Journal: IEICE Transactions

Volume 100-D, Issue 10

2265 -- 2266Guojun Wang. Foreword
2267 -- 2274Liang-Chun Chen, Chien-Lung Hsu, Nai-Wei Lo, Kuo-Hui Yeh, Ping-Hsien Lin. Fraud Analysis and Detection for Real-Time Messaging Communications on Social Networks
2275 -- 2286Wei-na Niu, Xiaosong Zhang, Guowu Yang, Ruidong Chen, Dong Wang. Modeling Attack Process of Advanced Persistent Threat Using Network Evolution
2287 -- 2294Na Ruan, Mingli Wu, Shiheng Ma, Haojin Zhu, Weijia Jia, Songyang Wu. Detect and Prevent SIP Flooding Attacks in VoLTE by Utilizing a Two-Tier PFilter Design
2295 -- 2306Toshihiro Yamauchi, Yuta Ikegami, Yuya Ban. Mitigating Use-After-Free Attacks Using Memory-Reuse-Prohibited Library
2307 -- 2318Dongyang Zhan, Lin Ye, Binxing Fang, Xiaojiang Du, Zhikai Xu. Protecting Critical Files Using Target-Based Virtual Machine Introspection Approach
2319 -- 2326Yuji Unagami, Natsume Matsuzaki, Shota Yamada 0001, Nuttapong Attrapadung, Takahiro Matsuda 0002, Goichiro Hanaoka. Private Similarity Searchable Encryption for Euclidean Distance
2327 -- 2338Takeshi Kumaki, Takeshi Fujino. Hierarchical-Masked Image Filtering for Privacy-Protection
2339 -- 2347Yoshinori Aono, Takuya Hayashi 0001, Le Trieu Phong, Lihua Wang. Input and Output Privacy-Preserving Linear Regression
2348 -- 2356Ki-Woong Park, Sung Hoon Baek. OPERA: A Complete Offline and Anonymous Digital Cash Transaction System with a One-Time Readable Memory
2357 -- 2367Tomoyoshi Ono, Kazuki Yoneyama. On Randomness Exposure Resilience of Group Signatures
2368 -- 2372Fei Xu, Pinxin Liu, Jing Xu, Jianfeng Yang, S. M. Yiu. Multi-Dimensional Bloom Filter: Design and Evaluation
2373 -- 2376Sang-Hoon Choi, Joobeom Yun, Ki-Woong Park. Doc-Trace: Tracing Secret Documents in Cloud Computing via Steganographic Marking
2377 -- 2381Toshihiro Yamauchi, Yohei Akao. Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features
2382 -- 0Shiro Uesugi. Foreword
2383 -- 2390Toshihiko Wakahara, Toshitaka Maki, Noriyasu Yamamoto, Akihisa Kodate, Manabu Okamoto, Hiroyuki Nishi. Trend and Factor Analysis of Office Related Research in LOIS Technical Committee
2391 -- 2398Yasushi Yamazaki, Tetsushi Ohki. Toward More Secure and Convenient User Authentication in Smart Device Era
2399 -- 2410Toru Kobayashi, Kenichi Arai, Hiroyuki Sato, Shigeaki Tanimoto, Atsushi Kanai. An Application Framework for Smart Education System Based on Mobile and Cloud Systems
2411 -- 2419Keisuke Tsunoda, Akihiro Chiba, Kazuhiro Yoshida, Tomoki Watanabe, Osamu Mizuno. Predicting Changes in Cognitive Performance Using Heart Rate Variability
2420 -- 2431Kenta Nomura, Masami Mohri, Yoshiaki Shiraishi, Masakatu Morii. Attribute Revocable Multi-Authority Attribute-Based Encryption with Forward Secrecy for Cloud Storage
2432 -- 2439Yoshiaki Shiraishi, Kenta Nomura, Masami Mohri, Takeru Naruse, Masakatu Morii. Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data
2440 -- 2448Yoshiaki Shiraishi, Masanori Hirotomo, Masami Mohri, Taisuke Yamamoto. Delivering CRL with Low Bit Rate Network Coded Communication for ITS
2449 -- 2457Yoshiaki Shiraishi, Masaki Kamizono, Masanori Hirotomo, Masami Mohri. Multi-Environment Analysis System for Evaluating the Impact of Malicious Web Sites Changing Their Behavior
2458 -- 2461Takashi Hatashima, Yasuhisa Sakamoto. Study on Effect of Company Rules and Regulations in Telework Involving Personal Devices
2462 -- 2464Arinobu Niijima, Takahiro Kusabuka, Soichiro Uchida, Tomoki Watanabe, Tomohiro Yamada. Smart Bottle Cap
