IEICE TRANSACTIONS on Information and Systems
Online ISSN : 1745-1361
[Whole issue]:PDF (30.9MB)
Previous | 
Top 10 downloads
To the Latest Issue

Advance publication (published online immediately after acceptance)


Inishing: A UI phishing attack to exploit the vulnerability of inotify in Android smartphones
Woo Hyun AHN  Sanghyeon PARK  Jaewon OH  Seung-Ho LIM  
Summary | Full Text:PDF(1.4MB)


Fast intra mode decision for screen contents coding in HEVC
Yong-Jo AHN  Xiangjian WU  Donggyu SIM  Woo-Jin HAN  
Summary | Full Text:PDF(419KB)


Fast coding unit size decision based on probabilistic graphical model in high efficiency video coding inter prediction
Xiantao JIANG  Tian SONG  Wen SHI  Takafumi KATAYAMA  Takashi SHIMAMOTO  Lisheng WANG  
Summary | Full Text:PDF(78.8KB)


Energy-based Tree Illustration System: ETIS
Katsuto NAKAJIMA  Azusa MAMA  Yuki MORIMOTO  
Summary | Full Text:PDF(1.9MB)


LRU-LC: Fast Estimating Cardinality of Flows over Sliding Windows
Jingsong SHAN  Jianxin LUO  Guiqiang NI  Yinjin FU  Zhaofeng WU  
Summary | Full Text:PDF(141KB)


Revisiting the Regression between Raw Outputs of Image Quality Metrics and Ground Truth Measurements
Chanho JUNG  Sanghyun JOO  Do-Won NAM  Wonjun KIM  
Summary | Full Text:PDF(3.8MB)


A Built-in Test Circuit for Electrical Interconnect Testing of Open Defects in Assembled PCBs
Widiant  Masaki HASHIZUME  Shohei SUENAGA  Hiroyuki YOTSUYANAGI  Akira ONO  Shyue-Kung LU  Zvi ROTH  
Summary | Full Text:PDF(1.3MB)


Reseeding-oriented Test Power Reduction for Linear-Decompression-Based Test Compression Architectures
Tian CHEN  Dandan SHEN  Xin YI  Huaguo LIANG  Xiaoqing WEN  Wei WANG  
Summary | Full Text:PDF(3.7MB)


Micro-vibration Patterns Generated from Shape Memory Alloyï¼›Actuators and the Detection of an Asymptomatic Tactile Sensation Decrease in Diabetic Patients
Junichi DANJO  Sonoko DANJO  Yu NAKAMURA  Keiji UCHIDA  Hideyuki SAWADA  
Summary | Full Text:PDF(464.9KB)


Incremental Semantic Construction Based on Combinatory Categorial Grammar
Yoshihide KATO  Shigeki MATSUBARA  
Summary | Full Text:PDF(217.4KB)


A Virtualization-based Hybrid Storage System for a Map-Reduce Framework
Aseffa, DEREJE TEKILU  Chin-Hsien WU  
Summary | Full Text:PDF(295.9KB)


Reliability-Enhanced ECC-Based Memory Architecture Using In-Field Self-Repair
Gian MAYUGA  Yuta YAMATO  Tomokazu YONEDA  Yasuo SATO  Michiko INOUE  
Summary | Full Text:PDF(3.2MB)


Multi-Agent Steiner Tree Algorithm Based on Branch-Based Multicast
Hiroshi Matsuura  
Summary | Full Text:PDF(1.8MB)


HISTORY: An Efficient and Robust Algorithm for Noisy 1-bit Compressed Sensing
Biao SUN  Hui FENG  Xinxin XU  
Summary | Full Text:PDF(251.5KB)


Design of a compact sound localization device on a stand-alone FPGA-based platform
Mauricio KUGLER  Teemu TOSSAVAINEN  Susumu KUROYANAGI  Akira IWATA  
Summary | Full Text:PDF(5.7MB)


Robust Non-parametric Template Matching with Local Rigidity Constraints
Chao ZHANG  Haitian SUN  Takuya AKASHI  
Summary | Full Text:PDF(3.3MB)


