IEICE Transactions on Information and Systems

Papers
(The TQCC of IEICE Transactions on Information and Systems is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Load Balancing with In-Protocol/Wallet-Level Account Assignment in Sharded Blockchains79
FOREWORD21
GECNN for Weakly Supervised Semantic Segmentation of 3D Point Clouds21
A Proof of Work Based on Key Recovery Problem of Cascade Block Ciphers with ASIC Resistance17
Collaborative Ontology Development and its Use for Video Annotation in Elderly Care Domain16
LTL Model Checking for Register Pushdown Systems16
FOREWORD13
FOREWORD12
Imbalanced Data Over-Sampling Method Based on ISODATA Clustering11
Image Based Coding of Spatial Probability Distribution on Human Dynamics Data11
Learning Multi-Level Features for Improved 3D Reconstruction11
Triplet Attention Network for Video-Based Person Re-Identification11
Space-Efficient FPT Algorithms for Degeneracy10
A Driver Fatigue Detection Algorithm Based on Dynamic Tracking of Small Facial Targets Using YOLOv710
DGA-based Malware Communication Detection from DoH Traffic Using Hierarchical Machine Learning Analysis10
Fast and Lightweight Non-Parallel Voice Conversion Based on Free-Energy Minimization of Speaker-Conditional Restricted Boltzmann Machine9
Face Image Generation of Anime Characters Using an Advanced First Order Motion Model with Facial Landmarks9
CASEformer — A Transformer-Based Projection Photometric Compensation Network9
GConvLoc: WiFi Fingerprinting-Based Indoor Localization Using Graph Convolutional Networks9
Development of a Coanda-Drone with Built-in Propellers9
Amodal Instance Segmentation of Thin Objects with Large Overlaps by Seed-to-Mask Extending9
Bounded Approximate Payoff Division for MC-nets Games8
An Improved Method for Two-UAV Trajectory Planning for Cooperative Target Locating Based on Airborne Visual Tracking Platform8
A CNN-Based Optimal CTU λ Decision for HEVC Intra Rate Control8
Entropy Regularized Unsupervised Clustering Based on Maximum Correntropy Criterion and Adaptive Neighbors8
Geometric Partitioning Mode with Inter and Intra Prediction for Beyond Versatile Video Coding8
Adaptive Binarization for Vehicle State Images Based on Contrast Preserving Decolorization and Major Cluster Estimation8
PPW Curves: a <i>C</i><sup>2</sup> Interpolating Spline with Hyperbolic Blending of Rational Bézier Curves8
Real-Time Interactions with Photos and Texts in Large Classrooms8
Research on Dissections of a Net of a Cube into Nets of Cubes7
BMR: a new BBR algorithm with moderate delivery rate7
Frank-Wolfe Algorithm for Learning SVM-Type Multi-Category Classifiers7
Research on a Prediction Method for Carbon Dioxide Concentration Based on an Optimized LSTM Network of Spatio-Temporal Data Fusion7
OS-Mamba: Overall scanning Mamba for building damage assessment using multi-phase satellite imagery7
Two-Stage Fine-Grained Text-Level Sentiment Analysis Based on Syntactic Rule Matching and Deep Semantic7
FOREWORD7
Negative Learning to Prevent Undesirable Misclassification7
Gait analysis and severity estimation of Parkinson's disease patients using insole-type pressure sensors7
Skin Visualization Using Smartphone and Deep Learning in the Beauty Industry7
Multi-Grained Guaranteeable Requirement Analysis for Iterative Adaptation7
Action Recognition Using Pose Data in a Distributed Environment over the Edge and Cloud7
Brain Tumor Classification using Under-Sampled k-Space Data: A Deep Learning Approach7
On CSS Unsatisfiability Problem in the Presense of DTDs7
Boosting the Performance of Interconnection Networks by Selective Data Compression7
BlockCSDN: Towards Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking7
Detecting Textual Backdoor Attacks via Class Difference for Text Classification System6
Prediction of Driver's Visual Attention in Critical Moment Using Optical Flow6
A Fast Handover Mechanism for Ground-to-Train Free-Space Optical Communication using Station ID Recognition by Dual-Port Camera6
