IEICE Transactions on Information and Systems

Papers
(The median citation count of IEICE Transactions on Information and Systems is 0. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
FOREWORD100
FOREWORD28
Learning Multi-Level Features for Improved 3D Reconstruction21
Amodal Instance Segmentation of Thin Objects with Large Overlaps by Seed-to-Mask Extending17
Fast and Lightweight Non-Parallel Voice Conversion Based on Free-Energy Minimization of Speaker-Conditional Restricted Boltzmann Machine17
Face Image Generation of Anime Characters Using an Advanced First Order Motion Model with Facial Landmarks15
Space-Efficient FPT Algorithms for Degeneracy15
PPW Curves: a <i>C</i><sup>2</sup> Interpolating Spline with Hyperbolic Blending of Rational Bézier Curves14
Geometric Partitioning Mode with Inter and Intra Prediction for Beyond Versatile Video Coding14
Development of a Coanda-Drone with Built-in Propellers14
DGA-Based Malware Communication Detection from DoH Traffic Using Hierarchical Machine Learning Analysis14
SAT-Based Differential Analysis of Initialization Phase of AEGIS/Tiaoxin-346/Rocca/Rocca-S12
Knowledge-Based Building Region Extraction Using Patch-Based Graph Cut11
A Driver Fatigue Detection Algorithm Based on Dynamic Tracking of Small Facial Targets Using YOLOv711
Negotiation Simulation System Using Large Language Model for Medical Office Staff11
GConvLoc: WiFi Fingerprinting-Based Indoor Localization Using Graph Convolutional Networks10
CASEformer — A Transformer-Based Projection Photometric Compensation Network10
Imbalanced Data Over-Sampling Method Based on ISODATA Clustering10
A Hybrid Model of SARIMA and GRU in Water Level Forecasting: Case Study in Ankhe Reservoir, Vietnam10
Brain Tumor Classification using Under-Sampled k-Space Data: A Deep Learning Approach9
Negative Learning to Prevent Undesirable Misclassification9
An Efficient Algorithm for the Detour Hinge Vertex Problem on Trapezoid Graphs9
Real-Time Interactions with Photos and Texts in Large Classrooms9
Bounded Approximate Payoff Division for MC-nets Games9
Entropy Regularized Unsupervised Clustering Based on Maximum Correntropy Criterion and Adaptive Neighbors9
FOREWORD8
A Fast Handover Mechanism for Ground-to-Train Free-Space Optical Communication using Station ID Recognition by Dual-Port Camera8
Multi-Grained Guaranteeable Requirement Analysis for Iterative Adaptation8
Should Maintainers Deploy to Cross-Ecosystems? An Analysis of Packages from PyPI and NPM8
Intrinsic Representation Mining for Zero-Shot Slot Filling8
Boosting the Performance of Interconnection Networks by Selective Data Compression8
Detecting Textual Backdoor Attacks via Class Difference for Text Classification System8
Overlapping of Lattice Unfolding for Cuboids7
Gait Analysis and Severity Estimation of Parkinson’s Disease Patients Using Insole-Type Pressure Sensors7
Projection-Based Adversarial Attack Using Physics-in-the-Loop Optimization for Monocular Depth Estimation7
FusionReg: LiDAR-Camera Fusion Regression Enhancement for 3D Object Detection7
BMR: a New BBR Algorithm with Moderate Delivery Rate7
Prediction of Driver's Visual Attention in Critical Moment Using Optical Flow7
Neural End-To-End Speech Translation Leveraged by ASR Posterior Distribution7
Skin Visualization Using Smartphone and Deep Learning in the Beauty Industry6
Research on FPGA Implementation of a Fire Detection System for Key Equipment in Converter Stations6
A Sealed-Bid Auction with Fund Binding: Preventing Maximum Bidding Price Leakage6
FOREWORD6
D2PT: Density to Point Transformer with Knowledge Distillation for Crowd Counting and Localization6
Learning from Repeated Trials without Feedback: Can Collective Intelligence Outperform the Best Members?6
UF-Net: Unified Feature Network for Remote Sensing Image Dehazing6
Multi-Scale Contrastive Learning for Human Pose Estimation6
VTD-FCENet: A Real-Time HD Video Text Detection with Scale-Aware Fourier Contour Embedding6
Calculation Solitaire is NP-Complete6
Understanding Characteristics of Phishing Reports from Experts and Non-Experts on Twitter6
