


default search action
IEICE Transactions on Information & Systems, Volume 105-D
Volume 105-D, Number 1, January 2022
- Shinpei Hayashi:

Foreword. 1 - Daniel Moritz Marutschke, Victor V. Kryssanov, Patricia Brockmann:

Balanced, Unbalances, and One-Sided Distributed Teams - An Empirical View on Global Software Engineering Education. 2-10 - Syful Islam, Dong Wang, Raula Gaikovina Kula

, Takashi Ishio
, Kenichi Matsumoto:
An Exploration of npm Package Co-Usage Examples from Stack Overflow: A Case Study. 11-18 - Bodin Chinthanet, Raula Gaikovina Kula

, Rodrigo Eliza Zapata, Takashi Ishio
, Kenichi Matsumoto, Akinori Ihara:
SōjiTantei: Function-Call Reachability Detection of Vulnerable Code for npm Packages. 19-20 - Yukasa Murakami, Masateru Tsunoda:

Replicated Study of Effectiveness Evaluation of Cutting-Edge Software Engineering. 21-25 - Jie Tan, Jianmin Pang, Cong Liu

:
What Factors Affect the Performance of Software after Migration: A Case Study on Sunway TaihuLight Supercomputer. 26-30 - Keitaro Nakasai, Masateru Tsunoda, Kenichi Matsumoto:

Analyzing Web Search Strategy of Software Developers to Modify Source Codes. 31-36 - Masaki Kawamura

:
Foreword. 37 - Kiyoharu Aizawa:

Movie Map for Virtual Exploration in a City. 38-45 - Tetsuya Kojima

, Kento Akimoto:
A Visible Video Data Hiding Scheme Based on Fade-In and Fade-Out Effects Utilizing Barcodes. 46-53 - Rio Kurokawa, Kazuki Yamato, Madoka Hasegawa:

Near Hue-Preserving Reversible Contrast and Saturation Enhancement Using Histogram Shifting. 54-64 - Huy H. Nguyen, Minoru Kuribayashi, Junichi Yamagishi, Isao Echizen:

Effects of Image Processing Operations on Adversarial Noise and Their Use in Detecting and Correcting Adversarial Images. 65-77 - Isamu Hasegawa, Tomoyuki Yokogawa:

Formal Verification for Node-Based Visual Scripts Using Symbolic Model Checking. 78-91 - Kaiho Fukuchi, Hiroshi Yamada:

Leveraging Scale-Up Machines for Swift DBMS Replication on IaaS Platforms Using BalenaDB. 92-104 - Keigo Taga, Junjun Zheng

, Koichi Mouri, Shoichi Saito, Eiji Takimoto
:
Firewall Traversal Method by Pseudo-TCP Encapsulation. 105-115 - Akira Tanaka, Masanari Nakamura, Hideyuki Imai:

Kernel-Based Regressors Equivalent to Stochastic Affine Estimators. 116-122 - Isana Funahashi, Taichi Yoshida, Xi Zhang, Masahiro Iwahashi:

Image Adjustment for Multi-Exposure Images Based on Convolutional Neural Networks. 123-133 - Kenshiro Tamata, Tomohiro Mashita:

Feature Description with Feature Point Registration Error Using Local and Global Point Cloud Encoders. 134-140 - Kangbo Sun, Jie Zhu:

Searching and Learning Discriminative Regions for Fine-Grained Image Retrieval and Classification. 141-149 - Naohiro Tawara, Atsunori Ogawa, Tomoharu Iwata, Hiroto Ashikawa, Tetsunori Kobayashi, Tetsuji Ogawa

:
Multi-Source Domain Generalization Using Domain Attributes for Recurrent Neural Network Language Models. 150-160 - Koji Kamma, Sarimu Inoue, Toshikazu Wada:

Pruning Ratio Optimization with Layer-Wise Pruning Method for Accelerating Convolutional Neural Networks. 161-169 - Hyun Kwon

:
Multi-Model Selective Backdoor Attack with Different Trigger Positions. 170-174 - Zihao Song, Peng Song, Chao Sheng, Wenming Zheng, Wenjing Zhang, Shaokai Li

:
A Novel Discriminative Virtual Label Regression Method for Unsupervised Feature Selection. 175-179 - Weiwei Luo, Wenpeng Zhou, Jinglong Fang, Lingyan Fan:

JPEG Image Steganalysis Using Weight Allocation from Block Evaluation. 180-183 - Wenjing Zhang, Peng Song, Wenming Zheng:

A Novel Transferable Sparse Regression Method for Cross-Database Facial Expression Recognition. 184-188 - Jiayi Li

, Lin Yang, Junyan Yi, Haichuan Yang
, Yuki Todo, Shangce Gao
:
A Simple but Efficient Ranking-Based Differential Evolution. 189-192
Volume 105-D, Number 2, February 2022
- Guojun Wang, Yizhi Ren:

Foreword. 193-194 - Hao Wang, Zhe Liu, Chunpeng Ge, Kouichi Sakurai, Chunhua Su:

A Privacy-Preserving Data Feed Scheme for Smart Contracts. 195-204 - Naoya Okanami, Ryuya Nakamura, Takashi Nishide:

Load Balancing with In-Protocol/Wallet-Level Account Assignment in Sharded Blockchains. 205-214 - Tao Peng, Kejian Guan, Jierong Liu:

A Privacy-Preserving Mobile Crowdsensing Scheme Based on Blockchain and Trusted Execution Environment. 215-226 - Shingo Fujimoto, Takuma Takeuchi, Yoshiki Higashikado:

Secure Blockchain Interworking Using Extended Smart Contract. 227-234 - Haoyang An

, Jiageng Chen
:
ExamChain: A Privacy-Preserving Onscreen Marking System Based on Consortium Blockchain. 235-247 - Takaki Asanuma, Takanori Isobe:

A Proof of Work Based on Key Recovery Problem of Cascade Block Ciphers with ASIC Resistance. 248-255 - Zhuotao Lian