Shilling Attack Detection in Recommender Systems via Selecting Patterns Analysis
Wentao LI  Min GAO  Hua LI  Jun ZENG  Qingyu XIONG  Sachio HIROKAWA  
Summary | Full Text:PDF(2.3MB)


Vote Distribution Model for Hough-based Action Detection
Kensho HARA  Takatsugu HIRAYAMA  Kenji MASE  
Summary | Full Text:PDF(2.1MB)


Scenario Retrieval Method using Differential Scenario
Eiji SHIOTA  Atsushi OHNISHI  
Summary | Full Text:PDF(497.9KB)


Detecting Logical Inconsistencies by Clustering Technique in Natural Language Requirements
Satoshi Masuda  Tohru Matsuodani  Kazuhiko Tsuda  
Summary | Full Text:PDF(765.1KB)


Exhaustive and efficient identification of rationales using GQM+Strategies with stakeholder relationship analysis
Takanobu KOBORI  Hironori WASHIZAKI  Yoshiaki FUKAZAWA  Daisuke HIRABAYASHI  Katsutoshi SHINTANI  Yasuko OKAZAKI  Yasuhiro KIKUSHIMA  
Summary | Full Text:PDF(2.6MB)


A Search-based Constraint Elicitation in Test Design
Hiroyuki NAKAGAWA  Tatsuhiro TSUCHIYA  
Summary | Full Text:PDF(620.1KB)


Mathematical Analysis of Secrecy Amplification in Key Infection
Dae Hyun YUM  
Summary | Full Text:PDF(1.3MB)


A Collaborative Intrusion Detection System against DDoS for SDN
Xiaofan CHEN  Shunzheng YU  
Summary | Full Text:PDF(193.1KB)


A Keypoint-based Region Duplication Forgery Detection Algorithm
Mahmoud EMAM  Qi HAN  Liyang YU  Hongli ZHANG  
Summary | Full Text:PDF(2MB)


Fast Coding-Mode Selection and CU-Depth Prediction Algorithm based on Text-Block Recognition for Screen Content Coding
Mengmeng ZHANG  Ang ZHU  Zhi LIU  
Summary | Full Text:PDF(729.8KB)


Detecting Violations of Security Requirements for Vulnerability Discovery in Source Code
Hongzhe LI  Jaesang OH  Heejo LEE  
Summary | Full Text:PDF(210.5KB)


Tardy Flow Scheduling in Data Center Networks
Gyuyeong KIM  Wonjun LEE  
Summary | Full Text:PDF(107.9KB)


An Improved PSO Algorithm for Interval Multi-objective Optimization Systems
Yong ZHANG  Wanqiu ZHANG  Dunwei GONG  Yinan GUO  Leida LI  
Summary | Full Text:PDF(126.4KB)


LAB-LRU: A Life-Aware Buffer Management Algorithm for NAND Flash Memory
Liyu WANG  Lan CHEN  Xiaoran HAO  
Summary | Full Text:PDF(197.5KB)


Robust and Adaptive Object Tracking via Correspondence Clustering
Bo WU  Yurui XIE  Wang LUO  
Summary | Full Text:PDF(3.7MB)


Transfer Semi-supervised Non-negative Matrix Factorization for Speech Emotion Recognition
Peng SONG  Shifeng OU  Xinran ZHANG  Yun JIN  Wenming ZHENG  Jinglei LIU  Yanwei YU  
Summary | Full Text:PDF(107.9KB)


RBM-LBP: Joint Distribution of Multiple Local Binary Patterns for Texture Classification
Chao LIANG  Wenming YANG  Fei ZHOU  Qingmin LIAO  
Summary | Full Text:PDF(450.8KB)


Robust Hybrid Finger Pattern Identification Using Intersection Enhanced Gabor Based Direction Coding
Wenming YANG  Wenyang JI  Fei ZHOU  Qingmin LIAO  
Summary | Full Text:PDF(603.7KB)


2PTS: A two-phase task scheduling algorithm for MapReduce
Byungnam LIM  Yeeun SHIM  Yon Dohn CHUNG  
Summary | Full Text:PDF(221.3KB)


A Secure Light-weight Public Auditing Scheme in Cloud Computing with Potentially Malicious Third Party Auditor
Yilun WU  Xinye LIN  Xicheng LU  Jinshu SU  Peixin CHEN  
Summary | Full Text:PDF(368KB)


