IEICE TRANSACTIONS on Information and Systems    (open access publishing)
Online ISSN : 1745-1361
[Whole issue]:PDF (35.9MB)
Previous | 
Top 10 downloads
To the Latest Issue

Advance publication (published online immediately after acceptance)


Improved neighborhood based switching filter for protecting the thin curves in arbitrary direction in color images
ChangCheng Wu  Min Wang  JunJie Wang  WeiMing Luo  JiaFeng Hua  XiTao Chen  Wei Geng  Yu Lu  Wei Sun  
Summary | Full Text:PDF(1.8MB)


Evaluation of EEG activation pattern on the experience of visual perception in the driving
Keiichiro Inagaki  Tatsuya Maruno  Kota Yamamoto  
Summary | Full Text:PDF(624.8KB)


Fresh Tea Shoot Maturity Estimation via Multispectral Imaging and Deep Label Distribution Learning
Bin CHEN  JiLi YAN  
Summary | Full Text:PDF(587.7KB)


Node Density Loss Resilient Report Generation Method for the Statistical Filtering Based Sensor Networks
Jin Myoung KIM  Hae Young LEE  
Summary | Full Text:PDF(531.8KB)


Visual Recognition method based on Hybrid KPCA Network
Feng YANG  Zheng MA  Mei XIE  
Summary | Full Text:PDF(938.2KB)


A Ruby-based Hardware/Software Co-Design Environment with Functional Reactive Programming: Mulvery
Daichi TERUYA  Hironori NAKAJO  
Summary | Full Text:PDF(975.8KB)


Quantitative Evaluation of Software Component Behavior Discovery Approach
Cong LIU  
Summary | Full Text:PDF(678.7KB)


Silent speech interface using ultrasonic Doppler sonar
Ki-Seung LEE  
Summary | Full Text:PDF(1.4MB)


Graph based Wave Function Collapse Algorithm for Procedural Content Generation in Games
Hwanhee Kim  Teasung Hahn  Sookyun Kim  Shinjin Kang  
Summary | Full Text:PDF(3.2MB)


Link Prediction Using Higher-Order Feature Combinations across Objects
Kyohei ATARASHI  Satoshi OYAMA  Masahito KURIHARA  
Summary | Full Text:PDF(453.2KB)


Evaluation the Redundancy of the IoT System Based on Individual Sensing Probability
Ryuichi TAKAHASHI  
Summary | Full Text:PDF(699.4KB)


An Overview of De-identification Techniques and their Standardization Directions
Heung Youl Youm  
Summary | Full Text:PDF(1.1MB)


Online-Efficient Interval Test via Secure Empty-Set Check
Katsunari SHISHIDO  Atsuko MIYAJI  
Summary | Full Text:PDF(1.4MB)


H-TLA:Hybrid-based and Two-Level Addressing Architecture for IoT Devices and Services
Sangwon SEO  Sangbae YUN  Jaehong KIM  Inkyo KIM  Seongwook JIN  Seungryoul MAENG  
Summary | Full Text:PDF(126.5KB)


Deep learning approaches for pathological voice detection using heterogeneous parameters
JiYeoun Lee  Hee-Jin Choi  
Summary | Full Text:PDF(1013.9KB)


Combining Siamese Network and Regression Network for Visual Tracking
Yao GE  Rui CHEN  Ying TONG  Xuehong CAO  Ruiyu LIANG  
Summary | Full Text:PDF(1.2MB)


An algorithm for automatic collation of vocabulary decks based on word frequency
Zeynep YÜCEL  Parisa SUPITAYAKUL  Akito MONDEN  Pattara LEELAPRUTE  
Summary | Full Text:PDF(1.2MB)


Knowledge Integration by Probabilistic Argumentation
Saung HNIN PWINT OO  Nguyen DUY HUNG  Thanaruk THEERAMUNKONG  
Summary | Full Text:PDF(1.1MB)


An Attention-based GRU Network for Anomaly Detection from System Logs
Yixi Xie  Lixin Ji  Xiaotao Cheng  
Summary | Full Text:PDF(534.6KB)


