Hiroki Ito

Orcid: 0000-0002-8168-5974

According to our database1, Hiroki Ito authored at least 23 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Compensation of Transmitter Memory Nonlinearity by Post-Reception Blind Nonlinear Compensator with FDE.
IEICE Trans. Commun., July, 2023

Access Control with Encrypted Feature Maps for Object Detection Models.
IEICE Trans. Inf. Syst., 2023

2022
Access Control of Semantic Segmentation Models Using Encrypted Feature Maps.
CoRR, 2022

Access Control of Object Detection Models Using Encrypted Feature Maps.
Proceedings of the 4th IEEE Global Conference on Life Sciences and Technologies, 2022

2021
Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access.
CoRR, 2021

Image to Perturbation: An Image Transformation Network for Generating Visually Protected Images for Privacy-Preserving Deep Neural Networks.
IEEE Access, 2021

Estimating Learner's Perspective in Programming: Analysis of Operation Time Series in Code Puzzles.
Proceedings of the 16th International Conference on Intelligent Systems and Knowledge Engineering, 2021

Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2021

2020
Post-Reception Compensation Performance of Blind Nonlinear Compensator with Equalizer against Memory Nonlinear Distortion.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

Image Transformation Network for Privacy-Preserving Deep Neural Networks and Its Security Evaluation.
Proceedings of the 9th IEEE Global Conference on Consumer Electronics, 2020

Advanced Comprehension Analysis Using Code Puzzle - Considering the Programming Thinking Ability.
Proceedings of the Information Technology for Management: Towards Business Excellence, 2020

Comprehension analysis considering programming thinking ability using code puzzle.
Proceedings of the 2020 Federated Conference on Computer Science and Information Systems, 2020

A Framework for Transformation Network Training in Coordination with Semi-trusted Cloud Provider for Privacy-Preserving Deep Neural Networks.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020

2019
Detection of 3D Land Displacement After the Great East Japan Earthquake In 2011 From Multi-Temporal SAR Images And GPS Data.
Proceedings of the 2019 IEEE International Geoscience and Remote Sensing Symposium, 2019

2017
On the classification of $\mathbb{Z}_4$-codes.
CoRR, 2017

On the classification of ℤ<sub>4</sub>-codes.
Adv. Math. Commun., 2017

2015
Application of a MEMS Blood Flowmeter for Power Spectrum Analysis of Heart Rate Variability.
Proceedings of the BIOSIGNALS 2015, 2015

2012
Efficient DPA-Resistance Verification Method with Smaller Number of Power Traces on AES Cryptographic Circuit.
Proceedings of the 15th Euromicro Conference on Digital System Design, 2012

2010
Online Rescheduling in Semiconductor Manufacturing.
Int. J. Autom. Technol., 2010

Inoribi: emergence of "windows" and "mirrors".
Proceedings of the 4th International Conference on Tangible and Embedded Interaction 2010, 2010

2006
A fast rescheduling method in semiconductor manufacturing allowing for tardiness and scheduling stability.
Proceedings of the 2006 IEEE International Conference on Automation Science and Engineering, 2006

2005
Online job shop rescheduling with reaction-diffusion equation on a graph.
Proceedings of the 2005 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2005

2003
World-wide gallery for pseudo-3D photo collage.
Proceedings of the SIGGRAPH 2003 Conference on Web Graphics, 2003


  Loading...