IEICE Transactions on Information and Systems

Papers
(The TQCC of IEICE Transactions on Information and Systems is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-02-01 to 2025-02-01.)
ArticleCitations
FOREWORD48
GPGPU Implementation of Variational Bayesian Gaussian Mixture Models26
Blockchain-Based Pension System Ensuring Security, Provenance and Efficiency21
FOREWORD19
A Partial Matching Convolution Neural Network for Source Retrieval of Plagiarism Detection17
Alleviating File System Journaling Problem in Containers for DBMS Consolidation16
Rolling Guidance Filter as a Clustering Algorithm15
FOREWORD15
FOREWORD14
Fast Gated Recurrent Network for Speech Synthesis13
A Fast Algorithm for Liquid Voting on Blockchain13
Altered Fingerprints Detection Based on Deep Feature Fusion11
Accelerating LiNGAM Causal Discovery with Massive Parallel Execution on Supercomputer Fugaku11
Neuron-Network-Based Mixture Probability Model for Passenger Walking Time Distribution Estimation10
Bicolored Path Embedding Problems Inspired by Protein Folding Models10
Identification of Multiple Image Steganographic Methods Using Hierarchical ResNets9
Estimation of Multiple Illuminant Colors Using Color Line Features9
FOREWORD9
Semantic Matching Template-based Zero-shot Relation Triplet Extraction9
A Novel Transferable Sparse Regression Method for Cross-Database Facial Expression Recognition9
An Efficient Resource Shared RISC-V Multicore Architecture8
Multi-Stage Contour Primitive of Interest Extraction Network with Dense Direction Classification8
FOREWORD8
Collaborative Ontology Development and its Use for Video Annotation in Elderly Care Domain8
LTL Model Checking for Register Pushdown Systems8
A Two-Fold Cross-Validation Training Framework Combined with Meta-Learning for Code-Switching Speech Recognition8
Mapping Induced Subgraph Isomorphism Problems to Ising Models and Its Evaluations by an Ising Machine8
Pumping Lemmas for Languages Expressed by Computational Models with Registers8
Multi-View Texture Learning for Face Super-Resolution7
Lightweight Operation History Graph for Traceability on Program Elements7
Enumerating floorplans with Aligned Columns7
Image Based Coding of Spatial Probability Distribution on Human Dynamics Data7
A Case for Low-Latency Communication Layer for Distributed Operating Systems7
Space-efficient FPT Algorithms for Degeneracy7
Triplet Attention Network for Video-Based Person Re-Identification7
DCUIP Poisoning Attack in Intel x86 Processors6
Disaggregated Accelerator Management System for Cloud Data Centers6
Investigating and Enhancing the Neural Distinguisher for Differential Cryptanalysis6
Replicated Study of Effectiveness Evaluation of Cutting-Edge Software Engineering6
Spy in Your Eye: Spycam Attack via Open-Sided Mobile VR Device6
FOREWORD6
Secure Blockchain Interworking Using Extended Smart Contract6
Reinforced Tracker Based on Hierarchical Convolutional Features6
A Proof of Work Based on Key Recovery Problem of Cascade Block Ciphers with ASIC Resistance6
GECNN for Weakly Supervised Semantic Segmentation of 3D Point Clouds6
Extending Binary Neural Networks to Bayesian Neural Networks with Probabilistic Interpretation of Binary Weights6
FOREWORD6
FOREWORD6
Speech Emotion Recognition Using Multihead Attention in Both Time and Feature Dimensions5
Learning Local Similarity with Spatial Interrelations on Content-Based Image Retrieval5
FOREWORD5
Toward Generating Robot-Robot Natural Counseling Dialogue5
Graph Linear Notations with Regular Expressions5
Detection Method of Fat Content in Pig B-Ultrasound Based on Deep Learning5
Conditional Wasserstein Generative Adversarial Networks for Rebalancing Iris Image Datasets5
A Polynomial-Time Algorithm for Finding a Spanning Tree with Non-Terminal Set <i>V<sub>NT</sub></i> on Circular-Arc Graphs5
An Evaluation of the Impact of Distance on Perceptual Quality of Textured 3D Meshes5
Benchmarking Modern Edge Devices for AI Applications5