In-GPU Cache for Acceleration of Anomaly Detection in Blockchain
Shin MORISHIMA  Hiroki MATSUTANI  
Summary | Full Text:PDF(1.7MB)


Content-based Superpixel Segmentation and Matching Using Its Region Feature Descriptors
Jianmei ZHANG  Pengyu WANG  Feiyang GONG  Hongqing ZHU  ing CHEN  
Summary | Full Text:PDF(3.8MB)


Machine Learning-based Approach for Depression Detection in Twitter Using Content and Activity Features
Hatoon ALSAGRI  Mourad YKHLEF  
Summary | Full Text:PDF(594.2KB)


Improvement of Pressure Control Skill with Knife Device for Paper-cutting
Takafumi HIGASHI  Hideaki KANAI  
Summary | Full Text:PDF(384.7KB)


A 10.4-Gs/s High-Resolution Wideband Radar Sampling System Based on TIADC Technique
Jingyu Li  Dandan Xiao  Yue Zhang  
Summary | Full Text:PDF(616KB)


A Server-Based Distributed Storage using Secret Sharing with AES-256 for Lightweight Safety Restoration
Sanghun CHOI  Shuichiro HARUTA  Yichen AN  Iwao SASASE  
Summary | Full Text:PDF(794.9KB)


A Two-stage Phase-aware Approach for Monaural Multi-talker Speech Separation
Lu YIN  Junfeng LI  Yonghong YAN  Masato AKAGI  
Summary | Full Text:PDF(3MB)


An Efficient Method for Graph Repartitioning in Distributed Environments
He Li  YanNa Liu  XuHua Wang  LiangCai Su  Hang Yuan  JaeSoo Yoo  
Summary | Full Text:PDF(409.7KB)


Systematic Detection of State Variable Corruptions in Discrete Event System Specification Based Simulation
Hae Young LEE  Jin Myoung KIM  
Summary | Full Text:PDF(554.5KB)


Byzantine-Tolerant Gathering of Mobile Agents in Asynchronous Arbitrary Networks with Authenticated Whiteboards
Masashi TSUCHIDA  Fukuhito OOSHITA  Michiko INOUE  
Summary | Full Text:PDF(310.3KB)


Stochastic Discrete First-order Algorithm for Feature Subset Selection
Kota KUDO  Yuichi TAKANO  Ryo NOMURA  
Summary | Full Text:PDF(675.1KB)


Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption
Pratish DATTA  Tatsuaki OKAMOTO  Katsuyuki TAKASHIMA  
Summary | Full Text:PDF(1.1MB)


Strategy for improving target selection accuracy in indirect touch input
Yizhong XIN  Ruonan LIU  Yan LI  
Summary | Full Text:PDF(1000.1KB)


Analysis of The Similarity of Individual Knowledge and The Comprehension of Partner's Representation during Collaborative Concept Mapping with Reciprocal Kit Build Approach
Lia SADITA  Pedro GF FURTADO  Tsukasa HIRASHIMA  Yusuke HAYASHI  
Summary | Full Text:PDF(1MB)


Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?
Keika MORI  Takuya WATANABE  Yunao ZHOU  Ayako AKIYAMA HASEGAWA  Mitsuaki AKIYAMA  Tatsuya MORI  
Summary | Full Text:PDF(828.6KB)


Analysis on Wave-Velocity Inverse Imaging for the Supporting Layer in Ballastless Track
Yong Yang  Junwei Lu  Baoxian Wang  Weigang Zhao  
Summary | Full Text:PDF(2.4MB)


A Multilayer Steganography Method with High Embedding Efficiency for Palette Images
Han-Yan WU  Ling-Hwei CHEN  Yu-Tai CHING  
Summary | Full Text:PDF(2.4MB)


ROPminer: Learning-based Static Detection of ROP Chain Considering Linkability of ROP Gadgets
Toshinori USUI  Tomonori IKUSE  Yuto OTSUKI  Yuhei KAWAKOYA  Makoto IWAMURA  Jun MIYOSHI  Kanta MATSUURA  
Summary | Full Text:PDF(1.8MB)


