IEICE Transactions on Information and Systems

Papers
(The TQCC of IEICE Transactions on Information and Systems is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Machine Learning-Based Approach for Depression Detection in Twitter Using Content and Activity Features81
Gradient-Enhanced Softmax for Face Recognition28
A Ladder Spherical Evolution Search Algorithm25
Proposing High-Smart Approach for Content Authentication and Tampering Detection of Arabic Text Transmitted via Internet20
Multi-Targeted Backdoor: Indentifying Backdoor Attack for Multiple Deep Neural Networks19
Layer-Based Communication-Efficient Federated Learning with Privacy Preservation17
A Simple but Efficient Ranking-Based Differential Evolution16
Prosodic Features Control by Symbols as Input of Sequence-to-Sequence Acoustic Modeling for Neural TTS13
BlockCSDN: Towards Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking13
Malicious URLs Detection Based on a Novel Optimization Algorithm12
Benchmarking Modern Edge Devices for AI Applications12
FiC-RNN: A Multi-FPGA Acceleration Framework for Deep Recurrent Neural Networks11
Robust CAPTCHA Image Generation Enhanced with Adversarial Example Methods11
Multi-Party Electronic Contract Signing Protocol Based on Blockchain11
Real-Time Detection of Global Cyberthreat Based on Darknet by Estimating Anomalous Synchronization Using Graphical Lasso11
A Survey on Explainable Fake News Detection11
Online Collaborative Kit-Build Concept Map: Learning Effect and Conversation Analysis in Collaborative Learning of English as a Foreign Language Reading Comprehension10
A Prompt Report on the Performance of Intel Optane DC Persistent Memory Module10
Image and Model Transformation with Secret Key for Vision Transformer9
Joint Analysis of Sound Events and Acoustic Scenes Using Multitask Learning9
RVCoreP: An Optimized RISC-V Soft Processor of Five-Stage Pipelining9
A New Similarity Model Based on Collaborative Filtering for New User Cold Start Recommendation9
Multimodal Prediction of Social Responsiveness Score with BERT-Based Text Features8
An FPGA Acceleration and Optimization Techniques for 2D LiDAR SLAM Algorithm8
Learning Dynamic Systems Using Gaussian Process Regression with Analytic Ordinary Differential Equations as Prior Information8
Fitness-Distance Balance with Functional Weights: A New Selection Method for Evolutionary Algorithms8
Model-Agnostic Multi-Domain Learning with Domain-Specific Adapters for Action Recognition8
A Hybrid Approach for Paper Recommendation8
Retinex-Based Image Enhancement with Particle Swarm Optimization and Multi-Objective Function8
A Weighted Forward-Backward Spatial Smoothing DOA Estimation Algorithm Based on TLS-ESPRIT7
Deep Learning Approaches for Pathological Voice Detection Using Heterogeneous Parameters7
Evaluation of EEG Activation Pattern on the Experience of Visual Perception in the Driving7
Security Evaluation of Negative Iris Recognition7
Korean-Vietnamese Neural Machine Translation with Named Entity Recognition and Part-of-Speech Tags7
Patient-Specific ECG Classification with Integrated Long Short-Term Memory and Convolutional Neural Networks7
Design and Implementation of Sensor-Embedded Chair for Continuous Sitting Posture Recognition7
An Efficient Deep Learning Based Coarse-to-Fine Cephalometric Landmark Detection Method7
Secure OMP Computation Maintaining Sparse Representations and Its Application to EtC Systems7
Multi-Model Selective Backdoor Attack with Different Trigger Positions7
Fusion of Blockchain, IoT and Artificial Intelligence - A Survey7
A Privacy-Preserving Mobile Crowdsensing Scheme Based on Blockchain and Trusted Execution Environment7
Recursive Multi-Scale Channel-Spatial Attention for Fine-Grained Image Classification7
Sentence-Embedding and Similarity via Hybrid Bidirectional-LSTM and CNN Utilizing Weighted-Pooling Attention6
Comparing Two Extended Concept Mapping Approaches to Investigate the Distribution of Students' Achievements6
Fresh Tea Shoot Maturity Estimation via Multispectral Imaging and Deep Label Distribution Learning6
A Vulnerability in 5G Authentication Protocols and Its Countermeasure6
An Attention Nested U-Structure Suitable for Salient Ship Detection in Complex Maritime Environment6
Evaluating Deep Learning for Image Classification in Adversarial Environment6
