei IKEDA  Akinori IHARA  Raula GAIKOVINA KULA  Kenichi MATSUMOTO  
Summary | Full Text:PDF(456KB)


Automated Detection of Children at Risk of Chinese Handwriting Difficulties Using Handwriting Process Information: An Exploratory Study
Zhiming WU  Tao LIN  Ming LI  
Summary | Full Text:PDF(376.8KB)


Visual emphasis of lip protrusion for pronunciation learning
Siyang YU  Kazuaki KONDO  Yuichi NAKAMURA  Takayuki NAKAJIMA  Hiroaki NANJO  Masatake DANTSUJI  
Summary | Full Text:PDF(1023.8KB)


Side Scan Sonar Image Super Resolution via Region-Selective Sparse Coding
Jaihyun PARK  Bonhwa KU  Youngsaeng JIN  Hanseok KO  
Summary | Full Text:PDF(560.9KB)


Adaptive Tiling Selection for Viewport Adaptive Streaming of 360-degree Video
Duc V. NGUYEN  Huyen T. T. TRAN  Truong Cong THANG  
Summary | Full Text:PDF(525KB)


Image Manipulation Specifications on Social Networking Services for Encryption-then-Compression Systems
Tatsuya CHUMAN  Kenta IIDA  Warit SIRICHOTEDUMRONG  Hitoshi KIYA  
Summary | Full Text:PDF(1.7MB)


Robust and Secure Data Hiding for PDF Text Document
Minoru KURIBAYASHI  Takuya FUKUSHIMA  Nobuo FUNABIKI  
Summary | Full Text:PDF(306.8KB)


Permutation-based Signature Generation for Spread-Spectrum Video Watermarking
Hiroshi ITO  Tadashi KASEZAWA  
Summary | Full Text:PDF(740.4KB)


Image watermarking technique using embedder and extractor neural networks
Ippei HAMAMOTO  Masaki KAWAMURA  
Summary | Full Text:PDF(1.2MB)


Robust Image Identification with DC Coefficients for Double-compressed JPEG Images
Kenta IIDA  Hitoshi KIYA  
Summary | Full Text:PDF(3.3MB)


Symmetric Decomposition of Convolution Kernels
Jun OU  Yujian LI  
Summary | Full Text:PDF(549.3KB)


Towards Privacy-preserving Location Sharing over Mobile Online Social Networks
Juan CHEN  Shen SU  Xianzhi WANG  
Summary | Full Text:PDF(2MB)


On-Demand Generalization of Road Networks based on Facility Search Results
Daisuke YAMAMOTO  Masaki MURASE  Naohisa TAKAHASHI  
Summary | Full Text:PDF(8.6MB)


JPEG steganalysis based on multi-projection ensemble discriminant clustering
Yan SUN  Guorui FENG  Yanli REN  
Summary | Full Text:PDF(330.4KB)


A High Throughput Device-to-Device Wireless Communication System
Amin JAMALI  Seyed Mostafa SAFAVI HEMAMI  Mehdi BERENJKOUB  Hossein SAIDI  Masih ABEDINI  
Summary | Full Text:PDF(2.4MB)


Cycle Time Improvement of EtherCAT Networks with Embedded Linux-Based Master
Hyun-Chul YI  Joon-Young CHOI  
Summary | Full Text:PDF(236.3KB)


A Semantic Management Method of Simulation Models in GNSS Distributed Simulation Environment
Guo-chao FAN  Chun-sheng HU  Xue-en ZHENG  Cheng-dong XU  
Summary | Full Text:PDF(3.1MB)


Fast Visual Odometry based Sparse Geometric Constraint for RGB-D Camera
Ruibin GUO  Dongxiang ZHOU  Keju PENG  Yunhui LIU  
Summary | Full Text:PDF(2.3MB)


Design of High-Speed Easy-to-Expand CC-Link Parallel Communication Module Based on R-IN32M3
Yeong-Mo Yeon  Seung-Hee Kim  
Summary | Full Text:PDF(1.4MB)


Temporal and spatial analysis of local body sway movements for the identification of people
Takuya KAMITANI  Hiroki YOSHIMURA  Masashi NISHIYAMA  Yoshio IWAI  
Summary | Full Text:PDF(3.6MB)


Real-time Sparse Visual Tracking using Circulant Reverse Lasso Model
Cheng gang GUO  Dong yi CHEN  Zhi qi HUANG  
Summary | Full Text:PDF(2.9MB)


