Journal: IEICE Transactions

Volume 101-D, Issue 11

2559 -- 2560Atsushi Kanai. Foreword
2561 -- 2575Junko Takahashi. An Overview of Cyber Security for Connected Vehicles
2576 -- 2583Hiroki Nakano, Fumihiro Kanei, Yuta Takata, Mitsuaki Akiyama, Katsunari Yoshioka. Towards Finding Code Snippets on a Question and Answer Website Causing Mobile App Vulnerabilities
2584 -- 2599Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Hironori Washizaki, Tatsuya Mori. Understanding the Inconsistency between Behaviors and Descriptions of Mobile Apps
2600 -- 2611Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Kazuhiko Ohkubo, Shigeki Goto. Identifying Evasive Code in Malicious Websites by Analyzing Redirection Differences
2612 -- 2621Yong Jin, Masahiko Tomoishi, Satoshi Matsuura, Yoshiaki Kitaguchi. A Secure In-Depth File System Concealed by GPS-Based Mounting Authentication for Mobile Devices
2622 -- 2632Bo Sun, Akinori Fujino, Tatsuya Mori, Tao Ban, Takeshi Takahashi 0001, Daisuke Inoue. Automatically Generating Malware Analysis Reports Using Sandbox Logs
2633 -- 2643Hiroya Ikarashi, Yong Jin, Nariyoshi Yamai, Naoya Kitagawa, Kiyohiko Okayama. Design and Implementation of SDN-Based Proactive Firewall System in Collaboration with Domain Name Resolution
2644 -- 2657Hiroki Kuzuno, Giannis Tziakouris. Ad-hoc Analytical Framework of Bitcoin Investigations for Law Enforcement
2658 -- 2664Daiki Ito, Kenta Nomura, Masaki Kamizono, Yoshiaki Shiraishi, Yasuhiro Takano, Masami Mohri, Masakatu Morii. Modeling Attack Activity for Integrated Analysis of Threat Information
2665 -- 2676Seira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro Hanaoka. Model Inversion Attacks for Online Prediction Systems: Without Knowledge of Non-Sensitive Attributes
2677 -- 2687Yusuke Sakai 0001, Takahiro Matsuda 0002, Goichiro Hanaoka. Tag-KEM/DEM Framework for Public-Key Encryption with Non-Interactive Opening
2688 -- 2697Haruka Ito, Masanori Hirotomo, Youji Fukuta, Masami Mohri, Yoshiaki Shiraishi. Zero-Knowledge Identification Scheme Using LDPC Codes
2698 -- 2705Jinli Rao, Tianyong Ao, Shu Xu, Kui Dai, Xuecheng Zou. Design Exploration of SHA-3 ASIP for IoT on a 32-bit RISC-V Processor
2706 -- 2709Taekeun Park, Koohong Kang, Daesung Moon. A Scalable and Seamless Connection Migration Scheme for Moving Target Defense in Legacy Networks
2710 -- 2719Davud Mohammadpur, Ali Mahjur. Efficient Reusable Collections
2720 -- 2729Yuki Ueda, Akinori Ihara, Takashi Ishio, Toshiki Hirao, Kenichi Matsumoto. How are IF-Conditional Statements Fixed Through Peer CodeReview?
2730 -- 2743Chaman Wijesiriwardana, Prasad Wimalaratne. Fostering Real-Time Software Analysis by Leveraging Heterogeneous and Autonomous Software Repositories
2744 -- 2753Yasutaka Kamei, Takahiro Matsumoto, Kazuhiro Yamashita, Naoyasu Ubayashi, Takashi Iwasaki, Shuichi Takayama. Studying the Cost and Effectiveness of OSS Quality Assessment Models: An Experience Report of Fujitsu QNET
2754 -- 2761Ignacio Algredo-Badillo, Francisco Rubén Castillo Soria, Kelsey A. Ramírez-Gutiérrez, Luis A. Morales Rosales, Alejandro Medina-Santiago, Claudia Feregrino Uribe. Lightweight Security Hardware Architecture Using DWT and AES Algorithms
2762 -- 2772Wenjie Kang, Peidong Zhu, Jiexin Zhang, Junyang Zhang. Critical Nodes Identification of Power Grids Based on Network Efficiency
2773 -- 2783Kazuo Aoyama, Kazumi Saito, Tetsuo Ikeda. Accelerating a Lloyd-Type k-Means Clustering Algorithm with Summable Lower Bounds in a Lower-Dimensional Space
2784 -- 2794Yukihiro Tagami. Speeding up Extreme Multi-Label Classifier by Approximate Nearest Neighbor Search
2795 -- 2807Ghulam Hussain, Kamran Javed, Jundong Cho, Juneho Yi. Food Intake Detection and Classification Using a Necklace-Type Piezoelectric Wearable Sensor System
2808 -- 2817Reo Aoki, Kousuke Imamura, Akihiro Hirano, Yoshio Matsuda. High-Performance Super-Resolution via Patch-Based Deep Neural Network for Real-Time Implementation
2818 -- 2822Yingxun Fu, Shilin Wen, Li Ma, Jianyong Duan. Strip-Switched Deployment Method to Optimize Single Failure Recovery for Erasure Coded Storage Systems
2823 -- 2826Young Beom Kim. On the Optimal Configuration of Grouping-Based Framed Slotted ALOHA
2827 -- 2830Yunfeng Lu, Huaxi Gu, Xiaoshan Yu, Kun Wang 0001. NEST: Towards Extreme Scale Computing Systems
2831 -- 2835Qiuli Chen, Ming He, Fei Dai, Chaozheng Zhu. Energy-Efficient Connectivity Re-Establishment in UASNs with Dumb Nodes
2836 -- 2839Yong-Uk Yoon, Yong-Jo Ahn, Donggyu Sim, Jae-Gon Kim. Efficient Methods of Inactive Regions Padding for Segmented Sphere Projection (SSP) of 360 Video
2840 -- 2843Seok Bong Yoo, Mikyong Han. Efficient Texture Creation Based on Random Patches in Database and Guided Filter
2844 -- 2848Taku Nakahara, Kazunori Uruma, Tomohiro Takahashi, Toshihiro Furukawa. Deep Convolutional Neural Networks for Manga Show-Through Cancellation
2849 -- 2854Peng Gao, Yipeng Ma, Chao Li, Ke Song, Yan Zhang, Fei Wang, Liyi Xiao. Adaptive Object Tracking with Complementary Models
2855 -- 2858Jiatian Pi, Shaohua Zeng, Qing Zuo, Yan Wei. Accurate Scale Adaptive and Real-Time Visual Tracking with Correlation Filters
2859 -- 2862Zhaolin Yao, Xinyao Ma, Yijun Wang, Xu Zhang, Ming Liu 0015, Weihua Pei, Hongda Chen 0002. High-Speed Spelling in Virtual Reality with Sequential Hybrid BCIs