Journal: IEICE Transactions

Volume 99-D, Issue 4

785 -- 786Toshihiro Yamauchi. Foreword
787 -- 795Kazukuni Kobara. Cyber Physical Security for Industrial Control Systems and IoT
796 -- 804Rashed Mazumder, Atsuko Miyaji. A New Scheme of Blockcipher Hash
805 -- 815Yasuyuki Nogami, Hiroto Kagotani, Kengo Iokibe, Hiroyuki Miyatake, Takashi Narita. FPGA Implementation of Various Elliptic Curve Pairings over Odd Characteristic Field with Non Supersingular Curves
816 -- 829Kazumasa Omote, Tran Thao Phuong. D2-POR: Direct Repair and Dynamic Operations in Network Coding-Based Proof of Retrievability
830 -- 838Shoichiro Yamasaki, Tomoko K. Matsushima. A Security Enhancement Technique for Wireless Communications Using Secret Sharing and Physical Layer Secrecy Transmission
839 -- 849Rui Wang, Qiaoyan Wen, Hua Zhang 0001, Xuelei Li. A Novel Protocol-Feature Attack against Tor's Hidden Service
850 -- 859Xiulei Wang, Ming Chen 0003, Chang-you Xing, Tingting Zhang. Defending DDoS Attacks in Software-Defined Networking Based on Legitimate Source and Destination IP Address Database
860 -- 872Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Shigeki Goto. MineSpider: Extracting Hidden URLs Behind Evasive Drive-by Download Attacks
873 -- 882Bo Sun, Mitsuaki Akiyama, Takeshi Yagi, Mitsuhiro Hatada, Tatsuya Mori. Automating URL Blacklist Generation with Similarity Search Approach
883 -- 890Hyoung-Kee Choi, Ki-Eun Shin, Hyoungshick Kim. A Healthcare Information System for Secure Delivery and Remote Management of Medical Records
891 -- 894Hyunsu Mun, Youngseok Lee. Examining Privacy Leakage from Online Used Markets in Korea
895 -- 0Toshiyuki Amagasa. Foreword
896 -- 905Huifeng Guo, Dian-Hui Chu, Yunming Ye, Xutao Li, Xixian Fan. BLM-Rank: A Bayesian Linear Method for Learning to Rank and Its GPU Implementation
906 -- 917Keisuke Kiritoshi, Qiang Ma 0001. Named Entity Oriented Difference Analysis of News Articles and Its Application
918 -- 926Hongyeon Kim, Sungmin Kang, Seok-Joo Lee, Jun-Ki Min. The Efficient Algorithms for Constructing Enhanced Quadtrees Using MapReduce
927 -- 935Nan Jiang, Wenge Rong, Baolin Peng, Yifan Nie, Zhang Xiong. Modeling Joint Representation with Tri-Modal Deep Belief Networks for Query and Question Matching
936 -- 943Chooi-Ling Goh, Shigetoshi Nakatake. A Sensor-Based Data Visualization System for Training Blood Pressure Measurement by Auscultatory Method
944 -- 958Nobutaka Suzuki, Kosetsu Ikeda, Yeondae Kwon. An Algorithm for All-Pairs Regular Path Problem on External Memory Graphs
959 -- 968Yongyos Kaewpitakkun, Kiyoaki Shirai. Incorporation of Target Specific Knowledge for Sentiment Analysis on Microblogging
969 -- 978Md-Mizanur Rahoman, Ryutaro Ichise. Automatic Erroneous Data Detection over Type-Annotated Linked Data
979 -- 988Shunsuke Ohashi, Giovanni Yoko Kristianto, Goran Topic, Akiko Aizawa. Efficient Algorithm for Math Formula Semantic Search
989 -- 999Masafumi Makino, Tatsuo Tsuji, Ken Higuchi. History-Pattern Encoding for Large-Scale Dynamic Multidimensional Datasets and Its Evaluations
1000 -- 1009Ryosuke Koyanagi, Ryo Furukawa, Tsubasa Takahashi, Takuya Mori, Toshiyuki Amagasa, Hiroyuki Kitagawa. k-Concealment Anonymization
1010 -- 1018Marie Katsurai, Ikki Ohmukai, Hideaki Takeda 0001. Topic Representation of Researchers' Interests in a Large-Scale Academic Database and Its Application to Author Disambiguation
1019 -- 1022Kyoungman Bae, Youngjoong Ko. How to Combine Translation Probabilities and Question Expansion for Question Classification in cQA Services
1023 -- 0Masayuki Nakajima. Foreword
1024 -- 1031Asako Soga, Bin Umino, Yuho Yazaki, Motoko Hirayama. Body-Part Motion Synthesis System and Its Evaluation for Discovery Learning of Dance
1032 -- 1037Chung-Liang Lai, Chien-Ming Tseng, D. Erdenetsogt, Tzu-Kuan Liao, Ya-Ling Huang, Yung-fu Chen. A Kinect-Based System for Balance Rehabilitation of Stroke Patients