, Weizheng Wang, Huakun Huang
, Chunhua Su:
Layer-Based Communication-Efficient Federated Learning with Privacy Preservation. 256-263 - Tong Zhang, Yujue Wang, Yong Ding

, Qianhong Wu, Hai Liang, Huiyong Wang:
Multi-Party Electronic Contract Signing Protocol Based on Blockchain. 264-271 - Wenjuan Li, Yu Wang, Weizhi Meng

, Jin Li, Chunhua Su:
BlockCSDN: Towards Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking. 272-279 - Yingxiao Xiang, Chao Li

, Tong Chen, Yike Li, Endong Tong, Wenjia Niu, Qiong Li, Jiqiang Liu, Wei Wang:
Toward Blockchain-Based Spoofing Defense for Controlled Optimization of Phases in Traffic Signal System. 280-288 - Yizhi Ren, Zelong Li, Lifeng Yuan

, Zhen Zhang, Chunhua Su, Yujuan Wang, Guohua Wu:
Semantic Shilling Attack against Heterogeneous Information Network Based Recommend Systems. 289-299 - Srinivas Koppu, Kumar K

, Siva Rama Krishnan Somayaji, Iyapparaja Meenakshisundaram, Weizheng Wang, Chunhua Su:
Fusion of Blockchain, IoT and Artificial Intelligence - A Survey. 300-308 - Dhidhi Pambudi

, Masaki Kawamura
:
Novel Metaheuristic: Spy Algorithm. 309-319 - Yasutaka Matsuda, Ryota Shioya, Hideki Ando:

Reducing Energy Consumption of Wakeup Logic through Double-Stage Tag Comparison. 320-332 - Ryunosuke Nagayama, Ryohei Banno, Kazuyuki Shudo:

Trail: An Architecture for Compact UTXO-Based Blockchain and Smart Contract. 333-343 - Meiming Fu, Qingyang Liu, Jiayi Liu, Xiang Wang, Hongyan Yang:

A Learning-Based Service Function Chain Early Fault Diagnosis Mechanism Based on In-Band Network Telemetry. 344-354 - Jianyong Duan, Liangcai Li, Mei Zhang, Hao Wang:

Hierarchical Preference Hash Network for News Recommendation. 355-363 - Hiroki Ishiguro, Takashi Ishida, Masashi Sugiyama:

Learning from Noisy Complementary Labels with Robust Loss Functions. 364-376 - Shuhei Yamamoto

, Takeshi Kurashima, Hiroyuki Toda:
Classifying Near-Miss Traffic Incidents through Video, Sensor, and Object Features. 377-386 - Yuichiro Nomura

, Takio Kurita
:
Consistency Regularization on Clean Samples for Learning with Noisy Labels. 387-395 - Masayuki Hiromoto, Hisanao Akima, Teruo Ishihara, Takuji Yamamoto:

SimpleZSL: Extremely Simple and Fast Zero-Shot Learning with Nearest Neighbor Classifiers. 396-405 - Masayuki Miyama:

FPGA Implementation of 3-Bit Quantized Multi-Task CNN for Contour Detection and Disparity Estimation. 406-414 - Masashi Nishiyama, Michiko Inoue, Yoshio Iwai:

Gender Recognition Using a Gaze-Guided Self-Attention Mechanism Robust Against Background Bias in Training Samples. 415-426 - Young H. Oh, Yunho Jin, Tae Jun Ham, Jae W. Lee:

Layerweaver+: A QoS-Aware Layer-Wise DNN Scheduler for Multi-Tenant Neural Processing Units. 427-431 - Fei Wu, Xinhao Zheng, Ying Sun, Yang Gao, Xiao-Yuan Jing:

Joint Domain Adaption and Pseudo-Labeling for Cross-Project Defect Prediction. 432-435 - Kazuki Sato, Satoshi Nakata, Takashi Matsubara, Kuniaki Uehara:

Few-Shot Anomaly Detection Using Deep Generative Models for Grouped Data. 436-440 - Jie Zhu, Yuan Zong, Hongli Chang

, Li Zhao, Chuangao Tang:
Joint Patch Weighting and Moment Matching for Unsupervised Domain Adaptation in Micro-Expression Recognition. 441-445 - Fairuz Safwan Mahad, Masakazu Iwamura

, Koichi Kise:
Learning Pyramidal Feature Hierarchy for 3D Reconstruction. 446-449
Volume 105-D, Number 3, March 2022
- Masashi Kiyomi:

Foreword. 450 - Tatsuya Inoha, Kunihiko Sadakane

, Yushi Uno, Yuma Yonebayashi:
Efficient Computation of Betweenness Centrality by Graph Decompositions and Their Applications to Real-World Networks. 451-458 - Tamami Okada, Ryuhei Uehara:

Research on Dissections of a Net of a Cube into Nets of Cubes. 459-465 - Taishu Ito, Yusuke Sano, Katsuhisa Yamanaka, Takashi Hirayama:

A Polynomial Delay Algorithm for Enumerating 2-Edge-Connected Induced Subgraphs. 466-473 - Hiroshi Fujiwara, Yuichi Shirai, Hiroaki Yamamoto:

The Huffman Tree Problem with Upper-Bounded Linear Functions. 474-480 - Tong Qin

, Osamu Watanabe:
An Improvement of the Biased-PPSZ Algorithm for the 3SAT Problem. 481-490 - Yoshiaki Takahashi, Akira Ito:

Finite Automata with Colored Accepting States and Their Unmixedness Problems. 491-502 - Yasuaki Kobayashi

, Shin-Ichi Nakano, Kei Uchizawa
, Takeaki Uno, Yutaro Yamaguchi, Katsuhisa Yamanaka:
An O(n2)-Time Algorithm for Computing a Max-Min 3-Dispersion on a Point Set in Convex Position. 503-507 - Chuzo Iwamoto, Tatsuya Ide:

Five Cells and Tilepaint are NP-Complete. 508-516 - Tianfeng Feng, Leonie Ryvkin, Jérôme Urhausen, Giovanni Viglietta:

Complexity of Critter Crunch. 517-531 - Kwon Kham Sai, Giovanni Viglietta, Ryuhei Uehara:

Cyclic Shift Problems on Graphs. 532-540 - Jion Hirose, Junya Nakamura

, Fukuhito Ooshita, Michiko Inoue:
Weakly Byzantine Gathering with a Strong Team. 541-555 - Masashi Komori:

Foreword. 556 - Yuta Suzumura, Jun-ichi Imai:

Effectiveness of "Neither-Good-Nor-Bad" Information on User's Trust in Agents in Presence of Numerous Options. 557-564 - Masatoshi Yamada, Masaki Ohata, Daisuke Kakoi:

A Study on Cognitive Transformation in the Process of Acquiring Movement Skills for Changing Running Direction. 565-577 - Takeshi Saga, Hiroki Tanaka

, Hidemi Iwasaka, Satoshi Nakamura:
Multimodal Prediction of Social Responsiveness Score with BERT-Based Text Features. 578-586 - Shengzhou Yi, Junichiro Matsugami, Toshihiko Yamasaki:

Assessment System of Presentation Slide Design Using Visual and Structural Features. 587-596 - Ryota Eguchi, Naoki Kitamura, Taisuke Izumi:

Fast Neighborhood Rendezvous. 597-610 - Hiroki Nishimoto, Renyuan Zhang, Yasuhiko Nakashima:

GPGPU Implementation of Variational Bayesian Gaussian Mixture Models. 611-622 - Tianfeng Feng, Ryuhei Uehara, Giovanni Viglietta:

Bicolored Path Embedding Problems Inspired by Protein Folding Models. 623-633 - Naoki Kitamura, Taisuke Izumi:

A Subquadratic-Time Distributed Algorithm for Exact Maximum Matching. 634-645 - Esrat Farjana Rupu, Natthawut Kertkeidkachorn

, Ryutaro Ichise:
Competent Triple Identification for Knowledge Graph Completion under the Open-World Assumption. 646-655 - Wenhao Fan, Dong Liu, Fan Wu, Bihua Tang, Yuan'an Liu:

Android Malware Detection Based on Functional Classification. 656-666 - Genki Osada, Budrul Ahsan, Revoti Prasad Bora, Takashi Nishide:

Latent Space Virtual Adversarial Training for Supervised and Semi-Supervised Learning. 667-678 - Ye Tian

, Mei Han
:
Adaptive Binarization for Vehicle State Images Based on Contrast Preserving Decolorization and Major Cluster Estimation. 679-688 - Yuki Monma, Kan Aro, Muneki Yasuda:

Hierarchical Gaussian Markov Random Field for Image Denoising. 689-699 - Yu Wang, Cong Cao, Jien Kato:

Discriminative Part CNN for Pedestrian Detection. 700-712 - Dichao Liu, Yu Wang, Kenji Mase, Jien Kato:

Recursive Multi-Scale Channel-Spatial Attention for Fine-Grained Image Classification. 713-726 - Eunsam Kim, Jinsung Kim, Hyoseop Shin:

Cooperative Recording to Increase Storage Efficiency in Networked Home Appliances. 727-731 - Masaki Takanashi, Shuichi Sato

, Kentaro Indo, Nozomu Nishihara, Hiroki Hayashi, Toru Suzuki:
Anomaly Prediction for Wind Turbines Using an Autoencoder with Vibration Data Supported by Power-Curve Filtering. 732-735
Volume 105-D, Number 4, April 2022
- Jing Zhu, Song Huang, Yaqing Shi, Kaishun Wu, Yanqiu Wang:

A Method of K-Means Clustering Based on TF-IDF for Software Requirements Documents Written in Chinese Language. 736-754 - Yuma Masubuchi, Masaki Hashimoto

, Akira Otsuka:
SIBYL: A Method for Detecting Similar Binary Functions Using Machine Learning. 755-765 - Jing Wang, Yiyu Luo, Weiming Yi, Xiang Xie:

Speaker-Independent Audio-Visual Speech Separation Based on Transformer in Multi-Talker Environments. 766-777 - Kazuhiko Murasaki, Shingo Ando, Jun Shimamura:

Semi-Supervised Representation Learning via Triplet Loss Based on Explicit Class Ratio of Unlabeled Data. 778-784 - Xiang Shen

, Dezhi Han, Chin-Chen Chang, Liang Zong:
Dual Self-Guided Attention with Sparse Question Networks for Visual Question Answering. 785-796 - Guoyi Miao, Yufeng Chen, Mingtong Liu, Jinan Xu, Yujie Zhang, Wenhe Feng

:
Exploring Hypotactic Structure for Chinese-English Machine Translation with a Structure-Aware Encoder-Decoder Neural Model. 797-806 - Ying Zhang, Fandong Meng, Jinchao Zhang, Yufeng Chen, Jinan Xu, Jie Zhou:

MKGN: A Multi-Dimensional Knowledge Enhanced Graph Network for Multi-Hop Question and Answering. 807-819 - Saifeng Hou, Yuxiang Hu, Le Tian, Zhiguang Dang:

NFD.P4: NDN In-Networking Cache Implementation Scheme with P4. 820-823 - Jinho Choi, Taehwa Lee, Kwanwoo Kim, Minjae Seo, Jian Cui, Seungwon Shin:

Discovering Message Templates on Large Scale Bitcoin Abuse Reports Using a Two-Fold NLP-Based Clustering Method. 824-827 - Yuzhuo Liu, Hangting Chen, Qingwei Zhao, Pengyuan Zhang:

Master-Teacher-Student: A Weakly Labelled Semi-Supervised Framework for Audio Tagging and Sound Event Detection. 828-831 - Yaying Shen, Qun Li

, Ding Xu, Ziyi Zhang
, Rui Yang:
Triple Loss Based Framework for Generalized Zero-Shot Learning. 832-835
Volume 105-D, Number 5, May 2022
- Hiroyuki Nakagawa:

Foreword. 836 - Shinpei Hayashi, Keisuke Asano, Motoshi Saeki:

Automating Bad Smell Detection in Goal Refinement of Goal Models. 837-848 - Yotaro Seki, Shinpei Hayashi, Motoshi Saeki:

Cataloging Bad Smells in Use Case Descriptions and Automating Their Detection. 849-863 - Shiyao Ding, Donghui Lin:

Deep Coalitional Q-Learning for Dynamic Coalition Formation in Edge Computing. 864-872 - Rizal Setya Perdana

, Yoshiteru Ishida:
Contextualized Language Generation on Visual-to-Language Storytelling. 873-886 - Shohei Yokoyama:

Foreword. 887 - Hideaki Ohashi, Toshiyuki Shimizu, Masatoshi Yoshikawa:

Does Student-Submission Allocation Affect Peer Assessment Accuracy? 888-897 - Tomohiro Yamazaki, Hisashi Koga:

Exact Algorithm to Solve Continuous Similarity Search for Evolving Queries and Its Variant. 898-908 - Yutaro Bessho, Yuto Hayamizu, Kazuo Goda, Masaru Kitsuregawa:

Dynamic Fault Tolerance for Multi-Node Query Processing. 909-919 - Da Li, Yuanyuan Wang

, Rikuya Yamamoto, Yukiko Kawai, Kazutoshi Sumiya:
A Low-Cost High-Performance Semantic and Physical Distance Calculation Method Based on ZIP Code. 920-927 - Tomoya Hashiguchi, Takehiro Yamamoto, Sumio Fujita, Hiroaki Ohshima

:
Toward Generating Robot-Robot Natural Counseling Dialogue. 928-935 - Shiyao Ding, Donghui Lin:

Multi-Agent Reinforcement Learning for Cooperative Task Offloading in Distributed Edge Cloud Computing. 936-945 - Kento Sugiura

, Yoshiharu Ishikawa
:
Implementation of a Multi-Word Compare-and-Swap Operation without Garbage Collection. 946-954 - Hiroshi Uehara, Yasuhiro Iuchi, Yusuke Fukazawa, Yoshihiro Kaneta:

Predicting A Growing Stage of Rice Plants Based on The Cropping Records over 25 Years - A Trial of Feature Engineering Incorporating Hidden Regional Characteristics -. 955-963 - Tongzhou Qu, Zibin Dai, Yanjiang Liu

, Lin Chen, Xianzhao Xia:
A Performance Model for Reconfigurable Block Cipher Array Utilizing Amdahl's Law. 964-972 - Takashi Ishio

, Naoto Maeda, Kensuke Shibuya, Kenho Iwamoto, Katsuro Inoue:
NCDSearch: Sliding Window-Based Code Clone Search Using Lempel-Ziv Jaccard Distance. 973-981 - Xudong Yang, Ling Gao, Yan Li, Jipeng Xu, Jie Zheng, Hai Wang, Quanli Gao:

A Semantic-Based Dual Location Privacy-Preserving Approach. 982-995 - Ruijun Ma

, Stefan Holst, Xiaoqing Wen, Aibin Yan, Hui Xu:
Evaluation and Test of Production Defects in Hardened Latches. 996-1009 - Ryota Yoshimura

, Ichiro Maruta, Kenji Fujimoto, Ken Sato, Yusuke Kobayashi:
Particle Filter Design Based on Reinforcement Learning and Its Application to Mobile Robot Localization. 1010-1023 - Fei Zhang, Peining Zhen, Dishan Jing, Xiaotang Tang, Hai-Bao Chen, Jie Yan:

SVM Based Intrusion Detection Method with Nonlinear Scaling and Feature Selection. 1024-1038 - Gwonsang Ryu

, Daeseon Choi:
Feature-Based Adversarial Training for Deep Learning Models Resistant to Transferable Adversarial Examples. 1039-1049 - Kana Miyamoto, Hiroki Tanaka, Satoshi Nakamura:

Online EEG-Based Emotion Prediction and Music Generation for Inducing Affective States. 1050-1063 - Tingting Hu, Ryuji Fuchikami

, Takeshi Ikenaga:
High Temporal Resolution-Based Temporal Iterative Tracking for High Framerate and Ultra-Low Delay Dynamic Tracking System. 1064-1074 - Rubin Zhao, Xiaolong Zheng, Zhihua Ying, Lingyan Fan:

Localization of Pointed-At Word in Printed Documents via a Single Neural Network. 1075-1084 - Weiguo Zhang, Jiaqi Lu, Jing Zhang, Xuewen Li, Qi Zhao:

Research on the Algorithm of License Plate Recognition Based on MPGAN Haze Weather. 1085-1093 - Wen Shao, Rei Kawakami, Takeshi Naemura

:
Anomaly Detection Using Spatio-Temporal Context Learned by Video Clip Sorting. 1094-1102 - Sejin Jung, Eui-Sub Kim, Junbeom Yoo:

Unfolding Hidden Structures in Cyber-Physical Systems for Thorough STPA Analysis. 1103-1106 - Yuxue Zhang, Guorui Feng:

Efficient Multi-Scale Feature Fusion for Image Manipulation Detection. 1107-1111 - Hao Fang

, Chi-Hua Chen
, Dewang Chen
, Feng-Jang Hwang
:
Neuron-Network-Based Mixture Probability Model for Passenger Walking Time Distribution Estimation. 1112-1115 - Byungjae Park:

Stochastic Path Optimization to Improve Navigation Safety in Urban Environment. 1116-1119 - Zhimin Guo, Jianfei Chen, Sheng Zhang:

Fully Connected Imaging Network for Near-Field Synthetic Aperture Interferometric Radiometer. 1120-1124 - Haoyu Xu, Yuenan Li:

A Deep Neural Network for Coarse-to-Fine Image Dehazing with Interleaved Residual Connections and Semi-Supervised Training. 1125-1129 - Jin S. Seo:

Pairwise Similarity Normalization Based on a Hubness Score for Improving Cover Song Retrieval Accuracy. 1130-1134
Volume 105-D, Number 6, June 2022
- Zheng Wang, Yi Di:

Cluster Expansion Method for Critical Node Problem Based on Contraction Mechanism in Sparse Graphs. 1135-1149 - Jiaheng Liu, Ryusuke Egawa, Hiroyuki Takizawa

