1793 | -- | 1794 | Ilsun You. Foreword |
1795 | -- | 1804 | Yuanlong Cao, Ruiwen Ji, Lejun Ji, Xun Shao, Gang Lei, Hao Wang 0080. meLearning: A Multi-Expert Learning-Based MPTCP Extension to Enhance Multipathing Robustness against Network Attacks |
1805 | -- | 1813 | Taeeun Kim, Hwankuk Kim. A Design of Automated Vulnerability Information Management System for Secure Use of Internet-Connected Devices Based on Internet-Wide Scanning Methods |
1814 | -- | 1827 | Cheng-Chung Kuo, Ding-Kai Tseng, Chun-Wei Tsai, Chu-Sing Yang. An Effective Feature Extraction Mechanism for Intrusion Detection System |
1828 | -- | 1838 | Yuta Takata, Hiroshi Kumagai, Masaki Kamizono. The Uncontrolled Web: Measuring Security Governance on the Web |
1839 | -- | 1849 | Seolah Jang, Sandi Rahmadika, Sang Uk Shin, Kyung Hyune Rhee. PDPM: A Patient-Defined Data Privacy Management with Nudge Theory in Decentralized E-Health Environments |
1850 | -- | 1856 | HyungJin Cho, Seongmin Park, Youngkwon Park, Bomin Choi, Dowon Kim, Kangbin Yim. Analysis against Security Issues of Voice over 5G |
1857 | -- | 1868 | Kang Woo Cho, Byeong-Gyu Jeong, Sang Uk Shin. Verifiable Credential Proof Generation and Verification Model for Decentralized SSI-Based Credit Scoring Data |
1869 | -- | 1879 | Dae-Hwi Lee, Won-Bin Kim, Deahee Seo, Im-Yeong Lee. An Efficient Public Verifiable Certificateless Multi-Receiver Signcryption Scheme for IoT Environments |
1880 | -- | 1893 | SeongHan Shin. Leakage-Resilient and Proactive Authenticated Key Exchange (LRP-AKE), Reconsidered |
1894 | -- | 1901 | Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida. Provable-Security Analysis of Authenticated Encryption Based on Lesamnta-LW in the Ideal Cipher Model |
1902 | -- | 1912 | Tianshi Mu, Huabing Zhang, Jian Wang, Huijuan Li. CoLaFUZE: Coverage-Guided and Layout-Aware Fuzzing for Android Drivers |
1913 | -- | 1922 | Shuhei Nishiyama, Chonho Lee, Tomohiro Mashita. Solving 3D Container Loading Problems Using Physics Simulation for Genetic Algorithm Evaluation |
1923 | -- | 1929 | Kenya Tajima, Yoshihiro Hirohashi, Esmeraldo Ronnie Rey Zara, Tsuyoshi Kato. Frank-Wolfe Algorithm for Learning SVM-Type Multi-Category Classifiers |
1930 | -- | 1940 | Mariana Rodrigues Makiuchi, Tifani Warnita, Nakamasa Inoue, Koichi Shinoda, Michitaka Yoshimura, Momoko Kitazawa, Kei Funaki, Yoko Eguchi, Taishiro Kishimoto. Speech Paralinguistic Approach for Detecting Dementia Using Gated Convolutional Neural Network |
1941 | -- | 1950 | Pedro Gabriel Fonteles Furtado, Tsukasa Hirashima, Nawras Khudhur, Aryo Pinandito, Yusuke Hayashi. Influence of Access to Reading Material during Concept Map Recomposition in Reading Comprehension and Retention |
1951 | -- | 1962 | Makoto Yasukawa, Yasushi Makihara, Toshinori Hosoi, Masahiro Kubo, Yasushi Yagi. Gait Phase Partitioning and Footprint Detection Using Mutually Constrained Piecewise Linear Approximation with Dynamic Programming |
1963 | -- | 1970 | Lei Wang, Jie Zhu, Kangbo Sun. A Multi-Task Scheme for Supervised DNN-Based Single-Channel Speech Enhancement by Using Speech Presence Probability as the Secondary Training Target |
1971 | -- | 1980 | Satoshi Mizoguchi, Yuki Saito, Shinnosuke Takamichi, Hiroshi Saruwatari. DNN-Based Low-Musical-Noise Single-Channel Speech Enhancement Based on Higher-Order-Moments Matching |
1981 | -- | 1991 | Thi Thu Thao Khong, Takashi Nakada, Yasuhiko Nakashima. Flexible Bayesian Inference by Weight Transfer for Robust Deep Neural Networks |
1992 | -- | 2001 | Andi Hendra, Yasushi Kanazawa. Smaller Residual Network for Single Image Depth Estimation |
2002 | -- | 2010 | Fuma Horie, Hideaki Goto, Takuo Suganuma. Synthetic Scene Character Generator and Ensemble Scheme with the Random Image Feature Method for Japanese and Chinese Scene Character Recognition |
2011 | -- | 2014 | Sooyong Jeong, Sungdeok Cha, Woo Jin Lee. Usage Log-Based Testing of Embedded Software and Identification of Dependencies among Environmental Components |
2015 | -- | 2018 | Zhentian Wu, Feng Yan, Zhihua Yang, Jingya Yang. Dynamic Incentive Mechanism for Industrial Network Congestion Control |
2019 | -- | 2023 | Yan Zhao, Yue Xie, Ruiyu Liang, Li Zhang, Li Zhao, Chengyu Liu. Detecting Depression from Speech through an Attentive LSTM Network |
2024 | -- | 2027 | Xinran Liu, Zhongju Wang, Long Wang, Chao Huang 0002, Xiong Luo. A Hybrid Retinex-Based Algorithm for UAV-Taken Image Enhancement |