A Morpheme-based Weighting for Chinese-Mongolian Statistical Machine Translation
Zhenxin YANG  Miao LI  Lei CHEN  Kai SUN  
Summary | Full Text:PDF(198KB)


An Index based on Irregular Identifier Space Partition for Quick Multiple Data Access in Wireless Data Broadcasting
SeokJin IM  HeeJoung HWANG  
Summary | Full Text:PDF(262.5KB)


Mining Spatial Temporal Saliency structure for Action Recognition
Yinan LIU  Qingbo WU  Linfeng XU  Bo WU  
Summary | Full Text:PDF(759.2KB)


A Visibility-Based Upper Bound for Android Unlock Patterns
Jinwoo LEE  Jae Woo SEO  Kookrae CHO  Pil Joong LEE  Juneyeun KIM  Seung Hoon CHOI  Dae Hyun YUM  
Summary | Full Text:PDF(90.7KB)


Illumination-invariant face representation via normalized structural information
Wonjun KIM  
Summary | Full Text:PDF(1MB)


ON-LINE RIGID OBJECT TRACKING VIA DISCRIMINATIVE FEATURE CLASSIFICATION
Quan MIAO  Chenbo SHI  Long MENG  Guang CHENG  
Summary | Full Text:PDF(2.3MB)


An Algorithm of Connecting Broken Objects Based on the Skeletons
Chao XU  Dongxiang ZHOU  Yunhui LIU  
Summary | Full Text:PDF(128KB)


Transparent Discovery of Hidden Service
Rui WANG  Qiaoyan WEN  Hua ZHANG  Sujuan QIN  Wenmin LI  
Summary | Full Text:PDF(370.9KB)


Combining Fisher criterion and deep learning for patterned fabric defect inspection
Yundong Li  Jiyue Zhang  Yubing Lin  
Summary | Full Text:PDF(613KB)


Contrast Enhancement of Mycobacterium Tuberculosis Images Based on Improved Histogram Equalization
Chao XU  Dongxiang ZHOU  Keju PENG  Weihong FAN  Yunhui LIU  
Summary | Full Text:PDF(3.7MB)


Local Multi-Coordinate System for Object Retrieval
Go IRIE  Yukito WATANABE  Takayuki KUROZUMI  Tetsuya KINEBUCHI  
Summary | Full Text:PDF(243.4KB)


Set-to-Set Disjoint Paths Routing in Torus-Connected Cycles
Antoine BOSSARD  Keiichi KANEKO  
Summary | Full Text:PDF(2.2MB)


Adaptive Local Thresholding for Co-localization Detection in Multi-Channel Fluorescence Microscopic Images
Eisuke ITO  Yusuke TOMARU  Akira IIZUKA  Hirokazu HIRAI  Tsuyoshi KATO  
Summary | Full Text:PDF(1.8MB)


Entity Identification on Microblogs by CRF Model with Adaptive Dependency
Jun-Li LU  Makoto P. KATO  Takehiro YAMAMOTO  Katsumi TANAKA  
Summary | Full Text:PDF(966.6KB)


Autonomous Decentralized Semantic based Traceability Link Recovery Framework
Khalid MAHMOOD  Mazen ALOBAIDI  Hironao TAKAHASHI  
Summary | Full Text:PDF(741.5KB)


A linear time algorithm for finding a spanning tree with non-terminal set VNT on cographs
Shin-ichi NAKAYAMA  Shigeru MASUYAMA  
Summary | Full Text:PDF(796.6KB)


Optimal Gaussian Weight Predictor and Sorting Using Genetic Algorithm for Reversible Watermarking Based on PEE and HS
Chaiyaporn PANYINDEE  Chuchart PINTAVIROOJ  
Summary | Full Text:PDF(1.5MB)


Robust Projective Template Matching
Chao ZHANG  Takuya AKASHI  
Summary | Full Text:PDF(3.2MB)


Latent Attribute Inference of Users in Social Media with Very Small Labeled Dataset
Ding XIAO  Rui WANG  Lingling WU  
Summary | Full Text:PDF(1.6MB)


