Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SIP |
2021-08-23 15:40 |
Online |
Online |
[Invited Talk (Young Researcher)]
Hyperspectral image restoration based on convex optimization Saori Takeyama (Tokyo Tech) SIP2021-31 |
Hyperspectral (HS) images have high-resolution spectral information including invisible light, so they can visible the i... [more] |
SIP2021-31 p.18 |
WBS, IT, ISEC |
2021-03-04 13:20 |
Online |
Online |
[Poster Presentation]
Recovery of Partially Missing OFDM Signal in Time-Domain Chengbo Liu, Na Chen, Minoru Okada (NAIST) IT2020-127 ISEC2020-57 WBS2020-46 |
Orthogonal Frequency Division Multiplexing (OFDM) suffers from the partial time-domain loss which is caused by obstacles... [more] |
IT2020-127 ISEC2020-57 WBS2020-46 pp.98-103 |
MVE, IMQ, IE, CQ (Joint) [detail] |
2021-03-01 13:50 |
Online |
Online |
Image Compression based on Deep Learning with Visual Spatial Frequency Characteristics Naoki Tada (Chiba Univ.), Tatsuki Adaniya (ADAWARP JAPAN Inc.), Keita Hirai (Chiba Univ.) IMQ2020-13 IE2020-53 MVE2020-45 |
(To be available after the conference date) [more] |
IMQ2020-13 IE2020-53 MVE2020-45 pp.17-18 |
IA |
2021-01-29 14:50 |
Online |
Online |
Retrieval in Confined Decodable Secret Sharing Scheme by Comparison of Difference in Coefficient between Shares and Its Security Evaluation Tomo Nakamura, Ryohei Yoshitomi, Eiji Fukutomi, Masahiro Fukumoto (KUT) IA2020-34 |
In Kochi Prefecture, an effort is underway to back up medical data such as electronic medical records to remote location... [more] |
IA2020-34 pp.21-26 |
IT |
2020-12-03 10:10 |
Online |
Online |
Local recovery with error tolerance for locally recoverable codes Genki Oiwa, Hideki Yagi (UEC) IT2020-47 |
Locally recoverable codes (LRC codes) can restore the lost codeword symbol by referring to surrounding codeword symbols.... [more] |
IT2020-47 pp.129-133 |
SIS, ITE-BCT |
2020-10-01 13:40 |
Online |
Online |
Image Regularization with Morphological Gradient Priors Using Optimization of Multiple Structuring Elements for Each Pixel Hirotaka Oka, Mistuji Muneyasu, Soh Yoshida (Kansai Univ.), Makoto Nakashizuka (CIT) SIS2020-15 |
In image regularization, a method for restoring an image has been proposed in which a morphological gradient is used as ... [more] |
SIS2020-15 pp.29-34 |
MI, IE, SIP, BioX, ITE-IST, ITE-ME [detail] |
2020-05-28 10:50 |
Online |
Online |
[Special Talk]
High-dimensional Signal Restoration by Convolutional Networks Driving Fusion Across Multiple Disciplines
-- Sparse Modeling and Convolutional Dictionary Learning -- Shogo Muramatsu (Niigata Univ.) |
This talk outlines a restoration process of high-dimensional signals such as image and volumetric data. With the develop... [more] |
|
IE, IMQ, MVE, CQ (Joint) [detail] |
2020-03-06 14:25 |
Fukuoka |
Kyushu Institute of Technology (Cancelled but technical report was issued) |
Image Tampering Detection and Self-Recovery by Using Robust Digital Watermark against JPEG Compression Shuhei Ohara, Masayuki Kurosaki, Ochi Hiroshi (Kyutech) IMQ2019-38 IE2019-120 MVE2019-59 |
Recently, with the tremendous diffuser of smartphones, the SNS users rate has increased to 74.7 %
in 2018. Users can ea... [more] |
IMQ2019-38 IE2019-120 MVE2019-59 pp.115-120 |
SP, EA, SIP |
2020-03-02 13:00 |
Okinawa |
Okinawa Industry Support Center (Cancelled but technical report was issued) |
[Poster Presentation]
Restoration of clipped signal using oversampling based on differentiable and convex loss function Natsuki Ueno, Shoichi Koyama, Hiroshi Saruwatari (Univ. Tokyo) EA2019-126 SIP2019-128 SP2019-75 |
A signal reconstruction method of clipped time-continuous signal using oversampling is proposed. The signal reconstructi... [more] |
EA2019-126 SIP2019-128 SP2019-75 pp.147-152 |
IE, CS, IPSJ-AVM, ITE-BCT [detail] |
2019-12-05 11:40 |
Iwate |
Aiina Center |
[Special Talk]