Improving Faster R-CNN framework for multiscale Chinese character detection and localization
Minseong KIM  Hyun-Chul CHOI  
Summary | Full Text:PDF(1.8MB)


A Series of PIN/Password Input Methods Resilient to Shoulder Hacking based on Cognitive Difficulty of Tracing Multiple Key Movements
Kokoro KOBAYASHI  Tsuyoshi OGUNI  Masaki NAKAGAWA  
Summary | Full Text:PDF(529.4KB)


Instruction Filters for Mitigating Attacks on Instruction Emulation in Hypervisors
Kenta ISHIGURO  Kenji KONO  
Summary | Full Text:PDF(802.3KB)


Logging Inter-Thread Data Dependencies in Linux Kernel
Takafumi KUBOTA  Naohiro AOTA  Kenji KONO  
Summary | Full Text:PDF(1.7MB)


Effect of fixational eye movement on signal processing of retinal photoreceptor: A computational study
Keiichiro Inagaki  Takayuki Kannon  Yoshimi Kamiyama  Shiro Usui  
Summary | Full Text:PDF(1.8MB)


Sparsity Reduction Technique using Grouping Method for Matrix Factorization in Differentially Private Recommendation Systems
Taewhan Kim  Kangsoo Jung  Seog Park  
Summary | Full Text:PDF(1.3MB)


A Double Adversarial Network Model for Multi-domain and Multi-task Chinese Named Entity Recognition
Yun HU  Changwen ZHENG  
Summary | Full Text:PDF(461KB)


Intrusion Detection System Using Deep Learning and its Application to Wi-Fi Network
Kwangjo KIM  
Summary | Full Text:PDF(497.8KB)


Model Checking of Automotive Control Software: An Industrial Approach
Masahiro MATSUBARA  Tatsuhiro TSUCHIYA  
Summary | Full Text:PDF(322.3KB)


A Vulnerability in 5G Authentication Protocols and Its Countermeasure
Xinxin HU  Caixia LIU  Shuxin LIU  Jinsong LI  Xiaotao CHENG  
Summary | Full Text:PDF(506.8KB)


A Study on Re-constructibility of Event Structures
Marika IZAWA  Toshiyuki MIYAMOTO  
Summary | Full Text:PDF(290.3KB)


Model-based Development of Spatial Movement Skill Training System and Its Evaluation
Ayumi Yamazaki  Yuki Hayashi  Kazuhisa Seta  
Summary | Full Text:PDF(820.1KB)


1-day, 2 Countries—A Study on Consumer IoT Device Vulnerability Disclosure and Patch Release in Japan and the United States
Asuka NAKAJIMA  Takuya WATANABE  Eitaro SHIOJI  Mitsuaki AKIYAMA  Maverick WOO  
Summary | Full Text:PDF(1.3MB)


Detecting and Understanding Online Advertising Fraud in the Wild
Fumihiro KANEI  Daiki CHIBA  Kunio HATO  Katsunari YOSHIOKA  Tsutomu MATSUMOTO  Mitsuaki AKIYAMA  
Summary | Full Text:PDF(1.9MB)


Trojan-Net Classification for Gate-Level Hardware Design Utilizing Boundary Net Structures
Kento HASEGAWA  Masao YANAGISAWA  Nozomu TOGAWA  
Summary | Full Text:PDF(937.6KB)


DomainScouter: Analyzing the Risks of Deceptive Internationalized Domain Names
Daiki CHIBA  Ayako AKIYAMA HASEGAWA  Takashi KOIDE  Yuta SAWABE  Shigeki GOTO  Mitsuaki AKIYAMA  
Summary | Full Text:PDF(500.8KB)


Identification of Kernel Memory Corruption Using Kernel Memory Secret Observation Mechanism
Hiroki KUZUNO  Toshihiro YAMAUCHI  
Summary | Full Text:PDF(1.8MB)

