1431 | -- | 1432 | Kazuomi Oishi. Foreword |
1433 | -- | 1447 | Kwangjo Kim. Intrusion Detection System Using Deep Learning and Its Application to Wi-Fi Network |
1448 | -- | 1461 | Heung-Youl Youm. An Overview of De-Identification Techniques and Their Standardization Directions |
1462 | -- | 1475 | Hiroki Kuzuno, Toshihiro Yamauchi. Identification of Kernel Memory Corruption Using Kernel Memory Secret Observation Mechanism |
1476 | -- | 1492 | Toshinori Usui, Tomonori Ikuse, Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, Kanta Matsuura. ROPminer: Learning-Based Static Detection of ROP Chain Considering Linkability of ROP Gadgets |
1493 | -- | 1511 | Daiki Chiba 0001, Ayako Akiyama Hasegawa, Takashi Koide, Yuta Sawabe, Shigeki Goto, Mitsuaki Akiyama. DomainScouter: Analyzing the Risks of Deceptive Internationalized Domain Names |
1512 | -- | 1523 | Fumihiro Kanei, Daiki Chiba 0001, Kunio Hato, Katsunari Yoshioka, Tsutomu Matsumoto, Mitsuaki Akiyama. Detecting and Understanding Online Advertising Fraud in the Wild |
1524 | -- | 1540 | Asuka Nakajima, Takuya Watanabe 0001, Eitaro Shioji, Mitsuaki Akiyama, Maverick Woo. 1-day, 2 Countries - A Study on Consumer IoT Device Vulnerability Disclosure and Patch Release in Japan and the United States |
1541 | -- | 1555 | Keika Mori, Takuya Watanabe 0001, Yunao Zhou, Ayako Akiyama Hasegawa, Mitsuaki Akiyama, Tatsuya Mori. Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits? |
1556 | -- | 1597 | Pratish Datta, Tatsuaki Okamoto, Katsuyuki Takashima. Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption |
1598 | -- | 1607 | Katsunari Shishido, Atsuko Miyaji. Online-Efficient Interval Test via Secure Empty-Set Check |
1608 | -- | 1617 | Han-Yan Wu, Ling-Hwei Chen, Yu-Tai Ching. A Multilayer Steganography Method with High Embedding Efficiency for Palette Images |
1618 | -- | 1622 | Kento Hasegawa, Masao Yanagisawa, Nozomu Togawa. Trojan-Net Classification for Gate-Level Hardware Design Utilizing Boundary Net Structures |
1623 | -- | 1632 | Kokoro Kobayashi, Tsuyoshi Oguni, Masaki Nakagawa. A Series of PIN/Password Input Methods Resilient to Shoulder Hacking Based on Cognitive Difficulty of Tracing Multiple Key Movements |
1633 | -- | 1646 | Takafumi Kubota, Naohiro Aota, Kenji Kono. Logging Inter-Thread Data Dependencies in Linux Kernel |
1647 | -- | 1659 | Sanghun Choi, Shuichiro Haruta, Yichen An, Iwao Sasase. A Server-Based Distributed Storage Using Secret Sharing with AES-256 for Lightweight Safety Restoration |
1660 | -- | 1671 | Kenta Ishiguro, Kenji Kono. Instruction Filters for Mitigating Attacks on Instruction Emulation in Hypervisors |
1672 | -- | 1682 | Masashi Tsuchida, Fukuhito Ooshita, Michiko Inoue. Byzantine-Tolerant Gathering of Mobile Agents in Asynchronous Arbitrary Networks with Authenticated Whiteboards |
1683 | -- | 1692 | Taewhan Kim, Kangsoo Jung, Seog Park. Sparsity Reduction Technique Using Grouping Method for Matrix Factorization in Differentially Private Recommendation Systems |
1693 | -- | 1702 | Kota Kudo, Yuichi Takano, Ryo Nomura. Stochastic Discrete First-Order Algorithm for Feature Subset Selection |
1703 | -- | 1709 | Yizhong Xin, Ruonan Liu, Yan Li. Strategy for Improving Target Selection Accuracy in Indirect Touch Input |
1710 | -- | 1721 | Ayumi Yamazaki, Yuki Hayashi, Kazuhisa Seta. Model-Based Development of Spatial Movement Skill Training System and Its Evaluation |
1722 | -- | 1731 | Lia Sadita, Pedro Gabriel Fonteles Furtado, Tsukasa Hirashima, Yusuke Hayashi. Analysis of The Similarity of Individual Knowledge and The Comprehension of Partner's Representation during Collaborative Concept Mapping with Reciprocal Kit Build Approach |
1732 | -- | 1743 | Lu Yin, Junfeng Li, Yonghong Yan 0002, Masato Akagi. A Two-Stage Phase-Aware Approach for Monaural Multi-Talker Speech Separation |
1744 | -- | 1752 | Yun Hu, Changwen Zheng. A Double Adversarial Network Model for Multi-Domain and Multi-Task Chinese Named Entity Recognition |
1753 | -- | 1759 | Keiichiro Inagaki, Takayuki Kannon, Yoshimi Kamiyama, Shiro Usui. Effect of Fixational Eye Movement on Signal Processing of Retinal Photoreceptor: A Computational Study |
1760 | -- | 1764 | Yong Yang, Junwei Lu, Baoxian Wang, Weigang Zhao. Analysis on Wave-Velocity Inverse Imaging for the Supporting Layer in Ballastless Track |
1765 | -- | 1768 | Jingyu Li, Dandan Xiao, Yue Zhang. A 10.4-Gs/s High-Resolution Wideband Radar Sampling System Based on TIADC Technique |
1769 | -- | 1772 | Hae Young Lee, Jin Myoung Kim. Systematic Detection of State Variable Corruptions in Discrete Event System Specification Based Simulation |
1773 | -- | 1776 | He Li 0006, Yanna Liu, Xuhua Wang, LiangCai Su, Hang Yuan, Jae Soo Yoo. An Efficient Method for Graph Repartitioning in Distributed Environments |
1777 | -- | 1781 | Minseong Kim, Hyun Chul Choi. Improving Faster R-CNN Framework for Multiscale Chinese Character Detection and Localization |