IEICE TRANSACTIONS on Information and Systems

Archive Index

Online ISSN : 1745-1361
Volume E103-D No.7  (Publication Date:2020/07/01)
[Whole issue]:PDF (44MB)
Previous | 
Next
Special Section on Information and Communication System Security

pp.1431-1432  FOREWORD  Open Access Paper
FOREWORD
Kazuomi OISHI  
Summary | FreeFull Text:PDF(77.1KB)

pp.1433-1447  INVITED PAPER
Intrusion Detection System Using Deep Learning and Its Application to Wi-Fi Network
Kwangjo KIM  
Summary | Full Text:PDF (669.8KB) >>
Buy this Article


pp.1448-1461  INVITED PAPER
An Overview of De-Identification Techniques and Their Standardization Directions
Heung Youl YOUM  
Summary | Full Text:PDF (3.7MB) >>
Buy this Article


pp.1462-1475  PAPER-Network and System Security
Identification of Kernel Memory Corruption Using Kernel Memory Secret Observation Mechanism
Hiroki KUZUNO  Toshihiro YAMAUCHI  
Summary | Full Text:PDF (1.8MB) >>
Buy this Article


pp.1476-1492  PAPER-Network and System Security
ROPminer: Learning-Based Static Detection of ROP Chain Considering Linkability of ROP Gadgets
Toshinori USUI  Tomonori IKUSE  Yuto OTSUKI  Yuhei KAWAKOYA  Makoto IWAMURA  Jun MIYOSHI  Kanta MATSUURA  
Summary | Full Text:PDF (2.3MB) >>
Buy this Article


pp.1493-1511  PAPER-Network and System Security
DomainScouter: Analyzing the Risks of Deceptive Internationalized Domain Names
Daiki CHIBA  Ayako AKIYAMA HASEGAWA  Takashi KOIDE  Yuta SAWABE  Shigeki GOTO  Mitsuaki AKIYAMA  
[Paper recommended by Technical Committee on Information and Communication System Security]Summary | Full Text:PDF (1013.6KB) >>
Buy this Article

 | Errata[Uploaded on August 1,2020]


pp.1512-1523  PAPER-Network and System Security
Detecting and Understanding Online Advertising Fraud in the Wild
Fumihiro KANEI  Daiki CHIBA  Kunio HATO  Katsunari YOSHIOKA  Tsutomu MATSUMOTO  Mitsuaki AKIYAMA  
Summary | Full Text:PDF (1010.8KB) >>
Buy this Article


pp.1524-1540  PAPER-Network and System Security
1-day, 2 Countries — A Study on Consumer IoT Device Vulnerability Disclosure and Patch Release in Japan and the United States
Asuka NAKAJIMA  Takuya WATANABE  Eitaro SHIOJI  Mitsuaki AKIYAMA  Maverick WOO  
Summary | Full Text:PDF (1MB) >>
Buy this Article


pp.1541-1555  PAPER-Network and System Security
Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?
Keika MORI  Takuya WATANABE  Yunao ZHOU  Ayako AKIYAMA HASEGAWA  Mitsuaki AKIYAMA  Tatsuya MORI  
Summary | Full Text:PDF (853.8KB) >>
Buy this Article


pp.1556-1597  PAPER-Cryptographic Techniques
Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption
Pratish DATTA  Tatsuaki OKAMOTO  Katsuyuki TAKASHIMA  
Summary | Full Text:PDF (1.1MB) >>
Buy this Article


pp.1598-1607  PAPER-Cryptographic Techniques
Online-Efficient Interval Test via Secure Empty-Set Check
Katsunari SHISHIDO  Atsuko MIYAJI  
Summary | Full Text:PDF (411.3KB) >>
Buy this Article


pp.1608-1617  PAPER-Cryptographic Techniques
A Multilayer Steganography Method with High Embedding Efficiency for Palette Images
Han-Yan WU  Ling-Hwei CHEN  Yu-Tai CHING  
Summary | Full Text:PDF (2.6MB) >>
Buy this Article


pp.1618-1622  LETTER-Network and System Security
Trojan-Net Classification for Gate-Level Hardware Design Utilizing Boundary Net Structures
Kento HASEGAWA  Masao YANAGISAWA  Nozomu TOGAWA  
Summary | Full Text:PDF (182KB) >>
Buy this Article