Semi-incremental recognition of on-line handwritten Japanese text
Cuong-Tuan NGUYEN  Bilan ZHU  Masaki NAKAGAWA  
Summary | Full Text:PDF(2.1MB)


Bayesian Exponential Inverse Document Frequency and Region-of-Interest Effect for Enhancing Instance Search Accuracy
Masaya MURATA  Hidehisa NAGANO  Kaoru HIRAMATSU  Kunio KASHINO  Shin'ichi SATOH  
Summary | Full Text:PDF(1.2MB)


Acquiring 4D Light Fields of Self-Luminous Extended Light Sources Using Programmable Filter
Motohiro NAKAMURA  Shinnosuke OYA  Takahiro OKABE  Hendrik P. A. LENSCH  
Summary | Full Text:PDF(1.3MB)


Optimum Nonlinear Discriminant Analysis and Discriminant Kernel Support Vector Machine
Akinori HIDAKA  Takio KURITA  
Summary | Full Text:PDF(1.2MB)


Performance Optimization of Light-field Applications on GPU
Yuttakon YUTTAKONKIT  Shinya TAKAMAEDA-YAMAZAKI  Yasuhiko NAKASHIMA  
Summary | Full Text:PDF(2.4MB)


Vehicle Detection Using Local Size-specific Classifiers
SeungJong NOH  Moongu JEON  
Summary | Full Text:PDF(1.5MB)


A Configuration Management Study to Fast Massive Writing for Distributed NoSQL System
Xianqiang BAO  Nong XIAO  Yutong LU  Zhiguang CHEN  
Summary | Full Text:PDF(2MB)


Automatic Retrieval of Action Video Shots from the Web using Density-based Cluster Analysis and Outlier Detection
Nga H. DO  Keiji YANAI  
Summary | Full Text:PDF(2.9MB)


Competitive Strategies for Evacuating from an Unknown Affected Area
Qi WEI  Xuehou TAN  Bo JIANG  
Summary | Full Text:PDF(368.2KB)


Personalized Web Page Recommendation based on Preference Footprint to Browsed Pages
Kenta SERIZAWA  Sayaka KAMEI  Syuhei HAYASHI  Satoshi FUJITA  
Summary | Full Text:PDF(707.6KB)


Reliability and Failure Impact Analysis of Distributed Storage Systems with Dynamic Refuging
Hiroaki Akutsu  Kazunori Ueda  Takeru Chiba  Tomohiro Kawaguchi  Norio Shimozono  
Summary | Full Text:PDF(497.9KB)


CCP-based Plant-wide Optimization and Application to the Walking-beam-type Reheating Furnace
Yan Zhang  Hongyan Mao  
Summary | Full Text:PDF(508.2KB)


Job Mapping and Scheduling on Free-Space Optical Networks
Yao HU  Ikki FUJIWAWA  Michihiro KOIBUCHI  
Summary | Full Text:PDF(876.2KB)


A One-Round Certificateless Authenticated Group Key Agreement Protocol for Mobile Ad Hoc Networks
Dongxu CHENG  Jianwei LIU  Zhenyu GUAN  Tao SHANG  
Summary | Full Text:PDF(216.1KB)


Improvements of Voice Timbre Control Based on Perceived Age in Singing Voice Conversion
Kazuhiro KOBAYASHI  Tomoki TODA  Tomoyasu NAKANO  Masataka GOTO  Satoshi NAKAMURA  
Summary | Full Text:PDF(2.5MB)


A Mobile Agent Based Distributed Variational Bayesian Algorithm for Flow and Speed Estimation in a Traffic System
Mohiyeddin MOZAFFARI  Behrouz SAFARINEJADIAN  
Summary | Full Text:PDF(377.5KB)


A Waiting Mechanism with Conflict Prediction on Hardware Transactional Memory
Keisuke MASHITA  Maya TABUCHI  Ryohei YAMADA  Tomoaki TSUMURA  
Summary | Full Text:PDF(1.9MB)


Enhancing Entropy Throttling: New Classes of Injection Control in Interconnection Networks
Takashi YOKOTA  Kanemitsu OOTSU  Takeshi OHKAWA  
Summary | Full Text:PDF(2MB)


ully Parallelized LZW decompression for CUDA-enabled GPUs
Shunji Funasaka  Koji Nakano  Yasuaki Ito  
Summary | Full Text:PDF(353.5KB)


