Journal: IEICE Trans. Inf. Syst.

Volume 103-D, Issue 9

1929 -- 1938Daichi Teruya, Hironori Nakajo. A Ruby-Based Hardware/Software Co-Design Environment with Functional Reactive Programming: Mulvery
1939 -- 1948ChangCheng Wu, Min Wang, Junjie Wang, Weiming Luo, Jiafeng Hua, Xitao Chen, Wei Geng, Yu Lu, Wei Sun. Improved Neighborhood Based Switching Filter for Protecting the Thin Curves in Arbitrary Direction in Color Images
1949 -- 1959Yuechao Lu, Yasuyuki Matsushita, Fumihiko Ino. Block Randomized Singular Value Decomposition on GPUs
1960 -- 1970Rousslan Fernand Julien Dossa, Xinyu Lian, Hirokazu Nomoto, Takashi Matsubara, Kuniaki Uehara. Hybrid of Reinforcement and Imitation Learning for Human-Like Agents
1971 -- 1977Keisuke Imoto, Seisuke Kyochi. Sound Event Detection Utilizing Graph Laplacian Regularization with Event Co-Occurrence
1978 -- 1987Yuki Saito, Kei Akuzawa, Kentaro Tachibana. Joint Adversarial Training of Speech Recognition and Synthesis Models for Many-to-One Voice Conversion Using Phonetic Posteriorgrams
1988 -- 1997Takayuki Nakachi, Hitoshi Kiya. Secure OMP Computation Maintaining Sparse Representations and Its Application to EtC Systems
1998 -- 2002Jiang Wu, Jianjun Xu, Xiankai Meng, Yan Lei. A Highly Reliable Compilation Optimization Passes Sequence Generation Framework
2003 -- 2006Ying Sun, Xiao-Yuan Jing, Fei Wu 0004, Yanfei Sun. Selective Pseudo-Labeling Based Subspace Learning for Cross-Project Defect Prediction
2007 -- 2010Jin Myoung Kim, Hae Young Lee. Node Density Loss Resilient Report Generation Method for the Statistical Filtering Based Sensor Networks
2011 -- 2014Jianfei Chen 0003, Xiaowei Zhu, Yuehua Li. Super-Resolution Imaging Method for Millimeter Wave Synthetic Aperture Interferometric Radiometer
2015 -- 2018Feng Yang, Zheng Ma 0005, Mei Xie. Visual Recognition Method Based on Hybrid KPCA Network
2019 -- 2022Bin Chen, Jili Yan. Fresh Tea Shoot Maturity Estimation via Multispectral Imaging and Deep Label Distribution Learning
2023 -- 2026Vantruong Nguyen, Jueping Cai, Linyu Wei, Jie Chu. Neural Networks Probability-Based PWL Sigmoid Function Approximation
2027 -- 2031Yoshitaka Nozaki, Takashi Watanabe. Development of Artificial Neural Network Based Automatic Stride Length Estimation Method Using IMU: Validation Test with Healthy Subjects
2032 -- 2034Keiichiro Inagaki, Tatsuya Maruno, Kota Yamamoto. Evaluation of EEG Activation Pattern on the Experience of Visual Perception in the Driving

Volume 103-D, Issue 8

1782 -- 0Ken Mano. Foreword
1783 -- 1793Ryuichi Takahashi. Evaluation the Redundancy of the IoT System Based on Individual Sensing Probability
1794 -- 1805Masahiro Matsubara, Tatsuhiro Tsuchiya. Model Checking of Automotive Control Software: An Industrial Approach
1806 -- 1809Xinxin Hu, Caixia Liu, Shuxin Liu, Jinsong Li, Xiaotao Cheng. A Vulnerability in 5G Authentication Protocols and Its Countermeasure
1810 -- 1813Marika Izawa, Toshiyuki Miyamoto. A Study on Re-Constructibility of Event Structures
1814 -- 1824Shin Morishima, Hiroki Matsutani. In-GPU Cache for Acceleration of Anomaly Detection in Blockchain
1825 -- 1832Hatoon S. AlSagri, Mourad Ykhlef. Machine Learning-Based Approach for Depression Detection in Twitter Using Content and Activity Features
1833 -- 1842Kyohei Atarashi, Satoshi Oyama, Masahito Kurihara. Link Prediction Using Higher-Order Feature Combinations across Objects
1843 -- 1855Saung Hnin Pwint Oo, Nguyen Duy Hung, Thanaruk Theeramunkong. Knowledge Integration by Probabilistic Argumentation
1856 -- 1864Takafumi Higashi, Hideaki Kanai. Improvement of Pressure Control Skill with Knife Device for Paper-Cutting
1865 -- 1874Zeynep Yücel, Parisa Supitayakul, Akito Monden, Pattara Leelaprute. An Algorithm for Automatic Collation of Vocabulary Decks Based on Word Frequency
1875 -- 1887Ki-Seung Lee. Silent Speech Interface Using Ultrasonic Doppler Sonar
1888 -- 1900Jianmei Zhang, Pengyu Wang 0005, Feiyang Gong, Hongqing Zhu, Ning Chen. Content-Based Superpixel Segmentation and Matching Using Its Region Feature Descriptors
1901 -- 1910Hwanhee Kim, Teasung Hahn, SooKyun Kim, Shinjin Kang. Graph Based Wave Function Collapse Algorithm for Procedural Content Generation in Games
1911 -- 1915Sangwon Seo, Sangbae Yun, Jae-Hong Kim, Inkyo Kim, Seongwook Jin, Seungryoul Maeng. H-TLA: Hybrid-Based and Two-Level Addressing Architecture for IoT Devices and Services
1916 -- 1919Yixi Xie, Lixin Ji, Xiaotao Cheng. An Attention-Based GRU Network for Anomaly Detection from System Logs
1920 -- 1923JiYeoun Lee, Hee-Jin Choi. Deep Learning Approaches for Pathological Voice Detection Using Heterogeneous Parameters
1924 -- 1927Yao Ge, Rui Chen 0009, Ying Tong, Xuehong Cao, Ruiyu Liang. Combining Siamese Network and Regression Network for Visual Tracking