IAD-Net: Single-Image Dehazing Network Based on Image Attention6
Subjective Quality Assessment of Dynamic 3D Meshes in Virtual Reality Environment6
OS-Mamba: Overall Scanning Mamba for Building Damage Assessment Using Multi-Phase Satellite Imagery6
Dynamic Fault Tolerance for Multi-Node Query Processing6
A Subclass of Mu-Calculus with the Freeze Quantifier Equivalent to Register Automata6
Shared Latent Embedding Learning for Multi-View Subspace Clustering6
Unveiling Python Version Compatibility Challenges in Code Snippets on Stack Overflow6
Bridging between Soft and Hard Thresholding by Scaling6
Strategies and Equilibria on Indistinguishability of Winning Objectives and Related Decision Problems5
Fault-Tolerant Routing in Bicubes5
A Sequential Approach to Detect Drifts and Retrain Neural Networks on Resource-Limited Edge Devices5
Learning Support System That Encourages Self-Directed Knowledge Discovery5
Toward an Understanding of Musical Factors in Judging a Song on First Listen5
Priority Evasion Attack: An Adversarial Example That Considers the Priority of Attack on Each Classifier5
Interpreting Attention Mechanisms of NMT with Linguistic Features5
Intelligent Tool Condition Monitoring Based on Multi-Scale Convolutional Recurrent Neural Network5
Wide-Area and Long-Term Agricultural Sensing System Utilizing UAV and Wireless Technologies5
Online Combinatorial Linear Optimization via a Frank-Wolfe-Based Metarounding Algorithm5
Training Strategy to Ignore Scene Context on Action Quality Assessment5
Orthogonal Deep Feature Decomposition Network for Cross-Resolution Person Re-Identification5
CLEAR & RETURN: Stopping Run-Time Countermeasures in Cryptographic Primitives5
BP-CRN: A Lightweight Two-Stage Convolutional Recurrent Network for Multi-Channel Speech Enhancement4
Multi-Scale Rail Surface Anomaly Detection Based on Weighted Multivariate Gaussian Distribution4
A mmWave Sensor and Camera Fusion System for Indoor Occupancy Detection and Tracking4
Constructing a Dataset of Functionally Equivalent Python Methods Using Test Generation Techniques4
Synchronization Options and Their Performance Benefits for Spatial Index on Persistent Memory4
Epileptic Seizure Prediction Using Convolutional Neural Networks and Fusion Features on Scalp EEG Signals4
Efficient and Lightweight Multi-Scale Point Cloud Denoising4
Domain Knowledge Graph Embedding for Zero-Shot Human-Object Interaction Detection4
Subjective Difficulty Estimation of Educational Comics Using Gaze Features4
RR-Row: Redirect-on-Write Based Virtual Machine Disk for Record/Replay4
ZGridBC: Zero-Knowledge Proof Based Scalable and Privacy-Enhanced Blockchain Platform for Electricity Tracking4
Unbiased Pseudo-Labeling for Learning with Noisy Labels4
Task Scheduling in Edge Network System Using Resource Interleaving and Reinforcement Learning4
Machine Learning-Based System for Heat-Resistant Analysis of Car Lamp Design4
Graph Contextual Reinforcement Learning for Efficient Directed Controller Synthesis4
Agent Allocation-Action Learning with Dynamic Heterogeneous Graph in Multi-Task Games4
Predicting Image Diffusion in Social Networks through Visual Interest Similarity4
FOREWORD4
Multi-Targeted Poisoning Attack in Deep Neural Networks4
Designing ReLU Generative Networks to Enumerate Trees with a Given Tree Edit Distance4
An Efficient Combined Bit-Width Reducing Method for Ising Models4
A Systematic Evaluation of Large Language Models in API Mapping4
No Reference Quality Assessment of Contrast-Distorted SEM Images Based on Global Features4
Lightweight Neural Data Sequence Modeling by Scale Causal Blocks4
Analysis on Norms of Word Embedding and Hidden Vectors in Neural Conversational Model Based on Encoder-Decoder RNN4
Japanese Essay Scoring with Generative Pre-Trained Language Models Combined with Soft Labels4
A Survey on Explainable Fake News Detection4
Confidence-Driven Contrastive Learning for Document Classification without Annotated Data4
Evaluation and Comparison of Integer Programming Solvers for Hard Real-Time Scheduling4