A Replication Protocol Supporting Multiple Consistency Models without Single Point of Failure
Atsushi OHTA  Ryota KAWASHIMA  Hiroshi MATSUO  
Summary | Full Text:PDF(1.6MB)


A Peer-to-Peer Content-Distribution Scheme Resilient to Key Leakage
Tatsuyuki MATSUSHITA  Shinji YAMANAKA  Fangming ZHAO  
Summary | Full Text:PDF(495.4KB)


Improvement of Throughput Prediction Scheme Considering Terminal Distribution in Multi-rate WLAN Considering both CSMA/CA and Frame Collision
Ryo HAMAMOTO  Chisa TAKANO  Hiroyasu OBATA  Kenji ISHIDA  
Summary | Full Text:PDF(1.3MB)


Rule-based sensor data aggregation system for M2M gateways
Yuichi NAKAMURA  Akira MORIGUCHI  Masanori IRIE  Taizo KINOSHITA  Toshihiro YAMAUCHI  
Summary | Full Text:PDF(183.2KB)


Fast Live Migration for IO-Intensive VMs with Parallel and Adaptive Transfer of Page Cache via SAN
Soramichi AKIYAMA  Takahiro HOROFUCHI  Ryousei TAKANO  Shinichi HONIDEN  
Summary | Full Text:PDF(1.4MB)


A Memory-access-efficient Implementation for Computing the Approximate String Matching Algorithm on GPUs
Lucas Saad Nogueira NUNES  Jacir Luiz BORDIM  Yasuaki ITO  Koji NAKANO  
Summary | Full Text:PDF(1.3MB)


A Runtime Optimization Selection Framework to Realize Energy Efficient Networks-on-Chip
Yuan HE  Masaaki KONDO  Takashi NAKADA  Hiroshi SASAKI  Shinobu MIWA  Hiroshi NAKAMURA  
Summary | Full Text:PDF(2.6MB)


GPU-accelerated Bulk Execution of Multiple-length Multiplication with Warp-synchronous Programming Technique
Takumi HONDA  Yasuaki ITO  Koji NAKANO  
Summary | Full Text:PDF(370.1KB)


An FPGA implementation for a flexible-length-arithmetic processor employing the FDFM processor core approach
Tatsuya KAWAMOTO  Xin ZHOU  Jacir L. BORDIM  Yasuaki ITO  Koji NAKANO  
Summary | Full Text:PDF(270.6KB)


An Inductive Method to Select Simulation Points
MinSeong CHOI  Takashi FUKUDA  Masahiro GOSHIMA  Shuichi SAKAI  
Summary | Full Text:PDF(2.7MB)


An Efficient Algorithm of Discrete Particle Swarm Optimization for Multi-objective Task Assignment
Nannan QIAO  Jiali YOU  Yiqiang SHENG  Jinlin WANG  Haojiang DENG  
Summary | Full Text:PDF(4.9MB)


Novel Chip Stacking Methods to Extend Both Horizontally and Vertically for Many-Core Architectures with ThrouChip Interface
Hiroshi NAKAHARA  Tomoya OZAKI  Hiroki MATSUTANI  Michihiro KOIBUCHI  Hideharu AMANO  
Summary | Full Text:PDF(1.3MB)


Accelerating Reachability Analysis on Petri Net for Mutual Exclusion-Based Deadlock Detection
Yunkai DU  Naijie GU  Xin ZHOU  
Summary | Full Text:PDF(4.2MB)


Sensitivity-characterised Activity Neurogram (SCAN) for Visualising and Understanding the Inner Workings of Deep Neural Network
Khe Chai SIM  
Summary | Full Text:PDF(1.7MB)


Improved End-to-End Speech Recognition Using Adaptive Per-dimensional Learning Rate Methods
Xuyang WANG  Pengyuan ZHANG  Qingwei ZHAO  Jielin PAN  Yonghong YAN  
Summary | Full Text:PDF(147.1KB)


Multi-task Learning in Deep Neural Networks for Mandarin-English Code-mixing Speech Recognition
Mengzhe CHEN  Jielin PAN  Qingwei ZHAO  Yonghong YAN  
Summary | Full Text:PDF(111.3KB)