FOREWORD5
Effectively Utilizing the Category Labels for Image Captioning5
FOREWORD5
Efficient Multi-Scale Feature Fusion for Image Manipulation Detection5
Combining Spiking Neural Networks with Artificial Neural Networks for Enhanced Image Classification5
Hierarchical Preference Hash Network for News Recommendation4
A Shallow SNN Model for Embedding Neuromorphic Devices in a Camera for Scalable Video Surveillance Systems4
Loss Function for Deep Learning to Model Dynamical Systems4
Two-Path Object Knowledge Injection for Detecting Novel Objects With Single-Stage Dense Detector4
Computer Vision-Based Tracking of Workers in Construction Sites Based on MDNet4
Loosely-Stabilizing Algorithm on Almost Maximal Independent Set4
Feasibility of Estimating Concentration Level of Japanese Document Workers Based on Kana-Kanji Conversion Confirmation Time4
A CNN-Based Feature Pyramid Segmentation Strategy for Acoustic Scene Classification4
Face Image Generation of Anime Characters Using an Advanced First Order Motion Model with Facial Landmarks4
Design and Development of a Card Game for Learning on the Structure of Arithmetic Story by Concatenated Sentence Integration4
Efficient Protection Mechanism for CPU Cache Flush Instruction Based Attacks4
Aggregate Signature Schemes with Traceability of Devices Dynamically Generating Invalid Signatures4
A Comparative Study of Data Collection Periods for Just-In-Time Defect Prediction Using the Automatic Machine Learning Method4
I/O Performance Improvement of FHE Apriori with Striping File Layout Considering Storage of Intermediate Data4
Mechanisms to Address Different Privacy Requirements for Users and Locations4
Locally Differentially Private Minimum Finding4
Unsupervised Techniques for Identifying the Mode of a Multi-Functional Radar with Varying Pulse Sequences4
RT-libSGM: FPGA-Oriented Real-Time Stereo Matching System with High Scalability4
Geometric Partitioning Mode with Inter and Intra Prediction for Beyond Versatile Video Coding4
PPW Curves: a <i>C</i><sup>2</sup> Interpolating Spline with Hyperbolic Blending of Rational Bézier Curves4
Learning Multi-Level Features for Improved 3D Reconstruction4
FOREWORD4
Automated Labeling of Entities in CVE Vulnerability Descriptions with Natural Language Processing4
Metacognitive Adaptation to Enhance Lifelong Language Learning4
Transactional TF: Transform Library with Concurrency and Correctness4
Does Introduction of Individual Learning at Home Improve the Effectiveness of Group Learning at Classroom in First-Year PBL Course?4
Implementation of Fully-Pipelined CNN Inference Accelerator on FPGA and HBM2 Platform4
Image Adjustment for Multi-Exposure Images Based on Convolutional Neural Networks4
A Lightweight Reinforcement Learning Based Packet Routing Method Using Online Sequential Learning4
Improved Just Noticeable Difference Model Based Algorithm for Fast CU Partition in V-PCC4
Efficient Hardware Accelerator for Compressed Sparse Deep Neural Network4
FOREWORD4
FOREWORD4
Quality and Quantity Pair as Trust Metric4
An Improved Online Multiclass Classification Algorithm Based on Confidence-Weighted4
An Improved Real-Time Object Tracking Algorithm Based on Deep Learning Features4
Solving Constrained Slot Placement Problems Using an Ising Machine and Its Evaluations3
Dataset of Functionally Equivalent Java Methods and Its Application to Evaluating Clone Detection Tools3
Mining Emergency Event Logs to Support Resource Allocation3
Temporal-Based Action Clustering for Motion Tendencies3
Research on the Algorithm of License Plate Recognition Based on MPGAN Haze Weather3
Siamese Transformer for Saliency Prediction Based on Multi-Prior Enhancement and Cross-Modal Attention Collaboration3
A Low-Latency 4K HEVC Multi-Channel Encoding System with Content-Aware Bitrate Control for Live Streaming3
Surface Defect Image Classification of Lithium Battery Pole Piece Based on Deep Learning3