Neural Network-Based Post-Processing Filter on V-PCC Attribute Frames4
Influence Propagation Based Influencer Detection in Online Forum4
Proactive Defense against Propaganda Strategies by Malicious Cut-and-Paste Editing4
Measuring Motivational Pattern on Second Language Learning and its Relationships to Academic Performance: A Case Study of Blended Learning Course4
Improved Anomaly Detection Using Efficient GAN and Mapping Consistency4
A Hybrid Bayesian-Convolutional Neural Network for Adversarial Robustness4
MSFF: A Multi-Scale Feature Fusion Network for Surface Defect Detection of Aluminum Profiles4
Improving Chinese Spelling Correction by Integrating Error Position Detection and Over-correction Optimization4
A Framework for Interactive Web-Based Learning Materials Facilitating Competition and Collaboration through Gamification4
An Interpretable Feature Selection Based on Particle Swarm Optimization4
Skin Diagnostic Method Using Fontana-Masson Stained Images of Stratum Corneum Cells4
Best Possible Algorithms for One-Way Trading with Only the Maximum Fluctuation Ratio Available3
Locating Concepts on Use Case Steps in Source Code3
Fully Private Hill-Climbing Protocol for Multi-Issue Negotiation3
Efficient Processing of Multiple Continuous Window Aggregations over Streams3
Umbrellalike Hierarchical Artificial Bee Colony Algorithm3
Leveraging Self-Refinement in Large Language Models to Suppress Excessive Responses for Virtual Simulated Patients3
An Accelerated Integrity-Secured Name Resolution Architecture Using Two Full-Service Resolvers with and without DNSSEC Validation in Parallel3
An Exploration of Cross-Patch Collaborations via Patch Linkage in OpenStack3
Effect of Politeness on Trust in Re-Enter Requests to User by Smart Speaker —Pilot Study—3
HAR-DCWGAN: Dual-Conditional Wasserstein GAN for Human Activity Recognition Data Synthesis3
Object-ABN: Learning to Generate Sharp Attention Maps for Action Recognition3
FPGA-based Garbling Accelerator with Parallel Pipeline Processing3
Channel Pruning via Improved Grey Wolf Optimizer Pruner3
Associating Colors with Mental States for Computer-Aided Drawing Therapy3
Reconfiguring <i>k</i>-Path Vertex Covers3
Unfolding Hidden Structures in Cyber-Physical Systems for Thorough STPA Analysis3
A Low-Cost Structure-Preserving Texture Removal Method Using AW-dRTV and Pixel-Wise ISES Filter3
Greedy Sensor Selection Based on LU Factorization for Linear Least Squares Estimation3
Feature Transformation for Learning with Selective Forgetting3
A Night Image Enhancement Algorithm Based on MDIFE-Net Curve Estimation3
LiNeS Cloud: A Web-Based Hands-On System for Network Security Classes with Intuitive and Seamless Operability and Light-Weight Responsiveness3
Recognition of Vibration Dampers Based on Deep Learning Method in UAV Images3
An Interpretable Multi-Level Feature Disentanglement Algorithm for Speech Emotion Recognition3
Prior Information Based Decomposition and Reconstruction Learning for Micro-Expression Recognition3
Interactive Persona Chat for Accurate Response Selection3
DDPG-QoSRA: A Cross-Layer QoS-Optimized Routing Algorithm for Large-Scale LEO Satellite Networks3
FOREWORD3
The Impact of Defect (Re) Prediction on Software Testing3
An Academic Presentation Support System Utilizing Structural Elements3
FOREWORD3
FOREWORD3
Towards Safety Evaluations of Theory of Mind in Large Language Models3
Conversational AI as a Facilitator Improves Participant Engagement and Problem-Solving in Online Discussion: Sharing Evidence from Five Cities in Afghanistan3
Pattern-Based Meta Graph Neural Networks for Argument Classifications3
A+Block: Web Security Add-on Service by Just Pointing to Your Website URL3
Deep Reinforcement Learning Based Ontology Meta-Matching Technique3
A VVC Dependent Quantization Optimization Based on the Parallel Viterbi Algorithm and Its FPGA Implementation3
A DFT and IWT-DCT Based Image Watermarking Scheme for Industry3
Implementation of a Multi-Word Compare-and-Swap Operation without Garbage Collection3