Short Text Classification based on Distributional Representations of Words
Chenglong MA  Qingwei ZHAO  Jielin PAN  Yonghong YAN  
Summary | Full Text:PDF(198KB)


Speeding up Deep Neural Networks in Speech Recognition with Piecewise Quantized Sigmoidal Activation Function
Anhao XING  Qingwei ZHAO  Yonghong YAN  
Summary | Full Text:PDF(120.9KB)


Acoustic Scene Analysis Based on Hierarchical Generative Model of Acoustic Event Sequence
Keisuke IMOTO  Suehiro SHIMAUCHI  
Summary | Full Text:PDF(6.6MB)


Statistical bandwidth extension for speech synthesis based on Gaussian mixture model with sub-band basis spectrum model
Yamato OHTANI  Masatsune TAMURA  Masahiro MORITA  Masami AKAMINE  
Summary | Full Text:PDF(1.7MB)


Policy optimization for spoken dialog management using genetic algorithm
Hang REN  Qingwei ZHAO  Yonghong YAN  
Summary | Full Text:PDF(369.1KB)


Speaker Adaptive Training Localizing Speaker Modules in DNN for Hybrid DNN-HMM Speech Recognizers
Tsubasa OCHIAI  Shigeki MATSUDA  Hideyuki WATANABE  Xugang LU  Chiori HORI  Hisashi KAWAI  Shigeru KATAGIRI  
Summary | Full Text:PDF(2.1MB)


Investigation of Using Continuous Representation of Various Linguistic Units in Neural Network based Text-to-Speech Synthesis
Xin WANG  Shinji TAKAKI  Junichi YAMAGISHI  
Summary | Full Text:PDF(461.2KB)


Re-Ranking Approach of Spoken Term Detection Using Conditional Random Fields-Based Triphone Detection
Naoki SAWADA  Hiromitsu NISHIZAKI  
Summary | Full Text:PDF(1MB)


Investigation of Combining Various Major Language Model Technologies including Data Expansion and Adaptation
Ryo MASUMURA  Taichi ASAMI  Takanobu OBA  Hirokazu MASATAKI  Sumitaka SAKAUCHI  Akinori ITO  
Summary | Full Text:PDF(984.6KB)


N-gram Approximation of Latent Words Language Models for Domain Robust Automatic Speech Recognition
Ryo MASUMURA  Taichi ASAMI  Takanobu OBA  Hirokazu MASATAKI  Sumitaka SAKAUCHI  Satoshi TAKAHASHI  
Summary | Full Text:PDF(1.1MB)


Spoken Term Detection using SVM-based Classiifier Trained with Pre-indexed Keywords
Kentaro DOMOTO  Takehito UTSURO  Naoki SAWADA  Hiromitsu NISHIZAKI  
Summary | Full Text:PDF(1.3MB)


Neural Network Approaches to Dialog Response Retrieval and Generation
Lasguido NIO  Sakriani SAKTI  Graham NEUBIG  Koichiro YOSHINO  Satoshi NAKAMURA  
Summary | Full Text:PDF(3.3MB)


Investigation of DNN-based audio-visual speech recognition
Satoshi TAMURA  Hiroshi NINOMIYA  Norihide KITAOKA  Shin OSUGA  Yurie IRIBE  Kazuya TAKEDA  Satoru HAYAMIZU  
Summary | Full Text:PDF(2.2MB)


A statistical sample-based approach to GMM-based voice conversion using tied-covariance acoustic models
Shinnosuke TAKAMICHI  Tomoki TODA  Graham NEUBIG  Sakriani SAKTI  Satoshi NAKAMURA  
Summary | Full Text:PDF(497.3KB)