2465 -- 2469Jae-Yoon Jung, Gyunyoung Heo, Kyuhyup Oh. Urban Zone Discovery from Smart Card-Based Transit Logs
2470 -- 2477Qiong Wang, Mohamed El-Hadedy, Kevin Skadron, Ke Wang. Accelerating Weeder: A DNA Motif Search Tool Using the Micron Automata Processor and FPGA
2478 -- 2492Naohisa Fukase, Yasuyuki Miura, Shigeyoshi Watanabe, M. M. Hafizur Rahman. The Performance Evaluation of a 3D Torus Network Using Partial Link-Sharing Method in NoC Router Buffer
2493 -- 2504Takashi Nakada, Tomoki Hatanaka, Hiroshi Ueki, Masanori Hayashikoshi, Toru Shimizu, Hiroshi Nakamura. An Energy-Efficient Task Scheduling for Near-Realtime Systems with Execution Time Variation
2505 -- 2514Shan Ding, Gang Zeng, Ryo Kurachi, Ruifeng Huang. A Genetic Algorithm for Packing CAN FD Frame with Real-Time Constraints
2515 -- 2525Jiang Zhu, Bai Wang, Bin Wu, Weiyu Zhang. Emotional Community Detection in Social Network
2526 -- 2536Yuki Yamagishi, Kazuo Aoyama, Kazumi Saito, Tetsuo Ikeda. Efficient Similarity Search with a Pivot-Based Complete Binary Tree
2537 -- 2546Youngin Kim, Cheong Hee Park. An Efficient Concept Drift Detection Method for Streaming Data under Limited Labeling
2547 -- 2555Taiki Ogata, Naoki Higo, Takayuki Nozawa, Eisuke Ono, Kazuo Yano, Koji Ara, Yoshihiro Miyake. Interpersonal Coevolution of Body Movements in Daily Face-to-Face Communication
2556 -- 2566Corentin Jouault, Kazuhisa Seta, Yuki Hayashi. SOLS: An LOD Based Semantically Enhanced Open Learning Space Supporting Self-Directed Learning of History
2567 -- 2577Ryosuke Onda, Yuki Hirai, Kay Penny, Bipin Indurkhya, Keiichi Kaneko. A Support System for Solving Problems of Two-Triangle Congruence Using 'Backward Chaining'
2578 -- 2586Zhixian Ma, Jie Zhu, Weitian Li, Haiguang Xu. An Approach to Detect Cavities in X-Ray Astronomical Images Using Granular Convolutional Neural Networks
2587 -- 2596Younggi Kim, Younghee Lee. Next-Activity Set Prediction Based on Sequence Partitioning to Reduce Activity Pattern Complexity in the Multi-User Smart Space
2597 -- 2604Lu Sun, Mineichi Kudo, Keigo Kimura. READER: Robust Semi-Supervised Multi-Label Dimension Reduction
2605 -- 2613Yuichi Yoshida, Tsuyoshi Toyofuku. Image Retrieval Framework Based on Dual Representation Descriptor
2614 -- 2626Takahiro Ogawa, Akira Tanaka, Miki Haseyama. Wiener-Based Inpainting Quality Prediction
2627 -- 2634Yuki Kawana, Norimichi Ukita. Occluded Appearance Modeling with Sample Weighting for Human Pose Estimation
2635 -- 2643Kento Ohtani, Kenta Niwa, Kazuya Takeda. A Single-Dimensional Interface for Arranging Multiple Audio Sources in Three-Dimensional Space
2644 -- 2647Sanghyun Yoon, Dong-Ah Lee, Eunji Pak, Taeho Kim, Junbeom Yoo. Timed Model-Based Formal Analysis of a Scheduler of Qplus-AIR, an ARINC-653 Compliance RTOS
2648 -- 2652Van-Quyet Nguyen, Kyungbaek Kim. Efficient Regular Path Query Evaluation by Splitting with Unit-Subquery Cost Matrix
2653 -- 2658Lixing Xue, Decheng Zuo, Zhan Zhang, Na Wu. A Novel Component Ranking Method for Improving Software Reliability
2659 -- 2663Sang-Chul Lee, Christos Faloutsos, Dong-Kyu Chae, Sang-Wook Kim. Fraud Detection in Comparison-Shopping Services: Patterns and Anomalies in User Click Behaviors
2664 -- 2668Kangru Wang, Lei Qu, Lili Chen, Jiamao Li, Yuzhang Gu, Dongchen Zhu, Xiaolin Zhang. Ground Plane Detection with a New Local Disparity Texture Descriptor
2669 -- 2672Masaki Murata, Yuki Abe. Using Machine Learning for Automatic Estimation of Emphases in Japanese Documents