Volume 103-D, Issue 7

1431 -- 1432Kazuomi Oishi. Foreword
1433 -- 1447Kwangjo Kim. Intrusion Detection System Using Deep Learning and Its Application to Wi-Fi Network
1448 -- 1461Heung-Youl Youm. An Overview of De-Identification Techniques and Their Standardization Directions
1462 -- 1475Hiroki Kuzuno, Toshihiro Yamauchi. Identification of Kernel Memory Corruption Using Kernel Memory Secret Observation Mechanism
1476 -- 1492Toshinori Usui, Tomonori Ikuse, Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, Kanta Matsuura. ROPminer: Learning-Based Static Detection of ROP Chain Considering Linkability of ROP Gadgets
1493 -- 1511Daiki Chiba 0001, Ayako Akiyama Hasegawa, Takashi Koide, Yuta Sawabe, Shigeki Goto, Mitsuaki Akiyama. DomainScouter: Analyzing the Risks of Deceptive Internationalized Domain Names
1512 -- 1523Fumihiro Kanei, Daiki Chiba 0001, Kunio Hato, Katsunari Yoshioka, Tsutomu Matsumoto, Mitsuaki Akiyama. Detecting and Understanding Online Advertising Fraud in the Wild
1524 -- 1540Asuka Nakajima, Takuya Watanabe 0001, Eitaro Shioji, Mitsuaki Akiyama, Maverick Woo. 1-day, 2 Countries - A Study on Consumer IoT Device Vulnerability Disclosure and Patch Release in Japan and the United States
1541 -- 1555Keika Mori, Takuya Watanabe 0001, Yunao Zhou, Ayako Akiyama Hasegawa, Mitsuaki Akiyama, Tatsuya Mori. Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?
1556 -- 1597Pratish Datta, Tatsuaki Okamoto, Katsuyuki Takashima. Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption
1598 -- 1607Katsunari Shishido, Atsuko Miyaji. Online-Efficient Interval Test via Secure Empty-Set Check
1608 -- 1617Han-Yan Wu, Ling-Hwei Chen, Yu-Tai Ching. A Multilayer Steganography Method with High Embedding Efficiency for Palette Images
1618 -- 1622Kento Hasegawa, Masao Yanagisawa, Nozomu Togawa. Trojan-Net Classification for Gate-Level Hardware Design Utilizing Boundary Net Structures
1623 -- 1632Kokoro Kobayashi, Tsuyoshi Oguni, Masaki Nakagawa. A Series of PIN/Password Input Methods Resilient to Shoulder Hacking Based on Cognitive Difficulty of Tracing Multiple Key Movements
1633 -- 1646Takafumi Kubota, Naohiro Aota, Kenji Kono. Logging Inter-Thread Data Dependencies in Linux Kernel
1647 -- 1659Sanghun Choi, Shuichiro Haruta, Yichen An, Iwao Sasase. A Server-Based Distributed Storage Using Secret Sharing with AES-256 for Lightweight Safety Restoration
1660 -- 1671Kenta Ishiguro, Kenji Kono. Instruction Filters for Mitigating Attacks on Instruction Emulation in Hypervisors
1672 -- 1682Masashi Tsuchida, Fukuhito Ooshita, Michiko Inoue. Byzantine-Tolerant Gathering of Mobile Agents in Asynchronous Arbitrary Networks with Authenticated Whiteboards
1683 -- 1692Taewhan Kim, Kangsoo Jung, Seog Park. Sparsity Reduction Technique Using Grouping Method for Matrix Factorization in Differentially Private Recommendation Systems
1693 -- 1702Kota Kudo, Yuichi Takano, Ryo Nomura. Stochastic Discrete First-Order Algorithm for Feature Subset Selection
1703 -- 1709Yizhong Xin, Ruonan Liu, Yan Li. Strategy for Improving Target Selection Accuracy in Indirect Touch Input
1710 -- 1721Ayumi Yamazaki, Yuki Hayashi, Kazuhisa Seta. Model-Based Development of Spatial Movement Skill Training System and Its Evaluation
1722 -- 1731Lia Sadita, Pedro Gabriel Fonteles Furtado, Tsukasa Hirashima, Yusuke Hayashi. Analysis of The Similarity of Individual Knowledge and The Comprehension of Partner's Representation during Collaborative Concept Mapping with Reciprocal Kit Build Approach
1732 -- 1743Lu Yin, Junfeng Li, Yonghong Yan 0002, Masato Akagi. A Two-Stage Phase-Aware Approach for Monaural Multi-Talker Speech Separation
1744 -- 1752Yun Hu, Changwen Zheng. A Double Adversarial Network Model for Multi-Domain and Multi-Task Chinese Named Entity Recognition
1753 -- 1759Keiichiro Inagaki, Takayuki Kannon, Yoshimi Kamiyama, Shiro Usui. Effect of Fixational Eye Movement on Signal Processing of Retinal Photoreceptor: A Computational Study
1760 -- 1764Yong Yang, Junwei Lu, Baoxian Wang, Weigang Zhao. Analysis on Wave-Velocity Inverse Imaging for the Supporting Layer in Ballastless Track
1765 -- 1768Jingyu Li, Dandan Xiao, Yue Zhang. A 10.4-Gs/s High-Resolution Wideband Radar Sampling System Based on TIADC Technique
1769 -- 1772Hae Young Lee, Jin Myoung Kim. Systematic Detection of State Variable Corruptions in Discrete Event System Specification Based Simulation
1773 -- 1776He Li 0006, Yanna Liu, Xuhua Wang, LiangCai Su, Hang Yuan, Jae Soo Yoo. An Efficient Method for Graph Repartitioning in Distributed Environments
1777 -- 1781Minseong Kim, Hyun Chul Choi. Improving Faster R-CNN Framework for Multiscale Chinese Character Detection and Localization