 Volume E99-D No.8  (Publication Date:2016/08/01)
Special Section on Security, Privacy and Anonymity of Internet of Things

pp.1964-1965  FOREWORD  Open Access Paper
FOREWORD
Guojun WANG  
Summary | FreeFull Text:PDF(76.8KB)

pp.1966-1973  INVITED PAPER  Open Access Paper
Remote Data Integrity Checking and Sharing in Cloud-Based Health Internet of Things
Huaqun WANG  Keqiu LI  Kaoru OTA  Jian SHEN  
Summary | FreeFull Text:PDF(507.4KB)

pp.1974-1981  INVITED PAPER  Open Access Paper
Analysis of Privacy and Security Affecting the Intention of Use in Personal Data Collection in an IoT Environment
Remi ANDO  Shigeyoshi SHIMA  Toshihiko TAKEMURA  
Summary | FreeFull Text:PDF(687KB)

pp.1982-1990  INVITED PAPER  Open Access Paper
Challenges of Fully Homomorphic Encryptions for the Internet of Things
Licheng WANG  Jing LI  Haseeb AHMAD  
Summary | FreeFull Text:PDF(367.2KB)

pp.1991-2001  PAPER
Privacy-Aware Information Sharing in Location-Based Services: Attacks and Defense
Zhikai XU  Hongli ZHANG  Xiangzhan YU  Shen SU  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.2002-2009  PAPER
BFWindow: Speculatively Checking Data Property Consistency against Buffer Overflow Attacks
Jinli RAO  Zhangqing HE  Shu XU  Kui DAI  Xuecheng ZOU  
Summary | Full Text:PDF (691.8KB) >>Buy this Article

pp.2010-2018  PAPER
MDMA: A Multi-Data and Multi-ACK Verified Selective Forwarding Attack Detection Scheme in WSNs
Anfeng LIU  Xiao LIU  He LI  Jun LONG  
Summary | Full Text:PDF (2MB) >>Buy this Article

pp.2019-2026  PAPER
Privacy Protection Method Based on Two-Factor Authentication Protocol in FRID Systems
Guangquan XU  Yuanyuan REN  Yuanbin HAN  Xiaohong LI  Zhiyong FENG  
Summary | Full Text:PDF (798KB) >>Buy this Article

pp.2027-2035  PAPER
A Secure RFID Application Revocation Scheme for IoT
Kai FAN  Zhao DU  Yuanyuan GONG  Yue WANG  Tongjiang YAN  Hui LI  Yintang YANG  
Summary | Full Text:PDF (636.9KB) >>Buy this Article

pp.2036-2043  PAPER
CloudS: A Multi-Cloud Storage System with Multi-Level Security
Lu SHEN  Shifang FENG  Jinjin SUN  Zhongwei LI  Ming SU  Gang WANG  Xiaoguang LIU  
Summary | Full Text:PDF (968.8KB) >>Buy this Article

pp.2044-2055  PAPER
A Matrix Based ORAM: Design, Implementation and Experimental Analysis
Steven GORDON  Atsuko MIYAJI  Chunhua SU  Karin SUMONGKAYOTHIN  
Summary | Full Text:PDF (1.6MB) >>Buy this Article

pp.2056-2060  PAPER
Implementation of µNaCl on 32-bit ARM Cortex-M0
Toshifumi NISHINAGA  Masahiro MAMBO  
Summary | Full Text:PDF (178.9KB) >>Buy this Article

pp.2061-2068  PAPER
Behavioral Equivalence of Security-Oriented Interactive Systems
Guanjun LIU  Changjun JIANG  
Summary | Full Text:PDF (564.5KB) >>Buy this Article

pp.2069-2078  PAPER
Achieving High Data Utility K-Anonymization Using Similarity-Based Clustering Model
Mohammad Rasool SARRAFI AGHDAM  Noboru SONEHARA  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

pp.2079-2089  PAPER
Privacy-Preserving Logistic Regression with Distributed Data Sources via Homomorphic Encryption
Yoshinori AONO  Takuya HAYASHI  Le Trieu PHONG  Lihua WANG  
Summary | Full Text:PDF (495.4KB) >>Buy this Article