FOREWORD3
A Memory-Efficient Overwrite Detection Method for Ransomware-Proof SSDs3
Permissionless Blockchain-Based Sybil-Resistant Self-Sovereign Identity Utilizing Attested Execution Secure Processors3
Re-Evaluating Syntax-Based Negation Scope Resolution3
Your heart foretells your performance: Analysis of pre-task heart rate in program comprehension tasks2
FOREWORD2
6T-8T Hybrid SRAM for Lower-Power Neural-Network Processing by Lowering Operating Voltage2
A Compression Router for Low-Latency Network-on-Chip2
Accelerating Sequential Pattern Mining on Spark: A SPADE-Based Approach2
Reconfigurable Pedestrian Detection System Using Deep Learning for Video Surveillance2
Feasibility Study of Applying Spatial Crowd Smoothing without Economic Incentives on Ticket Reservation System that Applies Nudges2
Analysis of Non-Experts' Security- and Privacy-Related Questions on a Q&A Site2
GSViTS: Enhancing Speech Naturalness and Fluency in Parallel End-to-End TTS Model2
Minimal Paths in a Bicube2
Online Job Scheduling with <i>K</i> Servers2
Differential-Neural Cryptanalysis on AES2
Counting and Tracking People to Avoid from Crowded in a Restaurant Using mmWave Radar2
Feedback-Based Dynamic Traffic Balancing for Multipath Routing in ISP Networks2
Computational Complexity and Integer Programming Formulation of the Oredango Puzzle2
Spotlight Contents Extraction from Text-Based Online Discussion2
I/O Performance Improvement of FHE Apriori with Striping File Layout Considering Storage of Intermediate Data2
2D Human Skeleton Action Recognition Based on Depth Estimation2
Efficient and Precise Ellipse Detection via Deep Learning-Based Axis-Aligned Bounding Box Estimation2
UTStyleCap4K: Generating Image Captions with Sentimental Styles2
<i>Verikube</i>: Automatic and Efficient Verification for Container Network Policies2
Deterministic and Probabilistic Certified Defenses for Content-Based Image Retrieval2
Practical Order-Revealing Encryption with Short Ciphertext2
Toward Generating Robot-Robot Natural Counseling Dialogue2
Loosening Bolts Detection of Bogie Box in Metro Vehicles Based on Deep Learning2
CodeTree<sub><i>sub</i></sub>: Efficient subgraph search with graph code indices and its comprehensive performance evaluation2
Multilayer Perceptron Training Accelerator Using Systolic Array2
BFF R-CNN: Balanced Feature Fusion for Object Detection2
Feature-Based Adversarial Training for Deep Learning Models Resistant to Transferable Adversarial Examples2
A Non-Revisiting Equilibrium Optimizer Algorithm2
GAMPALv2: An Anomaly Detection Mechanism for Internet Traffic by Predicting Flow Size Range from Time Features2
Multimodal Named Entity Recognition with Bottleneck Fusion and Contrastive Learning2
Computational Complexity of the Chromatic Dispersive Art Gallery Problem2
Wider Depth Dynamic Range Using Occupancy Map Correction for Immersive Video Coding2
Frank-Wolfe for Sign-Constrained Support Vector Machines2
Multiple Layout Design Generation via a GAN-Based Method with Conditional Convolution and Attention2
Finding a Reconfiguration Sequence between Longest Increasing Subsequences2
EfficientNet Empowered by Dendritic Learning for Diabetic Retinopathy2
Degraded Image Classification using Knowledge Distillation and Robust Data Augmentations2
Shift Quality Classifier Using Deep Neural Networks on Small Data with Dropout and Semi-Supervised Learning2
Exact Algorithm to Solve Continuous Similarity Search for Evolving Queries and Its Variant2
Personalizing LLM-Based Evaluation of Code Readability2
Comparison of Three DFT-Based Fine Frequency Estimation Methods Using Synthetic Vibrato Tone Models2
Video Object Segmentation via Adaptive Multi-Feature Fusion of Foreground and Background2
A Fine-Aware Vision Transformer for Precision Grasp Pose Detection2
Unsupervised Techniques for Identifying the Mode of a Multi-Functional Radar with Varying Pulse Sequences2
The Comparison of Attention Mechanisms with Different Embedding Modes for Performance Improvement of Fine-Grained Classification2