:
A Conflict-Aware Capacity Control Mechanism for Deep Cache Hierarchy. 1150-1163 - Weina Zhou

, Ying Zhou, Xiaoyang Zeng:
An Attention Nested U-Structure Suitable for Salient Ship Detection in Complex Maritime Environment. 1164-1171 - Ding Li, Chunxiang Gu, Yuefei Zhu:

Gene Fingerprinting: Cracking Encrypted Tunnel with Zero-Shot Learning. 1172-1184 - Sathya Madhusudhanan, Suresh Jaganathan:

Data Augmented Incremental Learning (DAIL) for Unsupervised Data. 1185-1195 - Hitoshi Suda, Gaku Kotani, Daisuke Saito:

INmfCA Algorithm for Training of Nonparallel Voice Conversion Systems Based on Non-Negative Matrix Factorization. 1196-1210 - Masahiro Murayama, Toyohiro Higashiyama, Yuki Harazono, Hirotake Ishii, Hiroshi Shimoda, Shinobu Okido, Yasuyoshi Taruta:

Depth Image Noise Reduction and Super-Resolution by Pixel-Wise Multi-Frame Fusion. 1211-1224 - Xin Zeng, Lin Zhang, Zhongqiang Luo, Xingzhong Xiong, Chengjie Li:

Reinforced Tracker Based on Hierarchical Convolutional Features. 1225-1233 - Zhi Weng

, Longzhen Fan, Yong Zhang, Zhiqiang Zheng, Caili Gong, Zhongyue Wei:
Facial Recognition of Dairy Cattle Based on Improved Convolutional Neural Network. 1234-1238 - Xian Chen, Xi Deng, Chensen Huang, Hyoseop Shin:

Detection of Trust Shilling Attacks in Recommender Systems. 1239-1242 - Kazumoto Tanaka, Yunchuan Zhang:

Single-Image Camera Calibration for Furniture Layout Using Natural-Marker-Based Augmented Reality. 1243-1248
Volume 105-D, Number 7, July 2022
- Ken Mishima, Hayato Yamana

:
A Survey on Explainable Fake News Detection. 1249-1257 - Duc A. Hoang

, Akira Suzuki, Tsuyoshi Yagita:
Reconfiguring k-Path Vertex Covers. 1258-1272 - Dehua Liang

, Jun Shiomi, Noriyuki Miura, Masanori Hashimoto, Hiromitsu Awano:
A Hardware Efficient Reservoir Computing System Using Cellular Automata and Ensemble Bloom Filter. 1273-1282 - Anum Tariq, Shoab Ahmed Khan:

Industry 4.0 Based Business Process Re-Engineering Framework for Manufacturing Industry Setup Incorporating Evolutionary Multi-Objective Optimization. 1283-1295 - Jinho Choi, Jaehan Kim, Minkyoo Song, Hanna Kim, Nahyeon Park, Minjae Seo, Youngjin Jin, Seungwon Shin:

A Large-Scale Bitcoin Abuse Measurement and Clustering Analysis Utilizing Public Reports. 1296-1307 - Thi Thu Thao Khong, Takashi Nakada, Yasuhiko Nakashima:

A Hybrid Bayesian-Convolutional Neural Network for Adversarial Robustness. 1308-1319 - Qianqian Wu, Zhenzhou Ji:

A Two-Level Cache Aware Adaptive Data Replication Mechanism for Shared LLC. 1320-1324 - Takashi Yokota, Kanemitsu Ootsu, Shun Kojima:

On a Cup-Stacking Concept in Repetitive Collective Communication. 1325-1329 - Kyungmin Kim

, Jiung Song, Jong Wook Kwak
:
PRIGM: Partial-Regression-Integrated Generic Model for Synthetic Benchmarks Robust to Sensor Characteristics. 1330-1334 - Yang Yan, Qiuyan Wang, Lin Liu:

Latent Influence Based Self-Attention Framework for Heterogeneous Network Embedding. 1335-1339 - Weiwei Jiang:

Loan Default Prediction with Deep Learning and Muddling Label Regularization. 1340-1342 - Haeyoung Lee:

A Framework for Synchronous Remote Online Exams. 1343-1347 - Haeyoung Lee:

Synchronous Sharing of Lecture Slides and Photo Messaging during Real-Time Online Classes. 1348-1351 - Yue Xie, Ruiyu Liang, Xiaoyan Zhao, Zhenlin Liang, Jing Du:

Weighted Gradient Pretrain for Low-Resource Speech Emotion Recognition. 1352-1355 - Xiaozhou Cheng, Rui Li, Yanjing Sun, Yu Zhou, Kaiwen Dong:

Gray Augmentation Exploration with All-Modality Center-Triplet Loss for Visible-Infrared Person Re-Identification. 1356-1360
Volume 105-D, Number 8, August 2022
- Young-Sung Ihm, Seung-Hee Kim

:
Development of a Blockchain-Based Online Secret Electronic Voting System. 1361-1372 - Shin-ichi Nakayama, Shigeru Masuyama:

A Polynomial-Time Algorithm for Finding a Spanning Tree with Non-Terminal Set VNT on Circular-Arc Graphs. 1373-1382 - Masaaki Okada, Keiichi Kaneko

:
Minimal Paths in a Bicube. 1383-1392 - Weina Zhou

, Xinxin Huang, Xiaoyang Zeng:
Obstacle Detection for Unmanned Surface Vehicles by Fusion Refinement Network. 1393-1400 - Phong X. Nguyen, Hung Q. Cao, Khang V. T. Nguyen, Hung Nguyen

, Takehisa Yairi:
SeCAM: Tightly Accelerate the Image Explanation via Region-Based Segmentation. 1401-1417 - Kazuto Fukuchi, Chia-Mu Yu, Jun Sakuma:

Locally Differentially Private Minimum Finding. 1418-1430 - Jangmin Oh

:
Short-Term Stock Price Prediction by Supervised Learning of Rapid Volume Decrease Patterns. 1431-1442 - Yahui Tang, Tong Li, Rui Zhu, Cong Liu