Volume 103-D, Issue 6

1208 -- 0Atsuto Maki. Foreword
1209 -- 1216Kohei Sendo, Norimichi Ukita. Heatmapping of Group People Involved in the Group Activity
1217 -- 1225Kazuki Kawamura, Takashi Matsubara, Kuniaki Uehara. Deep State-Space Model for Noise Tolerant Skeleton-Based Action Recognition
1226 -- 1235Songlin Du, Yuan Li, Takeshi Ikenaga. Temporally Forward Nonlinear Scale Space for High Frame Rate and Ultra-Low Delay A-KAZE Matching System
1236 -- 1246Songlin Du, Zhe Wang, Takeshi Ikenaga. Temporal Constraints and Block Weighting Judgement Based High Frame Rate and Ultra-Low Delay Mismatch Removal System
1247 -- 1256Takeru Oba, Norimichi Ukita. Instance Segmentation by Semi-Supervised Learning and Image Synthesis
1257 -- 1264Takuya Matsumoto, Kodai Shimosato, Takahiro Maeda, Tatsuya Murakami, Koji Murakoso, Kazuhiko Mino, Norimichi Ukita. Human Pose Annotation Using a Motion Capture System for Loose-Fitting Clothes
1265 -- 1275Hitoshi Nishimura, Naoya Makibuchi, Kazuyuki Tasaka, Yasutomo Kawanishi, Hiroshi Murase. Multiple Human Tracking Using an Omnidirectional Camera with Local Rectification and World Coordinates Representation
1276 -- 1286Kenta Nishiyuki, Jia-Yau Shiau, Shigenori Nagae, Tomohiro Yabuuchi, Koichi Kinoshita, Yuki Hasegawa, Takayoshi Yamashita, Hironobu Fujiyoshi. Driver Drowsiness Estimation by Parallel Linked Time-Domain CNN with Novel Temporal Measures on Eye States
1287 -- 0Fumihiro Kumeno. Foreword
1288 -- 1296Mondheera Pituxcoosuvarn, Takao Nakaguchi, Donghui Lin, Toru Ishida 0001. Privacy-Aware Best-Balanced Multilingual Communication
1297 -- 1308Yutaka Matsuno, Toshinori Takai, Shuichiro Yamamoto. Facilitating Use of Assurance Cases in Industries by Workshops with an Agent-Based Method
1309 -- 1318Hiroyuki Nakagawa, Hironori Shimada, Tatsuhiro Tsuchiya. Interactive Goal Model Construction Based on a Flow of Questions
1319 -- 1327Yukasa Murakami, Masateru Tsunoda, Koji Toda. Evaluation of Software Fault Prediction Models Considering Faultless Cases
1328 -- 1338Rongcun Wang, Shujuan Jiang, Kun Zhang, Qiao Yu. Improving the Accuracy of Spectrum-Based Fault Localization Using Multiple Rules
1339 -- 1354Yoshihiko Omori, Takao Yamashita. Extended Inter-Device Digital Rights Sharing and Transfer Based on Device-Owner Equality Verification Using Homomorphic Encryption
1355 -- 1361Tian Xie, Hongchang Chen, Tuosiyu Ming, Jianpeng Zhang, Chao Gao, Shaomei Li, Yuehang Ding. Partial Label Metric Learning Based on Statistical Inference
1362 -- 1370Zizheng Ji, Zhengchao Lei, Tingting Shen, Jing Zhang. Joint Representations of Knowledge Graphs and Textual Information via Reference Sentences
1371 -- 1379Chen Chen, Huaxin Xiao, Yu Liu 0008, Maojun Zhang. Dual-Task Integrated Network for Fast Pedestrian Detection in Crowded Scenes
1380 -- 1387Haoran Li, Binyu Wang, Jisheng Dai, Tianhong Pan. 1-norm Minimization Problems
1388 -- 1394Ruilin Pan, Chuanming Ge, Li Zhang, Wei Zhao, Xun Shao. A New Similarity Model Based on Collaborative Filtering for New User Cold Start Recommendation
1395 -- 1405Daisuke Saito, Nobuaki Minematsu, Keikichi Hirose. Tensor Factor Analysis for Arbitrary Speaker Conversion
1406 -- 1413Yi-Ze Le, Yong Feng 0002, Dajiang Liu, Baohua Qiang. Adversarial Metric Learning with Naive Similarity Discriminator
1414 -- 1418Guangyuan Liu, Daokun Chen. Survivable Virtual Network Topology Protection Method Based on Particle Swarm Optimization
1419 -- 1422Feng-Li Shen, Zhe-Ming Lu. A Semantic Similarity Supervised Autoencoder for Zero-Shot Learning
1423 -- 1426Zaiyu Pan, Jun Wang. Hand-Dorsa Vein Recognition Based on Selective Deep Convolutional Feature
1427 -- 1430Danyang Liu, Ji Xu, Pengyuan Zhang. End-to-End Multilingual Speech Recognition System with Language Supervision Training

