2559 | -- | 2560 | Atsushi Kanai. Foreword |
2561 | -- | 2575 | Junko Takahashi. An Overview of Cyber Security for Connected Vehicles |
2576 | -- | 2583 | Hiroki Nakano, Fumihiro Kanei, Yuta Takata, Mitsuaki Akiyama, Katsunari Yoshioka. Towards Finding Code Snippets on a Question and Answer Website Causing Mobile App Vulnerabilities |
2584 | -- | 2599 | Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Hironori Washizaki, Tatsuya Mori. Understanding the Inconsistency between Behaviors and Descriptions of Mobile Apps |
2600 | -- | 2611 | Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Kazuhiko Ohkubo, Shigeki Goto. Identifying Evasive Code in Malicious Websites by Analyzing Redirection Differences |
2612 | -- | 2621 | Yong Jin, Masahiko Tomoishi, Satoshi Matsuura, Yoshiaki Kitaguchi. A Secure In-Depth File System Concealed by GPS-Based Mounting Authentication for Mobile Devices |
2622 | -- | 2632 | Bo Sun, Akinori Fujino, Tatsuya Mori, Tao Ban, Takeshi Takahashi 0001, Daisuke Inoue. Automatically Generating Malware Analysis Reports Using Sandbox Logs |
2633 | -- | 2643 | Hiroya Ikarashi, Yong Jin, Nariyoshi Yamai, Naoya Kitagawa, Kiyohiko Okayama. Design and Implementation of SDN-Based Proactive Firewall System in Collaboration with Domain Name Resolution |
2644 | -- | 2657 | Hiroki Kuzuno, Giannis Tziakouris. Ad-hoc Analytical Framework of Bitcoin Investigations for Law Enforcement |
2658 | -- | 2664 | Daiki Ito, Kenta Nomura, Masaki Kamizono, Yoshiaki Shiraishi, Yasuhiro Takano, Masami Mohri, Masakatu Morii. Modeling Attack Activity for Integrated Analysis of Threat Information |
2665 | -- | 2676 | Seira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro Hanaoka. Model Inversion Attacks for Online Prediction Systems: Without Knowledge of Non-Sensitive Attributes |
2677 | -- | 2687 | Yusuke Sakai 0001, Takahiro Matsuda 0002, Goichiro Hanaoka. Tag-KEM/DEM Framework for Public-Key Encryption with Non-Interactive Opening |
2688 | -- | 2697 | Haruka Ito, Masanori Hirotomo, Youji Fukuta, Masami Mohri, Yoshiaki Shiraishi. Zero-Knowledge Identification Scheme Using LDPC Codes |
2698 | -- | 2705 | Jinli Rao, Tianyong Ao, Shu Xu, Kui Dai, Xuecheng Zou. Design Exploration of SHA-3 ASIP for IoT on a 32-bit RISC-V Processor |
2706 | -- | 2709 | Taekeun Park, Koohong Kang, Daesung Moon. A Scalable and Seamless Connection Migration Scheme for Moving Target Defense in Legacy Networks |
2710 | -- | 2719 | Davud Mohammadpur, Ali Mahjur. Efficient Reusable Collections |
2720 | -- | 2729 | Yuki Ueda, Akinori Ihara, Takashi Ishio, Toshiki Hirao, Kenichi Matsumoto. How are IF-Conditional Statements Fixed Through Peer CodeReview? |
2730 | -- | 2743 | Chaman Wijesiriwardana, Prasad Wimalaratne. Fostering Real-Time Software Analysis by Leveraging Heterogeneous and Autonomous Software Repositories |
2744 | -- | 2753 | Yasutaka Kamei, Takahiro Matsumoto, Kazuhiro Yamashita, Naoyasu Ubayashi, Takashi Iwasaki, Shuichi Takayama. Studying the Cost and Effectiveness of OSS Quality Assessment Models: An Experience Report of Fujitsu QNET |
2754 | -- | 2761 | Ignacio Algredo-Badillo, Francisco Rubén Castillo Soria, Kelsey A. Ramírez-Gutiérrez, Luis A. Morales Rosales, Alejandro Medina-Santiago, Claudia Feregrino Uribe. Lightweight Security Hardware Architecture Using DWT and AES Algorithms |
2762 | -- | 2772 | Wenjie Kang, Peidong Zhu, Jiexin Zhang, Junyang Zhang. Critical Nodes Identification of Power Grids Based on Network Efficiency |
2773 | -- | 2783 | Kazuo Aoyama, Kazumi Saito, Tetsuo Ikeda. Accelerating a Lloyd-Type k-Means Clustering Algorithm with Summable Lower Bounds in a Lower-Dimensional Space |
2784 | -- | 2794 | Yukihiro Tagami. Speeding up Extreme Multi-Label Classifier by Approximate Nearest Neighbor Search |
2795 | -- | 2807 | Ghulam Hussain, Kamran Javed, Jundong Cho, Juneho Yi. Food Intake Detection and Classification Using a Necklace-Type Piezoelectric Wearable Sensor System |
2808 | -- | 2817 | Reo Aoki, Kousuke Imamura, Akihiro Hirano, Yoshio Matsuda. High-Performance Super-Resolution via Patch-Based Deep Neural Network for Real-Time Implementation |
2818 | -- | 2822 | Yingxun Fu, Shilin Wen, Li Ma, Jianyong Duan. Strip-Switched Deployment Method to Optimize Single Failure Recovery for Erasure Coded Storage Systems |
2823 | -- | 2826 | Young Beom Kim. On the Optimal Configuration of Grouping-Based Framed Slotted ALOHA |
2827 | -- | 2830 | Yunfeng Lu, Huaxi Gu, Xiaoshan Yu, Kun Wang 0001. NEST: Towards Extreme Scale Computing Systems |
2831 | -- | 2835 | Qiuli Chen, Ming He, Fei Dai, Chaozheng Zhu. Energy-Efficient Connectivity Re-Establishment in UASNs with Dumb Nodes |
2836 | -- | 2839 | Yong-Uk Yoon, Yong-Jo Ahn, Donggyu Sim, Jae-Gon Kim. Efficient Methods of Inactive Regions Padding for Segmented Sphere Projection (SSP) of 360 Video |
2840 | -- | 2843 | Seok Bong Yoo, Mikyong Han. Efficient Texture Creation Based on Random Patches in Database and Guided Filter |
2844 | -- | 2848 | Taku Nakahara, Kazunori Uruma, Tomohiro Takahashi, Toshihiro Furukawa. Deep Convolutional Neural Networks for Manga Show-Through Cancellation |
2849 | -- | 2854 | Peng Gao, Yipeng Ma, Chao Li, Ke Song, Yan Zhang, Fei Wang, Liyi Xiao. Adaptive Object Tracking with Complementary Models |
2855 | -- | 2858 | Jiatian Pi, Shaohua Zeng, Qing Zuo, Yan Wei. Accurate Scale Adaptive and Real-Time Visual Tracking with Correlation Filters |
2859 | -- | 2862 | Zhaolin Yao, Xinyao Ma, Yijun Wang, Xu Zhang, Ming Liu 0015, Weihua Pei, Hongda Chen 0002. High-Speed Spelling in Virtual Reality with Sequential Hybrid BCIs |