1038 -- 1051Isao Miyagawa, Yukinobu Taniguchi. Dense Light Transport for Relighting Computation Using Orthogonal Illumination Based on Walsh-Hadamard Matrix
1052 -- 1061Shohei Kakei, Masami Mohri, Yoshiaki Shiraishi, Masakatu Morii. SSL Client Authentication with TPM
1062 -- 1070Wei Zhang, Huan Ren, Qingshan Jiang. Application of Feature Engineering for Phishing Detection
1071 -- 1080Hyunjoo Kim, Jong-Hyun Kim, Jung-Tai Kim, Ikkyun Kim, Tai-Myung Chung. Feature-Chain Based Malware Detection Using Multiple Sequence Alignment of API Call
1081 -- 1091Bumsoon Jang, Seokjoo Doo, Soojin Lee, Hyunsoo Yoon. Hybrid Recovery-Based Intrusion Tolerant System for Practical Cyber-Defense
1092 -- 1107Ryota Shioya, Ryo Takami, Masahiro Goshima, Hideki Ando. FXA: Executing Instructions in Front-End for Energy Efficiency
1108 -- 1116Chun Hung Cheng, Ying-Wen Bai. An Automatically Peak-Shift Control Design for Charging and Discharging of the Battery in an Ultrabook
1117 -- 1126Tomomi Hatano, Takashi Ishio, Joji Okada, Yuji Sakata, Katsuro Inoue. Dependency-Based Extraction of Conditional Statements for Understanding Business Rules
1127 -- 1138Masayoshi Shimamura, Hiroaki Yamanaka, Akira Nagata, Katsuyoshi Iida, Eiji Kawai, Masato Tsuru. Elastic and Adaptive Resource Orchestration Architecture on 3-Tier Network Virtualization Model
1139 -- 1152Iku Ohama, Hiromi Iida, Takuya Kida, Hiroki Arimura. The Relevance Dependent Infinite Relational Model for Discovering Co-Cluster Structure from Relationships with Structured Noise
1153 -- 1161Yusuke Iwasawa, Ikuko Eguchi Yairi, Yutaka Matsuo. Combining Human Action Sensing of Wheelchair Users and Machine Learning for Autonomous Accessibility Data Collection
1162 -- 1171Chao Xu 0008, Dongxiang Zhou, Tao Guan, Yongping Zhai, Yunhui Liu. Automatic Recognition of Mycobacterium Tuberculosis Based on Active Shape Model
1172 -- 1181Jianjuan Liang, Bilan Zhu, Taro Kumagai, Masaki Nakagawa. Character-Position-Free On-Line Handwritten Japanese Text Recognition by Two Segmentation Methods
1182 -- 1192Kheang Seng, Kouichi Katsurada, Yurie Iribe, Tsuneo Nitta. Using Reversed Sequences and Grapheme Generation Rules to Extend the Feasibility of a Phoneme Transition Network-Based Grapheme-to-Phoneme Conversion
1193 -- 1201Chihiro Tsutake, Yutaka Nakano, Toshiyuki Yoshida. Fast Mode Decision Technique for HEVC Intra Prediction Based on Reliability Metric for Motion Vectors
1202 -- 1211Fang Tian, Jie Guo, Bin Song, Haixiao Liu, Hao Qin. 1-Analysis Based Reconstruction
1212 -- 1220Yu Wang 0018, Jien Kato. Efficient Local Feature Encoding for Human Action Recognition with Approximate Sparse Coding
1221 -- 1233Yuta Nakashima, Noboru Babaguchi, Jianping Fan. Privacy Protection for Social Video via Background Estimation and CRF-Based Videographer's Intention Modeling
1234 -- 1241Nattapong Thammasan, Koichi Moriyama, Ken-ichi Fukui, Masayuki Numao. Continuous Music-Emotion Recognition Based on Electroencephalogram
1242 -- 1245Seon Hwan Kim, Ju Hee Choi, Jong Wook Kwak. HaWL: Hidden Cold Block-Aware Wear Leveling Using Bit-Set Threshold for NAND Flash Memory
1246 -- 1250Riham AlTawy, Ahmed Abdelkhalek 0001, Amr M. Youssef. b
1251 -- 1254Joonsang Baek, Ilsun You. Efficient Subversion of Symmetric Encryption with Random Initialization Vector
1255 -- 1258Hideo Fujiwara, Katsuya Fujiwara. Properties of Generalized Feedback Shift Registers for Secure Scan Design
1259 -- 1263Jianhong Wang, Pinzheng Zhang, Linmin Luo. Nonnegative Component Representation with Hierarchical Dictionary Learning Strategy for Action Recognition
1264 -- 1267Quan Miao, Chun Zhang, Long Meng. Feature-Based On-Line Object Tracking Combining Both Keypoints and Quasi-Keypoints Matching
1268 -- 1271Suofei Zhang, Zhixin Sun, Xu Cheng, Lin Zhou. Object Tracking with Embedded Deformable Parts in Dynamic Conditional Random Fields
1272 -- 1274YingJiang Wu, Benyong Liu. Spatial and Anatomical Regularization Based on Multiple Kernel Learning for Neuroimaging Classification