Volume 103-D, Issue 5

914 -- 915Shingo Otsuka, Jun Miyazaki. Foreword
916 -- 927Che-Wen Chen, Shih-Pang Tseng, Pin-Chieh Chen, Jhing-Fa Wang. On the Design of a Happiness Cups System: A Smart Device for Health Care and Happiness Improvement Using LSTM
928 -- 938Yiling Dai, Masatoshi Yoshikawa, Yasuhito Asano. Estimating Knowledge Category Coverage by Courses Based on Centrality in Taxonomy
939 -- 948Hideaki Ohashi, Yasuhito Asano, Toshiyuki Shimizu, Masatoshi Yoshikawa. Adaptive Balanced Allocation for Peer Assessments
949 -- 957Hironori Ito, Yasuhito Asano. Composition Proposal Generation for Manga Creation Support
958 -- 968Md. Mostafizur Rahman, Atsuhiro Takasu. Leveraging Entity-Type Properties in the Relational Context for Knowledge Graph Embedding
969 -- 981Kosetsu Tsukuda, Masahiro Hamasaki, Masataka Goto. Modeling N-th Order Derivative Creation Based on Content Attractiveness and Time-Dependent Popularity
982 -- 991Kento Sugiura, Yoshiharu Ishikawa. Multiple Regular Expression Pattern Monitoring over Probabilistic Event Streams
992 -- 1001Kaoru Katayama, Takashi Hirashima. A Retrieval Method for 3D CAD Assembly Models Using 3D Radon Transform and Spherical Harmonic Transform
1002 -- 1005Shize Kang, Lixin Ji, Zhenglian Li, Xindi Hao, Yuehang Ding. Iterative Cross-Lingual Entity Alignment Based on TransC
1006 -- 1012Junwei Bao 0003, Dazhuan Xu, Hao Luo 0005, Ruidan Zhang, Fei Wang. Design and SNR Optimization for Multi-Relay Compress-and-Forward System Based on CEO Theory
1013 -- 1022Wei Ge, Shenghua Chen, Benyu Liu, Min Zhu, Bo Liu 0019. A Power Analysis Attack Countermeasure Based on Random Data Path Execution For CGRA
1023 -- 1030Hideo Fujiwara, Katsuya Fujiwara, Toshinori Hosokawa. Universal Testing for Linear Feed-Forward/Feedback Shift Registers
1031 -- 1038Hiroaki Akutsu, Takahiro Naruko. End-to-End Deep ROI Image Compression
1039 -- 1054Masaya Okada, Yasutaka Kuroki, Masahiro Tada. Multimodal Analytics to Understand Self-Regulation Process of Cognitive and Behavioral Strategies in Real-World Learning
1055 -- 1066Makio Ishihara, Ryo Kawashima. Multi-Distance Function Trilateration over k-NN Fingerprinting for Indoor Positioning and Its Evaluation
1067 -- 1077Teruhiro Mizumoto, Yasuhiro Otoda, Chihiro Nakajima, Mitsuhiro Kohana, Motohiro Uenishi, Keiichi Yasumoto, Yutaka Arakawa. Design and Implementation of Sensor-Embedded Chair for Continuous Sitting Posture Recognition
1078 -- 1087Sila Chunwijitra, Phondanai Khanti, Supphachoke Suntiwichaya, Kamthorn Krairaksa, Pornchai Tummarattananont, Marut Buranarach, Chai Wutiwiwatchai. Development of MOOC Service Framework for Life Long Learning: A Case Study of Thai MOOC
1088 -- 1098Hiroshi Shimanuki, Toyohide Watanabe, Koichi Asakura, Hideki Sato, Taketoshi Ushiama. Anomaly Detection of Folding Operations for Origami Instruction with Single Camera
1099 -- 1107Mohammed Salah Al-Radhi, Tamás Gábor Csapó, Géza Németh. Continuous Noise Masking Based Vocoder for Statistical Parametric Speech Synthesis
1108 -- 1117Thuan Van Ngo, Rieko Kubo, Masato Akagi. Mimicking Lombard Effect: An Analysis and Reconstruction
1118 -- 1125Bin Chen. Air Quality Index Forecasting via Deep Dictionary Learning
1126 -- 1134Nobuhiko Wagatsuma, Mika Urabe, Ko Sakai. Perception and Saccades during Figure-Ground Segregation and Border-Ownership Discrimination in Natural Contours
1135 -- 1143Koji Kamma, Yuki Isoda, Sarimu Inoue, Toshikazu Wada. Neural Behavior-Based Approach for Neural Network Pruning
1144 -- 1152Osama Ouda, Slim Chaoui, Norimichi Tsumura. Security Evaluation of Negative Iris Recognition
1153 -- 1163Jiaquan Wu, Feiteng Li, Zhijian Chen, Xiaoyan Xiang, Yu Pu. Patient-Specific ECG Classification with Integrated Long Short-Term Memory and Convolutional Neural Networks
1164 -- 1167Jin-Taek Seong. A New Upper Bound for Finding Defective Samples in Group Testing
1168 -- 1172Takahiro Hirofuchi, Ryousei Takano. A Prompt Report on the Performance of Intel Optane DC Persistent Memory Module
1173 -- 1176Young-Su Jang. Detection of SQL Injection Vulnerability in Embedded SQL
1177 -- 1180Jing Sun, Yi-mu Ji, Shangdong Liu, Fei Wu 0004. Cost-Sensitive and Sparse Ladder Network for Software Defect Prediction
1181 -- 1184Sheng-Hong Lin, Jin-Yuan Wang, Ying Xu, Jianxin Dai. Enhanced Secure Transmission for Indoor Visible Light Communications
1185 -- 1189Linjun Sun, Weijun Li, Xin-ning, Liping Zhang, Xiaoli Dong, Wei He. Gradient-Enhanced Softmax for Face Recognition
1190 -- 1194Xin Long, Xiangrong Zeng, Chen Chen, Huaxin Xiao, Maojun Zhang. Loss-Driven Channel Pruning of Convolutional Neural Networks
1195 -- 1198Chao-Yuan Kao, Sangwook Park, Alzahra Badi, David K. Han, Hanseok Ko. Orthogonal Gradient Penalty for Fast Training of Wasserstein GAN Based Multi-Task Autoencoder toward Robust Speech Recognition
1199 -- 1202Shinya Horiike, Masanori Morise. Voice Conversion for Improving Perceived Likability of Uttered Speech
1203 -- 1207Yuki Kurosawa, Shinya Mochiduki, Yuko Hoshino, Mitsuho Yamada. Measurement of Fatigue Based on Changes in Eye Movement during Gaze