L1 Norm Minimal Mode-Based Methods for Listing Reaction Network Designs for Metabolite Production6
VTD-FCENet: A Real-Time HD Video Text Detection with Scale-Aware Fourier Contour Embedding6
FusionReg: LiDAR-Camera Fusion Regression Enhancement for 3D Object Detection6
Overlapping of Lattice Unfolding for Cuboids6
Rapid Recovery by Maximizing Page-Mapping Logs Deactivation6
Privacy-Preserving System for Enriched-Integrated Service6
A Sealed-Bid Auction with Fund Binding: Preventing Maximum Bidding Price Leakage6
Improved Hybrid Feature Selection Framework6
Intrinsic Representation Mining for Zero-Shot Slot Filling6
Multi-Scale Contrastive Learning for Human Pose Estimation6
Neural End-To-End Speech Translation Leveraged by ASR Posterior Distribution6
Priority Evasion Attack: An Adversarial Example That Considers the Priority of Attack on Each Classifier6
FOREWORD6
Dynamic Fault Tolerance for Multi-Node Query Processing5
A Subclass of Mu-Calculus with the Freeze Quantifier Equivalent to Register Automata5
Measuring Motivational Pattern on Second Language Learning and its Relationships to Academic Performance: A Case Study of Blended Learning Course5
Calculation Solitaire is NP-Complete5
CLEAR & RETURN: Stopping Run-Time Countermeasures in Cryptographic Primitives5
Efficient Computation of Betweenness Centrality by Graph Decompositions and Their Applications to Real-World Networks5
An Interpretable Feature Selection Based on Particle Swarm Optimization5
Epileptic Seizure Prediction Using Convolutional Neural Networks and Fusion Features on Scalp EEG Signals5
Efficient Reboot-Based Recovery of In-Memory Databases5
Orthogonal Deep Feature Decomposition Network for Cross-Resolution Person Re-Identification5
Patent One-Stop Service Business Model Based on Scientific and Technological Resource Bundle5
FOREWORD5
Wide-Area and Long-Term Agricultural Sensing System Utilizing UAV and Wireless Technologies4
An <i>O</i>(<i>n</i><sup>2</sup>)-Time Algorithm for Computing a Max-Min 3-Dispersion on a Point Set in Convex Position4
IAD-Net: Single-Image Dehazing Network Based on Image Attention4
Toward an Understanding of Musical Factors in Judging a Song on First Listen4
Learning Support System That Encourages Self-Directed Knowledge Discovery4
An Efficient Combined Bit-Width Reducing Method for Ising Models4
Understanding Characteristics of Phishing Reports from Experts and Non-Experts on Twitter4
D2PT: Density to Point Transformer with Knowledge Distillation for Crowd Counting and Localization4
Discriminative Part CNN for Pedestrian Detection4
Subjective Difficulty Estimation of Educational Comics Using Gaze Features4
Influence Propagation Based Influencer Detection in Online Forum4
Unbiased Pseudo-Labeling for Learning with Noisy Labels4
Strategies and Equilibria on Indistinguishability of Winning Objectives and Related Decision Problems4
Smaller Residual Network for Single Image Depth Estimation4
Learning from Repeated Trials without Feedback: Can Collective Intelligence Outperform the Best Members?4
A Sequential Approach to Detect Drifts and Retrain Neural Networks on Resource-Limited Edge Devices4
Unveiling Python Version Compatibility Challenges in Code Snippets on Stack Overflow4
MSFF: A Multi-Scale Feature Fusion Network for Surface Defect Detection of Aluminum Profiles4
FOREWORD4
Neural Network-Based Post-Processing Filter on V-PCC Attribute Frames4
ZGridBC: Zero-Knowledge Proof Based Scalable and Privacy-Enhanced Blockchain Platform for Electricity Tracking4
Machine Learning-Based System for Heat-Resistant Analysis of Car Lamp Design4
Online Combinatorial Linear Optimization via a Frank-Wolfe-Based Metarounding Algorithm4
Shared Latent Embedding Learning for Multi-View Subspace Clustering4
Intelligent Tool Condition Monitoring Based on Multi-Scale Convolutional Recurrent Neural Network4
Bridging between Soft and Hard Thresholding by Scaling4
Fault-Tolerant Routing in Bicubes4
Toward Blockchain-Based Spoofing Defense for Controlled Optimization of Phases in Traffic Signal System4
