IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 117, Number 487

Information Theory

Workshop Date : 2018-03-08 - 2018-03-09 / Issue Date : 2018-03-01

[PREV] [NEXT]

[TOP] | [2014] | [2015] | [2016] | [2017] | [2018] | [2019] | [2020] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

IT2017-103
Evaluation of Bayes Predictive Distributions under Unknown Parametric Models on Misspecified Models
Hirokazu Kono, Shota Saito, Toshiyasu Matsushima (Waseda Univ.)
pp. 1 - 6

IT2017-104
Information Geometrical Study of Cluster-Model Approximation for Boltzmann Machines
Kenta Toyoda, Tomohiro Ogawa (Univ. of Electro- Commu.)
pp. 7 - 12

IT2017-105
Redundancy Analysis of Univarsal Lossless Source Coding via Estimation of Prior -- Relaxing an Ergodicity Condition --
Ryosuke Ikarashi, Tsutomu Kawabata (UEC)
pp. 13 - 18

IT2017-106
Evaluation of the Worst-Case Redundancy of Strongly Universal FV Source Codes Using the Source Approximation and the Asymptotically Sufficient Statistic
Mitsuharu Arimura (Shonan Inst. Tech.), Hiroshi Nagaoka (Univ. of Electro-Comm.)
pp. 19 - 24

IT2017-107
The Access Structure of a Secret Sharing Scheme Using Locally Repairable Codes
Masanobu Nakata, Tomohiko Uyematsu, Tetsunao Matsuta (Tokyo Tech)
pp. 25 - 30

IT2017-108
Construction of Secret Sharing Schemes with Small Thresholds for Countably Infinite Participants
Takashi Hisatome, Hiroki Koga (Univ. Tsukuba)
pp. 31 - 36

IT2017-109
Constructions of the (3,n) and (4,n) Threshold Visual Cryptography Using Combinatorial Designs and Their Performance Evaluation
Kotaro Okada, Hiroki Koga (Univ. of Tsukuba)
pp. 37 - 42

IT2017-110
Outage Capacity of a Two-User MIMO Interference Channel for Simultaneous Information and Energy Transfer
Kengo Ikebata, Tomohiko Uyematsu (Tokyo Tech), Ryutaroh Matsumoto (Nagoya Univ), Tetsunao Matsuta (Tokyo Tech)
pp. 43 - 48

IT2017-111
Optimality for the Iterative Construction Scheme of AIFV-$m$ codes
Ryusei Fujita, Ken-ichi Iwata (Univ. of Fukui), Hirosuke Yamamoto (The Univ. of Tokyo)
pp. 49 - 54

IT2017-112
Optimal Coded Caching using Linear Programming
Shota Kamiya, Hiroki Koga (Univ. Tsukuba)
pp. 55 - 60

IT2017-113
Shifted Coded Slotted ALOHA
Tomokazu Emoto, Takayuki Nozaki (Yamaguchi Univ.)
pp. 61 - 66

IT2017-114
[Invited Talk] On Traitor Tracings and Related Topics
Shota Yamada (AIST)
p. 67

IT2017-115
[Invited Talk] Research and Development of Transmission Technologies for the Next Generation Terrestrial Broadcasting
Tomoaki Takeuchi (NHK)
p. 69

IT2017-116
[Invited Talk] On fast multiplications of multiple-valued logic polynomials by discrete Fourier transforms
Hajime Matsui (Toyota Technological Institute)
p. 71

IT2017-117
Effect on randomizing components to the security of Minalpher
Yuki Kishi, Keita Osafune, Yuta Kuwano, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ)
pp. 73 - 79

IT2017-118
A study on hierarchical secret sharing schemes applicable to any level based on XOR operations
Koji Shima, Hiroshi Doi (IISEC)
pp. 81 - 88

IT2017-119
Succinct Oblivious RAM
Taku Onodera, Tetsuo Shibuya (IMSUT)
pp. 89 - 96

IT2017-120
High Efficient Scalar Multiplication in Elliptic Curve Cryptography
Noboru Takeuchi, Toshiyuki Kinoshita (TUT)
pp. 97 - 101

IT2017-121
Digital watermark using deep-learning classification
Mashu Sakai, Taiki Shigeta, Hikaru Morita (Kanagawa Univ.)
pp. 103 - 106

IT2017-122
Evaluation of deep learning method for detection of intrusion packets
Tomoki Ueno, Mitiko Harayama (GIFU Univ)
pp. 107 - 113

IT2017-123
Reply analysis between Twitter users using machine learning -- Distinguish real-life/online friends --
Takakuwa Ranka, Sasaki Taroh, Fujioka Atsushi (KU)
pp. 115 - 119

IT2017-124
On the Number of Rounds by Card-based Cryptographic Protocols Using Private Operations
Hibiki Ono, Yoshifumi Manabe (Kogakuin Univ.)
pp. 121 - 128

IT2017-125
Card-Based Cryptographic Protocols with Private Operations which can Prevent Malicious Behaviors
Youhei Shimizu, Yuki Kishi, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ)
pp. 129 - 135

IT2017-126
A study on segmented deletion error correction using polar code
Hikari Koremura, Haruhiko Kaneko (Tokyo Tech)
pp. 137 - 141

IT2017-127
Bayes Optimal AMP Decoder for Sparse Superposition Codes
Yuwa Hatae (Kyushu Univ.), Kazushi Mimura (Hiroshima City Univ.), Masanori Kawakita, Jun'ichi Takeuchi (Kyushu Univ.)
pp. 143 - 148

