


Остановите войну!
for scientists:


default search action
IEICE Transactions on Information & Systems, Volume 103
Volume 103-D, Number 1, January 2020
- Keiichi Iwamura:
Foreword. 1 - KokSheik Wong, ChuanSheng Chan, MaungMaung AprilPyone:
Lightweight Authentication for MP4 Format Container Using Subtitle Track. 2-10 - Mariko Fujii, Tomoharu Shibuya:
Improvement of the Quality of Visual Secret Sharing Schemes with Constraints on the Usage of Shares. 11-24 - Kenta Iida, Hitoshi Kiya:
Image Identification of Encrypted JPEG Images for Privacy-Preserving Photo Sharing Services. 25-32 - Ippei Hamamoto, Masaki Kawamura
:
Neural Watermarking Method Including an Attack Simulator against Rotation and Compression Attacks. 33-41 - Ryota Kaminishi, Haruna Miyamoto, Sayaka Shiota, Hitoshi Kiya:
Blind Bandwidth Extension with a Non-Linear Function and Its Evaluation on Automatic Speaker Verification. 42-49 - Takayuki Nakachi, Yukihiro Bandoh, Hitoshi Kiya:
Secure Overcomplete Dictionary Learning for Sparse Representation. 50-58 - Jin S. Seo:
Multi-Scale Chroma n-Gram Indexing for Cover Song Identification. 59-62 - Reiya Namikawa, Masashi Unoki
:
Non-Blind Speech Watermarking Method Based on Spread-Spectrum Using Linear Prediction Residue. 63-66 - Huyen T. T. Tran, Trang H. Hoang, Phu N. Minh, Nam Pham Ngoc, Truong Cong Thang:
A Weighted Viewport Quality Metric for Omnidirectional Images. 67-70
- Sufen Zhao, Rong Peng, Meng Zhang, Liansheng Tan:
HeteroRWR: A Novel Algorithm for Top-k Co-Author Recommendation with Fusion of Citation Networks. 71-84 - Shanshan Jiao, Zhisong Pan, Yutian Chen, Yunbo Li:
Cloud Annealing: A Novel Simulated Annealing Algorithm Based on Cloud Model. 85-92 - Keiichi Kaneko
:
Node-Disjoint Paths Problems in Directed Bijective Connection Graphs. 93-100 - Ryuta Kawano
, Ryota Yasudo
, Hiroki Matsutani, Michihiro Koibuchi, Hideharu Amano:
A Generalized Theory Based on the Turn Model for Deadlock-Free Irregular Networks. 101-110 - Takashi Yokota, Kanemitsu Ootsu, Takeshi Ohkawa:
Genetic Node-Mapping Methods for Rapid Collective Communications. 111-129 - Shun Imai, Akihiro Inokuchi:
Efficient Supergraph Search Using Graph Coding. 130-141 - Rei Takami, Yasufumi Takama:
Proposal and Evaluation of Visual Analytics Interface for Time-Series Data Based on Trajectory Representation. 142-151 - Weiqing Tong, Haisheng Li, Guoyue Chen:
Blob Detection Based on Soft Morphological Filter. 152-162 - Jianyong Duan, Yuwei Wu, Mingli Wu, Hao Wang:
Measuring Semantic Similarity between Words Based on Multiple Relational Information. 163-169 - Sooyong Jeong, Ajay Kumar Jha, Youngsul Shin, Woo Jin Lee:
A Log-Based Testing Approach for Detecting Faults Caused by Incorrect Assumptions About the Environment. 170-173 - Shaojie Zhu, Lei Zhang, Bailong Liu, Shumin Cui, Changxing Shao, Yun Li:
Mode Normalization Enhanced Recurrent Model for Multi-Modal Semantic Trajectory Prediction. 174-176 - Huaizhe Zhou, Haihe Ba, Yongjun Wang, Tie Hong:
On the Detection of Malicious Behaviors against Introspection Using Hardware Architectural Events. 177-180 - Pengyu Wang
, Hongqing Zhu, Ning Chen:
UMMS: Efficient Superpixel Segmentation Driven by a Mixture of Spatially Constrained Uniform Distribution. 181-185
Volume 103-D, Number 2, February 2020
- Guojun Wang:
Foreword. 186-187 - Yudi Zhang, Debiao He, Xinyi Huang, Ding Wang, Kim-Kwang Raymond Choo
, Jing Wang:
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography. 188-195 - Wenjuan Li
, Weizhi Meng, Zhiqiang Liu, Man Ho Au:
Towards Blockchain-Based Software-Defined Networking: Security Challenges and Solutions. 196-203 - Vasileios Kouliaridis
, Konstantia Barmpatsalou, Georgios Kambourakis, Shuhong Chen:
A Survey on Mobile Malware Detection Techniques. 204-211 - Yuya Senzaki, Satsuya Ohata, Kanta Matsuura:
Simple Black-Box Adversarial Examples Generation with Very Few Queries. 212-221 - Huiyao Zheng, Jian Shen
, Youngju Cho, Chunhua Su, Sangman Moh:
A Novel Structure-Based Data Sharing Scheme in Cloud Computing. 222-229 - Qiuhua Wang, Mingyang Kang, Guohua Wu, Yizhi Ren, Chunhua Su:
A Practical Secret Key Generation Scheme Based on Wireless Channel Characteristics for 5G Networks. 230-238 - Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Keito Sasaoka, Takeshi Yagi, Tatsuya Mori
:
Follow Your Silhouette: Identifying the Social Account of Website Visitors through User-Blocking Side Channel. 239-255 - Na Ruan, Chunhua Su, Chi Xie:
Securing Cooperative Adaptive Cruise Control in Vehicular Platoons via Cooperative Message Authentication. 256-264 - Mitsuhiro Hatada, Tatsuya Mori
:
CLAP: Classification of Android PUAs by Similarity of DNS Queries. 265-275 - Takuya Watanabe, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, Yuta Takata, Bo Sun, Yuta Ishii, Toshiki Shibahara, Takeshi Yagi, Tatsuya Mori
:
Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library. 276-291 - Hiroshi Nomaguchi, Chunhua Su, Atsuko Miyaji:
New Pseudo-Random Number Generator for EPC Gen2. 292-298 - Tomoaki Mimoto, Seira Hidano, Shinsaku Kiyomoto, Atsuko Miyaji:
Anonymization Technique Based on SGD Matrix Factorization. 299-308
- Jae Young Hur:
Virtual Address Remapping with Configurable Tiles in Image Processing Applications. 309-320 - Yudai Sakamoto, Shigeru Yamashita:
Efficient Methods to Generate Constant SNs with Considering Trade-Off between Error and Overhead and Its Evaluation. 321-328 - Takashi Nakada, Hiroyuki Yanagihashi
, Kunimaro Imai, Hiroshi Ueki, Takashi Tsuchiya, Masanori Hayashikoshi, Hiroshi Nakamura:
An Energy-Efficient Task Scheduling for Near Real-Time Systems on Heterogeneous Multicore Processors. 329-338 - Apinporn Methawachananont, Marut Buranarach
, Pakaimart Amsuriya, Sompol Chaimongkhon, Kamthorn Krairaksa, Thepchai Supnithi:
Software Process Capability Self-Assessment Support System Based on Task and Work Product Characteristics: A Case Study of ISO/IEC 29110 Standard. 339-347 - Yutaro Kashiwa, Masao Ohira:
A Release-Aware Bug Triaging Method Considering Developers' Bug-Fixing Loads. 348-362 - Naoto Sato, Hironobu Kuruma, Yuichiroh Nakagawa, Hideto Ogawa:
Formal Verification of a Decision-Tree Ensemble Model and Detection of Its Violation Ranges. 363-378 - Hiroya Kato, Shuichiro Haruta, Iwao Sasase:
Android Malware Detection Scheme Based on Level of SSL Server Certificate. 379-389 - Chihiro Watanabe, Kaoru Hiramatsu, Kunio Kashino:
Knowledge Discovery from Layered Neural Networks Based on Non-negative Task Matrix Decomposition. 390-397 - Naoki Kato, Toshihiko Yamasaki, Kiyoharu Aizawa, Takemi Ohama:
Users' Preference Prediction of Real Estate Properties Based on Floor Plan Analysis. 398-405 - Jeong-Uk Bang, Mu-Yeol Choi, Sang-Hun Kim, Oh-Wook Kwon:
Automatic Construction of a Large-Scale Speech Recognition Database Using Multi-Genre Broadcast Data with Inaccurate Subtitle Timestamps. 406-415 - Ming Dai, Zhiheng Zhou, Tianlei Wang, Yongfan Guo:
Nonparametric Distribution Prior Model for Image Segmentation. 416-423 - Kazuki Sakai, Ryuichiro Higashinaka, Yuichiro Yoshikawa, Hiroshi Ishiguro, Junji Tomita:
Hierarchical Argumentation Structure for Persuasive Argumentative Dialogue Generation. 424-434 - Andros Tjandra, Sakriani Sakti, Satoshi Nakamura:
Recurrent Neural Network Compression Based on Low-Rank Tensor Representation. 435-449 - Guizhong Zhang, Baoxian Wang, Zhaobo Yan, Yiqiang Li, Huaizhi Yang:
Rust Detection of Steel Structure via One-Class Classification and L2 Sparse Representation with Decision Fusion. 450-453 - Joanna Kazzandra Dumagpi
, Woo-Young Jung, Yong-Jin Jeong:
A New GAN-Based Anomaly Detection (GBAD) Approach for Multi-Threat Object Classification on Large-Scale X-Ray Security Images. 454-458 - Jiateng Liu, Wenming Zheng, Yuan Zong, Cheng Lu, Chuangao Tang
:
Cross-Corpus Speech Emotion Recognition Based on Deep Domain-Adaptive Convolutional Neural Network. 459-463 - Jichen Yang, Longting Xu, Bo Ren:
Constant-Q Deep Coefficients for Playback Attack Detection. 464-468 - Yong-Uk Yoon
, Dohyeon Park, Jae-Gon Kim:
Enhanced Derivation of Model Parameters for Cross-Component Linear Model (CCLM) in VVC. 469-471 - Dohyeon Park, Jinho Lee, Jung-Won Kang, Jae-Gon Kim:
Simplified Triangular Partitioning Mode in Versatile Video Coding. 472-475 - Chunhua Qian, Mingyang Li, Yi Ren:
Tea Sprouts Segmentation via Improved Deep Convolutional Encoder-Decoder Network. 476-479
Volume 103-D, Number 3, March 2020
- Kohei Hatano:
Foreword. 480 - Hiroshi Fujiwara, Kei Shibusawa, Kouki Yamamoto, Hiroaki Yamamoto:
Bounds for the Multislope Ski-Rental Problem. 481-488 - Yuichi Sudo, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa:
Loosely Stabilizing Leader Election on Arbitrary Graphs in Population Protocols without Identifiers or Random Numbers. 489-499 - Chuzo Iwamoto, Tatsuaki Ibusuki:
Polynomial-Time Reductions from 3SAT to Kurotto and Juosan Puzzles. 500-505 - Kazuyuki Amano, Shin-Ichi Nakano:
An Approximation Algorithm for the 2-Dispersion Problem. 506-508 - Takashi Harada, Ken Tanaka, Kenji Mikawa:
Simulated Annealing Method for Relaxed Optimal Rule Ordering. 509-515 - Ryohei Banno, Kazuyuki Shudo:
An Efficient Routing Method for Range Queries in Skip Graph. 516-525 - Satoshi Matsumoto, Tomoyuki Uchida, Takayoshi Shoudai, Yusuke Suzuki, Tetsuhiro Miyahara:
An Efficient Learning Algorithm for Regular Pattern Languages Using One Positive Example and a Linear Number of Membership Queries. 526-539 - Ryoma Senda, Yoshiaki Takata, Hiroyuki Seki:
Generalized Register Context-Free Grammars. 540-548 - Keehang Kwon:
A Heuristic Proof Procedure for First-Order Logic. 549-552
- Yuanbang Li, Rong Peng, Bangchao Wang:
Survey on Challenges and Achievements in Context-Aware Requirement Modeling. 553-565 - Yoshiyuki Mihara, Shuichi Miyazaki, Yasuo Okabe, Tetsuya Yamaguchi, Manabu Okamoto:
Identifying Link Layer Home Network Topologies Using HTIP. 566-577 - Jun Iwamoto, Yuma Kikutani, Renyuan Zhang, Yasuhiko Nakashima:
Daisy-Chained Systolic Array and Reconfigurable Memory Space for Narrow Memory Bandwidth. 578-589 - Hisao Ogata, Tomoyoshi Ishikawa, Norichika Miyamoto, Tsutomu Matsumoto:
An ATM Security Measure to Prevent Unauthorized Deposit with a Smart Card. 590-601 - Rui Chen, Ying Tong, Ruiyu Liang:
Real-Time Generic Object Tracking via Recurrent Regression Network. 602-611 - Chunting Wan, Dongyi Chen, Juan Yang, Miao Huang:
Combining Parallel Adaptive Filtering and Wavelet Threshold Denoising for Photoplethysmography-Based Pulse Rate Monitoring during Intensive Physical Exercise. 612-620 - Yan Li, Zhijie Chu, Yizhong Xin:
Posture Recognition Technology Based on Kinect. 621-630 - Keisuke Imoto
:
Graph Cepstrum: Spatial Feature Extracted from Partially Connected Microphones. 631-638 - Hiroki Tamaru, Yuki Saito
, Shinnosuke Takamichi, Tomoki Koriyama
, Hiroshi Saruwatari:
Generative Moment Matching Network-Based Neural Double-Tracking for Synthesized and Natural Singing Voices. 639-647 - Xinyu Zhu, Jun Zhang, Gengsheng Chen:
ASAN: Self-Attending and Semantic Activating Network towards Better Object Detection. 648-659 - Yuki Fujimura, Motoharu Sonogashira, Masaaki Iiyama:
Simultaneous Estimation of Object Region and Depth in Participating Media Using a ToF Camera. 660-673 - Johanes Effendi, Sakriani Sakti, Katsuhito Sudoh, Satoshi Nakamura:
Leveraging Neural Caption Translation with Visually Grounded Paraphrase Augmentation. 674-683 - Mingming Yang
, Min Zhang, Kehai Chen, Rui Wang, Tiejun Zhao:
Neural Machine Translation with Target-Attention Model. 684-694 - Huan Tang, Ning Chen:
Combining CNN and Broad Learning for Music Classification. 695-701 - Nao Igawa, Tomoyuki Yokogawa, Sousuke Amasaki, Masafumi Kondo, Yoichiro Sato, Kazutami Arimoto:
Symbolic Representation of Time Petri Nets for Efficient Bounded Model Checking. 702-705 - Ji-Hoon Shin, Tae-Hwan Kim:
Fast Inference of Binarized Convolutional Neural Networks Exploiting Max Pooling with Modified Block Structure. 706-710 - Xinxin Hu
, Caixia Liu, Shuxin Liu, Xiaotao Cheng:
A Security Enhanced 5G Authentication Scheme for Insecure Channel. 711-713 - Yoonhee Kim, Deokgyu Yun, Hannah Lee, Seung Ho Choi:
A Non-Intrusive Speech Intelligibility Estimation Method Based on Deep Learning Using Autoencoder Features. 714-715 - Bing Luo, Junkai Xiong, Li Xu, Zheng Pei:
Superpixel Segmentation Based on Global Similarity and Contour Region Transform. 716-719 - Weiwei Jiang, Le Zhang:
Edge-SiamNet and Edge-TripleNet: New Deep Learning Models for Handwritten Numeral Recognition. 720-723 - Toru Hiraoka:
A High-Speed Method for Generating Edge-Preserving Bubble Images. 724-727
Volume 103-D, Number 4, April 2020
- Susumu Kunifuji, Thanaruk Theeramunkong, Takayuki Ito
:
Foreword. 728-729 - Takafumi Higashi, Hideaki Kanai
:
Improvement in the Effectiveness of Cutting Skill Practice for Paper-Cutting Creations Based on the Steering Law. 730-738 - Tachanun Kangwantrakool, Kobkrit Viriyayudhakorn, Thanaruk Theeramunkong:
Software Development Effort Estimation from Unstructured Software Project Description by Sequence Models. 739-747 - Uraiwan Buatoom
, Waree Kongprawechnon, Thanaruk Theeramunkong:
Improving Seeded k-Means Clustering with Deviation- and Entropy-Based Term Weightings. 748-758 - Shun Okuhara, Takayuki Ito
:
Compromising Strategies for Agents in Multiple Interdependent Issues Negotiation. 759-770 - Konlakorn Wongaptikaseree, Panida Yomaboot, Kantinee Katchapakirin, Yongyos Kaewpitakkun:
Social Behavior Analysis and Thai Mental Health Questionnaire (TMHQ) Optimization for Depression Detection System. 771-778 - Rachasak Somyanonthanakul
, Thanaruk Theeramunkong:
Characterization of Interestingness Measures Using Correlation Analysis and Association Rule Mining. 779-788 - Kedir Mamo Besher, Juan Ivan Nieto-Hipólito, Juan De Dios Sánchez-López, Mabel Vázquez-Briseno, Raymundo Buenrostro-Mariscal
:
Cognition-Based Delay Analysis to Determine the Average Minimum Time Limit for Wireless Sensor Communications. 789-795 - Jun Munemori, Kohei Komori, Junko Itou:
GUNGEN-Heartbeat: A Support System for High Quality Idea Generation Using Heartbeat Variance. 796-799
- Yajun Wu, Satoshi Yamane:
Model Checking of Real-Time Properties for Embedded Assembly Program Using Real-Time Temporal Logic RTCTL and Its Application to Real Microcontroller Software. 800-812 - Xinxin Han, Jian Ye, Jia Luo
, Haiying Zhou:
The Effect of Axis-Wise Triaxial Acceleration Data Fusion in CNN-Based Human Activity Recognition. 813-824 - Ye Peng, Wentao Zhao, Wei Cai, Jinshu Su, Biao Han, Qiang Liu:
Evaluating Deep Learning for Image Classification in Adversarial Environment. 825-837 - Shota Shiratori, Yuichiro Fujimoto, Kinya Fujita
:
Predicting Uninterruptible Durations of Office Workers by Using Probabilistic Work Continuance Model. 838-849 - Shi-Chei Hung, Da-Chun Wu, Wen-Hsiang Tsai:
Data Hiding in Computer-Generated Stained Glass Images and Its Applications to Information Protection. 850-865 - Van-Hai Vu, Quang-Phuoc Nguyen, Kiem-Hieu Nguyen, Joon-Choul Shin, Cheol-Young Ock:
Korean-Vietnamese Neural Machine Translation with Named Entity Recognition and Part-of-Speech Tags. 866-873 - Dong Kwan Kim:
A Deep Neural Network-Based Approach to Finding Similar Code Segments. 874-878 - Hyun Kwon
, Hyunsoo Yoon, Ki-Woong Park:
Robust CAPTCHA Image Generation Enhanced with Adversarial Example Methods. 879-882 - Hyun Kwon
, Hyunsoo Yoon, Ki-Woong Park:
Multi-Targeted Backdoor: Indentifying Backdoor Attack for Multiple Deep Neural Networks. 883-887 - Minhae Jang, Yeonseung Ryu, Jik-Soo Kim, Minkyoung Cho:
Against Insider Threats with Hybrid Anomaly Detection with Local-Feature Autoencoder and Global Statistics (LAGS). 888-891 - Kazuteru Namba:
Master-Slave FF Using DICE Capable of Tolerating Soft Errors Occurring Around Clock Edge. 892-895 - Minkyoung Cho, Jik-Soo Kim, Jongho Shin, Incheol Shin:
Mal2d: 2d Based Deep Learning Model for Malware Detection Using Black and White Binary Image. 896-900 - Taisuke Kawamata
, Takako Akakura:
Sequential Authentication Using Handwriting Biometrics for Free Response e-Testing. 901-904 - Siyang Yu, Kazuaki Kondo, Yuichi Nakamura, Takayuki Nakajima, Masatake Dantsuji:
Investigation on e-Learning Status Estimation for New Learners - Classifier Selection on Representative Sample Selection. 905-909 - Cheng Xu, Wei Han, Dongzhen Wang, Daqing Huang:
Salient Region Detection with Multi-Feature Fusion and Edge Constraint. 910-913
Volume 103-D, Number 5, May 2020
- Shingo Otsuka, Jun Miyazaki:
Foreword. 914-915 - Che-Wen Chen, Shih-Pang Tseng, Pin-Chieh Chen, Jhing-Fa Wang:
On the Design of a Happiness Cups System: A Smart Device for Health Care and Happiness Improvement Using LSTM. 916-927 - Yiling Dai, Masatoshi Yoshikawa, Yasuhito Asano:
Estimating Knowledge Category Coverage by Courses Based on Centrality in Taxonomy. 928-938