Volume 103-D, Issue 4

728 -- 729Susumu Kunifuji, Thanaruk Theeramunkong, Takayuki Ito. Foreword
730 -- 738Takafumi Higashi, Hideaki Kanai. Improvement in the Effectiveness of Cutting Skill Practice for Paper-Cutting Creations Based on the Steering Law
739 -- 747Tachanun Kangwantrakool, Kobkrit Viriyayudhakorn, Thanaruk Theeramunkong. Software Development Effort Estimation from Unstructured Software Project Description by Sequence Models
748 -- 758Uraiwan Buatoom, Waree Kongprawechnon, Thanaruk Theeramunkong. Improving Seeded k-Means Clustering with Deviation- and Entropy-Based Term Weightings
759 -- 770Shun Okuhara, Takayuki Ito. Compromising Strategies for Agents in Multiple Interdependent Issues Negotiation
771 -- 778Konlakorn Wongaptikaseree, Panida Yomaboot, Kantinee Katchapakirin, Yongyos Kaewpitakkun. Social Behavior Analysis and Thai Mental Health Questionnaire (TMHQ) Optimization for Depression Detection System
779 -- 788Rachasak Somyanonthanakul, Thanaruk Theeramunkong. Characterization of Interestingness Measures Using Correlation Analysis and Association Rule Mining
789 -- 795Kedir Mamo Besher, Juan Ivan Nieto-Hipólito, Juan De Dios Sánchez-López, Mabel Vázquez-Briseno, Raymundo Buenrostro-Mariscal. Cognition-Based Delay Analysis to Determine the Average Minimum Time Limit for Wireless Sensor Communications
796 -- 799Jun Munemori, Kohei Komori, Junko Itou. GUNGEN-Heartbeat: A Support System for High Quality Idea Generation Using Heartbeat Variance
800 -- 812Yajun Wu, Satoshi Yamane. Model Checking of Real-Time Properties for Embedded Assembly Program Using Real-Time Temporal Logic RTCTL and Its Application to Real Microcontroller Software
813 -- 824Xinxin Han, Jian Ye, Jia Luo, Haiying Zhou. The Effect of Axis-Wise Triaxial Acceleration Data Fusion in CNN-Based Human Activity Recognition
825 -- 837Ye Peng, Wentao Zhao, Wei Cai 0002, Jinshu Su, Biao Han, Qiang Liu 0004. Evaluating Deep Learning for Image Classification in Adversarial Environment
838 -- 849Shota Shiratori, Yuichiro Fujimoto, Kinya Fujita. Predicting Uninterruptible Durations of Office Workers by Using Probabilistic Work Continuance Model
850 -- 865Shi-Chei Hung, Da-Chun Wu, Wen-Hsiang Tsai. Data Hiding in Computer-Generated Stained Glass Images and Its Applications to Information Protection
866 -- 873Van-Hai Vu, Quang-Phuoc Nguyen, Kiem-Hieu Nguyen, Joon-Choul Shin, Cheol-Young Ock. Korean-Vietnamese Neural Machine Translation with Named Entity Recognition and Part-of-Speech Tags
874 -- 878Dong Kwan Kim. A Deep Neural Network-Based Approach to Finding Similar Code Segments
879 -- 882Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park. Robust CAPTCHA Image Generation Enhanced with Adversarial Example Methods
883 -- 887Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park. Multi-Targeted Backdoor: Indentifying Backdoor Attack for Multiple Deep Neural Networks
888 -- 891Minhae Jang, Yeonseung Ryu, Jik-Soo Kim, Minkyoung Cho. Against Insider Threats with Hybrid Anomaly Detection with Local-Feature Autoencoder and Global Statistics (LAGS)
892 -- 895Kazuteru Namba. Master-Slave FF Using DICE Capable of Tolerating Soft Errors Occurring Around Clock Edge
896 -- 900Minkyoung Cho, Jik-Soo Kim, Jongho Shin, Incheol Shin. Mal2d: 2d Based Deep Learning Model for Malware Detection Using Black and White Binary Image
901 -- 904Taisuke Kawamata, Takako Akakura. Sequential Authentication Using Handwriting Biometrics for Free Response e-Testing
905 -- 909Siyang Yu, Kazuaki Kondo, Yuichi Nakamura, Takayuki Nakajima, Masatake Dantsuji. Investigation on e-Learning Status Estimation for New Learners - Classifier Selection on Representative Sample Selection
910 -- 913Cheng Xu, Wei Han, Dongzhen Wang, Daqing Huang. Salient Region Detection with Multi-Feature Fusion and Edge Constraint

