Journal: IEICE Transactions

Volume 103-D, Issue 3

480 -- 0Kohei Hatano. Foreword
481 -- 488Hiroshi Fujiwara, Kei Shibusawa, Kouki Yamamoto, Hiroaki Yamamoto. Bounds for the Multislope Ski-Rental Problem
489 -- 499Yuichi Sudo, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa. Loosely Stabilizing Leader Election on Arbitrary Graphs in Population Protocols without Identifiers or Random Numbers
500 -- 505Chuzo Iwamoto, Tatsuaki Ibusuki. Polynomial-Time Reductions from 3SAT to Kurotto and Juosan Puzzles
506 -- 508Kazuyuki Amano, Shin-Ichi Nakano. An Approximation Algorithm for the 2-Dispersion Problem
509 -- 515Takashi Harada, Ken Tanaka, Kenji Mikawa. Simulated Annealing Method for Relaxed Optimal Rule Ordering
516 -- 525Ryohei Banno, Kazuyuki Shudo. An Efficient Routing Method for Range Queries in Skip Graph
526 -- 539Satoshi Matsumoto, Tomoyuki Uchida, Takayoshi Shoudai, Yusuke Suzuki, Tetsuhiro Miyahara. An Efficient Learning Algorithm for Regular Pattern Languages Using One Positive Example and a Linear Number of Membership Queries
540 -- 548Ryoma Senda, Yoshiaki Takata, Hiroyuki Seki. Generalized Register Context-Free Grammars
549 -- 552Keehang Kwon. A Heuristic Proof Procedure for First-Order Logic
553 -- 565Yuanbang Li, Rong Peng, Bangchao Wang. Survey on Challenges and Achievements in Context-Aware Requirement Modeling
566 -- 577Yoshiyuki Mihara, Shuichi Miyazaki, Yasuo Okabe, Tetsuya Yamaguchi, Manabu Okamoto. Identifying Link Layer Home Network Topologies Using HTIP
578 -- 589Jun Iwamoto, Yuma Kikutani, Renyuan Zhang, Yasuhiko Nakashima. Daisy-Chained Systolic Array and Reconfigurable Memory Space for Narrow Memory Bandwidth
590 -- 601Hisao Ogata, Tomoyoshi Ishikawa, Norichika Miyamoto, Tsutomu Matsumoto. An ATM Security Measure to Prevent Unauthorized Deposit with a Smart Card
602 -- 611Rui Chen 0009, Ying Tong, Ruiyu Liang. Real-Time Generic Object Tracking via Recurrent Regression Network
612 -- 620Chunting Wan, Dongyi Chen, Juan Yang, Miao Huang. Combining Parallel Adaptive Filtering and Wavelet Threshold Denoising for Photoplethysmography-Based Pulse Rate Monitoring during Intensive Physical Exercise
621 -- 630Yan Li, Zhijie Chu, Yizhong Xin. Posture Recognition Technology Based on Kinect
631 -- 638Keisuke Imoto. Graph Cepstrum: Spatial Feature Extracted from Partially Connected Microphones
639 -- 647Hiroki Tamaru, Yuki Saito, Shinnosuke Takamichi, Tomoki Koriyama, Hiroshi Saruwatari. Generative Moment Matching Network-Based Neural Double-Tracking for Synthesized and Natural Singing Voices
648 -- 659Xinyu Zhu, Jun Zhang, Gengsheng Chen. ASAN: Self-Attending and Semantic Activating Network towards Better Object Detection
660 -- 673Yuki Fujimura, Motoharu Sonogashira, Masaaki Iiyama. Simultaneous Estimation of Object Region and Depth in Participating Media Using a ToF Camera
674 -- 683Johanes Effendi, Sakriani Sakti, Katsuhito Sudoh, Satoshi Nakamura 0001. Leveraging Neural Caption Translation with Visually Grounded Paraphrase Augmentation
684 -- 694Mingming Yang, Min Zhang 0005, Kehai Chen, Rui Wang 0015, Tiejun Zhao. Neural Machine Translation with Target-Attention Model
