default search action
IEICE Transactions on Information & Systems, Volume 105-D
Volume 105-D, Number 1, January 2022
- Shinpei Hayashi:
Foreword. 1 - Daniel Moritz Marutschke, Victor V. Kryssanov, Patricia Brockmann:
Balanced, Unbalances, and One-Sided Distributed Teams - An Empirical View on Global Software Engineering Education. 2-10 - Syful Islam, Dong Wang, Raula Gaikovina Kula, Takashi Ishio, Kenichi Matsumoto:
An Exploration of npm Package Co-Usage Examples from Stack Overflow: A Case Study. 11-18 - Bodin Chinthanet, Raula Gaikovina Kula, Rodrigo Eliza Zapata, Takashi Ishio, Kenichi Matsumoto, Akinori Ihara:
SōjiTantei: Function-Call Reachability Detection of Vulnerable Code for npm Packages. 19-20 - Yukasa Murakami, Masateru Tsunoda:
Replicated Study of Effectiveness Evaluation of Cutting-Edge Software Engineering. 21-25 - Jie Tan, Jianmin Pang, Cong Liu:
What Factors Affect the Performance of Software after Migration: A Case Study on Sunway TaihuLight Supercomputer. 26-30 - Keitaro Nakasai, Masateru Tsunoda, Kenichi Matsumoto:
Analyzing Web Search Strategy of Software Developers to Modify Source Codes. 31-36 - Masaki Kawamura:
Foreword. 37 - Kiyoharu Aizawa:
Movie Map for Virtual Exploration in a City. 38-45 - Tetsuya Kojima, Kento Akimoto:
A Visible Video Data Hiding Scheme Based on Fade-In and Fade-Out Effects Utilizing Barcodes. 46-53 - Rio Kurokawa, Kazuki Yamato, Madoka Hasegawa:
Near Hue-Preserving Reversible Contrast and Saturation Enhancement Using Histogram Shifting. 54-64 - Huy H. Nguyen, Minoru Kuribayashi, Junichi Yamagishi, Isao Echizen:
Effects of Image Processing Operations on Adversarial Noise and Their Use in Detecting and Correcting Adversarial Images. 65-77 - Isamu Hasegawa, Tomoyuki Yokogawa:
Formal Verification for Node-Based Visual Scripts Using Symbolic Model Checking. 78-91 - Kaiho Fukuchi, Hiroshi Yamada:
Leveraging Scale-Up Machines for Swift DBMS Replication on IaaS Platforms Using BalenaDB. 92-104 - Keigo Taga, Junjun Zheng, Koichi Mouri, Shoichi Saito, Eiji Takimoto:
Firewall Traversal Method by Pseudo-TCP Encapsulation. 105-115 - Akira Tanaka, Masanari Nakamura, Hideyuki Imai:
Kernel-Based Regressors Equivalent to Stochastic Affine Estimators. 116-122 - Isana Funahashi, Taichi Yoshida, Xi Zhang, Masahiro Iwahashi:
Image Adjustment for Multi-Exposure Images Based on Convolutional Neural Networks. 123-133 - Kenshiro Tamata, Tomohiro Mashita:
Feature Description with Feature Point Registration Error Using Local and Global Point Cloud Encoders. 134-140 - Kangbo Sun, Jie Zhu:
Searching and Learning Discriminative Regions for Fine-Grained Image Retrieval and Classification. 141-149 - Naohiro Tawara, Atsunori Ogawa, Tomoharu Iwata, Hiroto Ashikawa, Tetsunori Kobayashi, Tetsuji Ogawa:
Multi-Source Domain Generalization Using Domain Attributes for Recurrent Neural Network Language Models. 150-160 - Koji Kamma, Sarimu Inoue, Toshikazu Wada:
Pruning Ratio Optimization with Layer-Wise Pruning Method for Accelerating Convolutional Neural Networks. 161-169 - Hyun Kwon:
Multi-Model Selective Backdoor Attack with Different Trigger Positions. 170-174 - Zihao Song, Peng Song, Chao Sheng, Wenming Zheng, Wenjing Zhang, Shaokai Li:
A Novel Discriminative Virtual Label Regression Method for Unsupervised Feature Selection. 175-179 - Weiwei Luo, Wenpeng Zhou, Jinglong Fang, Lingyan Fan:
JPEG Image Steganalysis Using Weight Allocation from Block Evaluation. 180-183 - Wenjing Zhang, Peng Song, Wenming Zheng:
A Novel Transferable Sparse Regression Method for Cross-Database Facial Expression Recognition. 184-188 - Jiayi Li, Lin Yang, Junyan Yi, Haichuan Yang, Yuki Todo, Shangce Gao:
A Simple but Efficient Ranking-Based Differential Evolution. 189-192
Volume 105-D, Number 2, February 2022
- Guojun Wang, Yizhi Ren:
Foreword. 193-194 - Hao Wang, Zhe Liu, Chunpeng Ge, Kouichi Sakurai, Chunhua Su:
A Privacy-Preserving Data Feed Scheme for Smart Contracts. 195-204 - Naoya Okanami, Ryuya Nakamura, Takashi Nishide:
Load Balancing with In-Protocol/Wallet-Level Account Assignment in Sharded Blockchains. 205-214 - Tao Peng, Kejian Guan, Jierong Liu:
A Privacy-Preserving Mobile Crowdsensing Scheme Based on Blockchain and Trusted Execution Environment. 215-226 - Shingo Fujimoto, Takuma Takeuchi, Yoshiki Higashikado:
Secure Blockchain Interworking Using Extended Smart Contract. 227-234 - Haoyang An, Jiageng Chen:
ExamChain: A Privacy-Preserving Onscreen Marking System Based on Consortium Blockchain. 235-247 - Takaki Asanuma, Takanori Isobe:
A Proof of Work Based on Key Recovery Problem of Cascade Block Ciphers with ASIC Resistance. 248-255 - Zhuotao Lian, Weizheng Wang, Huakun Huang, Chunhua Su:
Layer-Based Communication-Efficient Federated Learning with Privacy Preservation. 256-263 - Tong Zhang, Yujue Wang, Yong Ding, Qianhong Wu, Hai Liang, Huiyong Wang:
Multi-Party Electronic Contract Signing Protocol Based on Blockchain. 264-271 - Wenjuan Li, Yu Wang, Weizhi Meng, Jin Li, Chunhua Su:
BlockCSDN: Towards Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking. 272-279 - Yingxiao Xiang, Chao Li, Tong Chen, Yike Li, Endong Tong, Wenjia Niu, Qiong Li, Jiqiang Liu, Wei Wang:
Toward Blockchain-Based Spoofing Defense for Controlled Optimization of Phases in Traffic Signal System. 280-288 - Yizhi Ren, Zelong Li, Lifeng Yuan, Zhen Zhang, Chunhua Su, Yujuan Wang, Guohua Wu:
Semantic Shilling Attack against Heterogeneous Information Network Based Recommend Systems. 289-299 - Srinivas Koppu, Kumar K, Siva Rama Krishnan Somayaji, Iyapparaja Meenakshisundaram, Weizheng Wang, Chunhua Su:
Fusion of Blockchain, IoT and Artificial Intelligence - A Survey. 300-308 - Dhidhi Pambudi, Masaki Kawamura:
Novel Metaheuristic: Spy Algorithm. 309-319 - Yasutaka Matsuda, Ryota Shioya, Hideki Ando:
Reducing Energy Consumption of Wakeup Logic through Double-Stage Tag Comparison. 320-332 - Ryunosuke Nagayama, Ryohei Banno, Kazuyuki Shudo:
Trail: An Architecture for Compact UTXO-Based Blockchain and Smart Contract. 333-343 - Meiming Fu, Qingyang Liu, Jiayi Liu, Xiang Wang, Hongyan Yang:
A Learning-Based Service Function Chain Early Fault Diagnosis Mechanism Based on In-Band Network Telemetry. 344-354 - Jianyong Duan, Liangcai Li, Mei Zhang, Hao Wang:
Hierarchical Preference Hash Network for News Recommendation. 355-363 - Hiroki Ishiguro, Takashi Ishida, Masashi Sugiyama:
Learning from Noisy Complementary Labels with Robust Loss Functions. 364-376 - Shuhei Yamamoto, Takeshi Kurashima, Hiroyuki Toda:
Classifying Near-Miss Traffic Incidents through Video, Sensor, and Object Features. 377-386 - Yuichiro Nomura, Takio Kurita:
Consistency Regularization on Clean Samples for Learning with Noisy Labels. 387-395 - Masayuki Hiromoto, Hisanao Akima, Teruo Ishihara, Takuji Yamamoto:
SimpleZSL: Extremely Simple and Fast Zero-Shot Learning with Nearest Neighbor Classifiers. 396-405 - Masayuki Miyama:
FPGA Implementation of 3-Bit Quantized Multi-Task CNN for Contour Detection and Disparity Estimation. 406-414 - Masashi Nishiyama, Michiko Inoue, Yoshio Iwai:
Gender Recognition Using a Gaze-Guided Self-Attention Mechanism Robust Against Background Bias in Training Samples. 415-426 - Young H. Oh, Yunho Jin, Tae Jun Ham, Jae W. Lee:
Layerweaver+: A QoS-Aware Layer-Wise DNN Scheduler for Multi-Tenant Neural Processing Units. 427-431 - Fei Wu, Xinhao Zheng, Ying Sun, Yang Gao, Xiao-Yuan Jing:
Joint Domain Adaption and Pseudo-Labeling for Cross-Project Defect Prediction. 432-435 - Kazuki Sato, Satoshi Nakata, Takashi Matsubara, Kuniaki Uehara:
Few-Shot Anomaly Detection Using Deep Generative Models for Grouped Data. 436-440 - Jie Zhu, Yuan Zong, Hongli Chang, Li Zhao, Chuangao Tang:
Joint Patch Weighting and Moment Matching for Unsupervised Domain Adaptation in Micro-Expression Recognition. 441-445 - Fairuz Safwan Mahad, Masakazu Iwamura, Koichi Kise:
Learning Pyramidal Feature Hierarchy for 3D Reconstruction. 446-449
Volume 105-D, Number 3, March 2022
- Masashi Kiyomi:
Foreword. 450 - Tatsuya Inoha, Kunihiko Sadakane, Yushi Uno, Yuma Yonebayashi:
Efficient Computation of Betweenness Centrality by Graph Decompositions and Their Applications to Real-World Networks. 451-458 - Tamami Okada, Ryuhei Uehara:
Research on Dissections of a Net of a Cube into Nets of Cubes. 459-465 - Taishu Ito, Yusuke Sano, Katsuhisa Yamanaka, Takashi Hirayama:
A Polynomial Delay Algorithm for Enumerating 2-Edge-Connected Induced Subgraphs. 466-473 - Hiroshi Fujiwara, Yuichi Shirai, Hiroaki Yamamoto:
The Huffman Tree Problem with Upper-Bounded Linear Functions. 474-480 - Tong Qin, Osamu Watanabe:
An Improvement of the Biased-PPSZ Algorithm for the 3SAT Problem. 481-490 - Yoshiaki Takahashi, Akira Ito:
Finite Automata with Colored Accepting States and Their Unmixedness Problems. 491-502 - Yasuaki Kobayashi, Shin-Ichi Nakano, Kei Uchizawa, Takeaki Uno, Yutaro Yamaguchi, Katsuhisa Yamanaka:
An O(n2)-Time Algorithm for Computing a Max-Min 3-Dispersion on a Point Set in Convex Position. 503-507 - Chuzo Iwamoto, Tatsuya Ide:
Five Cells and Tilepaint are NP-Complete. 508-516 - Tianfeng Feng, Leonie Ryvkin, Jérôme Urhausen, Giovanni Viglietta:
Complexity of Critter Crunch. 517-531 - Kwon Kham Sai, Giovanni Viglietta, Ryuhei Uehara:
Cyclic Shift Problems on Graphs. 532-540 - Jion Hirose, Junya Nakamura, Fukuhito Ooshita, Michiko Inoue:
Weakly Byzantine Gathering with a Strong Team. 541-555 - Masashi Komori:
Foreword. 556 - Yuta Suzumura, Jun-ichi Imai:
Effectiveness of "Neither-Good-Nor-Bad" Information on User's Trust in Agents in Presence of Numerous Options. 557-564 - Masatoshi Yamada, Masaki Ohata, Daisuke Kakoi:
A Study on Cognitive Transformation in the Process of Acquiring Movement Skills for Changing Running Direction. 565-577 - Takeshi Saga, Hiroki Tanaka, Hidemi Iwasaka, Satoshi Nakamura:
Multimodal Prediction of Social Responsiveness Score with BERT-Based Text Features. 578-586 - Shengzhou Yi, Junichiro Matsugami, Toshihiko Yamasaki:
Assessment System of Presentation Slide Design Using Visual and Structural Features. 587-596 - Ryota Eguchi, Naoki Kitamura, Taisuke Izumi:
Fast Neighborhood Rendezvous. 597-610 - Hiroki Nishimoto, Renyuan Zhang, Yasuhiko Nakashima:
GPGPU Implementation of Variational Bayesian Gaussian Mixture Models. 611-622 - Tianfeng Feng, Ryuhei Uehara, Giovanni Viglietta:
Bicolored Path Embedding Problems Inspired by Protein Folding Models. 623-633 - Naoki Kitamura, Taisuke Izumi:
A Subquadratic-Time Distributed Algorithm for Exact Maximum Matching. 634-645 - Esrat Farjana Rupu, Natthawut Kertkeidkachorn, Ryutaro Ichise:
Competent Triple Identification for Knowledge Graph Completion under the Open-World Assumption. 646-655 - Wenhao Fan, Dong Liu, Fan Wu, Bihua Tang, Yuan'an Liu:
Android Malware Detection Based on Functional Classification. 656-666 - Genki Osada, Budrul Ahsan, Revoti Prasad Bora, Takashi Nishide:
Latent Space Virtual Adversarial Training for Supervised and Semi-Supervised Learning. 667-678 - Ye Tian, Mei Han:
Adaptive Binarization for Vehicle State Images Based on Contrast Preserving Decolorization and Major Cluster Estimation. 679-688 - Yuki Monma, Kan Aro, Muneki Yasuda:
Hierarchical Gaussian Markov Random Field for Image Denoising. 689-699 - Yu Wang, Cong Cao, Jien Kato:
Discriminative Part CNN for Pedestrian Detection. 700-712 - Dichao Liu, Yu Wang, Kenji Mase, Jien Kato:
Recursive Multi-Scale Channel-Spatial Attention for Fine-Grained Image Classification. 713-726 - Eunsam Kim, Jinsung Kim, Hyoseop Shin:
Cooperative Recording to Increase Storage Efficiency in Networked Home Appliances. 727-731 - Masaki Takanashi, Shuichi Sato, Kentaro Indo, Nozomu Nishihara, Hiroki Hayashi, Toru Suzuki:
Anomaly Prediction for Wind Turbines Using an Autoencoder with Vibration Data Supported by Power-Curve Filtering. 732-735
Volume 105-D, Number 4, April 2022
- Jing Zhu, Song Huang, Yaqing Shi, Kaishun Wu, Yanqiu Wang:
A Method of K-Means Clustering Based on TF-IDF for Software Requirements Documents Written in Chinese Language. 736-754 - Yuma Masubuchi, Masaki Hashimoto, Akira Otsuka:
SIBYL: A Method for Detecting Similar Binary Functions Using Machine Learning. 755-765 - Jing Wang, Yiyu Luo, Weiming Yi, Xiang Xie:
Speaker-Independent Audio-Visual Speech Separation Based on Transformer in Multi-Talker Environments. 766-777 - Kazuhiko Murasaki, Shingo Ando, Jun Shimamura:
Semi-Supervised Representation Learning via Triplet Loss Based on Explicit Class Ratio of Unlabeled Data. 778-784 - Xiang Shen, Dezhi Han, Chin-Chen Chang, Liang Zong:
Dual Self-Guided Attention with Sparse Question Networks for Visual Question Answering. 785-796 - Guoyi Miao, Yufeng Chen, Mingtong Liu, Jinan Xu, Yujie Zhang, Wenhe Feng:
Exploring Hypotactic Structure for Chinese-English Machine Translation with a Structure-Aware Encoder-Decoder Neural Model. 797-806 - Ying Zhang, Fandong Meng, Jinchao Zhang, Yufeng Chen, Jinan Xu, Jie Zhou:
MKGN: A Multi-Dimensional Knowledge Enhanced Graph Network for Multi-Hop Question and Answering. 807-819 - Saifeng Hou, Yuxiang Hu, Le Tian, Zhiguang Dang:
NFD.P4: NDN In-Networking Cache Implementation Scheme with P4. 820-823 - Jinho Choi, Taehwa Lee, Kwanwoo Kim, Minjae Seo, Jian Cui, Seungwon Shin:
Discovering Message Templates on Large Scale Bitcoin Abuse Reports Using a Two-Fold NLP-Based Clustering Method. 824-827 - Yuzhuo Liu, Hangting Chen, Qingwei Zhao, Pengyuan Zhang:
Master-Teacher-Student: A Weakly Labelled Semi-Supervised Framework for Audio Tagging and Sound Event Detection. 828-831 - Yaying Shen, Qun Li, Ding Xu, Ziyi Zhang, Rui Yang:
Triple Loss Based Framework for Generalized Zero-Shot Learning. 832-835
Volume 105-D, Number 5, May 2022
- Hiroyuki Nakagawa:
Foreword. 836 - Shinpei Hayashi, Keisuke Asano, Motoshi Saeki:
Automating Bad Smell Detection in Goal Refinement of Goal Models. 837-848 - Yotaro Seki, Shinpei Hayashi, Motoshi Saeki:
Cataloging Bad Smells in Use Case Descriptions and Automating Their Detection. 849-863 - Shiyao Ding, Donghui Lin:
Deep Coalitional Q-Learning for Dynamic Coalition Formation in Edge Computing. 864-872 - Rizal Setya Perdana, Yoshiteru Ishida:
Contextualized Language Generation on Visual-to-Language Storytelling. 873-886 - Shohei Yokoyama:
Foreword. 887 - Hideaki Ohashi, Toshiyuki Shimizu, Masatoshi Yoshikawa:
Does Student-Submission Allocation Affect Peer Assessment Accuracy? 888-897 - Tomohiro Yamazaki, Hisashi Koga:
Exact Algorithm to Solve Continuous Similarity Search for Evolving Queries and Its Variant. 898-908 - Yutaro Bessho, Yuto Hayamizu, Kazuo Goda, Masaru Kitsuregawa:
Dynamic Fault Tolerance for Multi-Node Query Processing. 909-919 - Da Li, Yuanyuan Wang, Rikuya Yamamoto, Yukiko Kawai, Kazutoshi Sumiya:
A Low-Cost High-Performance Semantic and Physical Distance Calculation Method Based on ZIP Code. 920-927 - Tomoya Hashiguchi, Takehiro Yamamoto, Sumio Fujita, Hiroaki Ohshima:
Toward Generating Robot-Robot Natural Counseling Dialogue. 928-935 - Shiyao Ding, Donghui Lin:
Multi-Agent Reinforcement Learning for Cooperative Task Offloading in Distributed Edge Cloud Computing. 936-945 - Kento Sugiura, Yoshiharu Ishikawa:
Implementation of a Multi-Word Compare-and-Swap Operation without Garbage Collection. 946-954 - Hiroshi Uehara, Yasuhiro Iuchi, Yusuke Fukazawa, Yoshihiro Kaneta:
Predicting A Growing Stage of Rice Plants Based on The Cropping Records over 25 Years - A Trial of Feature Engineering Incorporating Hidden Regional Characteristics -. 955-963 - Tongzhou Qu, Zibin Dai, Yanjiang Liu, Lin Chen, Xianzhao Xia:
A Performance Model for Reconfigurable Block Cipher Array Utilizing Amdahl's Law. 964-972 - Takashi Ishio, Naoto Maeda, Kensuke Shibuya, Kenho Iwamoto, Katsuro Inoue:
NCDSearch: Sliding Window-Based Code Clone Search Using Lempel-Ziv Jaccard Distance. 973-981 - Xudong Yang, Ling Gao, Yan Li, Jipeng Xu, Jie Zheng, Hai Wang, Quanli Gao:
A Semantic-Based Dual Location Privacy-Preserving Approach. 982-995 - Ruijun Ma, Stefan Holst, Xiaoqing Wen, Aibin Yan, Hui Xu:
Evaluation and Test of Production Defects in Hardened Latches. 996-1009 - Ryota Yoshimura, Ichiro Maruta, Kenji Fujimoto, Ken Sato, Yusuke Kobayashi:
Particle Filter Design Based on Reinforcement Learning and Its Application to Mobile Robot Localization. 1010-1023 - Fei Zhang, Peining Zhen, Dishan Jing, Xiaotang Tang, Hai-Bao Chen, Jie Yan:
SVM Based Intrusion Detection Method with Nonlinear Scaling and Feature Selection. 1024-1038 - Gwonsang Ryu, Daeseon Choi:
Feature-Based Adversarial Training for Deep Learning Models Resistant to Transferable Adversarial Examples. 1039-1049 - Kana Miyamoto, Hiroki Tanaka, Satoshi Nakamura:
Online EEG-Based Emotion Prediction and Music Generation for Inducing Affective States. 1050-1063 - Tingting Hu, Ryuji Fuchikami, Takeshi Ikenaga:
High Temporal Resolution-Based Temporal Iterative Tracking for High Framerate and Ultra-Low Delay Dynamic Tracking System. 1064-1074 - Rubin Zhao, Xiaolong Zheng, Zhihua Ying, Lingyan Fan:
Localization of Pointed-At Word in Printed Documents via a Single Neural Network. 1075-1084 - Weiguo Zhang, Jiaqi Lu, Jing Zhang, Xuewen Li, Qi Zhao:
Research on the Algorithm of License Plate Recognition Based on MPGAN Haze Weather. 1085-1093 - Wen Shao, Rei Kawakami, Takeshi Naemura:
Anomaly Detection Using Spatio-Temporal Context Learned by Video Clip Sorting. 1094-1102 - Sejin Jung, Eui-Sub Kim, Junbeom Yoo:
Unfolding Hidden Structures in Cyber-Physical Systems for Thorough STPA Analysis. 1103-1106 - Yuxue Zhang, Guorui Feng:
Efficient Multi-Scale Feature Fusion for Image Manipulation Detection. 1107-1111 - Hao Fang, Chi-Hua Chen, Dewang Chen, Feng-Jang Hwang:
Neuron-Network-Based Mixture Probability Model for Passenger Walking Time Distribution Estimation. 1112-1115 - Byungjae Park:
Stochastic Path Optimization to Improve Navigation Safety in Urban Environment. 1116-1119 - Zhimin Guo, Jianfei Chen, Sheng Zhang:
Fully Connected Imaging Network for Near-Field Synthetic Aperture Interferometric Radiometer. 1120-1124 - Haoyu Xu, Yuenan Li:
A Deep Neural Network for Coarse-to-Fine Image Dehazing with Interleaved Residual Connections and Semi-Supervised Training. 1125-1129 - Jin S. Seo:
Pairwise Similarity Normalization Based on a Hubness Score for Improving Cover Song Retrieval Accuracy. 1130-1134
Volume 105-D, Number 6, June 2022