Volume 103-D, Issue 12

2411 -- 0Fukuhito Ooshita. Foreword
2412 -- 2420Lucas Saad Nogueira Nunes, Jacir Luiz Bordim, Yasuaki Ito, Koji Nakano. A Rabin-Karp Implementation for Handling Multiple Pattern-Matching on the GPU
2421 -- 2434Jingcheng Shen, Fumihiko Ino, Albert Farrés, Mauricio Hanzich. A Data-Centric Directive-Based Framework to Accelerate Out-of-Core Stencil Computation on a GPU
2435 -- 2443Ke Cui, Michihiro Koibuchi. Efficient Two-Opt Collective-Communication Operations on Low-Latency Random Network Topologies
2444 -- 2456Chenxu Wang, Yutong Lu, Zhiguang Chen, Junnan Li. An Efficient Method for Training Deep Learning Networks Distributed
2457 -- 2462YuXi Sun, Hideharu Amano. FiC-RNN: A Multi-FPGA Acceleration Framework for Deep Recurrent Neural Networks
2463 -- 2470Masayuki Shimoda, Youki Sada, Ryosuke Kuramochi, Shimpei Sato, Hiroki Nakahara. SENTEI: Filter-Wise Pruning with Distillation towards Efficient Sparse Convolutional Neural Network Accelerators
2471 -- 2479Ryuta Kawano, Ryota Yasudo, Hiroki Matsutani, Michihiro Koibuchi, Hideharu Amano. Traffic-Independent Multi-Path Routing for High-Throughput Data Center Networks
2480 -- 2493Yao Hu, Michihiro Koibuchi. Application Mapping and Scheduling of Uncertain Communication Patterns onto Non-Random and Random Network Topologies
2494 -- 2503Hiromu Miyazaki, Takuto Kanamori, Md. Ashraful Islam, Kenji Kise. RVCoreP: An Optimized RISC-V Soft Processor of Five-Stage Pipelining
2504 -- 2517Elsayed A. Elsayed, Kenji Kise. High-Performance and Hardware-Efficient Odd-Even Based Merge Sorter
2518 -- 2524Shougo Inoue, Satoshi Fujita. Collaborative Illustrator with Android Tablets Communicating through WebRTC
2525 -- 2527SeokHwan Kong, Saikia Dipjyoti, Jaiyong Lee. Programmable Chip Based High Performance MEC Router for Ultra-Low Latency and High Bandwidth Services in Distributed Computing Environment
2528 -- 2529Yasuhiro Nakahara, Masato Kiyama, Motoki Amagasaki, Masahiro Iida. Relationship between Recognition Accuracy and Numerical Precision in Convolutional Neural Network Models
2530 -- 0Yuichi Sei. Foreword
2531 -- 2539Yuta Hosokawa, Katsuhide Fujita. Opponent's Preference Estimation Considering Their Offer Transition in Multi-Issue Closed Negotiations
2540 -- 2548Ryohei Kawata, Katsuhide Fujita. Meta-Strategy Based on Multi-Armed Bandit Approach for Multi-Time Negotiation
2549 -- 2558Xiaoxuan Guo, Renxi Gong, Haibo Bao, Zhenkun Lu. A Multiobjective Optimization Dispatch Method of Wind-Thermal Power System
2559 -- 2567Ho Young Kim, Seong-Won Lee. Lifespan Extension of an IoT System with a Fixed Lithium Battery
2568 -- 2577Akkharawoot Takhom, Sasiporn Usanavasin, Thepchai Supnithi, Prachya Boonkwan. A Collaborative Framework Supporting Ontology Development Based on Agile and Scrum Model
2578 -- 2589Ying Ji, Yu Wang, Jien Kato, Kensaku Mori. Predicting Violence Rating Based on Pairwise Comparison
2590 -- 2599Hayato Yamaki, Hiroaki Nishi, Shinobu Miwa, Hiroki Honda. RPC: An Approach for Reducing Compulsory Misses in Packet Processing Cache
2600 -- 2610Sanghun Choi, Yichen An, Iwao Sasase. A Lightweight Detection Using Bloom Filter against Flooding DDoS Attack
2611 -- 2619Haitao Xie, Qingtao Fan, Qian Xiao. A Social Collaborative Filtering Method to Alleviate Data Sparsity Based on Graph Convolutional Networks
2620 -- 2631Kazuki Seshimo, Akira Ota, Daichi Nishio, Satoshi Yamane. Practical Evaluation of Online Heterogeneous Machine Learning
2632 -- 2642Hiroyuki Okuda, Nobuto Sugie, Tatsuya Suzuki 0001, Kentaro Haraguchi, Zibo Kang. Simultaneous Realization of Decision, Planning and Control for Lane-Changing Behavior Using Nonlinear Model Predictive Control
2643 -- 2648Liyang Zhang, Hiroyuki Suzuki, Akio Koyama. Smart Tableware-Based Meal Information Recognition by Comparing Supervised Learning and Multi-Instance Learning
2649 -- 2658Kazunori Iwata 0001. Revisiting a Nearest Neighbor Method for Shape Classification
2659 -- 2672Noriyuki Matsunaga, Yamato Ohtani, Tatsuya Hirahara. Loss Function Considering Multiple Attributes of a Temporal Sequence for Feed-Forward Neural Networks
2673 -- 2681Junya Koguchi, Shinnosuke Takamichi, Masanori Morise, Hiroshi Saruwatari, Shigeki Sagayama. DNN-Based Full-Band Speech Synthesis Using GMM Approximation of Spectral Envelope
2682 -- 2692Tomohiro Takahashi, Katsumi Konishi, Kazunori Uruma, Toshihiro Furukawa. Multiple Subspace Model and Image-Inpainting Algorithm Based on Multiple Matrix Rank Minimization
2693 -- 2700Kangbo Sun, Jie Zhu. A Two-Stage Approach for Fine-Grained Visual Recognition via Confidence Ranking and Fusion
2701 -- 2708Manabu Okawa. Online Signature Verification Using Single-Template Matching Through Locally and Globally Weighted Dynamic Time Warping
2709 -- 2712Shi Qiu, Daniel M. Germán, Katsuro Inoue. A Machine Learning Method for Automatic Copyright Notice Identification of Source Files
2713 -- 2716Guangyuan Liu, Daokun Chen. DVNR: A Distributed Method for Virtual Network Recovery
2717 -- 2720Mengmeng Li, Xiaoguang Ren, Yanzhen Wang, Wei Qin, Yi Liu 0043. Advanced Antlion Optimizer with Discrete Ant Behavior for Feature Selection
2721 -- 2724Farzin Matin, Yoosoo Jeong, Hanhoon Park. Retinex-Based Image Enhancement with Particle Swarm Optimization and Multi-Objective Function
2725 -- 2729Yubo Liu, Yangting Lai, Jianyong Chen, Lingyu Liang, Qiaoming Deng. SCUT-AutoALP: A Diverse Benchmark Dataset for Automatic Architectural Layout Parsing