Regular Section

pp.1623-1632  PAPER-Computer System
A Series of PIN/Password Input Methods Resilient to Shoulder Hacking Based on Cognitive Difficulty of Tracing Multiple Key Movements
Kokoro KOBAYASHI  Tsuyoshi OGUNI  Masaki NAKAGAWA  
Summary | Full Text:PDF (611.7KB) >>
Buy this Article


pp.1633-1646  PAPER-Software System
Logging Inter-Thread Data Dependencies in Linux Kernel
Takafumi KUBOTA  Naohiro AOTA  Kenji KONO  
Summary | Full Text:PDF (1.9MB) >>
Buy this Article


pp.1647-1659  PAPER-Data Engineering, Web Information Systems
A Server-Based Distributed Storage Using Secret Sharing with AES-256 for Lightweight Safety Restoration
Sanghun CHOI  Shuichiro HARUTA  Yichen AN  Iwao SASASE  
Summary | Full Text:PDF (1.6MB) >>
Buy this Article


pp.1660-1671  PAPER-Dependable Computing
Instruction Filters for Mitigating Attacks on Instruction Emulation in Hypervisors
Kenta ISHIGURO  Kenji KONO  
Summary | Full Text:PDF (1.3MB) >>
Buy this Article


pp.1672-1682  PAPER-Dependable Computing
Byzantine-Tolerant Gathering of Mobile Agents in Asynchronous Arbitrary Networks with Authenticated Whiteboards
Masashi TSUCHIDA  Fukuhito OOSHITA  Michiko INOUE  
Summary | Full Text:PDF (339.8KB) >>
Buy this Article


pp.1683-1692  PAPER-Artificial Intelligence, Data Mining
Sparsity Reduction Technique Using Grouping Method for Matrix Factorization in Differentially Private Recommendation Systems
Taewhan KIM  Kangsoo JUNG  Seog PARK  
Summary | Full Text:PDF (917.8KB) >>
Buy this Article


pp.1693-1702  PAPER-Artificial Intelligence, Data Mining
Stochastic Discrete First-Order Algorithm for Feature Subset Selection
Kota KUDO  Yuichi TAKANO  Ryo NOMURA  
Summary | Full Text:PDF (754.8KB) >>
Buy this Article


pp.1703-1709  PAPER-Human-computer Interaction
Strategy for Improving Target Selection Accuracy in Indirect Touch Input
Yizhong XIN  Ruonan LIU  Yan LI  
Summary | Full Text:PDF (2.5MB) >>
Buy this Article


pp.1710-1721  PAPER-Educational Technology
Model-Based Development of Spatial Movement Skill Training System and Its Evaluation
Ayumi YAMAZAKI  Yuki HAYASHI  Kazuhisa SETA  
Summary | Full Text:PDF (2.7MB) >>
Buy this Article


pp.1722-1731  PAPER-Educational Technology
Analysis of The Similarity of Individual Knowledge and The Comprehension of Partner's Representation during Collaborative Concept Mapping with Reciprocal Kit Build Approach
Lia SADITA  Pedro Gabriel Fonteles FURTADO  Tsukasa HIRASHIMA  Yusuke HAYASHI  
Summary | Full Text:PDF (838.2KB) >>
Buy this Article


pp.1732-1743  PAPER-Speech and Hearing
A Two-Stage Phase-Aware Approach for Monaural Multi-Talker Speech Separation
Lu YIN  Junfeng LI  Yonghong YAN  Masato AKAGI  
Summary | Full Text:PDF (1.1MB) >>
Buy this Article


pp.1744-1752  PAPER-Natural Language Processing
A Double Adversarial Network Model for Multi-Domain and Multi-Task Chinese Named Entity Recognition
Yun HU  Changwen ZHENG  
Summary | Full Text:PDF (933.7KB) >>
Buy this Article


pp.1753-1759  PAPER-Biological Engineering
Effect of Fixational Eye Movement on Signal Processing of Retinal Photoreceptor: A Computational Study
Keiichiro INAGAKI  Takayuki KANNON  Yoshimi KAMIYAMA  Shiro USUI  
Summary | Full Text:PDF (4.1MB) >>
Buy this Article


pp.1760-1764  LETTER-Fundamentals of Information Systems
Analysis on Wave-Velocity Inverse Imaging for the Supporting Layer in Ballastless Track
Yong YANG  Junwei LU  Baoxian WANG  Weigang ZHAO  
Summary | Full Text:PDF (4.6MB) >>
Buy this Article


pp.1765-1768  LETTER-Computer System
A 10.4-Gs/s High-Resolution Wideband Radar Sampling System Based on TIADC Technique
Jingyu LI  Dandan XIAO  Yue ZHANG  
Summary | Full Text:PDF (1MB) >>
Buy this Article


pp.1769-1772  LETTER-Software System
Systematic Detection of State Variable Corruptions in Discrete Event System Specification Based Simulation
Hae Young LEE  Jin Myoung KIM  
Summary | Full Text:PDF (825.9KB) >>
Buy this Article


pp.1773-1776  LETTER-Data Engineering, Web Information Systems
An Efficient Method for Graph Repartitioning in Distributed Environments
He LI  YanNa LIU  XuHua WANG  LiangCai SU  Hang YUAN  JaeSoo YOO  
Summary | Full Text:PDF (463.4KB) >>
Buy this Article


pp.1777-1781  LETTER-Pattern Recognition
Improving Faster R-CNN Framework for Multiscale Chinese Character Detection and Localization
Minseong KIM  Hyun-Chul CHOI  
Summary | Full Text:PDF (1.6MB) >>
Buy this Article


Previous | 
Next
go to Page Top