Representation of moving-image's sparsity and its applications to adaptive moving-image restoration Takahiro Saito (Kanagawa Univ.) CS2019-75 IE2019-55 |
This talk states that statistical sparsity of a moving-image sequence can be properly represented in the domain of the 3... [more] |
CS2019-75 IE2019-55 pp.29-34 |
ET |
2019-11-09 15:40 |
Hiroshima |
Hiroshima City University |
The shape restoration of a Japanese wolf cub and development of the movement observation system for a pack of Japanese wolves Hiroyuki Kitanaka, Nanami Itakura, Toshinobu Harada (Wakayama Univ) ET2019-55 |
There are only four stuffed specimens of a Japanese wolf in the world, and one of them is owned by Wakayama University. ... [more] |
ET2019-55 pp.43-48 |
ITE-BCT, SIS |
2019-10-24 15:30 |
Fukui |
Fukui International Activities Plaza |
Image Regularization with Total Variation and Morphological Gradient Priors Using Optimization of Structuring Element for Each Pixel Shoya Oohara, Hirotaka Oka, Mistuji Muneyasu, Soh Yoshida (Kansai Univ.), Makoto Nakashizuka (CIT) SIS2019-17 |
As an image prior for image restoration, a method using the sum of morphological gradients has been proposed. Optimizati... [more] |
SIS2019-17 pp.47-52 |
PRMU |
2019-10-18 16:15 |
Tokyo |
|
Recovering Dynamic Trajectory from a handwritten character image using a Deep Neural Network Tsubasa Nakamura, Nguyen Tuan Cuong, Masaki Nakagawa (TUAT) PRMU2019-41 |
This paper presents a method to recover a dynamic trajectory from a handwritten character image using a deep neural netw... [more] |
PRMU2019-41 pp.53-58 |
SIS, IPSJ-AVM, ITE-3DMT [detail] |
2019-06-13 16:25 |
Nagasaki |
Fukue Culture Center |
[Invited Talk]
Image Processing Based on Sparse and Low-rank Modeling Seisuke Kyochi (The Univ. of Kitakyushu) SIS2019-10 |
This paper presents fundamental tools for image recovery by convex optimization and introduces some case study from the ... [more] |
SIS2019-10 pp.55-60 |
EMM, IT |
2019-05-23 16:35 |
Hokkaido |
Asahikawa International Conference Hall |
[Invited Talk]
Security of Machine Learning Satsuya Ohata (AIST), Yuya Senzaki (Idein) IT2019-6 EMM2019-6 |
In this talk, we introduce several research results on machine learning security. Especially, we will explain about adve... [more] |
IT2019-6 EMM2019-6 p.29 |
ISEC |
2019-05-17 11:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Examination of quantitative evaluation of attack method to restore the anonymized data Takaya Yamazoe, Kazumasa Omote (Tsukuba Univ.) ISEC2019-4 |
With the increasing scale of data, integrated analysis of data distributed to multiple institutions is required. On the ... [more] |
ISEC2019-4 pp.7-13 |
IMQ, IE, MVE, CQ (Joint) [detail] |
2019-03-15 13:25 |
Kagoshima |
Kagoshima University |
Neighbor-aware Pixel-wise Reinforcement Learning for Image Processing Ryosuke Furuta, Naoto Inoue, Toshihiko Yamasaki (Univ. of Tokyo) IMQ2018-67 IE2018-151 MVE2018-98 |
(To be available after the conference date) [more] |
IMQ2018-67 IE2018-151 MVE2018-98 pp.245-250 |
IMQ, IE, MVE, CQ (Joint) [detail] |
2019-03-15 14:25 |
Kagoshima |
Kagoshima University |
IMQ2018-72 IE2018-156 MVE2018-103 |
(To be available after the conference date) [more] |
IMQ2018-72 IE2018-156 MVE2018-103 pp.273-277 |
IT, ISEC, WBS |
2019-03-08 15:20 |
Tokyo |
University of Electro-Communications |
Key Reocvery Atttack on Ring-LWE Scheme Using Side-Channel Information in Number Theoretic Transform Kento Oonishi, Noboru Kunihiro (Tokyo Univ.) IT2018-112 ISEC2018-118 WBS2018-113 |
Recently, the researches of post-quantum cryptography are conducted because of the realization of quantum computers in t... [more] |
IT2018-112 ISEC2018-118 WBS2018-113 pp.229-234 |
HPB (2nd) |
2019-02-15 11:25 |
Tokyo |
|
Development of a Visual SLAM framework Takeshi Ishita, Akihiro Yamashita (NITTC) |
(To be available after the conference date) [more] |
|