Volume 103-D, Issue 11

2250 -- 2261Hiroshi Matsuura. Tree Node Switching Algorithm for Minimum Energy Cost Aggregation Tree Problem in Wireless Sensor Networks
2262 -- 2277Katsuhisa Maruyama, Shinpei Hayashi, Takayuki Omori. ChangeMacroRecorder: Accurate Recording of Fine-Grained Textual Changes of Source Code
2278 -- 2288Yasunori Ishihara, Takashi Hayata, Toru Fujiwara. The Absolute Consistency Problem for Relational Schema Mappings with Functional Dependencies
2289 -- 2301Hanan T. Al-Awadhi, Tomoki Aono, Senling Wang, Yoshinobu Higami, Hiroshi Takahashi, Hiroyuki Iwata, Yoichi Maeda, Jun Matsushima. FF-Control Point Insertion (FF-CPI) to Overcome the Degradation of Fault Detection under Multi-Cycle Test for POST
2302 -- 2313Kazuaki Kondo, Takuto Fujiwara, Yuichi Nakamura. Non-Linear Distance Filter for Modeling Effect of a Large Pointer Used in a Gesture-Based Pointing Interface
2314 -- 2322Takahide Ito, Yuichi Nakamura, Kazuaki Kondo, Espen Knoop, Jonathan Rossiter. Design and Performance Analysis of a Skin-Stretcher Device for Urging Head Rotation
2323 -- 2331Yoshihiro Hirohashi, Tsuyoshi Kato. k SVM
2332 -- 2339Norihide Kitaoka, Eichi Seto, Ryota Nishimura. Example Phrase Adaptation Method for Customized, Example-Based Dialog System Using User Data and Distributed Word Representations
2340 -- 2350Takuya Kishida, Toru Nakashika. Speech Chain VC: Linking Linguistic and Acoustic Levels via Latent Distinctive Features for RBM-Based Voice Conversion
2351 -- 2361Takayuki Nakata, Isao Nishihara. Dynamic Image Adjustment Method and Evaluation for Glassless 3D Viewing Systems
2362 -- 2370Kento Terao, Toru Tamaki, Bisser Raytchev, Kazufumi Kaneda, Shin'ichi Satoh. Rephrasing Visual Questions by Specifying the Entropy of the Answer Distribution
2371 -- 2378Hyun-young Lee, Seung-Shik Kang. Contextualized Character Embedding with Multi-Sequence LSTM for Automatic Word Segmentation
2379 -- 2388Lisha Liu, Dongjin Yu, Dongjing Wang, Fumiyo Fukumoto. Citation Count Prediction Based on Neural Hawkes Model
2389 -- 2393Hiroyuki Nishimuta, Daiki Nobayashi, Takeshi Ikenaga. Adaptive Server and Path Switching for Content Delivery Networks
2394 -- 2397Yujian Feng, Fei Wu 0004, Yimu Ji, Xiao-Yuan Jing, Jian Yu. Deep Metric Learning with Triplet-Margin-Center Loss for Sketch Face Recognition
2398 -- 2402Sung-Woon Jung, Hyuk-Ju Kwon, Dong-Min Son, Sung-Hak Lee. Generative Adversarial Network Using Weighted Loss Map and Regional Fusion Training for LDR-to-HDR Image Conversion
2403 -- 2406Ying Tong, Rui Chen 0009, Ruiyu Liang. Unconstrained Facial Expression Recognition Based on Feature Enhanced CNN and Cross-Layer LSTM
2407 -- 2410Toru Hiraoka. Generation of Checkered Pattern Images by Iterative Calculation Using Prewitt Filter with Expanded Window Size