Real-time Head Action Recognition Based on HOF and ELM
Tie HONG  Yuan Wei LI  Zhi Ying WANG  
Summary | Full Text:PDF(738.4KB)


Selecting orientation-insensitive features for activity recognition from accelerometers
Yasser MOHAMMAD  Kazunori MATSUMOTO  Keiichiro HOASHI  
Summary | Full Text:PDF(735.9KB)


Accelerating Large-Scale Interconnection Network Simulation by Cellular Automata Concept
Takashi YOKOTA  Kanemitsu OOTSU  Takeshi OHKAWA  
Summary | Full Text:PDF(2.4MB)


Millimeter-wave Radar Target Recognition Algorithm based on Collaborative Auto-encoder
Yilu MA  Zhihui YE  Yuehua LI  
Summary | Full Text:PDF(441.8KB)


A Robot Model that Obeys a Norm of a Human Group by Participating in the Group and Interacting with its Members
Yotaro FUSE  Hiroshi TAKENOUCHI  Masataka TOKUMARU  
Summary | Full Text:PDF(2.1MB)


Empirical Studies of a Kernel Density Estimation Based Naive Bayes Method for Software Defect Prediction
Haijin JI  Song HUANG  Xuewei LV  Yaning WU  Yuntian FENG  
Summary | Full Text:PDF(731.3KB)


Patch Optimization for Surface Light Field Reconstruction
Wei LI  Huajun GONG  Chunlin SHEN  Yi WU  
Summary | Full Text:PDF(2.2MB)


Visualization of Inter-module Dataflow through Global Variables for Source Code Review
Naoto ISHIDA  Takashi ISHIO  Yuta NAKAMURA  Shinji KAWAGUCHI  Tetsuya KANDA  Katsuro INOUE  
Summary | Full Text:PDF(100.5KB)


A Multilevel Indexing Method for Approximate Geospatial Aggregation Analysis
Luo CHEN  Ye WU  Wei XIONG  Ning JING  
Summary | Full Text:PDF(813KB)


Parametric Models for Mutual Kernel Matrix Completion
Rachelle RIVERO  Tsuyoshi KATO  
Summary | Full Text:PDF(176.8KB)


Salient Feature Selection for CNN-based Visual Place Recognition
Yutian Chen  Wenyan Gan  Shanshan Jiao  Youwei Xu  Yuntian Feng  
Summary | Full Text:PDF(529KB)


Extrinsic Camera Calibration of Display-Camera System with Cornea Reflections
Kosuke TAKAHASHI  Dan MIKAMI  Mariko ISOGAWA  Akira KOJIMA  Hideaki KIMATA  
Summary | Full Text:PDF(2.6MB)


Multi Long-Short Term Memory Models for Short Term Traffic Flow Prediction
Zelong XUE  Yang XUE  
Summary | Full Text:PDF(2.8MB)


New Context-Adaptive Arithmetic Coding Scheme for Lossless Bit Rate Reduction of Parametric Stereo in Enhanced aacPlus
Hee-Suk PANG  Jun-seok LIM  Hyun-Young JIN  
Summary | Full Text:PDF(216.7KB)


Hardware based parallel phrase matching engine in dictionary compressor
Qian Dong  
Summary | Full Text:PDF(349.8KB)


A Genetic Approach for Accelerating Communication Performance by Node Mapping
Takashi YOKOTA  Kanemitsu OOTSU  Takeshi OHKAWA  
Summary | Full Text:PDF(174.7KB)


Parallel Precomputation with Input Value Prediction for Model Predictive Control Systems
Satoshi KAWAKAMI  Takatsugu ONO  Toshiyuki OHTSUKA  Koji INOUE  
Summary | Full Text:PDF(3.9MB)


Real-time and Energy-efficient Face Detection on CPU-GPU Heterogeneous Embedded Platforms
Chanyoung OH  Saehanseul YI  Youngmin YI  
Summary | Full Text:PDF(644.1KB)


ATSMF: Automated tiered storage with fast memory and slow flash storage to improve response time with concentrated input-output (IO) workloads
Kazuichi OE  Mitsuru SATO  Takeshi NANRI  
Summary | Full Text:PDF(1.2MB)


The Panpositionable Pancyclicity of Locally Twisted Cubes
Hon-Chan CHEN  
Summary | Full Text:PDF(274.6KB)