695 -- 701Huan Tang, Ning Chen. Combining CNN and Broad Learning for Music Classification
702 -- 705Nao Igawa, Tomoyuki Yokogawa, Sousuke Amasaki, Masafumi Kondo, Yoichiro Sato, Kazutami Arimoto. Symbolic Representation of Time Petri Nets for Efficient Bounded Model Checking
706 -- 710Ji-Hoon Shin, Tae-Hwan Kim. Fast Inference of Binarized Convolutional Neural Networks Exploiting Max Pooling with Modified Block Structure
711 -- 713Xinxin Hu, Caixia Liu, Shuxin Liu, Xiaotao Cheng. A Security Enhanced 5G Authentication Scheme for Insecure Channel
714 -- 715Yoonhee Kim, Deokgyu Yun, Hannah Lee, Seung Ho Choi. A Non-Intrusive Speech Intelligibility Estimation Method Based on Deep Learning Using Autoencoder Features
716 -- 719Bing Luo, Junkai Xiong, Li Xu, Zheng Pei. Superpixel Segmentation Based on Global Similarity and Contour Region Transform
720 -- 723WeiWei Jiang, Le Zhang. Edge-SiamNet and Edge-TripleNet: New Deep Learning Models for Handwritten Numeral Recognition
724 -- 727Toru Hiraoka. A High-Speed Method for Generating Edge-Preserving Bubble Images

Volume 103-D, Issue 2

186 -- 187Guojun Wang 0001. Foreword
188 -- 195Yudi Zhang 0001, Debiao He, Xinyi Huang, Ding Wang 0002, Kim-Kwang Raymond Choo, Jing Wang. White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography
196 -- 203Wenjuan Li 0001, Weizhi Meng, Zhiqiang Liu, Man Ho Au. Towards Blockchain-Based Software-Defined Networking: Security Challenges and Solutions
204 -- 211Vasileios Kouliaridis, Konstantia Barmpatsalou, Georgios Kambourakis, Shuhong Chen. A Survey on Mobile Malware Detection Techniques
212 -- 221Yuya Senzaki, Satsuya Ohata, Kanta Matsuura. Simple Black-Box Adversarial Examples Generation with Very Few Queries
222 -- 229Huiyao Zheng, Jian Shen 0001, Youngju Cho, Chunhua Su, Sangman Moh. A Novel Structure-Based Data Sharing Scheme in Cloud Computing
230 -- 238Qiuhua Wang, Mingyang Kang, Guohua Wu, Yizhi Ren, Chunhua Su. A Practical Secret Key Generation Scheme Based on Wireless Channel Characteristics for 5G Networks
239 -- 255Takuya Watanabe 0001, Eitaro Shioji, Mitsuaki Akiyama, Keito Sasaoka, Takeshi Yagi, Tatsuya Mori. Follow Your Silhouette: Identifying the Social Account of Website Visitors through User-Blocking Side Channel
256 -- 264Na Ruan, Chunhua Su, Chi Xie. Securing Cooperative Adaptive Cruise Control in Vehicular Platoons via Cooperative Message Authentication
265 -- 275Mitsuhiro Hatada, Tatsuya Mori. CLAP: Classification of Android PUAs by Similarity of DNS Queries
276 -- 291Takuya Watanabe 0001, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, Yuta Takata, Bo Sun, Yuta Ishii, Toshiki Shibahara, Takeshi Yagi, Tatsuya Mori. Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library
292 -- 298Hiroshi Nomaguchi, Chunhua Su, Atsuko Miyaji. New Pseudo-Random Number Generator for EPC Gen2
299 -- 308Tomoaki Mimoto, Seira Hidano, Shinsaku Kiyomoto, Atsuko Miyaji. Anonymization Technique Based on SGD Matrix Factorization
309 -- 320Jae Young Hur. Virtual Address Remapping with Configurable Tiles in Image Processing Applications