 Volume E103-D No.6  (Publication Date:2020/06/01)
Special Section on Machine Vision and its Applications

pp.1208-1208  FOREWORD  Open Access Paper
FOREWORD
Atsuto MAKI  
Summary | FreeFull Text:PDF(112.7KB)

pp.1209-1216  PAPER
Heatmapping of Group People Involved in the Group Activity
Kohei SENDO  Norimichi UKITA  
Summary | Full Text:PDF (3.9MB) >>
Buy this Article


pp.1217-1225  PAPER
Deep State-Space Model for Noise Tolerant Skeleton-Based Action Recognition
Kazuki KAWAMURA  Takashi MATSUBARA  Kuniaki UEHARA  
Summary | Full Text:PDF (1.3MB) >>
Buy this Article


pp.1226-1235  PAPER
Temporally Forward Nonlinear Scale Space for High Frame Rate and Ultra-Low Delay A-KAZE Matching System
Songlin DU  Yuan LI  Takeshi IKENAGA  
Summary | Full Text:PDF (3.1MB) >>
Buy this Article


pp.1236-1246  PAPER
Temporal Constraints and Block Weighting Judgement Based High Frame Rate and Ultra-Low Delay Mismatch Removal System
Songlin DU  Zhe WANG  Takeshi IKENAGA  
Summary | Full Text:PDF (1.7MB) >>
Buy this Article


pp.1247-1256  PAPER
Instance Segmentation by Semi-Supervised Learning and Image Synthesis
Takeru OBA  Norimichi UKITA  
Summary | Full Text:PDF (3.5MB) >>
Buy this Article


pp.1257-1264  PAPER
Human Pose Annotation Using a Motion Capture System for Loose-Fitting Clothes
Takuya MATSUMOTO  Kodai SHIMOSATO  Takahiro MAEDA  Tatsuya MURAKAMI  Koji MURAKOSO  Kazuhiko MINO  Norimichi UKITA  
Summary | Full Text:PDF (1.5MB) >>
Buy this Article


pp.1265-1275  PAPER
Multiple Human Tracking Using an Omnidirectional Camera with Local Rectification and World Coordinates Representation
Hitoshi NISHIMURA  Naoya MAKIBUCHI  Kazuyuki TASAKA  Yasutomo KAWANISHI  Hiroshi MURASE  
Summary | Full Text:PDF (2.7MB) >>
Buy this Article


pp.1276-1286  PAPER
Driver Drowsiness Estimation by Parallel Linked Time-Domain CNN with Novel Temporal Measures on Eye States
Kenta NISHIYUKI  Jia-Yau SHIAU  Shigenori NAGAE  Tomohiro YABUUCHI  Koichi KINOSHITA  Yuki HASEGAWA  Takayoshi YAMASHITA  Hironobu FUJIYOSHI  
Summary | Full Text:PDF (1.1MB) >>
Buy this Article


Special Section on Knowledge-Based Software Engineering

pp.1287-1287  FOREWORD  Open Access Paper
FOREWORD
Fumihiro KUMENO  
Summary | FreeFull Text:PDF(74.8KB)

pp.1288-1296  PAPER
Privacy-Aware Best-Balanced Multilingual Communication
Mondheera PITUXCOOSUVARN  Takao NAKAGUCHI  Donghui LIN  Toru ISHIDA  
Summary | Full Text:PDF (586.1KB) >>
Buy this Article


pp.1297-1308  PAPER
Facilitating Use of Assurance Cases in Industries by Workshops with an Agent-Based Method
Yutaka MATSUNO  Toshinori TAKAI  Shuichiro YAMAMOTO  
Summary | Full Text:PDF (2.1MB) >>
Buy this Article


pp.1309-1318  PAPER
Interactive Goal Model Construction Based on a Flow of Questions
Hiroyuki NAKAGAWA  Hironori SHIMADA  Tatsuhiro TSUCHIYA  
Summary | Full Text:PDF (1.4MB) >>
Buy this Article


pp.1319-1327  PAPER
Evaluation of Software Fault Prediction Models Considering Faultless Cases
Yukasa MURAKAMI  Masateru TSUNODA  Koji TODA  
Summary | Full Text:PDF (1.2MB) >>
Buy this Article