Order Adjustment Approach using Cayley Graphs for the Order/Degree Problem
Teruaki KITASUKA  Takayuki MATSUZAKI  Masahiro IIDA  
Summary | Full Text:PDF(245.6KB)


Cycle Embedding in Generalized Recursive Circulant Graphs
Shyue-Ming TANG  Yue-Li WANG  Chien-Yi LI  Jou-Ming CHANG  
Summary | Full Text:PDF(514.9KB)


Enhancing Job Scheduling on Inter-rackscale Datacenters with Free-space Optical Links
Yao HU  Michihiro KOIBUCHI  
Summary | Full Text:PDF(4.1MB)


Distributed Video Decoding on Hadoop
Illo YOON  Saehanseul YI  Chanyoung OH  Hyeonjin JUNG  Youngmin YI  
Summary | Full Text:PDF(750.6KB)


A Robust Algorithm for Deadline Constrained Scheduling in IaaS Cloud Environment
Bilkisu Larai MUHAMMAD-BELLO  Masayoshi ARITSUGI  
Summary | Full Text:PDF(1.9MB)


Avoiding Performance Impacts by Re-replication Workload Shifting in HDFS based Cloud Storage
Thanda SHWE  Masayoshi ARITSUGI  
Summary | Full Text:PDF(364.1KB)


Discovering Co-cluster Structure from Relationships between Biased Objects
Iku OHAMA  Takuya KIDA  Hiroki ARIMURA  
Summary | Full Text:PDF(1.9MB)


Highly Efficient Mobile Visual Search Algorithm
Chuang ZHU  Xiao Feng HUANG  Guo Qing XIANG  Hui Hui DONG  Jia Wen SONG  
Summary | Full Text:PDF(1.1MB)


Leveraging Unannotated Texts for Scientific Relation Extraction
Qin DAI  Naoya INOUE  Paul REISERT  Kentaro INUI  
Summary | Full Text:PDF(1.6MB)


A New DY Conjugate Gradient Method and Applications to Image Denoising
Wei XUE  Junhong REN  Xiao ZHENG  Zhi LIU  Yueyong LIANG  
Summary | Full Text:PDF(1.1MB)


BareUnpack: Generic Unpacking on the Bare-metal Operating System
Cheng BINLIN  Li PENGWEI  
Summary | Full Text:PDF(806.9KB)


Finding Widespread Events with Simple Bitmaps
Syed MOEEN ALI NAQVI  MyungKeun YOON  
Summary | Full Text:PDF(285.1KB)


A Verification Framework for Assembly Programs under Relaxed Memory Model using SMT Solver
Pattaravut MALEEHUAN  Yuki CHIBA  Toshiaki AOKI  
Summary | Full Text:PDF(694.9KB)


Local Feature Reliability Measure Consistent with Match Conditions for Mobile Visual Search
Kohei MATSUZAKI  Kazuyuki TASAKA  Hiromasa YANAGIHARA  
Summary | Full Text:PDF(2.4MB)


Shortening Downtime of Reboot-based Kernel Updates using Dwarf
Ken TERADA  Hiroshi YAMADA  
Summary | Full Text:PDF(1.1MB)


Improving Thai Word and Sentence Segmentation Using Linguistic Knowledge
Rungsiman Nararatwong  Natthawut Kertkeidkachorn  Nagul Cooharojananone  Hitoshi Okada  
Summary | Full Text:PDF(1.4MB)


A Block-Permutation-Based Encryption Scheme with Independent Processing of RGB Components
Shoko IMAIZUMI  Hitoshi KIYA  
Summary | Full Text:PDF(3MB)


A two-stage crack detection method for concrete bridges using Convolutional Neural Networks
Yundong Li  Weigang Zhao  Xueyan Zhang  Qichen Zhou  
Summary | Full Text:PDF(515.9KB)


In-vehicle Voice Interface with Improved Utterance Classification Accuracy Using Off-the-shelf Cloud Speech Recognizer
Takeshi HOMMA  Yasunari OBUCHI  Kazuaki SHIMA  Rintaro IKESHITA  Hiroaki KOKUBO  Takuya MATSUMOTO  
Summary | Full Text:PDF(747.6KB)


A Novel Speech Enhancement System Based on the Coherence-based Algorithm and the Differential Beamforming
Lei WANG  Jie ZHU  
Summary | Full Text:PDF(465.1KB)