321 -- 328Yudai Sakamoto, Shigeru Yamashita. Efficient Methods to Generate Constant SNs with Considering Trade-Off between Error and Overhead and Its Evaluation
329 -- 338Takashi Nakada, Hiroyuki Yanagihashi, Kunimaro Imai, Hiroshi Ueki, Takashi Tsuchiya, Masanori Hayashikoshi, Hiroshi Nakamura. An Energy-Efficient Task Scheduling for Near Real-Time Systems on Heterogeneous Multicore Processors
339 -- 347Apinporn Methawachananont, Marut Buranarach, Pakaimart Amsuriya, Sompol Chaimongkhon, Kamthorn Krairaksa, Thepchai Supnithi. Software Process Capability Self-Assessment Support System Based on Task and Work Product Characteristics: A Case Study of ISO/IEC 29110 Standard
348 -- 362Yutaro Kashiwa, Masao Ohira. A Release-Aware Bug Triaging Method Considering Developers' Bug-Fixing Loads
363 -- 378Naoto Sato, Hironobu Kuruma, Yuichiroh Nakagawa, Hideto Ogawa. Formal Verification of a Decision-Tree Ensemble Model and Detection of Its Violation Ranges
379 -- 389Hiroya Kato, Shuichiro Haruta, Iwao Sasase. Android Malware Detection Scheme Based on Level of SSL Server Certificate
390 -- 397Chihiro Watanabe, Kaoru Hiramatsu, Kunio Kashino. Knowledge Discovery from Layered Neural Networks Based on Non-negative Task Matrix Decomposition
398 -- 405Naoki Kato, Toshihiko Yamasaki, Kiyoharu Aizawa, Takemi Ohama. Users' Preference Prediction of Real Estate Properties Based on Floor Plan Analysis
406 -- 415Jeong-Uk Bang, Mu Yeol Choi, Sang-hun Kim, Oh-Wook Kwon. Automatic Construction of a Large-Scale Speech Recognition Database Using Multi-Genre Broadcast Data with Inaccurate Subtitle Timestamps
416 -- 423Ming Dai, Zhiheng Zhou, Tianlei Wang, Yongfan Guo. Nonparametric Distribution Prior Model for Image Segmentation
424 -- 434Kazuki Sakai, Ryuichiro Higashinaka, Yuichiro Yoshikawa, Hiroshi Ishiguro, Junji Tomita. Hierarchical Argumentation Structure for Persuasive Argumentative Dialogue Generation
435 -- 449Andros Tjandra, Sakriani Sakti, Satoshi Nakamura 0001. Recurrent Neural Network Compression Based on Low-Rank Tensor Representation
450 -- 453Guizhong Zhang, Baoxian Wang, Zhaobo Yan, Yiqiang Li, Huaizhi Yang. Rust Detection of Steel Structure via One-Class Classification and L2 Sparse Representation with Decision Fusion
454 -- 458Joanna Kazzandra Dumagpi, Woo Young Jung, Yong-jin Jeong. A New GAN-Based Anomaly Detection (GBAD) Approach for Multi-Threat Object Classification on Large-Scale X-Ray Security Images
459 -- 463Jiateng Liu, Wenming Zheng, Yuan Zong, Cheng Lu, Chuangao Tang. Cross-Corpus Speech Emotion Recognition Based on Deep Domain-Adaptive Convolutional Neural Network
464 -- 468Jichen Yang, Longting Xu, Bo Ren. Constant-Q Deep Coefficients for Playback Attack Detection
469 -- 471Yong-Uk Yoon, Dohyeon Park, Jae-Gon Kim. Enhanced Derivation of Model Parameters for Cross-Component Linear Model (CCLM) in VVC
472 -- 475Dohyeon Park, Jinho Lee, Jung Won Kang, Jae-Gon Kim. Simplified Triangular Partitioning Mode in Versatile Video Coding
476 -- 479Chunhua Qian, Mingyang Li, Yi Ren. Tea Sprouts Segmentation via Improved Deep Convolutional Encoder-Decoder Network