Skin Diagnostic Method Using Fontana-Masson Stained Images of Stratum Corneum Cells4
An Exploration of Cross-Patch Collaborations via Patch Linkage in OpenStack3
Maritime Target Detection Based on Electronic Image Stabilization Technology of Shipborne Camera3
Prior Information Based Decomposition and Reconstruction Learning for Micro-Expression Recognition3
BP-CRN: A Lightweight Two-Stage Convolutional Recurrent Network for Multi-Channel Speech Enhancement3
Analysis on Norms of Word Embedding and Hidden Vectors in Neural Conversational Model Based on Encoder-Decoder RNN3
Associating Colors with Mental States for Computer-Aided Drawing Therapy3
Unfolding Hidden Structures in Cyber-Physical Systems for Thorough STPA Analysis3
Confidence-Driven Contrastive Learning for Document Classification without Annotated Data3
Evaluation and Comparison of Integer Programming Solvers for Hard Real-Time Scheduling3
The Impact of Defect (Re) Prediction on Software Testing3
Asymmetric Tobit Analysis for Correlation Estimation from Censored Data3
Non-Invasive Monitoring of Respiratory Rate and Respiratory Status during Sleep Using a Passive Radio-Frequency Identification System3
FOREWORD3
FOREWORD3
A Visible Video Data Hiding Scheme Based on Fade-In and Fade-Out Effects Utilizing Barcodes3
An Interpretable Multi-level Feature Disentanglement Algorithm for Speech Emotion Recognition3
Semi-Supervised Representation Learning via Triplet Loss Based on Explicit Class Ratio of Unlabeled Data3
Deep Reinforcement Learning Based Ontology Meta-Matching Technique3
Reconfiguring <i>k</i>-Path Vertex Covers3
Japanese Essay Scoring with Generative Pre-trained Language Models Combined with Soft Labels3
Layerweaver+: A QoS-Aware Layer-Wise DNN Scheduler for Multi-Tenant Neural Processing Units3
RR-Row: Redirect-on-Write Based Virtual Machine Disk for Record/Replay3
Permissionless Blockchain-Based Sybil-Resistant Self-Sovereign Identity Utilizing Attested Execution Secure Processors3
Multi-Scale Rail Surface Anomaly Detection Based on Weighted Multivariate Gaussian Distribution3
Learning from Noisy Complementary Labels with Robust Loss Functions3
Dual Self-Guided Attention with Sparse Question Networks for Visual Question Answering3
Lightweight Neural Data Sequence Modeling by Scale Causal Blocks3
FOREWORD3
A Survey on Explainable Fake News Detection3
Efficient Processing of Multiple Continuous Window Aggregations over Streams3
NFD.P4: NDN In-Networking Cache Implementation Scheme with P43
A Memory-Efficient Overwrite Detection Method for Ransomware-Proof SSDs3
FOREWORD3
A DFT and IWT-DCT Based Image Watermarking Scheme for Industry3
ExamChain: A Privacy-Preserving Onscreen Marking System Based on Consortium Blockchain3
Improved Anomaly Detection Using Efficient GAN and Mapping Consistency3
FOREWORD3
Task scheduling in edge network system using resource interleaving and reinforcement learning3
LiNeS Cloud: A Web-Based Hands-On System for Network Security Classes with Intuitive and Seamless Operability and Light-Weight Responsiveness3
The Fractional-N All Digital Frequency Locked Loop with Robustness for PVT Variation and Its Application for the Microcontroller Unit3
Re-Evaluating Syntax-Based Negation Scope Resolution3
A Hybrid Bayesian-Convolutional Neural Network for Adversarial Robustness3
Construction of Multiple-Valued Bent Functions Using Subsets of Coefficients in GF and RMF Domains3
A mmWave Sensor and Camera Fusion System for Indoor Occupancy Detection and Tracking3
Agent Allocation-Action Learning with Dynamic Heterogeneous Graph in Multi-Task Games3
Reducing Energy Consumption of Wakeup Logic through Double-Stage Tag Comparison3
Deep Clustering for Improved Inter-Cluster Separability and Intra-Cluster Homogeneity with Cohesive Loss3
FOREWORD3
Multi-Targeted Poisoning Attack in Deep Neural Networks3
A Multi-Tenant Resource Management System for Multi-FPGA Systems3
NetworkAPI: An In-Band Signalling Application-Aware Traffic Engineering Using SRv6 and IP Anycast3