Currency Preserving Query: Selecting the Newest Values from Multiple Tables
Mohan LI  Yanbin SUN  
Summary | Full Text:PDF(598.9KB)


A Robust Depth Image Based Rendering Scheme for Stereoscopic View Synthesis with Adaptive Domain Transform Based Filtering Framework
Wei LIU  Yun Qi TANG  Jian Wei DING  Ming Yue CUI  
Summary | Full Text:PDF(980.3KB)


View Priority Based Threads Allocation and Binary Search Oriented Reweight for GPU Accelerated Real-time 3D Ball Tracking
Yilin HOU  Ziwei DENG  Xina CHENG  Takeshi IKENAGA  
Summary | Full Text:PDF(6.3MB)


Cooperative GPGPU Scheduling for Consolidating Server Workloads
Yusuke SUZUKI  Hiroshi YAMADA  Shinpei KATO  Kenji KONO  
Summary | Full Text:PDF(2.1MB)


Security Consideration For Deep Learning-Based Image Forensics
Wei ZHAO  Pengpeng YANG  Rongrong NI  Yao ZHAO  Haorui WU  
Summary | Full Text:PDF(3.9MB)


Development of License Plate Recognition on Complex Scene with Plate-style Classification and Confidence Scoring based on KNN
Vince Jebryl MONTERO  Yong-Jin JEONG  
Summary | Full Text:PDF(691.7KB)


Hidden Singer: Distinguishing Imitation Singers based on Training with Only the Original Song
Hosung PARK  Seungsoo NAM  Eun MAN CHOI  Daeseon CHOI  
Summary | Full Text:PDF(1.1MB)


A rate perceptual-distortion optimized video coding HEVC
Bumshik Lee  Jae Young Choi  
Summary | Full Text:PDF(1.2MB)


Automatic prevention of buffer overflow vulnerability using candidate code generation
Young-Su JANG  Jin-Young CHOI  
Summary | Full Text:PDF(651.4KB)


Syntax-Based Context Representation for Statistical Machine Translation
Kehai CHEN  Tiejun ZHAO  Muyun YANG  
Summary | Full Text:PDF(952KB)

 Volume E101-D No.11  (Publication Date:2018/11/01)
Special Section on Information and Communication System Security

pp.2559-2560  FOREWORD  Open Access Paper
FOREWORD
Atsushi KANAI  
Summary | FreeFull Text:PDF(73.5KB)

pp.2561-2575  INVITED PAPER  Open Access Paper
An Overview of Cyber Security for Connected Vehicles
Junko TAKAHASHI  
Summary | FreeFull Text:PDF(3.2MB)

pp.2576-2583  PAPER-Mobile Application and Web Security
Towards Finding Code Snippets on a Question and Answer Website Causing Mobile App Vulnerabilities
Hiroki NAKANO  Fumihiro KANEI  Yuta TAKATA  Mitsuaki AKIYAMA  Katsunari YOSHIOKA  
Summary | Full Text:PDF (1MB) >>Buy this Article

pp.2584-2599  PAPER-Mobile Application and Web Security
Understanding the Inconsistency between Behaviors and Descriptions of Mobile Apps
Takuya WATANABE  Mitsuaki AKIYAMA  Tetsuya SAKAI  Hironori WASHIZAKI  Tatsuya MORI  
Summary | Full Text:PDF (1.5MB) >>Buy this Article

pp.2600-2611  PAPER-Mobile Application and Web Security
Identifying Evasive Code in Malicious Websites by Analyzing Redirection Differences
Yuta TAKATA  Mitsuaki AKIYAMA  Takeshi YAGI  Takeo HARIU  Kazuhiko OHKUBO  Shigeki GOTO  
Summary | Full Text:PDF (1.7MB) >>Buy this Article

pp.2612-2621  PAPER-Mobile Application and Web Security
A Secure In-Depth File System Concealed by GPS-Based Mounting Authentication for Mobile Devices
Yong JIN  Masahiko TOMOISHI  Satoshi MATSUURA  Yoshiaki KITAGUCHI  
Summary | Full Text:PDF (2.3MB) >>Buy this Article

pp.2622-2632  PAPER-Network Security
Automatically Generating Malware Analysis Reports Using Sandbox Logs
Bo SUN  Akinori FUJINO  Tatsuya MORI  Tao BAN  Takeshi TAKAHASHI  Daisuke INOUE  
Summary | Full Text:PDF (934.9KB) >>Buy this Article