, Shuaipeng Zhang:
A Hybrid Genetic Service Mining Method Based on Trace Clustering Population. 1443-1455 - Tetsutaro Yamada, Masato Gocho, Kei Akama, Ryoma Yataka

, Hiroshi Kameda:
Multiple Hypothesis Tracking with Merged Bounding Box Measurements Considering Occlusion. 1456-1463 - Cunlei Wang, Donghui Li:

Diabetes Noninvasive Recognition via Improved Capsule Network. 1464-1471 - Hongzhe Liu

, Ningwei Wang
, Xuewei Li, Cheng Xu
, Yaze Li:
BFF R-CNN: Balanced Feature Fusion for Object Detection. 1472-1480 - Ya Zeng, Li Wan, Qiuhong Luo, Mao Chen:

A Hierarchical Memory Model for Task-Oriented Dialogue System. 1481-1489 - Xianmei Fang, Xiaobo Gao, Yuting Wang, Zhouyu Liao, Yue Ma:

Improving Fault Localization Using Conditional Variational Autoencoder. 1490-1494 - Yi Liu, Wei Qin, Qibin Zheng, Gensong Li, Mengmeng Li:

An Interpretable Feature Selection Based on Particle Swarm Optimization. 1495-1500 - Zhaoqi Li, Ta Li, Qingwei Zhao, Pengyuan Zhang:

Label-Adversarial Jointly Trained Acoustic Word Embedding. 1501-1505
Volume 105-D, Number 9, September 2022
- Md. Ashraful Islam, Kenji Kise:

An Efficient Resource Shared RISC-V Multicore Architecture. 1506-1515 - Hiroaki Yamanaka, Yuuichi Teranishi, Eiji Kawai, Hidehisa Nagano, Hiroaki Harai:

Design and Implementation of an Edge Computing Testbed to Simplify Experimental Environment Setup. 1516-1528 - Katsuyuki Hagiwara:

Bridging between Soft and Hard Thresholding by Scaling. 1529-1536 - Rui Yang

, Raphael Shu, Hideki Nakayama:
Improving Noised Gradient Penalty with Synchronized Activation Function for Generative Adversarial Networks. 1537-1545 - Keisuke Inazawa, Akihiro Kashihara:

Designing and Evaluating Presentation Avatar for Promoting Self-Review. 1546-1556 - Yuichiro Tateiwa:

LiNeS Cloud: A Web-Based Hands-On System for Network Security Classes with Intuitive and Seamless Operability and Light-Weight Responsiveness. 1557-1567 - Yahui Wang, Wenxi Zhang, Zhou Wu, Xinxin Kong, Yongbiao Wang, Hongxin Zhang:

Highly-Accurate and Real-Time Speech Measurement for Laser Doppler Vibrometers. 1568-1580 - Kento Matsumoto, Sunao Hara, Masanobu Abe:

Speech-Like Emotional Sound Generation Using WaveNet. 1581-1589 - Takaharu Kato, Ikuko Shimizu

, Tomás Pajdla:
Improving Image Pair Selection for Large Scale Structure from Motion by Introducing Modified Simpson Coefficient. 1590-1599 - Suraj Prakash Pattar, Tsubasa Hirakawa, Takayoshi Yamashita, Tetsuya Sawanobori, Hironobu Fujiyoshi:

Single Suction Grasp Detection for Symmetric Objects Using Shallow Networks Trained with Synthetic Data. 1600-1609 - Kai Yan

, Tiejun Zhao, Muyun Yang
:
BCGL: Binary Classification-Based Graph Layout. 1610-1619 - Yoshiaki Takata, Ryoma Senda, Hiroyuki Seki:

Reduction of Register Pushdown Systems with Freshness Property to Pushdown Systems in LTL Model Checking. 1620-1623 - Masamoto Fukawa, Xiaoqi Deng, Shinya Imai, Taiga Horiguchi, Ryo Ono

, Ikumi Rachi, Sihan A, Kazuma Shinomura, Shunsuke Niwa, Takeshi Kudo, Hiroyuki Ito, Hitoshi Wakabayashi, Yoshihiro Miyake, Atsushi Hori:
A Novel Method for Lightning Prediction by Direct Electric Field Measurements at the Ground Using Recurrent Neural Network. 1624-1628 - Md. Rabiul Islam, Andrew W. Vargo, Motoi Iwata, Masakazu Iwamura

, Koichi Kise:
Exploring Sensor Modalities to Capture User Behaviors for Reading Detection. 1629-1633 - Bima Prihasto

, Tzu-Chiang Tai, Pao-Chi Chang, Jia-Ching Wang:
Fast Gated Recurrent Network for Speech Synthesis. 1634-1638 - Zheying Huang, Ji Xu, Qingwei Zhao, Pengyuan Zhang:

A Two-Fold Cross-Validation Training Framework Combined with Meta-Learning for Code-Switching Speech Recognition. 1639-1642 - Keke Zhao, Peng Song, Shaokai Li

, Wenjing Zhang, Wenming Zheng:
A novel Adaptive Weighted Transfer Subspace Learning Method for Cross-Database Speech Emotion Recognition. 1643-1646 - Chao Xu, Yunfeng Yan, Lehangyu Yang, Sheng Li, Guorui Feng:

Altered Fingerprints Detection Based on Deep Feature Fusion. 1647-1651 - Lianshan Sun, Jingxue Wei, Hanchao Du

, Yongbin Zhang, Lifeng He:
MSFF: A Multi-Scale Feature Fusion Network for Surface Defect Detection of Aluminum Profiles. 1652-1655 - Yahui Tang, Tong Li, Rui Zhu, Cong Liu, Shuaipeng Zhang:

Erratum: A Hybrid Genetic Service Mining Method Based on Trace Clustering Population [IEICE Transactions on Information and Systems Vol.E105.D (2022), No.8 pp.1443-1455]. 1656
Volume 105-D, Number 10, October 2022
- Shingo Yamaguchi:

Foreword. 1657 - Takuma Kinugawa, Toshimitsu Ushio:

Finite-Horizon Optimal Spatio-Temporal Pattern Control under Spatio-Temporal Logic Specifications. 1658-1664 - Takashi Tomita

, Shigeki Hagihara, Masaya Shimakawa, Naoki Yonezaki:
A Characterization on Necessary Conditions of Realizability for Reactive System Specifications. 1665-1677 - Ichiro Matsuda:

Foreword. 1678 - Kohei Tateishi, Chihiro Tsutake, Keita Takahashi, Toshiaki Fujii

:
Time-Multiplexed Coded Aperture and Coded Focal Stack -Comparative Study on Snapshot Compressive Light Field Imaging. 1679-1690 - Yoshitaka Kidani, Haruhisa Kato, Kei Kawamura, Hiroshi Watanabe

:
Geometric Partitioning Mode with Inter and Intra Prediction for Beyond Versatile Video Coding. 1691-1703 - Seung-tak Noh, Hiroki Harada, Xi Yang, Tsukasa Fukusato, Takeo Igarashi:

PPW Curves: a C2 Interpolating Spline with Hyperbolic Blending of Rational Bézier Curves. 1704-1711 - Wenhao Huang

, Akira Tsuge, Yin Chen, Tadashi Okoshi, Jin Nakazawa:
A Bus Crowdedness Sensing System Using Deep-Learning Based Object Detection. 1712-1720 - Kotaro Matsuura, Chihiro Tsutake, Keita Takahashi, Toshiaki Fujii

:
Unrolled Network for Light Field Display. 1721-1725 - Ana Guasque

, Patricia Balbastre
:
Evaluation and Comparison of Integer Programming Solvers for Hard Real-Time Scheduling. 1726-1733 - Kenya Tajima, Takahiko Henmi, Tsuyoshi Kato:

Frank-Wolfe for Sign-Constrained Support Vector Machines. 1734-1742 - Jinyan Lu, Quanzhen Huang, Shoubing Liu:

Multi-Stage Contour Primitive of Interest Extraction Network with Dense Direction Classification. 1743-1750 - Quan Xiu Ho, Takao Jinno, Yusuke Uchimi, Shigeru Kuriyama:

Estimation of Multiple Illuminant Colors Using Color Line Features. 1751-1758 - Yuichiro Nomura

, Takio Kurita
:
Sample Selection Approach with Number of False Predictions for Learning with Noisy Labels. 1759-1768 - Nenghuan Zhang, Yongbin Wang, Xiaoguang Wang, Peng Yu:

A Multi-Modal Fusion Network Guided by Feature Co-Occurrence for Urban Region Function Recognition. 1769-1779 - Manaya Tomioka, Tsuneo Kato, Akihiro Tamura:

Analysis on Norms of Word Embedding and Hidden Vectors in Neural Conversational Model Based on Encoder-Decoder RNN. 1780-1789 - Yang Li

, Rui Qi:
Heterogeneous Graph Contrastive Learning for Stance Prediction. 1790-1798 - Taekeun Park, Keewon Kim:

Strengthening Network-Based Moving Target Defense with Disposable Identifiers. 1799-1802 - Yang Wang, Hongliang Fu, Huawei Tao, Jing Yang, Hongyi Ge

, Yue Xie:
Convolutional Auto-Encoder and Adversarial Domain Adaptation for Cross-Corpus Speech Emotion Recognition. 1803-1806 - Joanna Kazzandra Dumagpi, Yong-Jin Jeong:

End-to-End Object Separation for Threat Detection in Large-Scale X-Ray Security Images. 1807-1811 - Kaito Satta, Hiroaki Sasaki:

Graph Embedding with Outlier-Robust Ratio Estimation. 1812-1816 - Jiyeon Lee, Kilho Lee:

Spy in Your Eye: Spycam Attack via Open-Sided Mobile VR Device. 1817-1820 - Zhi Liu, Jia Cao, Xiaohan Guan, Mengmeng Zhang:

New VVC Chroma Prediction Modes Based on Coloring with Inter-Channel Correlation. 1821-1824 - Zhi Liu, Fangyuan Zhao, Mengmeng Zhang:

An Efficient Multimodal Aggregation Network for Video-Text Retrieval. 1825-1828 - Koki Tsubota, Hiroaki Akutsu, Kiyoharu Aizawa:

Evaluating the Stability of Deep Image Quality Assessment with Respect to Image Scaling. 1829-1833
Volume 105-D, Number 11, November 2022
- Ilsun You:

Foreword. 1834-1835 - Yu Zhou, Shengli Liu, Shuai Han:

Generic Construction of 1-out-of-n Oblivious Signatures. 1836-1844 - Ryu Ishii, Kyosuke Yamashita

, Yusuke Sakai, Tadanori Teruya, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura
, Tsutomu Matsumoto:
Aggregate Signature Schemes with Traceability of Devices Dynamically Generating Invalid Signatures. 1845-1856 - Gyeongjin Ra, Su-Hyun Kim, Imyeong Lee:

Identity Access Management via ECC Stateless Derived Key Based Hierarchical Blockchain for the Industrial Internet of Things. 1857-1871 - Nam-Su Jho, Daesung Moon, Taek-Young Youn:

Fully Dynamic Data Management in Cloud Storage Systems with Secure Proof of Retrievability. 1872-1879 - Hyun Kwon

, Changhyun Cho, Jun Lee:
Priority Evasion Attack: An Adversarial Example That Considers the Priority of Attack on Each Classifier. 1880-1889 - Shuhei Enomoto, Hiroki Kuzuno, Hiroshi Yamada:

Efficient Protection Mechanism for CPU Cache Flush Instruction Based Attacks. 1890-1899 - Seonghan Shin:

A Strengthened PAKE Protocol with Identity-Based Encryption. 1900-1910 - Hyun Kwon

, Yongchul Kim:
Toward Selective Membership Inference Attack against Deep Learning Model. 1911-1915 - Hyun Kwon

, Sunghwan Cho:
Multi-Targeted Poisoning Attack in Deep Neural Networks. 1916-1920 - Hyunghoon Kim, Jiwoo Shin, Hyo Jin Jo:

Adversarial Example Detection Based on Improved GhostBusters. 1921-1922 - Jaewoong Heo, Hyunghoon Kim, Hyo Jin Jo:

SOME/IP Intrusion Detection System Using Machine Learning. 1923-1924 - Haehyun Cho

:
Data Covert Channels between the Secure World and the Normal World in the ARM TrustZone Architecture. 1925-1927 - Geochang Jeon, Jeong Hyun Yi, Haehyun Cho

:
Hiding Data in the Padding Area of Android Applications without Re-Packaging. 1928-1929 - Seungkwang Lee, Nam-Su Jho:

A Multi-Tree Approach to Mutable Order-Preserving Encoding. 1930-1933 - Taek-Young Youn, Bo Sun Kwak, Seungkwang Lee, Hyun Sook Rhee:

Practical Order-Revealing Encryption with Short Ciphertext. 1934-1937 - Hitoshi Nishimura, Satoshi Komorita, Yasutomo Kawanishi, Hiroshi Murase:

SDOF-Tracker: Fast and Accurate Multiple Human Tracking by Skipped-Detection and Optical-Flow. 1938-1946 - Sixia Li, Shogo Okada

, Jianwu Dang:
Intrinsic Representation Mining for Zero-Shot Slot Filling. 1947-1956 - Yang Zhang, Qiang Ma

:
MP-BERT4REC: Recommending Multiple Positive Citations for Academic Manuscripts via Content-Dependent BERT and Multi-Positive Triplet. 1957-1968 - Haruka Nakamura, Yoshimasa Tawatsuji, Tatsunori Matsui, Makoto Nakamura, Koichi Kimura, Hisanori Fujisawa:

Formulation of Mindfulness States as a Network Optimization Problem and an Attempt to Identify Key Brain Pathways Using Digital Annealer. 1969-1983 - Jun Young An, Young-Kyoon Suh, Byungchul Tak:

Workload-Driven Analysis on the Performance Characteristics of GPU-Accelerated DBMSes. 1984-1989 - Weiwei Qi, Shubin Zheng, Liming Li, Zhenglong Yang:

Loosening Bolts Detection of Bogie Box in Metro Vehicles Based on Deep Learning. 1990-1993 - Rui Sun, Zi Yang, Lei Zhang, Yiheng Yu:

Orthogonal Deep Feature Decomposition Network for Cross-Resolution Person Re-Identification. 1994-1997
Volume 105-D, Number 12, December 2022
- Toshihiro Yamauchi:

Foreword. 1998 - Takuto Kanamori, Takashi Odan, Kazuki Hirohata, Kenji Kise:

RVCar: An FPGA-Based Simple and Open-Source Mini Motor Car System with a RISC-V Soft Processor. 1999-2007 - Tomoki Shimizu, Kohei Ito, Kensuke Iizuka, Kazuei Hironaka, Hideharu Amano:

The Implementation of a Hybrid Router and Dynamic Switching Algorithm on a Multi-FPGA System. 2008-2018 - Satoru Jimbo, Daiki Okonogi, Kota Ando, Thiem Van Chu, Jaehoon Yu, Masato Motomura, Kazushi Kawamura:

A Hybrid Integer Encoding Method for Obtaining High-Quality Solutions of Quadratic Knapsack Problems on Solid-State Annealers. 2019-2031 - Kazuhito Matsuda, Kouji Kurihara, Kentaro Kawakami, Masafumi Yamazaki, Fuyuka Yamada, Tsuguchika Tabaru, Ken Yokoyama:

Accelerating LiNGAM Causal Discovery with Massive Parallel Execution on Supercomputer Fugaku. 2032-2039 - Yoshiharu Yamagishi, Tatsuya Kaneko

, Megumi Akai-Kasaya, Tetsuya Asai
:
Holmes: A Hardware-Oriented Optimizer Using Logarithms. 2040-2047 - Takeshi Senoo, Akira Jinguji, Ryosuke Kuramochi, Hiroki Nakahara:

Multilayer Perceptron Training Accelerator Using Systolic Array. 2048-2056 - Naoya Niwa

, Hideharu Amano, Michihiro Koibuchi:
Boosting the Performance of Interconnection Networks by Selective Data Compression. 2057-2065 - Yaoyu Zhang, Jiarui Zhang, Han Zhang:

The Automatic Generation of Smart Contract Based on Configuration in the Field of Government Services. 2066-2074 - Naoki Aoyama, Hiroshi Yamada:

Comparison of Value- and Reference-Based Memory Page Compaction in Virtualized Systems. 2075-2084 - Katsutoshi Hirayama, Tenda Okimoto:

Bounded Approximate Payoff Division for MC-nets Games. 2085-2091 - Iuon-Chang Lin, Chin-Chen Chang, Hsiao-Chi Chiang:

A Novel e-Cash Payment System with Divisibility Based on Proxy Blind Signature in Web of Things. 2092-2103 - Yuli Zha, Pengshuai Cui, Yuxiang Hu, Julong Lan, Yu Wang:

A Scalable Bitwise Multicast Technology in Named Data Networking. 2104-2111 - Han Ma, Qiaoling Zhang, Roubing Tang, Lu Zhang, Yubo Jia:

Robust Speech Recognition Using Teacher-Student Learning Domain Adaptation. 2112-2118 - Kazuki Omi, Jun Kimata, Toru Tamaki:

Model-Agnostic Multi-Domain Learning with Domain-Specific Adapters for Action Recognition. 2119-2126 - Teng Liang, Ao Zhan, Chengyu Wu

, Zhengqiang Wang:
PDAA3C: An A3C-Based Multi-Path Data Scheduling Algorithm. 2127-2130 - Haney Kang, Seungwon Shin:

Verikube: Automatic and Efficient Verification for Container Network Policies. 2131-2134 - Kai Yan

, Tiejun Zhao, Muyun Yang
:
GRAPHULY: GRAPH U-Nets-Based Multi-Level Graph LaYout. 2135-2138

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