Deeply Programmable Application Switch for Performance Improvement of KVS in Data Center3
How Centrality of Driver Nodes Affects Controllability of Complex Networks3
Unsupervised Intrusion Detection Based on Asymmetric Auto-Encoder Feature Extraction3
A Driver Fatigue Detection Algorithm Based on Dynamic Tracking of Small Facial Targets Using YOLOv73
Anomaly Prediction for Wind Turbines Using an Autoencoder Based on Power-Curve Filtering3
Speech Rhythm-Based Speaker Embeddings Extraction from Phonemes and Phoneme Duration for Multi-Speaker Speech Synthesis3
Searching and Learning Discriminative Regions for Fine-Grained Image Retrieval and Classification3
Development of a Coanda-Drone with Built-in Propellers3
Shift Quality Classifier Using Deep Neural Networks on Small Data with Dropout and Semi-Supervised Learning3
Context-Aware Stock Recommendations with Stocks' Characteristics and Investors' Traits3
A Privacy-Preserving Mobile Crowdsensing Scheme Based on Blockchain and Trusted Execution Environment3
Code-Switching ASR and TTS Using Semisupervised Learning with Machine Speech Chain3
Pruning Ratio Optimization with Layer-Wise Pruning Method for Accelerating Convolutional Neural Networks3
Frameworks for Privacy-Preserving Federated Learning3
Amodal Instance Segmentation of Thin Objects with Large Overlaps by Seed-to-Mask Extending3
On Gradient Descent Training Under Data Augmentation with On-Line Noisy Copies3
Imbalanced Data Over-Sampling Method Based on ISODATA Clustering3
A Two-Stage Attention Based Modality Fusion Framework for Multi-Modal Speech Emotion Recognition3
CJAM: Convolutional Neural Network Joint Attention Mechanism in Gait Recognition3
Improving Sentiment Analysis with an Ensemble Transformers Model on Health Pandemic based on Twitter data3
Sum Rate Maximization for Cooperative NOMA with Hardware Impairments3
A Principal Factor of Performance in Decoupled Front-End3
Analysis against Security Issues of Voice over 5G3
CASEformer — A Transformer-Based Projection Photometric Compensation Network3
Federated Learning of Neural ODE Models with Different Iteration Counts3
Binary and Rotational Coded-Aperture Imaging for Dynamic Light Fields3
Load Balancing with In-Protocol/Wallet-Level Account Assignment in Sharded Blockchains3
Robust and Efficient Homography Estimation Using Directional Feature Matching of Court Points for Soccer Field Registration3
Online Communication Environment Design for Encouraging Reciprocal Use of Information among Groups3
Holmes: A Hardware-Oriented Optimizer Using Logarithms3
A Conflict-Aware Capacity Control Mechanism for Deep Cache Hierarchy3
Online Job Scheduling with <i>K</i> Servers3
Building a Measurement Model for Simulating Naturalness of Vibrato Based on Subjective Evaluation3
File Tracking and Visualization Methods Using a Network Graph to Prevent Information Leakage3
Near Hue-Preserving Reversible Contrast and Saturation Enhancement Using Histogram Shifting3
Health Indicator Estimation by Video-Based Gait Analysis3
An Improved Method for Two-UAV Trajectory Planning for Cooperative Target Locating Based on Airborne Visual Tracking Platform3
Leveraging Different Boolean Function Decompositions to Reduce T-Count in LUT-based Quantum Circuit Synthesis3
An FPT Algorithm for the Exact Matching Problem and NP-hardness of Related Problems3
Recaptured Image Detection Based on Multi-Scale Residual Features of Discriminative Regions3
Mining User Activity Patterns from Time-Series Data Obtained from UWB Sensors in Indoor Environments3
A Novel Double-Tail Generative Adversarial Network for Fast Photo Animation3
SIBYL: A Method for Detecting Similar Binary Functions Using Machine Learning3
A Simple but Efficient Ranking-Based Differential Evolution3
Data Covert Channels between the Secure World and the Normal World in the ARM TrustZone Architecture2
Dynamic Evolution Simulation of Bus Bunching Affected by Traffic Operation State2