Single Image Dehazing Algorithm Based on Modified Dark Channel Prior3
Gait Phase Partitioning and Footprint Detection Using Mutually Constrained Piecewise Linear Approximation with Dynamic Programming3
An Academic Presentation Support System Utilizing Structural Elements3
FPGA-based Garbling Accelerator with Parallel Pipeline Processing3
Best Possible Algorithms for One-Way Trading with Only the Maximum Fluctuation Ratio Available3
Locating Concepts on Use Case Steps in Source Code3
No Reference Quality Assessment of Contrast-Distorted SEM Images Based on Global Features3
Projection-Based Physical Adversarial Attack for Monocular Depth Estimation2
Classifying Near-Miss Traffic Incidents through Video, Sensor, and Object Features2
Leveraging Different Boolean Function Decompositions to Reduce T-Count in LUT-Based Quantum Circuit Synthesis2
Loosening Bolts Detection of Bogie Box in Metro Vehicles Based on Deep Learning2
Dataset of Functionally Equivalent Java Methods and Its Application to Evaluating Clone Detection Tools2
FOREWORD2
A VVC Dependent Quantization Optimization Based on the Parallel Viterbi Algorithm and Its FPGA Implementation2
Gender Recognition Using a Gaze-Guided Self-Attention Mechanism Robust Against Background Bias in Training Samples2
A Framework for Synchronous Remote Online Exams2
EfficientNet Empowered by Dendritic Learning for Diabetic Retinopathy2
Conversational AI as a Facilitator Improves Participant Engagement and Problem-Solving in Online Discussion: Sharing Evidence from Five Cities in Afghanistan2
Shift Quality Classifier Using Deep Neural Networks on Small Data with Dropout and Semi-Supervised Learning2
FOREWORD2
A Night Image Enhancement Algorithm Based on MDIFE-Net Curve Estimation2
MTGAN: Extending Test Case set for Deep Learning Image Classifier2
Practical Order-Revealing Encryption with Short Ciphertext2
Mechanisms to Address Different Privacy Requirements for Users and Locations2
Channel Pruning via Improved Grey Wolf Optimizer Pruner2
An FPGA-Based Optimizer Design for Distributed Deep Learning with Multiple GPUs2
Online Communication Environment Design for Encouraging Reciprocal Use of Information among Groups2
How Centrality of Driver Nodes Affects Controllability of Complex Networks2
Partition-then-Overlap Method for Labeling Cyber Threat Intelligence Reports by Topics over Time2
I/O Performance Improvement of FHE Apriori with Striping File Layout Considering Storage of Intermediate Data2
A Novel Discriminative Virtual Label Regression Method for Unsupervised Feature Selection2
Counting and Tracking People to Avoid from Crowded in a Restaurant Using mmWave Radar2
Speech Paralinguistic Approach for Detecting Dementia Using Gated Convolutional Neural Network2
Implementation of a Multi-Word Compare-and-Swap Operation without Garbage Collection2
Multimodal Named Entity Recognition with Bottleneck Fusion and Contrastive Learning2
A Business Service Model of Smart Home Appliances Participating in the Peak Shaving and Valley Filling Based on Cloud Platform2
Fusion of Blockchain, IoT and Artificial Intelligence - A Survey2
Two-Sided LPC-Based Speckle Noise Removal for Laser Speech Detection Systems2
SimpleZSL: Extremely Simple and Fast Zero-Shot Learning with Nearest Neighbor Classifiers2
Unsupervised Techniques for Identifying the Mode of a Multi-Functional Radar with Varying Pulse Sequences2
Learning Local Similarity with Spatial Interrelations on Content-Based Image Retrieval2
A Quasi-Newton Method for a Mean Variance Estimation Network2
A Lightweight Reinforcement Learning Based Packet Routing Method Using Online Sequential Learning2
Efficient Multi-Scale Feature Fusion for Image Manipulation Detection2
Umbrellalike Hierarchical Artificial Bee Colony Algorithm2
HDR-VDA: A Full Stage Data Augmentation Method for HDR Video Reconstruction2
Attention Voting Network with Prior Distance Augmented Loss for 6DoF Pose Estimation2
Pattern-Based Meta Graph Neural Networks for Argument Classifications2
A ΔΣ-Modulation Feedforward Network for Non-Binary Analog-to-Digital Converters2