Speech Paralinguistic Approach for Detecting Dementia Using Gated Convolutional Neural Network6
Trojan-Net Classification for Gate-Level Hardware Design Utilizing Boundary Net Structures6
Influence of Outliers on Estimation Accuracy of Software Development Effort6
Online EEG-Based Emotion Prediction and Music Generation for Inducing Affective States6
A Deep Neural Network-Based Approach to Finding Similar Code Segments5
Classification Functions for Handwritten Digit Recognition5
An Improved BPNN Method Based on Probability Density for Indoor Location5
Detection of SQL Injection Vulnerability in Embedded SQL5
An Attention-Based GRU Network for Anomaly Detection from System Logs5
Verifiable Credential Proof Generation and Verification Model for Decentralized SSI-Based Credit Scoring Data5
Analysis of The Similarity of Individual Knowledge and The Comprehension of Partner's Representation during Collaborative Concept Mapping with Reciprocal Kit Build Approach5
Complete Double Node Upset Tolerant Latch Using C-Element5
Online Signature Verification Using Single-Template Matching Through Locally and Globally Weighted Dynamic Time Warping5
A Hybrid Retinex-Based Algorithm for UAV-Taken Image Enhancement5
A Rabin-Karp Implementation for Handling Multiple Pattern-Matching on the GPU5
Improving the Performance of Circuit-Switched Interconnection Network for a Multi-FPGA System5
BFF R-CNN: Balanced Feature Fusion for Object Detection5
Development of MOOC Service Framework for Life Long Learning: A Case Study of Thai MOOC5
Citation Count Prediction Based on Neural Hawkes Model5
Stochastic Discrete First-Order Algorithm for Feature Subset Selection5
Advanced Antlion Optimizer with Discrete Ant Behavior for Feature Selection5
Model Checking of Real-Time Properties for Embedded Assembly Program Using Real-Time Temporal Logic RTCTL and Its Application to Real Microcontroller Software5
MPTCP-<i>me</i>Learning: A Multi-Expert Learning-Based MPTCP Extension to Enhance Multipathing Robustness against Network Attacks5
A Throughput Drop Estimation Model for Concurrent Communications under Partially Overlapping Channels without Channel Bonding and Its Application to Channel Assignment in IEEE 802.11n WLAN5
Indoor Crowd Estimation Scheme Using the Number of Wi-Fi Probe Requests under MAC Address Randomization5
Remote Dynamic Reconfiguration of a Multi-FPGA System FiC (Flow-in-Cloud)5
Detecting and Understanding Online Advertising Fraud in the Wild5
HTTP DDoS Flooding Attack Mitigation in Software-Defined Networking5
Pruning Ratio Optimization with Layer-Wise Pruning Method for Accelerating Convolutional Neural Networks5
A Multi-Tenant Resource Management System for Multi-FPGA Systems5
Characterization of Interestingness Measures Using Correlation Analysis and Association Rule Mining5
Assessment System of Presentation Slide Design Using Visual and Structural Features5
Obstacle Detection for Unmanned Surface Vehicles by Fusion Refinement Network4
Neural Architecture Search for Convolutional Neural Networks with Attention4
DORR: A DOR-Based Non-Blocking Optical Router for 3D Photonic Network-on-Chips4
Two-Sided LPC-Based Speckle Noise Removal for Laser Speech Detection Systems4
Leveraging Entity-Type Properties in the Relational Context for Knowledge Graph Embedding4
Iterative Cross-Lingual Entity Alignment Based on TransC4
Image Emotion Recognition Using Visual and Semantic Features Reflecting Emotional and Similar Objects4
SDOF-Tracker: Fast and Accurate Multiple Human Tracking by Skipped-Detection and Optical-Flow4
Local Riesz Pyramid for Faster Phase-Based Video Magnification4
Searching and Learning Discriminative Regions for Fine-Grained Image Retrieval and Classification4
Towards Interpretable Reinforcement Learning with State Abstraction Driven by External Knowledge4
A 10.4-Gs/s High-Resolution Wideband Radar Sampling System Based on TIADC Technique4
An Improved U-Net Architecture for Image Dehazing4
Multi-Category Image Super-Resolution with Convolutional Neural Network and Multi-Task Learning4
An Overview of De-Identification Techniques and Their Standardization Directions4
Relationship between Recognition Accuracy and Numerical Precision in Convolutional Neural Network Models4
Noisy Localization Annotation Refinement for Object Detection4
Joint Representations of Knowledge Graphs and Textual Information via Reference Sentences4