Regular Section

pp.1328-1338  PAPER-Software Engineering
Improving the Accuracy of Spectrum-Based Fault Localization Using Multiple Rules
Rongcun WANG  Shujuan JIANG  Kun ZHANG  Qiao YU  
Summary | Full Text:PDF (326.8KB) >>
Buy this Article


pp.1339-1354  PAPER-Information Network
Extended Inter-Device Digital Rights Sharing and Transfer Based on Device-Owner Equality Verification Using Homomorphic Encryption
Yoshihiko OMORI  Takao YAMASHITA  
Summary | Full Text:PDF (1.7MB) >>
Buy this Article


pp.1355-1361  PAPER-Artificial Intelligence, Data Mining
Partial Label Metric Learning Based on Statistical Inference
Tian XIE  Hongchang CHEN  Tuosiyu MING  Jianpeng ZHANG  Chao GAO  Shaomei LI  Yuehang DING  
Summary | Full Text:PDF (1.5MB) >>
Buy this Article


pp.1362-1370  PAPER-Artificial Intelligence, Data Mining
Joint Representations of Knowledge Graphs and Textual Information via Reference Sentences
Zizheng JI  Zhengchao LEI  Tingting SHEN  Jing ZHANG  
Summary | Full Text:PDF (656.6KB) >>
Buy this Article


pp.1371-1379  PAPER-Artificial Intelligence, Data Mining
Dual-Task Integrated Network for Fast Pedestrian Detection in Crowded Scenes
Chen CHEN  Huaxin XIAO  Yu LIU  Maojun ZHANG  
Summary | Full Text:PDF (2.3MB) >>
Buy this Article


pp.1380-1387  PAPER-Artificial Intelligence, Data Mining
Ridge-Adding Homotopy Approach for l1-norm Minimization Problems
Haoran LI  Binyu WANG  Jisheng DAI  Tianhong PAN  
Summary | Full Text:PDF (352.8KB) >>
Buy this Article


pp.1388-1394  PAPER-Office Information Systems, e-Business Modeling
A New Similarity Model Based on Collaborative Filtering for New User Cold Start Recommendation
Ruilin PAN  Chuanming GE  Li ZHANG  Wei ZHAO  Xun SHAO  
Summary | Full Text:PDF (2.3MB) >>
Buy this Article


pp.1395-1405  PAPER-Speech and Hearing
Tensor Factor Analysis for Arbitrary Speaker Conversion
Daisuke SAITO  Nobuaki MINEMATSU  Keikichi HIROSE  
Summary | Full Text:PDF (887.2KB) >>
Buy this Article


pp.1406-1413  PAPER-Image Processing and Video Processing
Adversarial Metric Learning with Naive Similarity Discriminator
Yi-ze LE  Yong FENG  Da-jiang LIU  Bao-hua QIANG  
Summary | Full Text:PDF (839.8KB) >>
Buy this Article


pp.1414-1418  LETTER-Information Network
Survivable Virtual Network Topology Protection Method Based on Particle Swarm Optimization
Guangyuan LIU  Daokun CHEN  
Summary | Full Text:PDF (258.4KB) >>
Buy this Article


pp.1419-1422  LETTER-Artificial Intelligence, Data Mining
A Semantic Similarity Supervised Autoencoder for Zero-Shot Learning
Fengli SHEN  Zhe-Ming LU  
Summary | Full Text:PDF (135.3KB) >>
Buy this Article


pp.1423-1426  LETTER-Pattern Recognition
Hand-Dorsa Vein Recognition Based on Selective Deep Convolutional Feature
Zaiyu PAN  Jun WANG  
Summary | Full Text:PDF (769.8KB) >>
Buy this Article


pp.1427-1430  LETTER-Speech and Hearing
End-to-End Multilingual Speech Recognition System with Language Supervision Training
Danyang LIU  Ji XU  Pengyuan ZHANG  
Summary | Full Text:PDF (258.7KB) >>
Buy this Article


Previous | 
go to Page Top