- Zheng Wang, Yi Di:
Cluster Expansion Method for Critical Node Problem Based on Contraction Mechanism in Sparse Graphs. 1135-1149 - Jiaheng Liu, Ryusuke Egawa, Hiroyuki Takizawa:
A Conflict-Aware Capacity Control Mechanism for Deep Cache Hierarchy. 1150-1163 - Weina Zhou, Ying Zhou, Xiaoyang Zeng:
An Attention Nested U-Structure Suitable for Salient Ship Detection in Complex Maritime Environment. 1164-1171 - Ding Li, Chunxiang Gu, Yuefei Zhu:
Gene Fingerprinting: Cracking Encrypted Tunnel with Zero-Shot Learning. 1172-1184 - Sathya Madhusudhanan, Suresh Jaganathan:
Data Augmented Incremental Learning (DAIL) for Unsupervised Data. 1185-1195 - Hitoshi Suda, Gaku Kotani, Daisuke Saito:
INmfCA Algorithm for Training of Nonparallel Voice Conversion Systems Based on Non-Negative Matrix Factorization. 1196-1210 - Masahiro Murayama, Toyohiro Higashiyama, Yuki Harazono, Hirotake Ishii, Hiroshi Shimoda, Shinobu Okido, Yasuyoshi Taruta:
Depth Image Noise Reduction and Super-Resolution by Pixel-Wise Multi-Frame Fusion. 1211-1224 - Xin Zeng, Lin Zhang, Zhongqiang Luo, Xingzhong Xiong, Chengjie Li:
Reinforced Tracker Based on Hierarchical Convolutional Features. 1225-1233 - Zhi Weng, Longzhen Fan, Yong Zhang, Zhiqiang Zheng, Caili Gong, Zhongyue Wei:
Facial Recognition of Dairy Cattle Based on Improved Convolutional Neural Network. 1234-1238 - Xian Chen, Xi Deng, Chensen Huang, Hyoseop Shin:
Detection of Trust Shilling Attacks in Recommender Systems. 1239-1242 - Kazumoto Tanaka, Yunchuan Zhang:
Single-Image Camera Calibration for Furniture Layout Using Natural-Marker-Based Augmented Reality. 1243-1248
Volume 105-D, Number 7, July 2022
- Ken Mishima, Hayato Yamana:
A Survey on Explainable Fake News Detection. 1249-1257 - Duc A. Hoang, Akira Suzuki, Tsuyoshi Yagita:
Reconfiguring k-Path Vertex Covers. 1258-1272 - Dehua Liang, Jun Shiomi, Noriyuki Miura, Masanori Hashimoto, Hiromitsu Awano:
A Hardware Efficient Reservoir Computing System Using Cellular Automata and Ensemble Bloom Filter. 1273-1282 - Anum Tariq, Shoab Ahmed Khan:
Industry 4.0 Based Business Process Re-Engineering Framework for Manufacturing Industry Setup Incorporating Evolutionary Multi-Objective Optimization. 1283-1295 - Jinho Choi, Jaehan Kim, Minkyoo Song, Hanna Kim, Nahyeon Park, Minjae Seo, Youngjin Jin, Seungwon Shin:
A Large-Scale Bitcoin Abuse Measurement and Clustering Analysis Utilizing Public Reports. 1296-1307 - Thi Thu Thao Khong, Takashi Nakada, Yasuhiko Nakashima:
A Hybrid Bayesian-Convolutional Neural Network for Adversarial Robustness. 1308-1319 - Qianqian Wu, Zhenzhou Ji:
A Two-Level Cache Aware Adaptive Data Replication Mechanism for Shared LLC. 1320-1324 - Takashi Yokota, Kanemitsu Ootsu, Shun Kojima:
On a Cup-Stacking Concept in Repetitive Collective Communication. 1325-1329 - Kyungmin Kim, Jiung Song, Jong Wook Kwak:
PRIGM: Partial-Regression-Integrated Generic Model for Synthetic Benchmarks Robust to Sensor Characteristics. 1330-1334 - Yang Yan, Qiuyan Wang, Lin Liu:
Latent Influence Based Self-Attention Framework for Heterogeneous Network Embedding. 1335-1339 - Weiwei Jiang:
Loan Default Prediction with Deep Learning and Muddling Label Regularization. 1340-1342 - Haeyoung Lee:
A Framework for Synchronous Remote Online Exams. 1343-1347 - Haeyoung Lee:
Synchronous Sharing of Lecture Slides and Photo Messaging during Real-Time Online Classes. 1348-1351 - Yue Xie, Ruiyu Liang, Xiaoyan Zhao, Zhenlin Liang, Jing Du:
Weighted Gradient Pretrain for Low-Resource Speech Emotion Recognition. 1352-1355 - Xiaozhou Cheng, Rui Li, Yanjing Sun, Yu Zhou, Kaiwen Dong:
Gray Augmentation Exploration with All-Modality Center-Triplet Loss for Visible-Infrared Person Re-Identification. 1356-1360
Volume 105-D, Number 8, August 2022
- Young-Sung Ihm, Seung-Hee Kim:
Development of a Blockchain-Based Online Secret Electronic Voting System. 1361-1372 - Shin-ichi Nakayama, Shigeru Masuyama:
A Polynomial-Time Algorithm for Finding a Spanning Tree with Non-Terminal Set VNT on Circular-Arc Graphs. 1373-1382 - Masaaki Okada, Keiichi Kaneko:
Minimal Paths in a Bicube. 1383-1392 - Weina Zhou, Xinxin Huang, Xiaoyang Zeng:
Obstacle Detection for Unmanned Surface Vehicles by Fusion Refinement Network. 1393-1400 - Phong X. Nguyen, Hung Q. Cao, Khang V. T. Nguyen, Hung Nguyen, Takehisa Yairi:
SeCAM: Tightly Accelerate the Image Explanation via Region-Based Segmentation. 1401-1417 - Kazuto Fukuchi, Chia-Mu Yu, Jun Sakuma:
Locally Differentially Private Minimum Finding. 1418-1430 - Jangmin Oh:
Short-Term Stock Price Prediction by Supervised Learning of Rapid Volume Decrease Patterns. 1431-1442 - Yahui Tang, Tong Li, Rui Zhu, Cong Liu, Shuaipeng Zhang:
A Hybrid Genetic Service Mining Method Based on Trace Clustering Population. 1443-1455 - Tetsutaro Yamada, Masato Gocho, Kei Akama, Ryoma Yataka, Hiroshi Kameda:
Multiple Hypothesis Tracking with Merged Bounding Box Measurements Considering Occlusion. 1456-1463 - Cunlei Wang, Donghui Li:
Diabetes Noninvasive Recognition via Improved Capsule Network. 1464-1471 - Hongzhe Liu, Ningwei Wang, Xuewei Li, Cheng Xu, Yaze Li:
BFF R-CNN: Balanced Feature Fusion for Object Detection. 1472-1480 - Ya Zeng, Li Wan, Qiuhong Luo, Mao Chen:
A Hierarchical Memory Model for Task-Oriented Dialogue System. 1481-1489 - Xianmei Fang, Xiaobo Gao, Yuting Wang, Zhouyu Liao, Yue Ma:
Improving Fault Localization Using Conditional Variational Autoencoder. 1490-1494 - Yi Liu, Wei Qin, Qibin Zheng, Gensong Li, Mengmeng Li:
An Interpretable Feature Selection Based on Particle Swarm Optimization. 1495-1500 - Zhaoqi Li, Ta Li, Qingwei Zhao, Pengyuan Zhang:
Label-Adversarial Jointly Trained Acoustic Word Embedding. 1501-1505
Volume 105-D, Number 9, September 2022
- Md. Ashraful Islam, Kenji Kise:
An Efficient Resource Shared RISC-V Multicore Architecture. 1506-1515 - Hiroaki Yamanaka, Yuuichi Teranishi, Eiji Kawai, Hidehisa Nagano, Hiroaki Harai:
Design and Implementation of an Edge Computing Testbed to Simplify Experimental Environment Setup. 1516-1528 - Katsuyuki Hagiwara:
Bridging between Soft and Hard Thresholding by Scaling. 1529-1536 - Rui Yang, Raphael Shu, Hideki Nakayama:
Improving Noised Gradient Penalty with Synchronized Activation Function for Generative Adversarial Networks. 1537-1545 - Keisuke Inazawa, Akihiro Kashihara:
Designing and Evaluating Presentation Avatar for Promoting Self-Review. 1546-1556 - Yuichiro Tateiwa:
LiNeS Cloud: A Web-Based Hands-On System for Network Security Classes with Intuitive and Seamless Operability and Light-Weight Responsiveness. 1557-1567 - Yahui Wang, Wenxi Zhang, Zhou Wu, Xinxin Kong, Yongbiao Wang, Hongxin Zhang:
Highly-Accurate and Real-Time Speech Measurement for Laser Doppler Vibrometers. 1568-1580 - Kento Matsumoto, Sunao Hara, Masanobu Abe:
Speech-Like Emotional Sound Generation Using WaveNet. 1581-1589 - Takaharu Kato, Ikuko Shimizu, Tomás Pajdla:
Improving Image Pair Selection for Large Scale Structure from Motion by Introducing Modified Simpson Coefficient. 1590-1599 - Suraj Prakash Pattar, Tsubasa Hirakawa, Takayoshi Yamashita, Tetsuya Sawanobori, Hironobu Fujiyoshi:
Single Suction Grasp Detection for Symmetric Objects Using Shallow Networks Trained with Synthetic Data. 1600-1609 - Kai Yan, Tiejun Zhao, Muyun Yang:
BCGL: Binary Classification-Based Graph Layout. 1610-1619 - Yoshiaki Takata, Ryoma Senda, Hiroyuki Seki:
Reduction of Register Pushdown Systems with Freshness Property to Pushdown Systems in LTL Model Checking. 1620-1623 - Masamoto Fukawa, Xiaoqi Deng, Shinya Imai, Taiga Horiguchi, Ryo Ono, Ikumi Rachi, Sihan A, Kazuma Shinomura, Shunsuke Niwa, Takeshi Kudo, Hiroyuki Ito, Hitoshi Wakabayashi, Yoshihiro Miyake, Atsushi Hori:
A Novel Method for Lightning Prediction by Direct Electric Field Measurements at the Ground Using Recurrent Neural Network. 1624-1628 - Md. Rabiul Islam, Andrew W. Vargo, Motoi Iwata, Masakazu Iwamura, Koichi Kise:
Exploring Sensor Modalities to Capture User Behaviors for Reading Detection. 1629-1633 - Bima Prihasto, Tzu-Chiang Tai, Pao-Chi Chang, Jia-Ching Wang:
Fast Gated Recurrent Network for Speech Synthesis. 1634-1638 - Zheying Huang, Ji Xu, Qingwei Zhao, Pengyuan Zhang:
A Two-Fold Cross-Validation Training Framework Combined with Meta-Learning for Code-Switching Speech Recognition. 1639-1642 - Keke Zhao, Peng Song, Shaokai Li, Wenjing Zhang, Wenming Zheng:
A novel Adaptive Weighted Transfer Subspace Learning Method for Cross-Database Speech Emotion Recognition. 1643-1646 - Chao Xu, Yunfeng Yan, Lehangyu Yang, Sheng Li, Guorui Feng:
Altered Fingerprints Detection Based on Deep Feature Fusion. 1647-1651 - Lianshan Sun, Jingxue Wei, Hanchao Du, Yongbin Zhang, Lifeng He:
MSFF: A Multi-Scale Feature Fusion Network for Surface Defect Detection of Aluminum Profiles. 1652-1655 - Yahui Tang, Tong Li, Rui Zhu, Cong Liu, Shuaipeng Zhang:
Erratum: A Hybrid Genetic Service Mining Method Based on Trace Clustering Population [IEICE Transactions on Information and Systems Vol.E105.D (2022), No.8 pp.1443-1455]. 1656
Volume 105-D, Number 10, October 2022
- Shingo Yamaguchi:
Foreword. 1657 - Takuma Kinugawa, Toshimitsu Ushio:
Finite-Horizon Optimal Spatio-Temporal Pattern Control under Spatio-Temporal Logic Specifications. 1658-1664 - Takashi Tomita, Shigeki Hagihara, Masaya Shimakawa, Naoki Yonezaki:
A Characterization on Necessary Conditions of Realizability for Reactive System Specifications. 1665-1677 - Ichiro Matsuda:
Foreword. 1678 - Kohei Tateishi, Chihiro Tsutake, Keita Takahashi, Toshiaki Fujii:
Time-Multiplexed Coded Aperture and Coded Focal Stack -Comparative Study on Snapshot Compressive Light Field Imaging. 1679-1690 - Yoshitaka Kidani, Haruhisa Kato, Kei Kawamura, Hiroshi Watanabe:
Geometric Partitioning Mode with Inter and Intra Prediction for Beyond Versatile Video Coding. 1691-1703 - Seung-tak Noh, Hiroki Harada, Xi Yang, Tsukasa Fukusato, Takeo Igarashi:
PPW Curves: a C2 Interpolating Spline with Hyperbolic Blending of Rational Bézier Curves. 1704-1711 - Wenhao Huang, Akira Tsuge, Yin Chen, Tadashi Okoshi, Jin Nakazawa:
A Bus Crowdedness Sensing System Using Deep-Learning Based Object Detection. 1712-1720 - Kotaro Matsuura, Chihiro Tsutake, Keita Takahashi, Toshiaki Fujii:
Unrolled Network for Light Field Display. 1721-1725 - Ana Guasque, Patricia Balbastre:
Evaluation and Comparison of Integer Programming Solvers for Hard Real-Time Scheduling. 1726-1733 - Kenya Tajima, Takahiko Henmi, Tsuyoshi Kato:
Frank-Wolfe for Sign-Constrained Support Vector Machines. 1734-1742 - Jinyan Lu, Quanzhen Huang, Shoubing Liu:
Multi-Stage Contour Primitive of Interest Extraction Network with Dense Direction Classification. 1743-1750 - Quan Xiu Ho, Takao Jinno, Yusuke Uchimi, Shigeru Kuriyama:
Estimation of Multiple Illuminant Colors Using Color Line Features. 1751-1758 - Yuichiro Nomura, Takio Kurita:
Sample Selection Approach with Number of False Predictions for Learning with Noisy Labels. 1759-1768 - Nenghuan Zhang, Yongbin Wang, Xiaoguang Wang, Peng Yu:
A Multi-Modal Fusion Network Guided by Feature Co-Occurrence for Urban Region Function Recognition. 1769-1779 - Manaya Tomioka, Tsuneo Kato, Akihiro Tamura:
Analysis on Norms of Word Embedding and Hidden Vectors in Neural Conversational Model Based on Encoder-Decoder RNN. 1780-1789 - Yang Li, Rui Qi:
Heterogeneous Graph Contrastive Learning for Stance Prediction. 1790-1798 - Taekeun Park, Keewon Kim:
Strengthening Network-Based Moving Target Defense with Disposable Identifiers. 1799-1802 - Yang Wang, Hongliang Fu, Huawei Tao, Jing Yang, Hongyi Ge, Yue Xie:
Convolutional Auto-Encoder and Adversarial Domain Adaptation for Cross-Corpus Speech Emotion Recognition. 1803-1806 - Joanna Kazzandra Dumagpi, Yong-Jin Jeong:
End-to-End Object Separation for Threat Detection in Large-Scale X-Ray Security Images. 1807-1811 - Kaito Satta, Hiroaki Sasaki:
Graph Embedding with Outlier-Robust Ratio Estimation. 1812-1816 - Jiyeon Lee, Kilho Lee:
Spy in Your Eye: Spycam Attack via Open-Sided Mobile VR Device. 1817-1820 - Zhi Liu, Jia Cao, Xiaohan Guan, Mengmeng Zhang:
New VVC Chroma Prediction Modes Based on Coloring with Inter-Channel Correlation. 1821-1824 - Zhi Liu, Fangyuan Zhao, Mengmeng Zhang:
An Efficient Multimodal Aggregation Network for Video-Text Retrieval. 1825-1828 - Koki Tsubota, Hiroaki Akutsu, Kiyoharu Aizawa:
Evaluating the Stability of Deep Image Quality Assessment with Respect to Image Scaling. 1829-1833
Volume 105-D, Number 11, November 2022
- Ilsun You:
Foreword. 1834-1835 - Yu Zhou, Shengli Liu, Shuai Han:
Generic Construction of 1-out-of-n Oblivious Signatures. 1836-1844 - Ryu Ishii, Kyosuke Yamashita, Yusuke Sakai, Tadanori Teruya, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Tsutomu Matsumoto:
Aggregate Signature Schemes with Traceability of Devices Dynamically Generating Invalid Signatures. 1845-1856 - Gyeongjin Ra, Su-Hyun Kim, Imyeong Lee:
Identity Access Management via ECC Stateless Derived Key Based Hierarchical Blockchain for the Industrial Internet of Things. 1857-1871 - Nam-Su Jho, Daesung Moon, Taek-Young Youn:
Fully Dynamic Data Management in Cloud Storage Systems with Secure Proof of Retrievability. 1872-1879 - Hyun Kwon, Changhyun Cho, Jun Lee:
Priority Evasion Attack: An Adversarial Example That Considers the Priority of Attack on Each Classifier. 1880-1889 - Shuhei Enomoto, Hiroki Kuzuno, Hiroshi Yamada:
Efficient Protection Mechanism for CPU Cache Flush Instruction Based Attacks. 1890-1899 - Seonghan Shin:
A Strengthened PAKE Protocol with Identity-Based Encryption. 1900-1910 - Hyun Kwon, Yongchul Kim:
Toward Selective Membership Inference Attack against Deep Learning Model. 1911-1915 - Hyun Kwon, Sunghwan Cho:
Multi-Targeted Poisoning Attack in Deep Neural Networks. 1916-1920 - Hyunghoon Kim, Jiwoo Shin, Hyo Jin Jo:
Adversarial Example Detection Based on Improved GhostBusters. 1921-1922 - Jaewoong Heo, Hyunghoon Kim, Hyo Jin Jo:
SOME/IP Intrusion Detection System Using Machine Learning. 1923-1924 - Haehyun Cho:
Data Covert Channels between the Secure World and the Normal World in the ARM TrustZone Architecture. 1925-1927 - Geochang Jeon, Jeong Hyun Yi, Haehyun Cho:
Hiding Data in the Padding Area of Android Applications without Re-Packaging. 1928-1929 - Seungkwang Lee, Nam-Su Jho:
A Multi-Tree Approach to Mutable Order-Preserving Encoding. 1930-1933 - Taek-Young Youn, Bo Sun Kwak, Seungkwang Lee, Hyun Sook Rhee:
Practical Order-Revealing Encryption with Short Ciphertext. 1934-1937 - Hitoshi Nishimura, Satoshi Komorita, Yasutomo Kawanishi, Hiroshi Murase:
SDOF-Tracker: Fast and Accurate Multiple Human Tracking by Skipped-Detection and Optical-Flow. 1938-1946 - Sixia Li, Shogo Okada, Jianwu Dang:
Intrinsic Representation Mining for Zero-Shot Slot Filling. 1947-1956 - Yang Zhang, Qiang Ma:
MP-BERT4REC: Recommending Multiple Positive Citations for Academic Manuscripts via Content-Dependent BERT and Multi-Positive Triplet. 1957-1968 - Haruka Nakamura, Yoshimasa Tawatsuji, Tatsunori Matsui, Makoto Nakamura, Koichi Kimura, Hisanori Fujisawa:
Formulation of Mindfulness States as a Network Optimization Problem and an Attempt to Identify Key Brain Pathways Using Digital Annealer. 1969-1983 - Jun Young An, Young-Kyoon Suh, Byungchul Tak:
Workload-Driven Analysis on the Performance Characteristics of GPU-Accelerated DBMSes. 1984-1989 - Weiwei Qi, Shubin Zheng, Liming Li, Zhenglong Yang:
Loosening Bolts Detection of Bogie Box in Metro Vehicles Based on Deep Learning. 1990-1993 - Rui Sun, Zi Yang, Lei Zhang, Yiheng Yu:
Orthogonal Deep Feature Decomposition Network for Cross-Resolution Person Re-Identification. 1994-1997
Volume 105-D, Number 12, December 2022
- Toshihiro Yamauchi:
Foreword. 1998 - Takuto Kanamori, Takashi Odan, Kazuki Hirohata, Kenji Kise:
RVCar: An FPGA-Based Simple and Open-Source Mini Motor Car System with a RISC-V Soft Processor. 1999-2007 - Tomoki Shimizu, Kohei Ito, Kensuke Iizuka, Kazuei Hironaka, Hideharu Amano:
The Implementation of a Hybrid Router and Dynamic Switching Algorithm on a Multi-FPGA System. 2008-2018 - Satoru Jimbo, Daiki Okonogi, Kota Ando, Thiem Van Chu, Jaehoon Yu, Masato Motomura, Kazushi Kawamura:
A Hybrid Integer Encoding Method for Obtaining High-Quality Solutions of Quadratic Knapsack Problems on Solid-State Annealers. 2019-2031 - Kazuhito Matsuda, Kouji Kurihara, Kentaro Kawakami, Masafumi Yamazaki, Fuyuka Yamada, Tsuguchika Tabaru, Ken Yokoyama:
Accelerating LiNGAM Causal Discovery with Massive Parallel Execution on Supercomputer Fugaku. 2032-2039 - Yoshiharu Yamagishi, Tatsuya Kaneko, Megumi Akai-Kasaya, Tetsuya Asai:
Holmes: A Hardware-Oriented Optimizer Using Logarithms. 2040-2047 - Takeshi Senoo, Akira Jinguji, Ryosuke Kuramochi, Hiroki Nakahara:
Multilayer Perceptron Training Accelerator Using Systolic Array. 2048-2056 - Naoya Niwa, Hideharu Amano, Michihiro Koibuchi:
Boosting the Performance of Interconnection Networks by Selective Data Compression. 2057-2065 - Yaoyu Zhang, Jiarui Zhang, Han Zhang:
The Automatic Generation of Smart Contract Based on Configuration in the Field of Government Services. 2066-2074 - Naoki Aoyama, Hiroshi Yamada:
Comparison of Value- and Reference-Based Memory Page Compaction in Virtualized Systems. 2075-2084 - Katsutoshi Hirayama, Tenda Okimoto:
Bounded Approximate Payoff Division for MC-nets Games. 2085-2091 - Iuon-Chang Lin, Chin-Chen Chang, Hsiao-Chi Chiang:
A Novel e-Cash Payment System with Divisibility Based on Proxy Blind Signature in Web of Things. 2092-2103 - Yuli Zha, Pengshuai Cui, Yuxiang Hu, Julong Lan, Yu Wang:
A Scalable Bitwise Multicast Technology in Named Data Networking. 2104-2111 - Han Ma, Qiaoling Zhang, Roubing Tang, Lu Zhang, Yubo Jia:
Robust Speech Recognition Using Teacher-Student Learning Domain Adaptation. 2112-2118 - Kazuki Omi, Jun Kimata, Toru Tamaki:
Model-Agnostic Multi-Domain Learning with Domain-Specific Adapters for Action Recognition. 2119-2126 - Teng Liang, Ao Zhan, Chengyu Wu, Zhengqiang Wang:
PDAA3C: An A3C-Based Multi-Path Data Scheduling Algorithm. 2127-2130 - Haney Kang, Seungwon Shin:
Verikube: Automatic and Efficient Verification for Container Network Policies. 2131-2134 - Kai Yan, Tiejun Zhao, Muyun Yang:
GRAPHULY: GRAPH U-Nets-Based Multi-Level Graph LaYout. 2135-2138
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.