IT2017-128
Ordered Shuffle-BP Decoding Based on the Loops of LDPC Code
Ryoma Sakai, Kazuhiko Yamaguchi (UEC)
pp. 149 - 154

IT2017-129
Efficient Scheduling of Serial Iterative Decoding for Zigzag Decodable Fountain Codes
Yoshihiro Murayama, Takayuki Nozaki (Yamaguchi Univ.)
pp. 155 - 160

IT2017-130
Non-binary codes correcting a burst of deletions or insertions
Toyohiko Saeki, Takayuki Nozaki (Yamaguchi Univ.)
pp. 161 - 166

IT2017-131
Asymptotic Analysis of LDPC Codes for Two-Way Relay Channels
Yuta Ishimatsu, Satoshi Takabe, Tadashi Wadayama (NITech), Masahito Hayashi (Nagoya Univ.)
pp. 167 - 172

IT2017-132
Consideration of error correction code suitable for WBAN
Akihiro Yamada, Hiroyoshi Morita, Akiko Manada (The Univ. of Electro-Communications)
pp. 173 - 177

IT2017-133
On the Generalization of Fano's Inequality for Countably Infinite Alphabets, List-Decoding, and General Conditional Information Measures
Yuta Sakai (Univ. Fukui)
pp. 179 - 184

IT2017-134
Parameter orthogonalization method in quantum parameter estimation problem
Jun Suzuki (UEC)
pp. 185 - 190

IT2017-135
Improved Lossless Compression by Substring Enumeration Using Sorting
Takahiro Ota (NPIT), Akiko Manada (UEC)
pp. 191 - 196

IT2017-136
The Error Performance Analysis of the K-best Viterbi Decoding Algorithm
Hideki Yoshikawa (Tohoku Gakuin Univ.)
pp. 197 - 200

IT2017-137
Quantum &Classical Radar Camera for Automotive and Effect of Fog-2 -- Sparse Modeling --
Osamu Hirota (Tamagawa Univ.)
pp. 201 - 206

IT2017-138
Attacks on several Multivariate PKCs -- Attack on K(AVII)MVPKC --
Ryuichi Sakai (Osaka Electro-Communication Univ.), Masao Kasahara (Waseda Univ.)
pp. 207 - 212

IT2017-139
A Note on Security Notions of Anonymity in Identity-Based Encryption -- Case of ID-CCA2 Security --
Honomu Ohtomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.)
pp. 213 - 218

IT2017-140
On Confirming Ciphertext Update in Key-Updatable Public-key Encryption with Keyword Search
Yuka Sakoda, Honomu Ohtomo, Naoki Matsunaga, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.)
pp. 219 - 223

IT2017-141
On (Un)Deniability of Plausible Deniability
Atsushi Waseda, Ryo Nojima (NICT)
pp. 225 - 230

IT2017-142
Information-Theoretically Secure Authentication Codes with Arbitration using Non-Uniformly Random Keys
Miho Ishikawa, Junji Shikata (Yokohama National Univ.)
pp. 231 - 236

IT2017-143
On Security Evaluation for Coset Coding in Wiretap Channel Coding
Yuki Mori, Tomohiro Ogawa (UEC)
pp. 237 - 243

IT2017-144
Secure Communications over the Two-Way Wiretap Channel II with Noisy Main Channel Using Cooperative Jamming
Hiroki Iizuka, Ryota Tanaka, Junji Shikata (Yokohama National Univ.)
pp. 245 - 251

IT2017-145
Time-Space Jointly Path-Matched MC-CDM Wide Band Radio Modulation with TX and RX Array Antennas -- for High Performance Error-Control Coding --
Kohji Itoh, Akira Nakamura, Makoto Itami (TUS)
pp. 253 - 258

IT2017-146
Influence of Channel Estimation Error on Noise Enhancement Suppression by Using Novel Multilevel Spreading Codes
Tatsuya Motoki, Takehiko Kobayashi (Tokyo Denki Univ.)
pp. 259 - 264

IT2017-147
Performance Comparison of User Position Detection Method using Multiple Unmanned Aerial Vehicles based Positioning Accuracy Index
Hiroyasu Ishikawa, Hiroki Onuki (Nihon Univ.)
pp. 265 - 270

IT2017-148
Study on Aerial Cooperative Relaying for Coverage Extension of High-Altitude Unmanned Aircraft Systems
Fumie Ono (NICT), Hideki Ochiai (Yokohama National Univ.), Ryu Miura, Fumihide Kojima (NICT)
pp. 271 - 273

IT2017-149
On Adaptive Self-Interference Suppression for Full Duplex Filter-and-Forward Relaying
Hayato Teshiromori, Teruyuki Miyajima, Yoshiki Sugitani (Ibaraki Univ.)
pp. 275 - 280

IT2017-150
Evaluation of synchronization jitter caused by the distance from base-station on optical wireless RVC system using CSK-MPPM
Masayuki Ishikawa, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.)
pp. 281 - 286

IT2017-151
A study of Bit Error Rate Taking into Account Synchronization Performance on Optical Wireless Framed-DOOK System
Yuta Asano, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.)
pp. 287 - 292

IT2017-152
BER Performance Evaluation of ROD-WSN using Modified Pseudo Orthogonal M-sequences under Fading Channel
Tomohiro Okawa, Hiromasa Habuchi (Ibaraki Univ.), Koichiro Hashiura (Akita Prefectural Univ.)
pp. 293 - 297

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan