IEICE TRANSACTIONS on Information and Systems

Archive Index

Online ISSN : 1745-1361
Volume E101-D No.11  (Publication Date:2018/11/01)
[Whole issue]:PDF (41.1MB)
Previous | 
Special Section on Information and Communication System Security

pp.2559-2560  FOREWORD  Open Access Paper
Atsushi KANAI  
Summary | FreeFull Text:PDF(73.5KB)

pp.2561-2575  INVITED PAPER  Open Access Paper
An Overview of Cyber Security for Connected Vehicles
Summary | FreeFull Text:PDF(3.2MB)

pp.2576-2583  PAPER-Mobile Application and Web Security
Towards Finding Code Snippets on a Question and Answer Website Causing Mobile App Vulnerabilities
Hiroki NAKANO  Fumihiro KANEI  Yuta TAKATA  Mitsuaki AKIYAMA  Katsunari YOSHIOKA  
Summary | Full Text:PDF (1MB) >>Buy this Article

pp.2584-2599  PAPER-Mobile Application and Web Security
Understanding the Inconsistency between Behaviors and Descriptions of Mobile Apps
Takuya WATANABE  Mitsuaki AKIYAMA  Tetsuya SAKAI  Hironori WASHIZAKI  Tatsuya MORI  
Summary | Full Text:PDF (1.5MB) >>Buy this Article

pp.2600-2611  PAPER-Mobile Application and Web Security
Identifying Evasive Code in Malicious Websites by Analyzing Redirection Differences
Yuta TAKATA  Mitsuaki AKIYAMA  Takeshi YAGI  Takeo HARIU  Kazuhiko OHKUBO  Shigeki GOTO  
Summary | Full Text:PDF (1.7MB) >>Buy this Article

pp.2612-2621  PAPER-Mobile Application and Web Security
A Secure In-Depth File System Concealed by GPS-Based Mounting Authentication for Mobile Devices
Yong JIN  Masahiko TOMOISHI  Satoshi MATSUURA  Yoshiaki KITAGUCHI  
Summary | Full Text:PDF (2.3MB) >>Buy this Article

pp.2622-2632  PAPER-Network Security
Automatically Generating Malware Analysis Reports Using Sandbox Logs
Bo SUN  Akinori FUJINO  Tatsuya MORI  Tao BAN  Takeshi TAKAHASHI  Daisuke INOUE  
Summary | Full Text:PDF (934.9KB) >>Buy this Article

pp.2633-2643  PAPER-Network Security
Design and Implementation of SDN-Based Proactive Firewall System in Collaboration with Domain Name Resolution
Hiroya IKARASHI  Yong JIN  Nariyoshi YAMAI  Naoya KITAGAWA  Kiyohiko OKAYAMA  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.2644-2657  PAPER-Forensics and Risk Analysis
Ad-hoc Analytical Framework of Bitcoin Investigations for Law Enforcement
Summary | Full Text:PDF (2.3MB) >>Buy this Article

pp.2658-2664  PAPER-Forensics and Risk Analysis
Modeling Attack Activity for Integrated Analysis of Threat Information
Daiki ITO  Kenta NOMURA  Masaki KAMIZONO  Yoshiaki SHIRAISHI  Yasuhiro TAKANO  Masami MOHRI  Masakatu MORII  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

pp.2665-2676  PAPER-Forensics and Risk Analysis
Model Inversion Attacks for Online Prediction Systems: Without Knowledge of Non-Sensitive Attributes
Seira HIDANO  Takao MURAKAMI  Shuichi KATSUMATA  Shinsaku KIYOMOTO  Goichiro HANAOKA  
Summary | Full Text:PDF (613.4KB) >>Buy this Article

pp.2677-2687  PAPER-Cryptographic Techniques
Tag-KEM/DEM Framework for Public-Key Encryption with Non-Interactive Opening
Yusuke SAKAI  Takahiro MATSUDA  Goichiro HANAOKA  
Summary | Full Text:PDF (832.1KB) >>Buy this Article

pp.2688-2697  PAPER-Cryptographic Techniques
Zero-Knowledge Identification Scheme Using LDPC Codes
Haruka ITO  Masanori HIROTOMO  Youji FUKUTA  Masami MOHRI  Yoshiaki SHIRAISHI  
Summary | Full Text:PDF (432.5KB) >>Buy this Article

pp.2698-2705  PAPER-Cryptographic Techniques
Design Exploration of SHA-3 ASIP for IoT on a 32-bit RISC-V Processor
Jinli RAO  Tianyong AO  Shu XU  Kui DAI  Xuecheng ZOU  
Summary | Full Text:PDF (730.3KB) >>Buy this Article

pp.2706-2709  LETTER-Network Security
A Scalable and Seamless Connection Migration Scheme for Moving Target Defense in Legacy Networks
Taekeun PARK  Koohong KANG  Daesung MOON  
Summary | Full Text:PDF (298.9KB) >>Buy this Article

Regular Section

pp.2710-2719  PAPER-Fundamentals of Information Systems
Efficient Reusable Collections
Summary | Full Text:PDF (1.6MB) >>Buy this Article

pp.2720-2729  PAPER-Software Engineering
How are IF-Conditional Statements Fixed Through Peer CodeReview?
Yuki UEDA  Akinori IHARA  Takashi ISHIO  Toshiki HIRAO  Kenichi MATSUMOTO  
Summary | Full Text:PDF (817.3KB) >>Buy this Article

pp.2730-2743  PAPER-Software Engineering
Fostering Real-Time Software Analysis by Leveraging Heterogeneous and Autonomous Software Repositories
Summary | Full Text:PDF (706.6KB) >>Buy this Article

pp.2744-2753  PAPER-Software Engineering
Studying the Cost and Effectiveness of OSS Quality Assessment Models: An Experience Report of Fujitsu QNET
Yasutaka KAMEI  Takahiro MATSUMOTO  Kazuhiro YAMASHITA  Naoyasu UBAYASHI  Takashi IWASAKI  Shuichi TAKAYAMA  
Summary | Full Text:PDF (600.1KB) >>Buy this Article

pp.2754-2761  PAPER-Information Network
Lightweight Security Hardware Architecture Using DWT and AES Algorithms
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.2762-2772  PAPER-Information Network
Critical Nodes Identification of Power Grids Based on Network Efficiency
WenJie KANG  PeiDong ZHU  JieXin ZHANG  JunYang ZHANG  
Summary | Full Text:PDF (1.3MB) >>Buy this Article

pp.2773-2783  PAPER-Artificial Intelligence, Data Mining
Accelerating a Lloyd-Type k-Means Clustering Algorithm with Summable Lower Bounds in a Lower-Dimensional Space
Kazuo AOYAMA  Kazumi SAITO  Tetsuo IKEDA  
Summary | Full Text:PDF (759KB) >>Buy this Article

pp.2784-2794  PAPER-Artificial Intelligence, Data Mining
Speeding up Extreme Multi-Label Classifier by Approximate Nearest Neighbor Search
Yukihiro TAGAMI  
Summary | Full Text:PDF (586.4KB) >>Buy this Article

pp.2795-2807  PAPER-Artificial Intelligence, Data Mining
Food Intake Detection and Classification Using a Necklace-Type Piezoelectric Wearable Sensor System
Ghulam HUSSAIN  Kamran JAVED  Jundong CHO  Juneho YI  
Summary | Full Text:PDF (3.6MB) >>Buy this Article | Errata[Uploaded on December 1,2018]

pp.2808-2817  PAPER-Image Processing and Video Processing
High-Performance Super-Resolution via Patch-Based Deep Neural Network for Real-Time Implementation
Reo AOKI  Kousuke IMAMURA  Akihiro HIRANO  Yoshio MATSUDA  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.2818-2822  LETTER-Computer System
Strip-Switched Deployment Method to Optimize Single Failure Recovery for Erasure Coded Storage Systems
Yingxun FU  Shilin WEN  Li MA  Jianyong DUAN  
Summary | Full Text:PDF (230.9KB) >>Buy this Article

pp.2823-2826  LETTER-Information Network
On the Optimal Configuration of Grouping-Based Framed Slotted ALOHA
Young-Beom KIM  
Summary | Full Text:PDF (297.7KB) >>Buy this Article

pp.2827-2830  LETTER-Information Network
NEST: Towards Extreme Scale Computing Systems
Yunfeng LU  Huaxi GU  Xiaoshan YU  Kun WANG  
Summary | Full Text:PDF (309KB) >>Buy this Article

pp.2831-2835  LETTER-Dependable Computing
Energy-Efficient Connectivity Re-Establishment in UASNs with Dumb Nodes
Qiuli CHEN  Ming HE  Fei DAI  Chaozheng ZHU  
Summary | Full Text:PDF (362.8KB) >>Buy this Article

pp.2836-2839  LETTER-Image Processing and Video Processing
Efficient Methods of Inactive Regions Padding for Segmented Sphere Projection (SSP) of 360 Video
Yong-Uk YOON  Yong-Jo AHN  Donggyu SIM  Jae-Gon KIM  
Summary | Full Text:PDF (756.7KB) >>Buy this Article

pp.2840-2843  LETTER-Image Processing and Video Processing
Efficient Texture Creation Based on Random Patches in Database and Guided Filter
Seok Bong YOO  Mikyong HAN  
Summary | Full Text:PDF (1.7MB) >>Buy this Article

pp.2844-2848  LETTER-Image Processing and Video Processing
Deep Convolutional Neural Networks for Manga Show-Through Cancellation
Taku NAKAHARA  Kazunori URUMA  Tomohiro TAKAHASHI  Toshihiro FURUKAWA  
Summary | Full Text:PDF (1.7MB) >>Buy this Article

pp.2849-2854  LETTER-Image Recognition, Computer Vision
Adaptive Object Tracking with Complementary Models
Peng GAO  Yipeng MA  Chao LI  Ke SONG  Yan ZHANG  Fei WANG  Liyi XIAO  
Summary | Full Text:PDF (3.6MB) >>Buy this Article

pp.2855-2858  LETTER-Image Recognition, Computer Vision
Accurate Scale Adaptive and Real-Time Visual Tracking with Correlation Filters
Jiatian PI  Shaohua ZENG  Qing ZUO  Yan WEI  
Summary | Full Text:PDF (721.8KB) >>Buy this Article

pp.2859-2862  LETTER-Biological Engineering
High-Speed Spelling in Virtual Reality with Sequential Hybrid BCIs
Zhaolin YAO  Xinyao MA  Yijun WANG  Xu ZHANG  Ming LIU  Weihua PEI  Hongda CHEN  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

Previous | 
go to Page Top