Automated Versioning for Software Releases: A Retrospective Study and a New Lightweight Approach2
An Efficient Multimodal Aggregation Network for Video-Text Retrieval2
Mechanisms to Address Different Privacy Requirements for Users and Locations2
Design and Implementation of an On-Line Quality Control System for Latch-Based True Random Number Generator2
A Support Method for Developing Adaptive User Interfaces for Mobile Devices Based on Placeona2
Locally Differentially Private Minimum Finding2
FOREWORD2
Non-Cooperative Rational Synthesis Problem for Probabilistic Strategies2
A Quasi-Newton Method for a Mean Variance Estimation Network2
Handwritten Character Image Generation for Effective Data Augmentation2
Empirical Analysis of the Effects of a Gender Stereotypical Cue on Computer Programming2
Efficient Token Exchange Scheme among Different Blockchain Ledgers2
Escape from the Room2
Dataset of Functionally Equivalent Java Methods and Its Application to Evaluating Clone Detection Tools2
Remote Sensing Image Dehazing Using Multi-Scale Gated Attention for Flight Simulator2
Correcting Recognition Errors in Japanese Handwritten Answers for Zero-Shot Automated Scoring with Large Language Models2
Propagation-Based Code Clone Analysis for Detecting Smart Contract Vulnerability2
A Hierarchical Memory Model for Task-Oriented Dialogue System2
Hierarchical Latent Alignment for Non-Autoregressive Generation under High Compression Ratio2
Research on Mask-Wearing Detection Algorithm Based on Improved YOLOv7-Tiny2
Chained Block is NP-Complete2
Towards Superior Pruning Performance in Federated Learning with Discriminative Data2
Improvement of Differential-GNSS Positioning by Estimating Code Double-Difference-Error Using Machine Learning2
Signing-Enhanced Forward-Secure Signatures by Leveraging SNARKs2
Interpretable Feature Engineering Approach Based on Co-Occurring Gene Mutations2
GPU-Accelerated Estimation and Targeted Reduction of Peak IR-Drop during Scan Chain Shifting2
Learning Local Similarity with Spatial Interrelations on Content-Based Image Retrieval2
FOREWORD2
Projection-Based Physical Adversarial Attack for Monocular Depth Estimation2
Residual Quantization in Displacement Coding of Dynamic Meshes2
Classification of URL Citations on Scholarly Papers Using Intermediate Task Training2
A Text-to-Lyrics Generation Method Leveraging Image-based Semantics and Reducing Plagiarism Risk2
Aggregate Signature Schemes with Traceability of Devices Dynamically Generating Invalid Signatures2
FOREWORD2
A Lightweight Reinforcement Learning Based Packet Routing Method Using Online Sequential Learning2
Preventing SNS Impersonation: A Blockchain-Based Approach2
Grid Sample Based Temporal Iteration for Fully Pipelined 1-ms SLIC Superpixel Segmentation System2
Non-Cooperative Rational Synthesis Problem on Stochastic Games for Positional Strategies2
Two-Path Object Knowledge Injection for Detecting Novel Objects With Single-Stage Dense Detector2
HDR-VDA: A Full Stage Data Augmentation Method for HDR Video Reconstruction2
Online Communication Environment Design for Encouraging Reciprocal Use of Information among Groups2
A Framework for Synchronous Remote Online Exams2
Efficient Multi-Scale Feature Fusion for Image Manipulation Detection2
Erratum: Learn Discriminative Features for Small Object Detection through Multi-Scale Image Degradation with Contrastive Learning [IEICE Transactions on Information and Systems Vol. E108.D (2025), No.2
SiFi-GAN: Combining Source-Filter Modeling and Upsampling-Based High-Fidelity Neural Vocoder for Fast and Pitch-Controllable Speech Synthesis2
Unified Physiological and Illumination Modeling for Heart Rate Estimation Using Dynamic Mode Decomposition and RGB/NIR Sensor2
Leveraging Different Boolean Function Decompositions to Reduce T-Count in LUT-Based Quantum Circuit Synthesis2
Joint Distribution-Aligned Dual-Sparse Linear Regression for Cross-Stimulus Speech-Based Depression Detection2
The Automatic Generation of Smart Contract Based on Configuration in the Field of Government Services2
0.10579109191895