pp.2633-2643  PAPER-Network Security
Design and Implementation of SDN-Based Proactive Firewall System in Collaboration with Domain Name Resolution
Hiroya IKARASHI  Yong JIN  Nariyoshi YAMAI  Naoya KITAGAWA  Kiyohiko OKAYAMA  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.2644-2657  PAPER-Forensics and Risk Analysis
Ad-hoc Analytical Framework of Bitcoin Investigations for Law Enforcement
Hiroki KUZUNO  Giannis TZIAKOURIS  
Summary | Full Text:PDF (2.3MB) >>Buy this Article

pp.2658-2664  PAPER-Forensics and Risk Analysis
Modeling Attack Activity for Integrated Analysis of Threat Information
Daiki ITO  Kenta NOMURA  Masaki KAMIZONO  Yoshiaki SHIRAISHI  Yasuhiro TAKANO  Masami MOHRI  Masakatu MORII  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

pp.2665-2676  PAPER-Forensics and Risk Analysis
Model Inversion Attacks for Online Prediction Systems: Without Knowledge of Non-Sensitive Attributes
Seira HIDANO  Takao MURAKAMI  Shuichi KATSUMATA  Shinsaku KIYOMOTO  Goichiro HANAOKA  
Summary | Full Text:PDF (613.4KB) >>Buy this Article

pp.2677-2687  PAPER-Cryptographic Techniques
Tag-KEM/DEM Framework for Public-Key Encryption with Non-Interactive Opening
Yusuke SAKAI  Takahiro MATSUDA  Goichiro HANAOKA  
Summary | Full Text:PDF (832.1KB) >>Buy this Article

pp.2688-2697  PAPER-Cryptographic Techniques
Zero-Knowledge Identification Scheme Using LDPC Codes
Haruka ITO  Masanori HIROTOMO  Youji FUKUTA  Masami MOHRI  Yoshiaki SHIRAISHI  
Summary | Full Text:PDF (432.5KB) >>Buy this Article

pp.2698-2705  PAPER-Cryptographic Techniques
Design Exploration of SHA-3 ASIP for IoT on a 32-bit RISC-V Processor
Jinli RAO  Tianyong AO  Shu XU  Kui DAI  Xuecheng ZOU  
Summary | Full Text:PDF (730.3KB) >>Buy this Article

pp.2706-2709  LETTER-Network Security
A Scalable and Seamless Connection Migration Scheme for Moving Target Defense in Legacy Networks
Taekeun PARK  Koohong KANG  Daesung MOON  
Summary | Full Text:PDF (298.9KB) >>Buy this Article

Regular Section

pp.2710-2719  PAPER-Fundamentals of Information Systems
Efficient Reusable Collections
Davud MOHAMMADPUR  Ali MAHJUR  
Summary | Full Text:PDF (1.6MB) >>Buy this Article

pp.2720-2729  PAPER-Software Engineering
How are IF-Conditional Statements Fixed Through Peer CodeReview?
Yuki UEDA  Akinori IHARA  Takashi ISHIO  Toshiki HIRAO  Kenichi MATSUMOTO  
Summary | Full Text:PDF (817.3KB) >>Buy this Article

pp.2730-2743  PAPER-Software Engineering
Fostering Real-Time Software Analysis by Leveraging Heterogeneous and Autonomous Software Repositories
Chaman WIJESIRIWARDANA  Prasad WIMALARATNE  
Summary | Full Text:PDF (706.6KB) >>Buy this Article

pp.2744-2753  PAPER-Software Engineering
Studying the Cost and Effectiveness of OSS Quality Assessment Models: An Experience Report of Fujitsu QNET
Yasutaka KAMEI  Takahiro MATSUMOTO  Kazuhiro YAMASHITA  Naoyasu UBAYASHI  Takashi IWASAKI  Shuichi TAKAYAMA  
Summary | Full Text:PDF (600.1KB) >>Buy this Article

pp.2754-2761  PAPER-Information Network
Lightweight Security Hardware Architecture Using DWT and AES Algorithms
Ignacio ALGREDO-BADILLO  Francisco R. CASTILLO-SORIA  Kelsey A. RAMÍREZ-GUTIÉRREZ  Luis MORALES-ROSALES  Alejandro MEDINA-SANTIAGO  Claudia FEREGRINO-URIBE  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.2762-2772  PAPER-Information Network
Critical Nodes Identification of Power Grids Based on Network Efficiency
WenJie KANG  PeiDong ZHU  JieXin ZHANG  JunYang ZHANG  
Summary | Full Text:PDF (1.3MB) >>Buy this Article