Effective Language Representations for Danmaku Comment Classification in Nicovideo2
Node-to-Node and Node-to-Set Disjoint Paths Problems in Bicubes2
Effective Anomaly Detection in Smart Home by Analyzing Sensor Correlations2
Enhanced Full Attention Generative Adversarial Networks2
GConvLoc: WiFi Fingerprinting-Based Indoor Localization Using Graph Convolutional Networks2
Frank-Wolfe Algorithm for Learning SVM-Type Multi-Category Classifiers2
Differentially Private Neural Networks with Bounded Activation Function2
Representation Learning of Tongue Dynamics for a Silent Speech Interface2
Brain Tumor Classification using Under-Sampled k-Space Data: A Deep Learning Approach2
Formalization and Analysis of Ceph Using Process Algebra2
Deterministic and Probabilistic Certified Defenses for Content-Based Image Retrieval2
<i>Verikube</i>: Automatic and Efficient Verification for Container Network Policies2
A Performance Model for Reconfigurable Block Cipher Array Utilizing Amdahl's Law2
Image Emotion Recognition Using Visual and Semantic Features Reflecting Emotional and Similar Objects2
Optimal Positioning Scheme of Multiple UAVs through DOP Minimization for Location Identification of Unknown Radar2
An Improved U-Net Architecture for Image Dehazing2
Watermarking Method with Scaling Rate Estimation Using Pilot Signal2
Enhancing the Business Model: Automating the Recommended Retail Price Calculation of Products2
A Boosting Method Based on Center-of-gravity Oversampling and Pruning for Classifying Imbalanced Data2
Grid Sample Based Temporal Iteration for Fully Pipelined 1-ms SLIC Superpixel Segmentation System2
HTTP DDoS Flooding Attack Mitigation in Software-Defined Networking2
A Visual-Identification Based Forwarding Strategy for Vehicular Named Data Networking2
TDEM: Table Data Extraction Model Based on Cell Segmentation2
HBDCA: A Toolchain for High-Accuracy BRAM-Defined CNN Accelerator on FPGA with Flexible Structure2
Solvability of Peg Solitaire on Graphs is NP-Complete2
Workload-Driven Analysis on the Performance Characteristics of GPU-Accelerated DBMSes2
Tracking WebVR User Activities through Hand Motions: An Attack Perspective2
AdaCF: Adaptively Updating Adjacency Matrix in Collaborative Filtering2
High-Precision Mobile Robot Localization Using the Integration of RAR and AKF2
DGA-based Malware Communication Detection from DoH Traffic Using Hierarchical Machine Learning Analysis2
SOME/IP Intrusion Detection System Using Machine Learning2
Clustering-Based Neural Network for Carbon Dioxide Estimation2
UTStyleCap4K: Generating Image Captions with Sentimental Styles2
A Novel Discriminative Virtual Label Regression Method for Unsupervised Feature Selection2
BMR: a new BBR algorithm with moderate delivery rate2
Policy-Based Method for Applying OAuth 2.0-Based Security Profiles2
Adaptive Binarization for Vehicle State Images Based on Contrast Preserving Decolorization and Major Cluster Estimation2
Inference Discrepancy Based Curriculum Learning for Neural Machine Translation2
Cataloging Bad Smells in Use Case Descriptions and Automating Their Detection2
Few-Shot Learning-Based Malicious IoT Traffic Detection with Prototypical Graph Neural Networks2
Implementing Region-Based Segmentation for Hardware Trojan Detection in FPGAs Cell-Level Netlist2
Non-Cooperative Rational Synthesis Problem on Stochastic Games for Positional Strategies2
An Improvement of the Biased-PPSZ Algorithm for the 3SAT Problem2
Subcarrier and Interleaver Assisted Burst Impulsive Noise Mitigation in Power Line Communication2
Exposure Fusion Using a Relative Generative Adversarial Network2
Propagation-based Code Clone Analysis for Detecting Smart Contract Vulnerability2
ConvNeXt-Haze: A Fog Image Classification Algorithm for Small and Imbalanced Sample Dataset Based on Convolutional Neural Network2
Dalio: In-Kernel Centralized Replication for Key-Value Stores2
Delta-Sigma Domain Signal Processing Revisited with Related Topics in Stochastic Computing2
