Journal: IEICE Transactions

Volume 103-D, Issue 2

186 -- 187Guojun Wang 0001. Foreword
188 -- 195Yudi Zhang 0001, Debiao He, Xinyi Huang, Ding Wang 0002, Kim-Kwang Raymond Choo, Jing Wang. White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography
196 -- 203Wenjuan Li 0001, Weizhi Meng, Zhiqiang Liu, Man Ho Au. Towards Blockchain-Based Software-Defined Networking: Security Challenges and Solutions
204 -- 211Vasileios Kouliaridis, Konstantia Barmpatsalou, Georgios Kambourakis, Shuhong Chen. A Survey on Mobile Malware Detection Techniques
212 -- 221Yuya Senzaki, Satsuya Ohata, Kanta Matsuura. Simple Black-Box Adversarial Examples Generation with Very Few Queries
222 -- 229Huiyao Zheng, Jian Shen 0001, Youngju Cho, Chunhua Su, Sangman Moh. A Novel Structure-Based Data Sharing Scheme in Cloud Computing
230 -- 238Qiuhua Wang, Mingyang Kang, Guohua Wu, Yizhi Ren, Chunhua Su. A Practical Secret Key Generation Scheme Based on Wireless Channel Characteristics for 5G Networks
239 -- 255Takuya Watanabe 0001, Eitaro Shioji, Mitsuaki Akiyama, Keito Sasaoka, Takeshi Yagi, Tatsuya Mori. Follow Your Silhouette: Identifying the Social Account of Website Visitors through User-Blocking Side Channel
256 -- 264Na Ruan, Chunhua Su, Chi Xie. Securing Cooperative Adaptive Cruise Control in Vehicular Platoons via Cooperative Message Authentication
265 -- 275Mitsuhiro Hatada, Tatsuya Mori. CLAP: Classification of Android PUAs by Similarity of DNS Queries
276 -- 291Takuya Watanabe 0001, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, Yuta Takata, Bo Sun, Yuta Ishii, Toshiki Shibahara, Takeshi Yagi, Tatsuya Mori. Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library
292 -- 298Hiroshi Nomaguchi, Chunhua Su, Atsuko Miyaji. New Pseudo-Random Number Generator for EPC Gen2
299 -- 308Tomoaki Mimoto, Seira Hidano, Shinsaku Kiyomoto, Atsuko Miyaji. Anonymization Technique Based on SGD Matrix Factorization
309 -- 320Jae Young Hur. Virtual Address Remapping with Configurable Tiles in Image Processing Applications
321 -- 328Yudai Sakamoto, Shigeru Yamashita. Efficient Methods to Generate Constant SNs with Considering Trade-Off between Error and Overhead and Its Evaluation
329 -- 338Takashi Nakada, Hiroyuki Yanagihashi, Kunimaro Imai, Hiroshi Ueki, Takashi Tsuchiya, Masanori Hayashikoshi, Hiroshi Nakamura. An Energy-Efficient Task Scheduling for Near Real-Time Systems on Heterogeneous Multicore Processors
339 -- 347Apinporn Methawachananont, Marut Buranarach, Pakaimart Amsuriya, Sompol Chaimongkhon, Kamthorn Krairaksa, Thepchai Supnithi. Software Process Capability Self-Assessment Support System Based on Task and Work Product Characteristics: A Case Study of ISO/IEC 29110 Standard
348 -- 362Yutaro Kashiwa, Masao Ohira. A Release-Aware Bug Triaging Method Considering Developers' Bug-Fixing Loads
363 -- 378Naoto Sato, Hironobu Kuruma, Yuichiroh Nakagawa, Hideto Ogawa. Formal Verification of a Decision-Tree Ensemble Model and Detection of Its Violation Ranges
379 -- 389Hiroya Kato, Shuichiro Haruta, Iwao Sasase. Android Malware Detection Scheme Based on Level of SSL Server Certificate
390 -- 397Chihiro Watanabe, Kaoru Hiramatsu, Kunio Kashino. Knowledge Discovery from Layered Neural Networks Based on Non-negative Task Matrix Decomposition
398 -- 405Naoki Kato, Toshihiko Yamasaki, Kiyoharu Aizawa, Takemi Ohama. Users' Preference Prediction of Real Estate Properties Based on Floor Plan Analysis
406 -- 415Jeong-Uk Bang, Mu Yeol Choi, Sang-hun Kim, Oh-Wook Kwon. Automatic Construction of a Large-Scale Speech Recognition Database Using Multi-Genre Broadcast Data with Inaccurate Subtitle Timestamps
416 -- 423Ming Dai, Zhiheng Zhou, Tianlei Wang, Yongfan Guo. Nonparametric Distribution Prior Model for Image Segmentation
424 -- 434Kazuki Sakai, Ryuichiro Higashinaka, Yuichiro Yoshikawa, Hiroshi Ishiguro, Junji Tomita. Hierarchical Argumentation Structure for Persuasive Argumentative Dialogue Generation
435 -- 449Andros Tjandra, Sakriani Sakti, Satoshi Nakamura 0001. Recurrent Neural Network Compression Based on Low-Rank Tensor Representation
450 -- 453Guizhong Zhang, Baoxian Wang, Zhaobo Yan, Yiqiang Li, Huaizhi Yang. Rust Detection of Steel Structure via One-Class Classification and L2 Sparse Representation with Decision Fusion
454 -- 458Joanna Kazzandra Dumagpi, Woo Young Jung, Yong-jin Jeong. A New GAN-Based Anomaly Detection (GBAD) Approach for Multi-Threat Object Classification on Large-Scale X-Ray Security Images
459 -- 463Jiateng Liu, Wenming Zheng, Yuan Zong, Cheng Lu, Chuangao Tang. Cross-Corpus Speech Emotion Recognition Based on Deep Domain-Adaptive Convolutional Neural Network
464 -- 468Jichen Yang, Longting Xu, Bo Ren. Constant-Q Deep Coefficients for Playback Attack Detection
469 -- 471Yong-Uk Yoon, Dohyeon Park, Jae-Gon Kim. Enhanced Derivation of Model Parameters for Cross-Component Linear Model (CCLM) in VVC
472 -- 475Dohyeon Park, Jinho Lee, Jung Won Kang, Jae-Gon Kim. Simplified Triangular Partitioning Mode in Versatile Video Coding
476 -- 479Chunhua Qian, Mingyang Li, Yi Ren. Tea Sprouts Segmentation via Improved Deep Convolutional Encoder-Decoder Network