186 | -- | 187 | Guojun Wang 0001. Foreword |
188 | -- | 195 | Yudi Zhang 0001, Debiao He, Xinyi Huang, Ding Wang 0002, Kim-Kwang Raymond Choo, Jing Wang. White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography |
196 | -- | 203 | Wenjuan Li 0001, Weizhi Meng, Zhiqiang Liu, Man Ho Au. Towards Blockchain-Based Software-Defined Networking: Security Challenges and Solutions |
204 | -- | 211 | Vasileios Kouliaridis, Konstantia Barmpatsalou, Georgios Kambourakis, Shuhong Chen. A Survey on Mobile Malware Detection Techniques |
212 | -- | 221 | Yuya Senzaki, Satsuya Ohata, Kanta Matsuura. Simple Black-Box Adversarial Examples Generation with Very Few Queries |
222 | -- | 229 | Huiyao Zheng, Jian Shen 0001, Youngju Cho, Chunhua Su, Sangman Moh. A Novel Structure-Based Data Sharing Scheme in Cloud Computing |
230 | -- | 238 | Qiuhua Wang, Mingyang Kang, Guohua Wu, Yizhi Ren, Chunhua Su. A Practical Secret Key Generation Scheme Based on Wireless Channel Characteristics for 5G Networks |
239 | -- | 255 | Takuya Watanabe 0001, Eitaro Shioji, Mitsuaki Akiyama, Keito Sasaoka, Takeshi Yagi, Tatsuya Mori. Follow Your Silhouette: Identifying the Social Account of Website Visitors through User-Blocking Side Channel |
256 | -- | 264 | Na Ruan, Chunhua Su, Chi Xie. Securing Cooperative Adaptive Cruise Control in Vehicular Platoons via Cooperative Message Authentication |
265 | -- | 275 | Mitsuhiro Hatada, Tatsuya Mori. CLAP: Classification of Android PUAs by Similarity of DNS Queries |
276 | -- | 291 | Takuya Watanabe 0001, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, Yuta Takata, Bo Sun, Yuta Ishii, Toshiki Shibahara, Takeshi Yagi, Tatsuya Mori. Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library |
292 | -- | 298 | Hiroshi Nomaguchi, Chunhua Su, Atsuko Miyaji. New Pseudo-Random Number Generator for EPC Gen2 |
299 | -- | 308 | Tomoaki Mimoto, Seira Hidano, Shinsaku Kiyomoto, Atsuko Miyaji. Anonymization Technique Based on SGD Matrix Factorization |
309 | -- | 320 | Jae Young Hur. Virtual Address Remapping with Configurable Tiles in Image Processing Applications |
321 | -- | 328 | Yudai Sakamoto, Shigeru Yamashita. Efficient Methods to Generate Constant SNs with Considering Trade-Off between Error and Overhead and Its Evaluation |
329 | -- | 338 | Takashi Nakada, Hiroyuki Yanagihashi, Kunimaro Imai, Hiroshi Ueki, Takashi Tsuchiya, Masanori Hayashikoshi, Hiroshi Nakamura. An Energy-Efficient Task Scheduling for Near Real-Time Systems on Heterogeneous Multicore Processors |
339 | -- | 347 | Apinporn Methawachananont, Marut Buranarach, Pakaimart Amsuriya, Sompol Chaimongkhon, Kamthorn Krairaksa, Thepchai Supnithi. Software Process Capability Self-Assessment Support System Based on Task and Work Product Characteristics: A Case Study of ISO/IEC 29110 Standard |
348 | -- | 362 | Yutaro Kashiwa, Masao Ohira. A Release-Aware Bug Triaging Method Considering Developers' Bug-Fixing Loads |
363 | -- | 378 | Naoto Sato, Hironobu Kuruma, Yuichiroh Nakagawa, Hideto Ogawa. Formal Verification of a Decision-Tree Ensemble Model and Detection of Its Violation Ranges |
379 | -- | 389 | Hiroya Kato, Shuichiro Haruta, Iwao Sasase. Android Malware Detection Scheme Based on Level of SSL Server Certificate |
390 | -- | 397 | Chihiro Watanabe, Kaoru Hiramatsu, Kunio Kashino. Knowledge Discovery from Layered Neural Networks Based on Non-negative Task Matrix Decomposition |
398 | -- | 405 | Naoki Kato, Toshihiko Yamasaki, Kiyoharu Aizawa, Takemi Ohama. Users' Preference Prediction of Real Estate Properties Based on Floor Plan Analysis |
406 | -- | 415 | Jeong-Uk Bang, Mu Yeol Choi, Sang-hun Kim, Oh-Wook Kwon. Automatic Construction of a Large-Scale Speech Recognition Database Using Multi-Genre Broadcast Data with Inaccurate Subtitle Timestamps |
416 | -- | 423 | Ming Dai, Zhiheng Zhou, Tianlei Wang, Yongfan Guo. Nonparametric Distribution Prior Model for Image Segmentation |
424 | -- | 434 | Kazuki Sakai, Ryuichiro Higashinaka, Yuichiro Yoshikawa, Hiroshi Ishiguro, Junji Tomita. Hierarchical Argumentation Structure for Persuasive Argumentative Dialogue Generation |
435 | -- | 449 | Andros Tjandra, Sakriani Sakti, Satoshi Nakamura 0001. Recurrent Neural Network Compression Based on Low-Rank Tensor Representation |
450 | -- | 453 | Guizhong Zhang, Baoxian Wang, Zhaobo Yan, Yiqiang Li, Huaizhi Yang. Rust Detection of Steel Structure via One-Class Classification and L2 Sparse Representation with Decision Fusion |
454 | -- | 458 | Joanna Kazzandra Dumagpi, Woo Young Jung, Yong-jin Jeong. A New GAN-Based Anomaly Detection (GBAD) Approach for Multi-Threat Object Classification on Large-Scale X-Ray Security Images |
459 | -- | 463 | Jiateng Liu, Wenming Zheng, Yuan Zong, Cheng Lu, Chuangao Tang. Cross-Corpus Speech Emotion Recognition Based on Deep Domain-Adaptive Convolutional Neural Network |
464 | -- | 468 | Jichen Yang, Longting Xu, Bo Ren. Constant-Q Deep Coefficients for Playback Attack Detection |
469 | -- | 471 | Yong-Uk Yoon, Dohyeon Park, Jae-Gon Kim. Enhanced Derivation of Model Parameters for Cross-Component Linear Model (CCLM) in VVC |
472 | -- | 475 | Dohyeon Park, Jinho Lee, Jung Won Kang, Jae-Gon Kim. Simplified Triangular Partitioning Mode in Versatile Video Coding |
476 | -- | 479 | Chunhua Qian, Mingyang Li, Yi Ren. Tea Sprouts Segmentation via Improved Deep Convolutional Encoder-Decoder Network |