A New Finite Automata Construction Using a Prefix and a Suffix of Regular Expressions2
FOREWORD2
Speech Paralinguistic Approach for Detecting Dementia Using Gated Convolutional Neural Network2
Intrinsic Representation Mining for Zero-Shot Slot Filling2
A Novel e-Cash Payment System with Divisibility Based on Proxy Blind Signature in Web of Things2
A Hybrid Genetic Service Mining Method Based on Trace Clustering Population2
FSPose: A Heterogeneous Framework with Fast and Slow Networks for Human Pose Estimation in Videos2
Visual Inspection Method for Subway Tunnel Cracks Based on Multi-Kernel Convolution Cascade Enhancement Learning2
Multi-Dimensional and Multi-Task Facial Expression Recognition for Academic Outcomes Prediction2
Fully Dynamic Data Management in Cloud Storage Systems with Secure Proof of Retrievability2
3D Multiple-Contextual ROI-Attention Network for Efficient and Accurate Volumetric Medical Image Segmentation2
Feature-Based Adversarial Training for Deep Learning Models Resistant to Transferable Adversarial Examples2
Practical Order-Revealing Encryption with Short Ciphertext2
Formulation of Mindfulness States as a Network Optimization Problem and an Attempt to Identify Key Brain Pathways Using Digital Annealer2
FP-GNN: A Graph Neural Network for Hardware Trojan Detection in Gate-Level Netlist2
Research on Dissections of a Net of a Cube into Nets of Cubes2
Mixup SVM Learning for Compound Toxicity Prediction Using Human Pluripotent Stem Cells2
An FPGA-Based Optimizer Design for Distributed Deep Learning with Multiple GPUs2
Dynamic Incentive Mechanism for Industrial Network Congestion Control2
Skin Visualization Using Smartphone and Deep Learning in the Beauty Industry2
Temporal Correlation-Based End-to-End Rate Control in DCVC2
DFAM-DETR: Deformable Feature Based Attention Mechanism DETR on Slender Object Detection2
A Framework for Synchronous Remote Online Exams2
Balanced, Unbalances, and One-Sided Distributed Teams - An Empirical View on Global Software Engineering Education2
Entropy Regularized Unsupervised Clustering Based on Maximum Correntropy Criterion and Adaptive Neighbors2
Stochastic Path Optimization to Improve Navigation Safety in Urban Environment2
CLOCK-DPP: Hybrid disk buffer replacement policy for SSDs with dirty page preservation for write intensive environments2
Siamese Visual Tracking with Dual-Pipeline Correlated Fusion Network2
A Transformer-based fully trainable point process2
On Easily Reconstructable Logic Functions2
Multi-Source Domain Generalization Using Domain Attributes for Recurrent Neural Network Language Models2
Evaluation of Multi-Valued Data Transmission in Two-Dimensional Symbol Mapping using Linear Mixture Model2
Non-Cooperative Rational Synthesis Problem for Probabilistic Strategies2
Neural End-To-End Speech Translation Leveraged by ASR Posterior Distribution2
Multilayer Perceptron Training Accelerator Using Systolic Array2
Overlapping of Lattice Unfolding for Cuboids2
CNN-Based Feature Integration Network for Speech Enhancement in Microphone Arrays2
Toward Human-Friendly ASR Systems: Recovering Capitalization and Punctuation for Vietnamese Text2
New Training Method for Non-Dominant Hand Pitching Motion Based on Reversal Trajectory of Dominant Hand Pitching Motion Using AR and Vibration2
FOREWORD1
What Factors Affect the Performance of Software after Migration: A Case Study on Sunway TaihuLight Supercomputer1
DAG-Pathwidth: Graph Algorithmic Analyses of DAG-Type Blockchain Networks1
Calculation Solitaire is NP-Complete1
An Extended Scheme for Shape Matching with Local Descriptors1
Character Design Generation System Using Multiple Users' Gaze Information1
Cross-Domain Energy Consumption Prediction via ED-LSTM Networks1
Robustness of Deep Learning Models in Dermatological Evaluation: A Critical Assessment1
An Approach for Identifying Malicious Domain Names Generated by Dictionary-Based DGA Bots1
0.083799839019775