Dual Self-Guided Attention with Sparse Question Networks for Visual Question Answering4
Mal2d: 2d Based Deep Learning Model for Malware Detection Using Black and White Binary Image4
An Ising Machine-Based Solver for Visiting-Route Recommendation Problems in Amusement Parks4
An Algorithm for Automatic Collation of Vocabulary Decks Based on Word Frequency4
Against Insider Threats with Hybrid Anomaly Detection with Local-Feature Autoencoder and Global Statistics (LAGS)4
Single Image Dehazing Based on Weighted Variational Regularized Model4
Two-Stage Fine-Grained Text-Level Sentiment Analysis Based on Syntactic Rule Matching and Deep Semantic4
Multi-Task Learning for Improved Recognition of Multiple Types of Acoustic Information4
What are the Features of Good Discussions for Shortening Bug Fixing Time?4
Image Captioning Algorithm Based on Multi-Branch CNN and Bi-LSTM4
Spatio-Temporal Self-Attention Weighted VLAD Neural Network for Action Recognition4
Single Image Dehazing Algorithm Based on Modified Dark Channel Prior4
A Novel Approach to Address External Validity Issues in Fault Prediction Using Bandit Algorithms4
Generation and Detection of Media Clones4
Learning from Noisy Complementary Labels with Robust Loss Functions4
Multi-Objective Ant Lion Optimizer Based on Time Weight4
Clustering of Handwritten Mathematical Expressions for Computer-Assisted Marking4
Joint Multi-Patch and Multi-Task CNNs for Robust Face Recognition3
Solving Constrained Slot Placement Problems Using an Ising Machine and Its Evaluations3
DomainScouter: Analyzing the Risks of Deceptive Internationalized Domain Names3
Simultaneous Realization of Decision, Planning and Control for Lane-Changing Behavior Using Nonlinear Model Predictive Control3
Time-Multiplexed Coded Aperture and Coded Focal Stack -Comparative Study on Snapshot Compressive Light Field Imaging3
Five Cells and Tilepaint are NP-Complete3
A Retrieval Method for 3D CAD Assembly Models Using 3D Radon Transform and Spherical Harmonic Transform3
Transmission Control Method for Data Retention Taking into Account the Low Vehicle Density Environments3
ROPminer: Learning-Based Static Detection of ROP Chain Considering Linkability of ROP Gadgets3
Partition-then-Overlap Method for Labeling Cyber Threat Intelligence Reports by Topics over Time3
NFD.P4: NDN In-Networking Cache Implementation Scheme with P43
Exposure Fusion Using a Relative Generative Adversarial Network3
Unconstrained Facial Expression Recognition Based on Feature Enhanced CNN and Cross-Layer LSTM3
Rapid Recovery by Maximizing Page-Mapping Logs Deactivation3
Discovering Message Templates on Large Scale Bitcoin Abuse Reports Using a Two-Fold NLP-Based Clustering Method3
Multimodal Analytics to Understand Self-Regulation Process of Cognitive and Behavioral Strategies in Real-World Learning3
HBDCA: A Toolchain for High-Accuracy BRAM-Defined CNN Accelerator on FPGA with Flexible Structure3
Performance Evaluation of Online Machine Learning Models Based on Cyclic Dynamic and Feature-Adaptive Time Series3
Dual-Task Integrated Network for Fast Pedestrian Detection in Crowded Scenes3
Hybrid Electrical/Optical Switch Architectures for Training Distributed Deep Learning in Large-Scale3
Forward Regularity Preservation Property of Register Pushdown Systems3
A Collaborative Framework Supporting Ontology Development Based on Agile and Scrum Model3
Feature Detection Based on Significancy of Local Features for Image Matching3
Improving Faster R-CNN Framework for Multiscale Chinese Character Detection and Localization3
Improvement in the Effectiveness of Cutting Skill Practice for Paper-Cutting Creations Based on the Steering Law3
GAN-Based Image Compression Using Mutual Information for Optimizing Subjective Image Similarity3
Mimicking Lombard Effect: An Analysis and Reconstruction3
The Effect of Axis-Wise Triaxial Acceleration Data Fusion in CNN-Based Human Activity Recognition3
Conditional Wasserstein Generative Adversarial Networks for Rebalancing Iris Image Datasets3
Sound Event Detection Utilizing Graph Laplacian Regularization with Event Co-Occurrence3
Formal Verification for Node-Based Visual Scripts Using Symbolic Model Checking3
A Novel Differential Evolution Algorithm Based on Local Fitness Landscape Information for Optimization Problems3
Character Design Generation System Using Multiple Users' Gaze Information3