pp.2773-2783  PAPER-Artificial Intelligence, Data Mining
Accelerating a Lloyd-Type k-Means Clustering Algorithm with Summable Lower Bounds in a Lower-Dimensional Space
Kazuo AOYAMA  Kazumi SAITO  Tetsuo IKEDA  
Summary | Full Text:PDF (759KB) >>Buy this Article

pp.2784-2794  PAPER-Artificial Intelligence, Data Mining
Speeding up Extreme Multi-Label Classifier by Approximate Nearest Neighbor Search
Yukihiro TAGAMI  
Summary | Full Text:PDF (586.4KB) >>Buy this Article

pp.2795-2807  PAPER-Artificial Intelligence, Data Mining
Food Intake Detection and Classification Using a Necklace-Type Piezoelectric Wearable Sensor System
Ghulam HUSSAIN  Kamran JAVED  Jundong CHO  Juneho YI  
Summary | Full Text:PDF (3.6MB) >>Buy this Article

pp.2808-2817  PAPER-Image Processing and Video Processing
High-Performance Super-Resolution via Patch-Based Deep Neural Network for Real-Time Implementation
Reo AOKI  Kousuke IMAMURA  Akihiro HIRANO  Yoshio MATSUDA  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.2818-2822  LETTER-Computer System
Strip-Switched Deployment Method to Optimize Single Failure Recovery for Erasure Coded Storage Systems
Yingxun FU  Shilin WEN  Li MA  Jianyong DUAN  
Summary | Full Text:PDF (230.9KB) >>Buy this Article

pp.2823-2826  LETTER-Information Network
On the Optimal Configuration of Grouping-Based Framed Slotted ALOHA
Young-Beom KIM  
Summary | Full Text:PDF (297.7KB) >>Buy this Article

pp.2827-2830  LETTER-Information Network
NEST: Towards Extreme Scale Computing Systems
Yunfeng LU  Huaxi GU  Xiaoshan YU  Kun WANG  
Summary | Full Text:PDF (309KB) >>Buy this Article

pp.2831-2835  LETTER-Dependable Computing
Energy-Efficient Connectivity Re-Establishment in UASNs with Dumb Nodes
Qiuli CHEN  Ming HE  Fei DAI  Chaozheng ZHU  
Summary | Full Text:PDF (362.8KB) >>Buy this Article

pp.2836-2839  LETTER-Image Processing and Video Processing
Efficient Methods of Inactive Regions Padding for Segmented Sphere Projection (SSP) of 360 Video
Yong-Uk YOON  Yong-Jo AHN  Donggyu SIM  Jae-Gon KIM  
Summary | Full Text:PDF (756.7KB) >>Buy this Article

pp.2840-2843  LETTER-Image Processing and Video Processing
Efficient Texture Creation Based on Random Patches in Database and Guided Filter
Seok Bong YOO  Mikyong HAN  
Summary | Full Text:PDF (1.7MB) >>Buy this Article

pp.2844-2848  LETTER-Image Processing and Video Processing
Deep Convolutional Neural Networks for Manga Show-Through Cancellation
Taku NAKAHARA  Kazunori URUMA  Tomohiro TAKAHASHI  Toshihiro FURUKAWA  
Summary | Full Text:PDF (1.7MB) >>Buy this Article

pp.2849-2854  LETTER-Image Recognition, Computer Vision
Adaptive Object Tracking with Complementary Models
Peng GAO  Yipeng MA  Chao LI  Ke SONG  Yan ZHANG  Fei WANG  Liyi XIAO  
Summary | Full Text:PDF (3.6MB) >>Buy this Article

pp.2855-2858  LETTER-Image Recognition, Computer Vision
Accurate Scale Adaptive and Real-Time Visual Tracking with Correlation Filters
Jiatian PI  Shaohua ZENG  Qing ZUO  Yan WEI  
Summary | Full Text:PDF (721.8KB) >>Buy this Article

pp.2859-2862  LETTER-Biological Engineering
High-Speed Spelling in Virtual Reality with Sequential Hybrid BCIs
Zhaolin YAO  Xinyao MA  Yijun WANG  Xu ZHANG  Ming LIU  Weihua PEI  Hongda CHEN  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

Previous | 
go to Page Top