Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT, EMM |
2022-05-17 13:00 |
Gifu |
Gifu University (Primary: On-site, Secondary: Online) |
On Structure of Fisher Information Matrix for Simple Softplus Neural Networks Masazumi Iida, Yoshinari Takeishi, Jun'ichi Takeuchi (Kyushu Univ.) IT2022-1 EMM2022-1 |
[more] |
IT2022-1 EMM2022-1 pp.1-6 |
IT, EMM |
2022-05-17 13:25 |
Gifu |
Gifu University (Primary: On-site, Secondary: Online) |
A Note on Time-Varying Two-Dimensional Autoregressive Models and the Bayes Codes Yuta Nakahara, Toshiyasu Matsushima (Waseda Univ.) IT2022-2 EMM2022-2 |
This paper proposes a two-dimensional autoregressive model with time-varying parameters as a stochastic model for explai... [more] |
IT2022-2 EMM2022-2 pp.7-12 |
IT, EMM |
2022-05-17 13:50 |
Gifu |
Gifu University (Primary: On-site, Secondary: Online) |
Extensible Polarization-Adjusted Convolutional Codes and Its Application to Rateless Codes Yachongka Vamoua, Michitaka Kurosu, Mizuho Asahi, Hideki Yagi, Koji Ishibashi (UEC) IT2022-3 EMM2022-3 |
Rateless codes have been proposed to realize efficient communications when the channel state information is not availabl... [more] |
IT2022-3 EMM2022-3 pp.13-18 |
IT, EMM |
2022-05-17 14:40 |
Gifu |
Gifu University (Primary: On-site, Secondary: Online) |
A Hearable Music Data Hiding Scheme Based on Reverb Effects Utilizing Time-Spread Echo Hiding Teppei Niimoto, Raito Matsuzaki, Akira Tanaka, Tetsuya Kojima (NIT, Tokyo College) IT2022-4 EMM2022-4 |
In digital data hiding, a property called "transparancy" is required in general. This property means that the embedded s... [more] |
IT2022-4 EMM2022-4 pp.19-22 |
IT, EMM |
2022-05-17 15:05 |
Gifu |
Gifu University (Primary: On-site, Secondary: Online) |
Generating patch-wise adversarial examples for avoidance of face recognition system and verification of its robustness Hiroto Takiwaki, Minoru Kuribayashi, Nobuo Funabiki (Okayama univ.) IT2022-5 EMM2022-5 |
Advances in machine learning technologies such as Convolutional Neural Networks (CNN) have made it possible to identify ... [more] |
IT2022-5 EMM2022-5 pp.23-28 |
IT, EMM |
2022-05-17 15:30 |
Gifu |
Gifu University (Primary: On-site, Secondary: Online) |
A study of adversarial example detection using the correlation between adversarial noise and JPEG compression-derived distortion Kenta Tsunomori, Yuma Yamasaki, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.), Isao Echizen (NII) IT2022-6 EMM2022-6 |
Adversarial examples cause misclassification of image classifiers. Higashi et al. proposed a method to detect adversari... [more] |
IT2022-6 EMM2022-6 pp.29-34 |
IT, EMM |
2022-05-17 15:55 |
Gifu |
Gifu University (Primary: On-site, Secondary: Online) |
Examination of round color 2D symbol for B2C with display area and secret data area Nobuyuki Teraura (Terrara Code), Isao Echizen (NII), Keiichi Iwamura (TUS) IT2022-7 EMM2022-7 |
We examined 2D symbols for B2C applications. QR code is a matrix-type 2D symbol announced in 1994. Since QR code was dev... [more] |
IT2022-7 EMM2022-7 pp.35-40 |
IT, EMM |
2022-05-17 16:40 |
Gifu |
Gifu University (Primary: On-site, Secondary: Online) |
[Invited Talk]
Secure Codes with List Decoding Yujie Gu (Kyudai) IT2022-8 EMM2022-8 |
In this paper, we consider secure codes for protecting the copyright of multimedia content against collusion attacks. We... [more] |
IT2022-8 EMM2022-8 pp.41-43 |
IT, EMM |
2022-05-18 10:25 |
Gifu |
Gifu University (Primary: On-site, Secondary: Online) |
A method of assigning bit labeling for delayed bit-interleaved coded modulation Gou Hosoya (Waseda Univ.) IT2022-9 EMM2022-9 |
We show the capacity of delayed bit-interleaved coded modulation (DBICM) with a small delay on a two-dimensional signal ... [more] |
IT2022-9 EMM2022-9 pp.44-49 |
IT, EMM |
2022-05-18 10:50 |
Gifu |
Gifu University (Primary: On-site, Secondary: Online) |
Binarized Neural Networks and Trainable ISTA based Signature Code with Channel Estimation for Multiple Access Rayleigh Fading Lantian Wei, Shan Lu, Hiroshi Kamabe (Gifu Univ.) IT2022-10 EMM2022-10 |
User Identification (UI) and Channel Estimation (CE) schemes are essential issues in wireless networks with massive user... [more] |
IT2022-10 EMM2022-10 pp.50-55 |
IT, EMM |
2022-05-18 12:40 |
Gifu |
Gifu University (Primary: On-site, Secondary: Online) |
On Bayesian Approach for Classification of Context Tree Model Shota Saito (Gunma Univ.) IT2022-11 EMM2022-11 |
This study deals with the Bayesian classification problem, which was investigated by Merhav and Ziv [IEEE Trans. Inf. Th... [more] |
IT2022-11 EMM2022-11 pp.56-60 |
IT, EMM |
2022-05-18 13:05 |
Gifu |
Gifu University (Primary: On-site, Secondary: Online) |
Ordinary Differential Equation and Mean Squared Error Analysis for MMSE Signal Detection in MIMO Systems Ayano Nakai-Kasai, Tadashi Wadayama (NITech) IT2022-12 EMM2022-12 |
(To be available after the conference date) [more] |
IT2022-12 EMM2022-12 pp.61-66 |
IT, EMM |
2022-05-18 13:30 |
Gifu |
Gifu University (Primary: On-site, Secondary: Online) |
Optimal measurement preserving map for quantum state estimation and hypothesis testing Jun Suzuki (UEC) IT2022-13 EMM2022-13 |
In this work we first introduce a notion of optimal decision preserving map for classical statistical decision theory, w... [more] |
IT2022-13 EMM2022-13 pp.67-72 |
IT, EMM |
2022-05-18 14:20 |
Gifu |
Gifu University (Primary: On-site, Secondary: Online) |
[Invited Talk]
Decentralized Federated Learning: Fundamentals, Research Trends and Open Issues in Wireless Channels Koya Sato (UEC) IT2022-14 EMM2022-14 |
The expansion of machine learning applications has raised novel concerns, such as data privacy and communication costs. ... [more] |
IT2022-14 EMM2022-14 p.73 |