IEICE TRANSACTIONS on Information and Systems

Archive Index

Online ISSN : 1745-1361
Volume E103-D No.2  (Publication Date:2020/02/01)
[Whole issue]:PDF (36.5MB)
Previous | 
Next
Special Section on Security, Privacy, Anonymity and Trust in Cyberspace Computing and Communications

pp.186-187  FOREWORD  Open Access Paper
FOREWORD
Guojun WANG  
Summary | FreeFull Text:PDF(71.8KB)

pp.188-195  INVITED PAPER
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography
Yudi ZHANG  Debiao HE  Xinyi HUANG  Ding WANG  Kim-Kwang Raymond CHOO  Jing WANG  
Summary | Full Text:PDF (975KB) >>
Buy this Article


pp.196-203  INVITED PAPER
Towards Blockchain-Based Software-Defined Networking: Security Challenges and Solutions
Wenjuan LI  Weizhi MENG  Zhiqiang LIU  Man-Ho AU  
Summary | Full Text:PDF (601.4KB) >>
Buy this Article


pp.204-211  INVITED PAPER
A Survey on Mobile Malware Detection Techniques
Vasileios KOULIARIDIS  Konstantia BARMPATSALOU  Georgios KAMBOURAKIS  Shuhong CHEN  
Summary | Full Text:PDF (436.6KB) >>
Buy this Article


pp.212-221  PAPER-Reliability and Security of Computer Systems
Simple Black-Box Adversarial Examples Generation with Very Few Queries
Yuya SENZAKI  Satsuya OHATA  Kanta MATSUURA  
Summary | Full Text:PDF (540.4KB) >>
Buy this Article


pp.222-229  PAPER-Reliability and Security of Computer Systems
A Novel Structure-Based Data Sharing Scheme in Cloud Computing
Huiyao ZHENG  Jian SHEN  Youngju CHO  Chunhua SU  Sangman MOH  
Summary | Full Text:PDF (1.1MB) >>
Buy this Article


pp.230-238  PAPER-Network Security
A Practical Secret Key Generation Scheme Based on Wireless Channel Characteristics for 5G Networks
Qiuhua WANG  Mingyang KANG  Guohua WU  Yizhi REN  Chunhua SU  
Summary | Full Text:PDF (1017.7KB) >>
Buy this Article


pp.239-255  PAPER-Network Security
Follow Your Silhouette: Identifying the Social Account of Website Visitors through User-Blocking Side Channel
Takuya WATANABE  Eitaro SHIOJI  Mitsuaki AKIYAMA  Keito SASAOKA  Takeshi YAGI  Tatsuya MORI  
Summary | Full Text:PDF (1.4MB) >>
Buy this Article


pp.256-264  PAPER-Network Security
Securing Cooperative Adaptive Cruise Control in Vehicular Platoons via Cooperative Message Authentication
Na RUAN  Chunhua SU  Chi XIE  
Summary | Full Text:PDF (2.8MB) >>
Buy this Article


pp.265-275  PAPER-Network Security
CLAP: Classification of Android PUAs by Similarity of DNS Queries
Mitsuhiro HATADA  Tatsuya MORI  
Summary | Full Text:PDF (580.2KB) >>
Buy this Article


pp.276-291  PAPER-Network Security
Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library
Takuya WATANABE  Mitsuaki AKIYAMA  Fumihiro KANEI  Eitaro SHIOJI  Yuta TAKATA  Bo SUN  Yuta ISHII  Toshiki SHIBAHARA  Takeshi YAGI  Tatsuya MORI  
Summary | Full Text:PDF (1.7MB) >>
Buy this Article


pp.292-298  PAPER-Cryptographic Techniques
New Pseudo-Random Number Generator for EPC Gen2
Hiroshi NOMAGUCHI  Chunhua SU  Atsuko MIYAJI  
Summary | Full Text:PDF (446KB) >>
Buy this Article


pp.299-308  PAPER-Cryptographic Techniques
Anonymization Technique Based on SGD Matrix Factorization
Tomoaki MIMOTO  Seira HIDANO  Shinsaku KIYOMOTO  Atsuko MIYAJI  
Summary | Full Text:PDF (1.1MB) >>
Buy this Article


Regular Section

pp.309-320  PAPER-Computer System
Virtual Address Remapping with Configurable Tiles in Image Processing Applications
Jae Young HUR  
Summary | Full Text:PDF (2MB) >>
Buy this Article


pp.321-328  PAPER-Computer System
Efficient Methods to Generate Constant SNs with Considering Trade-Off between Error and Overhead and Its Evaluation
Yudai SAKAMOTO  Shigeru YAMASHITA  
Summary | Full Text:PDF (844.1KB) >>
Buy this Article


pp.329-338  PAPER-Software System
An Energy-Efficient Task Scheduling for Near Real-Time Systems on Heterogeneous Multicore Processors
Takashi NAKADA  Hiroyuki YANAGIHASHI  Kunimaro IMAI  Hiroshi UEKI  Takashi TSUCHIYA  Masanori HAYASHIKOSHI  Hiroshi NAKAMURA  
Summary | Full Text:PDF (1.3MB) >>
Buy this Article


pp.339-347  PAPER-Software Engineering
Software Process Capability Self-Assessment Support System Based on Task and Work Product Characteristics: A Case Study of ISO/IEC 29110 Standard
Apinporn METHAWACHANANONT  Marut BURANARACH  Pakaimart AMSURIYA  Sompol CHAIMONGKHON  Kamthorn KRAIRAKSA  Thepchai SUPNITHI  
Summary | Full Text:PDF (1.8MB) >>
Buy this Article


