number |
title/author |
We-AM-Poster.1 | Code Parameter Estimation from Noisy Data: TPC Swaminathan R, A.S.MadhuKumar, |
We-AM-Poster.10 | A p-adic Analysis of Periodic Properties for Knuth’s Quadratic Congruence Sequences Takeru Miyazaki, Shunsuke Araki, Kohei Kawase, Hideyuki Muraoka, Yasuyuki Nogami, Satoshi Uehara, |
We-AM-Poster.11 | Capacity Analysis for Hybrid FSO/RF Networks Shubha Sharma, A.S. Madhukumar, Swaminathan R, |
We-AM-Poster.12 | Evaluation of Leakage Information on Searchable Encryption Database Masayuki Yoshino, Ken Naganuma, Noboru Kunihiro, Sota Onozawa, |
We-AM-Poster.13 | Channel Model Divided into Cylinder for Free-Space Optical Links in Rain Kyohei Futami, Gou Hosoya, Hiroyuki Yashima, |
We-AM-Poster.14 | Performance Evaluation of Post-Quantum Cryptographic Algorithms using JavaScript Ye Yuan, Junting Xiao, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi, |
We-AM-Poster.15 | Neural Network Detection of LDPC-Coded Random Access CDMA Systems Yuto Ichiki, Guanghui Song, Kui Cai, Shan Lu, Jun Cheng, |
We-AM-Poster.16 | Joint Secure Communication and Independent Random Number Generation against Eavesdropper Natsuki Hirotani, Tomohiko Uyematsu, Tetsunao Matsuta, |
We-AM-Poster.17 | Fundamental Trade-off among Identification, Secrecy and Template Rates in Identification System Vamoua Yachongka, Hideki Yagi, |
We-AM-Poster.18 | A novel Doppler resistant low complexity CS-CDMA system Hikaru Mizuyoshi, Chenggao Han, |
We-AM-Poster.19 | A New Bound of (r,δ)-Locally Repairable Codes over Finite Field of Small Order Tomoya Hamada, Hideki Yagi, |
We-AM-Poster.2 | Improved LT Code Degree Distribution and its Performance Evaluation Takumi Ishiyama, Ryo Shibata, Gou Hosoya, Hiroyuki Yashima, |
We-AM-Poster.20 | A Calculation Method using DFT Matrix for Roos Bound Junru Zheng, Takayasu Kaida, |
We-AM-Poster.21 | Expected Graph Evolution for Spatially “Mt. Fuji” Coupled LDPC Codes Yuta Nakahara, Toshiyasu Matsushima, |
We-AM-Poster.22 | Study the Quantitative Bound of Required Samples in Attacking GACD-based FHE Schemes Yuntao Wang, Xiaoling Yu, Tsuyoshi Takagi, |
We-AM-Poster.23 | A Construction of Secret Sharing Schemes with Threshold 3 for Countably Infinite Participants Taksahi Hisatome, Hiroki Koga, |
We-AM-Poster.24 | Generating Binary Quasi-Cyclic Reversible Codes Ramy Taki ElDin, Hajime Matsui, |
We-AM-Poster.25 | Some Properties of Z4 Sequences Obtained from Two Binary NTUA Sequences by the Gray Coding Masahiro GOTO, Takeru MIYAZAKI, Satoshi UEHARA, Yasuyuki NOGAMI, |
We-AM-Poster.26 | Research on Convolutional Codes for Dependable Storage Systems Tianyi Zhang, |
We-AM-Poster.27 | Probability Density Based Performance Analysis for Energy Harvesting Communications Yu MORISHIMA, |
We-AM-Poster.28 | Detailed experimentation know-how about CPA against lightweight cipher implemented 8-bit microcontroller for tamper resistance test bench Kota Kanou, Jun Sato, Tsukasa Adachi, Masahiro Kaminaga, Hideki Yoshikawa, Toshinori Suzuki, Masaharu Fukase, Arimitsu Shikoda, |
We-AM-Poster.29 | Dispensing with Noise Forward in the “Weak” Relay Eavesdropper Channel Krishnamoorthy Iyer, |
We-AM-Poster.3 | Probabilistic Shaping for BICM with Pseudorandom Sequence Masashi Yuri, Ryo Shibata, Gou Hosoya, Hiroyuki Yashima, |
We-AM-Poster.30 | A Note on a Bound on the Rate of a Locally Recoverable Code with Multiple Recovering Sets Koki Kazama, Akira Kamatsuka, Takahiro Yoshida, Toshiyasu Matsushima, |
We-AM-Poster.31 | Asymptotic Analysis of Classification in the Presence of Generalized Label Noise G. Yasuda, T. Suko, T. Matsushima, |
We-AM-Poster.32 | A Study of Error-Control Scheme for WBAN based on Retransmission Takahiro Goto, Kento Takabayashi, Ryuji Kohno, |
We-AM-Poster.4 | Attack on Multiple-Use Password Protected Secret Sharing Taiyu Kamiyama, Yuta Ugaya, Keisuke Kodaira, Tomoharu Shibuya, |
We-AM-Poster.5 | Consideration on b-weight for cyclic codes over b-symbol read channels Yuto Kono, Shogo Usami, |
We-AM-Poster.6 | Enumeration of Compact Trees of AIFV Codes Kengo Hashimoto, Ken-ichi Iwata, Hirosuke Yamamoto, |
We-AM-Poster.7 | Some properties of NTU sequences Gangsan Kim, Hong-Yeop Song, |
We-AM-Poster.8 | A Thresholded Discriminative Metric Learning Approach for Deep Speaker Recognition Yin-Cheng Yeh, Yan-Chin Liao, Hsie-Chia Chang, |
We-AM-Poster.9 | Security of K(AII) ΣⅡ PKC Along with a Challenge Problem Yasuyuki Murakami, Masao Kasahara, |