Volume 103-D, Issue 1

1 -- 0Keiichi Iwamura. Foreword
2 -- 10KokSheik Wong, ChuanSheng Chan, MaungMaung AprilPyone. Lightweight Authentication for MP4 Format Container Using Subtitle Track
11 -- 24Mariko Fujii, Tomoharu Shibuya. Improvement of the Quality of Visual Secret Sharing Schemes with Constraints on the Usage of Shares
25 -- 32Kenta Iida, Hitoshi Kiya. Image Identification of Encrypted JPEG Images for Privacy-Preserving Photo Sharing Services
33 -- 41Ippei Hamamoto, Masaki Kawamura. Neural Watermarking Method Including an Attack Simulator against Rotation and Compression Attacks
42 -- 49Ryota Kaminishi, Haruna Miyamoto, Sayaka Shiota, Hitoshi Kiya. Blind Bandwidth Extension with a Non-Linear Function and Its Evaluation on Automatic Speaker Verification
50 -- 58Takayuki Nakachi, Yukihiro Bandoh, Hitoshi Kiya. Secure Overcomplete Dictionary Learning for Sparse Representation
59 -- 62Jin S. Seo. n-Gram Indexing for Cover Song Identification
63 -- 66Reiya Namikawa, Masashi Unoki. Non-Blind Speech Watermarking Method Based on Spread-Spectrum Using Linear Prediction Residue
67 -- 70Huyen T. T. Tran, Trang H. Hoang, Phu N. Minh, Nam Pham Ngoc 0001, Truong Cong Thang. A Weighted Viewport Quality Metric for Omnidirectional Images
71 -- 84Sufen Zhao, Rong Peng, Meng Zhang, Liansheng Tan. k Co-Author Recommendation with Fusion of Citation Networks
85 -- 92Shanshan Jiao, Zhisong Pan, Yutian Chen, Yunbo Li. Cloud Annealing: A Novel Simulated Annealing Algorithm Based on Cloud Model
93 -- 100Keiichi Kaneko. Node-Disjoint Paths Problems in Directed Bijective Connection Graphs
101 -- 110Ryuta Kawano, Ryota Yasudo, Hiroki Matsutani, Michihiro Koibuchi, Hideharu Amano. A Generalized Theory Based on the Turn Model for Deadlock-Free Irregular Networks
111 -- 129Takashi Yokota, Kanemitsu Ootsu, Takeshi Ohkawa. Genetic Node-Mapping Methods for Rapid Collective Communications
130 -- 141Shun Imai, Akihiro Inokuchi. Efficient Supergraph Search Using Graph Coding
142 -- 151Rei Takami, Yasufumi Takama. Proposal and Evaluation of Visual Analytics Interface for Time-Series Data Based on Trajectory Representation
152 -- 162Weiqing Tong, Haisheng Li, Guoyue Chen. Blob Detection Based on Soft Morphological Filter
163 -- 169Jianyong Duan, Yuwei Wu, Mingli Wu, Hao Wang. Measuring Semantic Similarity between Words Based on Multiple Relational Information
170 -- 173Sooyong Jeong, Ajay Kumar Jha, Youngsul Shin, Woo Jin Lee. A Log-Based Testing Approach for Detecting Faults Caused by Incorrect Assumptions About the Environment
174 -- 176Shaojie Zhu, Lei Zhang 0029, Bailong Liu, Shumin Cui, Changxing Shao, Yun Li. Mode Normalization Enhanced Recurrent Model for Multi-Modal Semantic Trajectory Prediction
177 -- 180Huaizhe Zhou, Haihe Ba, Yongjun Wang, Tie Hong. On the Detection of Malicious Behaviors against Introspection Using Hardware Architectural Events
181 -- 185Pengyu Wang, Hongqing Zhu, Ning Chen. UMMS: Efficient Superpixel Segmentation Driven by a Mixture of Spatially Constrained Uniform Distribution