Mitigating Congestion with Explicit Cache Placement Notification for Adaptive Video Streaming over ICN3
A Semantic Similarity Supervised Autoencoder for Zero-Shot Learning3
Lifespan Extension of an IoT System with a Fixed Lithium Battery3
Time Series Forecasting Based on Convolution Transformer3
Extending the Measurement Angle of a Gaze Estimation Method Using an Eye Model Expressed by a Revolution about the Optical Axis of the Eye3
Algorithm-Hardware Co-Design of Real-Time Edge Detection for Deep-Space Autonomous Optical Navigation3
Efficient DLT-Based Method for Solving PnP, PnPf, and PnPfr Problems3
MSFF: A Multi-Scale Feature Fusion Network for Surface Defect Detection of Aluminum Profiles3
Design and Implementation of LoRa-Based Wireless Sensor Network with Embedded System for Smart Agricultural Recycling Rapid Processing Factory3
Simultaneous Attack on CNN-Based Monocular Depth Estimation and Optical Flow Estimation3
Enhanced Sender-Based Message Logging for Reducing Forced Checkpointing Overhead in Distributed Systems3
A Design of Automated Vulnerability Information Management System for Secure Use of Internet-Connected Devices Based on Internet-Wide Scanning Methods3
Difficulty-Based SPOC Video Clustering Using Video-Watching Data3
Target-Oriented Deformation of Visual-Semantic Embedding Space3
Classifying Near-Miss Traffic Incidents through Video, Sensor, and Object Features3
Efficient Hardware Accelerator for Compressed Sparse Deep Neural Network3
An Interpretable Feature Selection Based on Particle Swarm Optimization3
Meta-Strategy Based on Multi-Armed Bandit Approach for Multi-Time Negotiation3
Superpixel Based Hierarchical Segmentation for Color Image3
Silent Speech Interface Using Ultrasonic Doppler Sonar3
A Failsoft Scheme for Mobile Live Streaming by Scalable Video Coding3
Sparse Regression Model-Based Relearning Architecture for Shortening Learning Time in Traffic Prediction3
Preventing Fake Information Generation Against Media Clone Attacks3
Temporally Forward Nonlinear Scale Space for High Frame Rate and Ultra-Low Delay A-KAZE Matching System3
Facial Recognition of Dairy Cattle Based on Improved Convolutional Neural Network3
Feature-Based Adversarial Training for Deep Learning Models Resistant to Transferable Adversarial Examples3
A Data-Centric Directive-Based Framework to Accelerate Out-of-Core Stencil Computation on a GPU3
Sequential Authentication Using Handwriting Biometrics for Free Response e-Testing3
Influence of Access to Reading Material during Concept Map Recomposition in Reading Comprehension and Retention3
DFAM-DETR: Deformable Feature Based Attention Mechanism DETR on Slender Object Detection3
A Learning-Based Service Function Chain Early Fault Diagnosis Mechanism Based on In-Band Network Telemetry3
Light-YOLOv3: License Plate Detection in Multi-Vehicle Scenario3
A Scheme of Reversible Data Hiding for the Encryption-Then-Compression System3
Maritime Target Detection Based on Electronic Image Stabilization Technology of Shipborne Camera3
An Efficient Method for Graph Repartitioning in Distributed Environments3
Effects of Image Processing Operations on Adversarial Noise and Their Use in Detecting and Correcting Adversarial Images3
Efficient Patch Merging for Atlas Construction in 3DoF+ Video Coding3
Secure Blockchain Interworking Using Extended Smart Contract3
Analysis against Security Issues of Voice over 5G2
Ridge-Adding Homotopy Approach for <i>l</i><sub>1</sub>-norm Minimization Problems2
A Highly Reliable Compilation Optimization Passes Sequence Generation Framework2
Weight Sparseness for a Feature-Map-Split-CNN Toward Low-Cost Embedded FPGAs2
Research on the Algorithm of License Plate Recognition Based on MPGAN Haze Weather2
Learning Pyramidal Feature Hierarchy for 3D Reconstruction2
Practical Video Authentication Scheme to Analyze Software Characteristics2
Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption2
SVM Based Intrusion Detection Method with Nonlinear Scaling and Feature Selection2
Content-Based Superpixel Segmentation and Matching Using Its Region Feature Descriptors2
Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?2
Face Image Generation of Anime Characters Using an Advanced First Order Motion Model with Facial Landmarks2
Improving Seeded k-Means Clustering with Deviation- and Entropy-Based Term Weightings2