Non-Cooperative Rational Synthesis Problem for Probabilistic Strategies2
Dynamic Incentive Mechanism for Industrial Network Congestion Control2
An Improved Online Multiclass Classification Algorithm Based on Confidence-Weighted2
A Compression Router for Low-Latency Network-on-Chip2
Representation Learning of Tongue Dynamics for a Silent Speech Interface2
Aggregate Signature Schemes with Traceability of Devices Dynamically Generating Invalid Signatures2
Two-Path Object Knowledge Injection for Detecting Novel Objects With Single-Stage Dense Detector2
An Improvement of the Biased-PPSZ Algorithm for the 3SAT Problem2
Handwritten Character Image Generation for Effective Data Augmentation2
A Privacy-Preserving Mobile Crowdsensing Scheme Based on Blockchain and Trusted Execution Environment2
HBDCA: A Toolchain for High-Accuracy BRAM-Defined CNN Accelerator on FPGA with Flexible Structure2
Recursive Multi-Scale Channel-Spatial Attention for Fine-Grained Image Classification2
Multilayer Perceptron Training Accelerator Using Systolic Array2
Online Job Scheduling with <i>K</i> Servers2
Differentially Private Neural Networks with Bounded Activation Function2
Recognition of Vibration Dampers Based on Deep Learning Method in UAV Images2
SōjiTantei: Function-Call Reachability Detection of Vulnerable Code for npm Packages2
Multi-Model Selective Backdoor Attack with Different Trigger Positions2
Acquisition of the Width of a Virtual Body through Collision Avoidance Trials2
A Two-Stage Attention Based Modality Fusion Framework for Multi-Modal Speech Emotion Recognition2
Multi-View Texture Learning for Face Super-Resolution2
Propagation-based Code Clone Analysis for Detecting Smart Contract Vulnerability2
Toward Generating Robot-Robot Natural Counseling Dialogue2
Effect of Politeness on Trust in Re-Enter Requests to User by Smart Speaker —Pilot Study—2
The Automatic Generation of Smart Contract Based on Configuration in the Field of Government Services2
Deterministic and Probabilistic Certified Defenses for Content-Based Image Retrieval2
Locally Differentially Private Minimum Finding2
A+Block: Web Security Add-on Service by Just Pointing to Your Website URL2
UTStyleCap4K: Generating Image Captions with Sentimental Styles2
<i>Verikube</i>: Automatic and Efficient Verification for Container Network Policies2
Classification of URL Citations on Scholarly Papers Using Intermediate Task Training2
DORR: A DOR-Based Non-Blocking Optical Router for 3D Photonic Network-on-Chips2
Feature-Based Adversarial Training for Deep Learning Models Resistant to Transferable Adversarial Examples2
Balanced, Unbalances, and One-Sided Distributed Teams - An Empirical View on Global Software Engineering Education2
A Non-Revisiting Equilibrium Optimizer Algorithm2
Non-Cooperative Rational Synthesis Problem on Stochastic Games for Positional Strategies2
Secure Blockchain Interworking Using Extended Smart Contract2
Flexible Bayesian Inference by Weight Transfer for Robust Deep Neural Networks2
Grid Sample Based Temporal Iteration for Fully Pipelined 1-ms SLIC Superpixel Segmentation System2
Extracting Knowledge Entities from Sci-Tech Intelligence Resources Based on BiLSTM and Conditional Random Field2
Speaker-Independent Audio-Visual Speech Separation Based on Transformer in Multi-Talker Environments2
The Comparison of Attention Mechanisms with Different Embedding Modes for Performance Improvement of Fine-Grained Classification2
An Accelerated Integrity-secured Name Resolution Architecture Using Two Full-service Resolvers with and without DNSSEC Validation in Parallel2
Noisy Localization Annotation Refinement for Object Detection2
Object-ABN: Learning to Generate Sharp Attention Maps for Action Recognition2
Semantic Shilling Attack against Heterogeneous Information Network Based Recommend Systems2
Research on Mask-Wearing Detection Algorithm Based on Improved YOLOv7-Tiny2
6T-8T Hybrid SRAM for Lower-Power Neural-Network Processing by Lowering Operating Voltage2
0.11831188201904