Volume 103-D, Issue 10

2035 -- 0Toshiaki Fujii. Foreword
2036 -- 2046Shoichiro Takeda, Megumi Isogai, Shinya Shimizu, Hideaki Kimata. Local Riesz Pyramid for Faster Phase-Based Video Magnification
2047 -- 2058Hao Xiao, Yanming Fan, Fen Ge, Zhang Zhang, Xin Cheng. Algorithm-Hardware Co-Design of Real-Time Edge Detection for Deep-Space Autonomous Optical Navigation
2059 -- 2066Yasuhiro Mochida, Takayuki Nakachi, Takahiro Yamaguchi. An MMT-Based Hierarchical Transmission Module for 4K/120fps Temporally Scalable Video
2067 -- 2071Masahito Shimamoto, Yusuke Kameda, Takayuki Hamamoto. HDR Imaging Based on Image Interpolation and Motion Blur Suppression in Multiple-Exposure-Time Image Sensor
2072 -- 2082Ryuta Shingai, Yuria Hiraga, Hisakazu Fukuoka, Takamasa Mitani, Takashi Nakada, Yasuhiko Nakashima. Construction of an Efficient Divided/Distributed Neural Network Model Using Edge Computing
2083 -- 2093Makoto Nakagami, José A. B. Fortes, Saneyasu Yamaguchi. Job-Aware File-Storage Optimization for Improved Hadoop I/O Performance
2094 -- 2103Maohua Gan, Zeynep Yücel, Akito Monden, Kentaro Sasaki. Empirical Evaluation of Mimic Software Project Data Sets for Software Effort Estimation
2104 -- 2112Fahd N. Al-Wesabi. Proposing High-Smart Approach for Content Authentication and Tampering Detection of Arabic Text Transmitted via Internet
2113 -- 2124Chansu Han, Jumpei Shimamura, Takeshi Takahashi 0001, Daisuke Inoue, Jun'ichi Takeuchi, Koji Nakao. Real-Time Detection of Global Cyberthreat Based on Darknet by Estimating Anomalous Synchronization Using Graphical Lasso
2125 -- 2132Yuta Yamamoto, Kazuteru Namba. Complete Double Node Upset Tolerant Latch Using C-Element
2133 -- 2142Junjun Zheng, Hiroyuki Okamura, Tadashi Dohi. Optimal Rejuvenation Policies for Non-Markovian Availability Models with Aperiodic Checkpointing
2143 -- 2153Nicolas Bougie, Ryutaro Ichise. Towards Interpretable Reinforcement Learning with State Abstraction Driven by External Knowledge
2154 -- 2161Jonathan Mojoo, Yu Zhao, Muthu Subash Kavitha, Jun'ichi Miyao, Takio Kurita. Completion of Missing Labels for Multi-Label Annotation by a Unified Graph Laplacian Regularization
2162 -- 2167Zhongjian Ma, Dongzhen Huang, Baoqing Li, Xiaobing Yuan. Asymmetric Learning for Stereo Matching Cost Computation
2168 -- 2177Tomohiro Mashita, Koichi Shintani, Kiyoshi Kiyokawa. Improving Pointing Direction Estimation by Considering Hand- and Ocular-Dominance
2178 -- 2187Yanfei Liu, Junhua Chen, Yu Qiu. Joint Multi-Patch and Multi-Task CNNs for Robust Face Recognition
2188 -- 2198Junxing Zhang, Shuo Yang, Chunjuan Bo, Huimin Lu. Single Stage Vehicle Logo Detector Based on Multi-Scale Prediction
2199 -- 2207Fei Guo, Yuan Yang 0006, Yong Gao, Ningmei Yu. Efficient Salient Object Detection Model with Dilated Convolutional Networks
2208 -- 2215Jianwei Liu, Hongli Liu, Xuefeng Ni, Ziji Ma, Chao Wang 0014, Xun Shao. A Visual Inspection System for Accurate Positioning of Railway Fastener
2216 -- 2227Degen Huang, Anil Ahmed, Syed Yasser Arafat, Khawaja Iftekhar Rashid, Qasim Abbas, Fuji Ren. Sentence-Embedding and Similarity via Hybrid Bidirectional-LSTM and CNN Utilizing Weighted-Pooling Attention
2228 -- 2236Jianyong Duan, Zheng Tan, Mei Zhang, Hao Wang. New Word Detection Using BiLSTM+CRF Model with Features
2237 -- 2240Danlei Xing, Fei Wu 0004, Ying Sun, Xiao-Yuan Jing. Cross-Project Defect Prediction via Semi-Supervised Discriminative Feature Learning
2241 -- 2245Dongliang Chen, Peng Song 0002, Wenjing Zhang, Weijian Zhang, Bingui Xu, Xuan Zhou. Robust Transferable Subspace Learning for Cross-Corpus Facial Expression Recognition
2246 -- 2249Chong Wu, Le Zhang, Houwang Zhang, Hong Yan. Superpixel Based Hierarchical Segmentation for Color Image