LTL Model Checking for Register Pushdown Systems2
Weakly Byzantine Gathering with a Strong Team2
Cognition-Based Delay Analysis to Determine the Average Minimum Time Limit for Wireless Sensor Communications2
Cluster Expansion Method for Critical Node Problem Based on Contraction Mechanism in Sparse Graphs2
Formalization and Analysis of Ceph Using Process Algebra2
Extended Inter-Device Digital Rights Sharing and Transfer Based on Device-Owner Equality Verification Using Homomorphic Encryption2
Multimodal-Based Stream Integrated Neural Networks for Pain Assessment2
Learning Rule for a Quantum Neural Network Inspired by Hebbian Learning2
Context-Aware Stock Recommendations with Stocks' Characteristics and Investors' Traits2
Cross-Project Defect Prediction via Semi-Supervised Discriminative Feature Learning2
Multi-Agent Reinforcement Learning for Cooperative Task Offloading in Distributed Edge Cloud Computing2
Facilitating Use of Assurance Cases in Industries by Workshops with an Agent-Based Method2
Continuous Noise Masking Based Vocoder for Statistical Parametric Speech Synthesis2
A Study on Re-Constructibility of Event Structures2
MKGN: A Multi-Dimensional Knowledge Enhanced Graph Network for Multi-Hop Question and Answering2
Sum Rate Maximization for Cooperative NOMA with Hardware Impairments2
Byzantine-Tolerant Gathering of Mobile Agents in Asynchronous Arbitrary Networks with Authenticated Whiteboards2
HAIF: A Hierarchical Attention-Based Model of Filtering Invalid Webpage2
CJAM: Convolutional Neural Network Joint Attention Mechanism in Gait Recognition2
Model Checking of Automotive Control Software: An Industrial Approach2
An Improved Method for Two-UAV Trajectory Planning for Cooperative Target Locating Based on Airborne Visual Tracking Platform2
Attention Voting Network with Prior Distance Augmented Loss for 6DoF Pose Estimation2
Mapping Induced Subgraph Isomorphism Problems to Ising Models and Its Evaluations by an Ising Machine2
Bridging between Soft and Hard Thresholding by Scaling2
Optimal Rejuvenation Policies for Non-Markovian Availability Models with Aperiodic Checkpointing2
Depth Image Noise Reduction and Super-Resolution by Pixel-Wise Multi-Frame Fusion2
Boosting the Performance of Interconnection Networks by Selective Data Compression2
Efficient Computation of Betweenness Centrality by Graph Decompositions and Their Applications to Real-World Networks2
Gene Fingerprinting: Cracking Encrypted Tunnel with Zero-Shot Learning2
Load Balancing with In-Protocol/Wallet-Level Account Assignment in Sharded Blockchains2
A Multiobjective Optimization Dispatch Method of Wind-Thermal Power System2
Interactive Goal Model Construction Based on a Flow of Questions2
High Temporal Resolution-Based Temporal Iterative Tracking for High Framerate and Ultra-Low Delay Dynamic Tracking System2
Analysis of Work Efficiency and Quality of Software Maintenance Using Cross-Company Dataset2
Priority Evasion Attack: An Adversarial Example That Considers the Priority of Attack on Each Classifier2
GConvLoc: WiFi Fingerprinting-Based Indoor Localization Using Graph Convolutional Networks2
REAP: A Method for Pruning Convolutional Neural Networks with Performance Preservation2
DNN-Based Full-Band Speech Synthesis Using GMM Approximation of Spectral Envelope2
Joint Channel Allocation and Routing for ZigBee/Wi-Fi Coexistent Networks2
Detecting Depression from Speech through an Attentive LSTM Network2
Job-Aware File-Storage Optimization for Improved Hadoop I/O Performance2
An Exploration of npm Package Co-Usage Examples from Stack Overflow: A Case Study2
Adaptive Server and Path Switching for Content Delivery Networks2
A Bus Crowdedness Sensing System Using Deep-Learning Based Object Detection2
Intrusion Detection System Using Deep Learning and Its Application to Wi-Fi Network2
A Subquadratic-Time Distributed Algorithm for Exact Maximum Matching2
Extracting Knowledge Entities from Sci-Tech Intelligence Resources Based on BiLSTM and Conditional Random Field2
An Efficient Public Verifiable Certificateless Multi-Receiver Signcryption Scheme for IoT Environments2
Multi-Source Domain Generalization Using Domain Attributes for Recurrent Neural Network Language Models2
New Word Detection Using BiLSTM+CRF Model with Features2
Identification of Multiple Image Steganographic Methods Using Hierarchical ResNets2
0.035522937774658