Journal: IEICE Trans. Inf. Syst.

Volume 103-D, Issue 7

1431 -- 1432Kazuomi Oishi. Foreword
1433 -- 1447Kwangjo Kim. Intrusion Detection System Using Deep Learning and Its Application to Wi-Fi Network
1448 -- 1461Heung-Youl Youm. An Overview of De-Identification Techniques and Their Standardization Directions
1462 -- 1475Hiroki Kuzuno, Toshihiro Yamauchi. Identification of Kernel Memory Corruption Using Kernel Memory Secret Observation Mechanism
1476 -- 1492Toshinori Usui, Tomonori Ikuse, Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, Kanta Matsuura. ROPminer: Learning-Based Static Detection of ROP Chain Considering Linkability of ROP Gadgets
1493 -- 1511Daiki Chiba 0001, Ayako Akiyama Hasegawa, Takashi Koide, Yuta Sawabe, Shigeki Goto, Mitsuaki Akiyama. DomainScouter: Analyzing the Risks of Deceptive Internationalized Domain Names
1512 -- 1523Fumihiro Kanei, Daiki Chiba 0001, Kunio Hato, Katsunari Yoshioka, Tsutomu Matsumoto, Mitsuaki Akiyama. Detecting and Understanding Online Advertising Fraud in the Wild
1524 -- 1540Asuka Nakajima, Takuya Watanabe 0001, Eitaro Shioji, Mitsuaki Akiyama, Maverick Woo. 1-day, 2 Countries - A Study on Consumer IoT Device Vulnerability Disclosure and Patch Release in Japan and the United States
1541 -- 1555Keika Mori, Takuya Watanabe 0001, Yunao Zhou, Ayako Akiyama Hasegawa, Mitsuaki Akiyama, Tatsuya Mori. Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?
1556 -- 1597Pratish Datta, Tatsuaki Okamoto, Katsuyuki Takashima. Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption
1598 -- 1607Katsunari Shishido, Atsuko Miyaji. Online-Efficient Interval Test via Secure Empty-Set Check
1608 -- 1617Han-Yan Wu, Ling-Hwei Chen, Yu-Tai Ching. A Multilayer Steganography Method with High Embedding Efficiency for Palette Images
1618 -- 1622Kento Hasegawa, Masao Yanagisawa, Nozomu Togawa. Trojan-Net Classification for Gate-Level Hardware Design Utilizing Boundary Net Structures
1623 -- 1632Kokoro Kobayashi, Tsuyoshi Oguni, Masaki Nakagawa. A Series of PIN/Password Input Methods Resilient to Shoulder Hacking Based on Cognitive Difficulty of Tracing Multiple Key Movements
1633 -- 1646Takafumi Kubota, Naohiro Aota, Kenji Kono. Logging Inter-Thread Data Dependencies in Linux Kernel
1647 -- 1659Sanghun Choi, Shuichiro Haruta, Yichen An, Iwao Sasase. A Server-Based Distributed Storage Using Secret Sharing with AES-256 for Lightweight Safety Restoration
1660 -- 1671Kenta Ishiguro, Kenji Kono. Instruction Filters for Mitigating Attacks on Instruction Emulation in Hypervisors
1672 -- 1682Masashi Tsuchida, Fukuhito Ooshita, Michiko Inoue. Byzantine-Tolerant Gathering of Mobile Agents in Asynchronous Arbitrary Networks with Authenticated Whiteboards
1683 -- 1692Taewhan Kim, Kangsoo Jung, Seog Park. Sparsity Reduction Technique Using Grouping Method for Matrix Factorization in Differentially Private Recommendation Systems
1693 -- 1702Kota Kudo, Yuichi Takano, Ryo Nomura. Stochastic Discrete First-Order Algorithm for Feature Subset Selection
1703 -- 1709Yizhong Xin, Ruonan Liu, Yan Li. Strategy for Improving Target Selection Accuracy in Indirect Touch Input
1710 -- 1721Ayumi Yamazaki, Yuki Hayashi, Kazuhisa Seta. Model-Based Development of Spatial Movement Skill Training System and Its Evaluation
1722 -- 1731Lia Sadita, Pedro Gabriel Fonteles Furtado, Tsukasa Hirashima, Yusuke Hayashi. Analysis of The Similarity of Individual Knowledge and The Comprehension of Partner's Representation during Collaborative Concept Mapping with Reciprocal Kit Build Approach
1732 -- 1743Lu Yin, Junfeng Li, Yonghong Yan 0002, Masato Akagi. A Two-Stage Phase-Aware Approach for Monaural Multi-Talker Speech Separation
1744 -- 1752Yun Hu, Changwen Zheng. A Double Adversarial Network Model for Multi-Domain and Multi-Task Chinese Named Entity Recognition
1753 -- 1759Keiichiro Inagaki, Takayuki Kannon, Yoshimi Kamiyama, Shiro Usui. Effect of Fixational Eye Movement on Signal Processing of Retinal Photoreceptor: A Computational Study
1760 -- 1764Yong Yang, Junwei Lu, Baoxian Wang, Weigang Zhao. Analysis on Wave-Velocity Inverse Imaging for the Supporting Layer in Ballastless Track
1765 -- 1768Jingyu Li, Dandan Xiao, Yue Zhang. A 10.4-Gs/s High-Resolution Wideband Radar Sampling System Based on TIADC Technique
1769 -- 1772Hae Young Lee, Jin Myoung Kim. Systematic Detection of State Variable Corruptions in Discrete Event System Specification Based Simulation
1773 -- 1776He Li 0006, Yanna Liu, Xuhua Wang, LiangCai Su, Hang Yuan, Jae Soo Yoo. An Efficient Method for Graph Repartitioning in Distributed Environments
1777 -- 1781Minseong Kim, Hyun Chul Choi. Improving Faster R-CNN Framework for Multiscale Chinese Character Detection and Localization