Regular Section

pp.2090-2099  PAPER-Information Network
Grammar-Driven Workload Generation for Efficient Evaluation of Signature-Based Network Intrusion Detection Systems
Min SHAO  Min S. KIM  Victor C. VALGENTI  Jungkeun PARK  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.2100-2108  PAPER-Information Network
Hough Transform-Based Clock Skew Measurement by Dynamically Locating the Region of Offset Majority
Komang OKA SAPUTRA  Wei-Chung TENG  Takaaki NARA  
Summary | Full Text:PDF (561.9KB) >>Buy this Article

pp.2109-2120  PAPER-Information Network
Singular-Spectrum Analysis for Digital Audio Watermarking with Automatic Parameterization and Parameter Estimation
Jessada KARNJANA  Masashi UNOKI  Pakinee AIMMANEE  Chai WUTIWIWATCHAI  
Summary | Full Text:PDF (1MB) >>Buy this Article

pp.2121-2130  PAPER-Dependable Computing
Preemptive Real-Time Scheduling Incorporating Security Constraint for Cyber Physical Systems
Hyeongboo BAEK  Jaewoo LEE  Yongjae LEE  Hyunsoo YOON  
Summary | Full Text:PDF (800.9KB) >>Buy this Article

pp.2131-2139  PAPER-Artificial Intelligence, Data Mining
The Novel Performance Evaluation Method of the Fingerprinting-Based Indoor Positioning
Shutchon PREMCHAISAWATT  Nararat RUANGCHAIJATUPON  
Summary | Full Text:PDF (883.4KB) >>Buy this Article

pp.2140-2150  PAPER-Educational Technology
An Interoperability Framework of Open Educational Resources and Massive Open Online Courses for Sustainable e-Learning Platform
Sila CHUNWIJITRA  Chanchai JUNLOUCHAI  Sitdhibong LAOKOK  Pornchai TUMMARATTANANONT  Kamthorn KRAIRAKSA  Chai WUTIWIWATCHAI  
Summary | Full Text:PDF (1.5MB) >>Buy this Article

pp.2151-2160  PAPER-Rehabilitation Engineering and Assistive Technology
Development of Tactile Graph Generation Web Application Using R Statistics Software Environment
Tetsuya WATANABE  Kosuke ARAKI  Toshimitsu YAMAGUCHI  Kazunori MINATANI  
Summary | Full Text:PDF (595.9KB) >>Buy this Article

pp.2161-2171  PAPER-Pattern Recognition
Human Action Recognition from Depth Videos Using Pool of Multiple Projections with Greedy Selection
Chien-Quang LE  Sang PHAN  Thanh Duc NGO  Duy-Dinh LE  Shin'ichi SATOH  Duc Anh DUONG  
Summary | Full Text:PDF (9MB) >>Buy this Article

pp.2172-2176  LETTER-Software System
Hierarchical System Schedulability Analysis Framework Using UPPAAL
So Jin AHN  Dae Yon HWANG  Miyoung KANG  Jin-Young CHOI  
Summary | Full Text:PDF (456.5KB) >>Buy this Article

pp.2177-2181  LETTER-Information Network
Flow Clustering Based Efficient Consolidated Middlebox Positioning Approach for SDN/NFV-Enabled Network
Duc Tiep VU  Kyungbaek KIM  
Summary | Full Text:PDF (294.2KB) >>Buy this Article

pp.2182-2185  LETTER-Dependable Computing
Realization of SR-Equivalents Using Generalized Shift Registers for Secure Scan Design
Hideo FUJIWARA  Katsuya FUJIWARA  
Summary | Full Text:PDF (400.5KB) >>Buy this Article

pp.2186-2189  LETTER-Pattern Recognition
Spectral Features Based on Local Hu Moments of Gabor Spectrograms for Speech Emotion Recognition
Huawei TAO  Ruiyu LIANG  Cheng ZHA  Xinran ZHANG  Li ZHAO  
Summary | Full Text:PDF (753.4KB) >>Buy this Article

pp.2190-2193  LETTER-Image Processing and Video Processing
A Local Characteristic Image Restoration Based on Convolutional Neural Network
Guohao LYU  Hui YIN  Xinyan YU  Siwei LUO  
Summary | Full Text:PDF (1.5MB) >>Buy this Article

pp.2194-2198  LETTER-Image Processing and Video Processing
Fast Search of a Similar Patch for Self-Similarity Based Image Super Resolution
Jun-Sang YOO  Ji-Hoon CHOI  Kang-Sun CHOI  Dae-Yeol LEE  Hui-Yong KIM  Jong-Ok KIM  
Summary | Full Text:PDF (995.3KB) >>Buy this Article

Previous | 
go to Page Top