pp.348-362  PAPER-Software Engineering
A Release-Aware Bug Triaging Method Considering Developers' Bug-Fixing Loads
Yutaro KASHIWA  Masao OHIRA  
Summary | Full Text:PDF (3.2MB) >>
Buy this Article


pp.363-378  PAPER-Dependable Computing
Formal Verification of a Decision-Tree Ensemble Model and Detection of Its Violation Ranges
Naoto SATO  Hironobu KURUMA  Yuichiroh NAKAGAWA  Hideto OGAWA  
Summary | Full Text:PDF (1.4MB) >>
Buy this Article


pp.379-389  PAPER-Dependable Computing
Android Malware Detection Scheme Based on Level of SSL Server Certificate
Hiroya KATO  Shuichiro HARUTA  Iwao SASASE  
Summary | Full Text:PDF (1.6MB) >>
Buy this Article


pp.390-397  PAPER-Artificial Intelligence, Data Mining
Knowledge Discovery from Layered Neural Networks Based on Non-negative Task Matrix Decomposition
Chihiro WATANABE  Kaoru HIRAMATSU  Kunio KASHINO  
Summary | Full Text:PDF (1.4MB) >>
Buy this Article


pp.398-405  PAPER-Artificial Intelligence, Data Mining
Users' Preference Prediction of Real Estate Properties Based on Floor Plan Analysis
Naoki KATO  Toshihiko YAMASAKI  Kiyoharu AIZAWA  Takemi OHAMA  
Summary | Full Text:PDF (1004.7KB) >>
Buy this Article


pp.406-415  PAPER-Speech and Hearing
Automatic Construction of a Large-Scale Speech Recognition Database Using Multi-Genre Broadcast Data with Inaccurate Subtitle Timestamps
Jeong-Uk BANG  Mu-Yeol CHOI  Sang-Hun KIM  Oh-Wook KWON  
Summary | Full Text:PDF (1.2MB) >>
Buy this Article


pp.416-423  PAPER-Image Processing and Video Processing
Nonparametric Distribution Prior Model for Image Segmentation
Ming DAI  Zhiheng ZHOU  Tianlei WANG  Yongfan GUO  
Summary | Full Text:PDF (1.7MB) >>
Buy this Article


pp.424-434  PAPER-Natural Language Processing
Hierarchical Argumentation Structure for Persuasive Argumentative Dialogue Generation
Kazuki SAKAI  Ryuichiro HIGASHINAKA  Yuichiro YOSHIKAWA  Hiroshi ISHIGURO  Junji TOMITA  
Summary | Full Text:PDF (1.4MB) >>
Buy this Article


pp.435-449  PAPER-Music Information Processing
Recurrent Neural Network Compression Based on Low-Rank Tensor Representation
Andros TJANDRA  Sakriani SAKTI  Satoshi NAKAMURA  
Summary | Full Text:PDF (1.2MB) >>
Buy this Article


pp.450-453  LETTER-Artificial Intelligence, Data Mining
Rust Detection of Steel Structure via One-Class Classification and L2 Sparse Representation with Decision Fusion
Guizhong ZHANG  Baoxian WANG  Zhaobo YAN  Yiqiang LI  Huaizhi YANG  
Summary | Full Text:PDF (376.2KB) >>
Buy this Article


pp.454-458  LETTER-Artificial Intelligence, Data Mining
A New GAN-Based Anomaly Detection (GBAD) Approach for Multi-Threat Object Classification on Large-Scale X-Ray Security Images
Joanna Kazzandra DUMAGPI  Woo-Young JUNG  Yong-Jin JEONG  
Summary | Full Text:PDF (1.5MB) >>
Buy this Article


pp.459-463  LETTER-Pattern Recognition
Cross-Corpus Speech Emotion Recognition Based on Deep Domain-Adaptive Convolutional Neural Network
Jiateng LIU  Wenming ZHENG  Yuan ZONG  Cheng LU  Chuangao TANG  
Summary | Full Text:PDF (527.3KB) >>
Buy this Article


pp.464-468  LETTER-Speech and Hearing
Constant-Q Deep Coefficients for Playback Attack Detection
Jichen YANG  Longting XU  Bo REN  
Summary | Full Text:PDF (216.8KB) >>
Buy this Article


pp.469-471  LETTER-Image Processing and Video Processing
Enhanced Derivation of Model Parameters for Cross-Component Linear Model (CCLM) in VVC
Yong-Uk YOON  Do-Hyeon PARK  Jae-Gon KIM  
Summary | Full Text:PDF (423.7KB) >>
Buy this Article


pp.472-475  LETTER-Image Processing and Video Processing
Simplified Triangular Partitioning Mode in Versatile Video Coding
Dohyeon PARK  Jinho LEE  Jung-Won KANG  Jae-Gon KIM  
Summary | Full Text:PDF (631.4KB) >>
Buy this Article


pp.476-479  LETTER-Image Recognition, Computer Vision
Tea Sprouts Segmentation via Improved Deep Convolutional Encoder-Decoder Network
Chunhua QIAN  Mingyang LI  Yi REN  
Summary | Full Text:PDF (659.4KB) >>
Buy this Article


Previous | 
Next
go to Page Top