Hirosuke Yamamoto

Orcid: 0000-0001-6297-8838

According to our database1, Hirosuke Yamamoto authored at least 106 papers between 1979 and 2022.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2011, "For contributions to source coding and information-theoretic secure coding".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Joint Coding for Discrete Sources and Finite-State Noiseless Channels.
Proceedings of the IEEE International Symposium on Information Theory, 2022

2021
AIVF Codes Based on Iterative Algorithm and Dynamic Programming.
Proceedings of the IEEE International Symposium on Information Theory, 2021

2020
On the Capacity of Symmetric M-User Gaussian Interference Channels With Feedback.
IEEE Trans. Inf. Theory, 2020

An Algorithm for Constructing the Optimal Code Trees for Binary Alphabetic AIFV-m Codes.
Proceedings of the IEEE Information Theory Workshop, 2020

A Universal Data Compression Scheme based on the AIVF Coding Techniques.
Proceedings of the IEEE International Symposium on Information Theory, 2020

On a Redundancy of AIFV-m Codes for m =3, 5.
Proceedings of the IEEE International Symposium on Information Theory, 2020

2019
Proceedings of the 11th Asia-Europe Workshop on Concepts in Information Theory.
CoRR, 2019

Enumeration and Coding of Compact Code Trees for Binary AIFV Codes.
Proceedings of the IEEE International Symposium on Information Theory, 2019

An Iterative Algorithm to Optimize the Average Performance of Markov Chains with Finite States.
Proceedings of the IEEE International Symposium on Information Theory, 2019

2018
Dynamic AIFV Coding.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Alphabetic AIFV Codes Constructed from Hu- Tucker codes.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

An Optimality Proof of the Iterative Algorithm for AIFV-m Codes.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

2017
Worst-case Redundancy of Optimal Binary AIFV Codes and Their Extended Codes.
IEEE Trans. Inf. Theory, 2017

Posterior Matching for Gaussian Broadcast Channels with Feedback.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

A Cheating-Detectable (<i>k</i>, <i>L</i>, <i>n</i>) Ramp Secret Sharing Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Proceedings of Workshop AEW10: Concepts in Information Theory and Communications.
CoRR, 2017

Variable-to-Fixed Length Homophonic Coding Suitable for Asymmetric Channel Coding.
CoRR, 2017

An iterative algorithm to construct optimal binary AIFV-m codes.
Proceedings of the 2017 IEEE Information Theory Workshop, 2017

Application of Yamamoto-Itoh coding scheme to discrete memoryless broadcast channels.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Coding of binary AIFV code trees.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Yariable-to-fixed length homophonie coding suitable for asymmetric channel coding.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

On optimal error exponents in noiseless channel identification.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

2016
Direct- or Fast-Access Decoding Schemes for VF Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Variable-to-Fixed Length Homophonic Coding with a Modified Shannon-Fano-Elias Code.
CoRR, 2016

A ramp threshold secret sharing scheme against cheating by substitution attacks.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

A dynamic programming algorithm to construct optimal code trees of AIFV codes.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

Variable-to-fixed length homophonie coding with a modified Shannon-Fano-Elias code.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

Highly sensitive universal statistical test.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Tight upper bounds on the redundancy of optimal binary AIFV codes.
Proceedings of the IEEE International Symposium on Information Theory, 2016

On optimal transmission strategies for channels with noiseless feedback.
Proceedings of the IEEE International Symposium on Information Theory, 2016

2015
Multiple Object Identification Coding.
IEEE Trans. Inf. Theory, 2015

Almost Instantaneous Fixed-to-Variable Length Codes.
IEEE Trans. Inf. Theory, 2015

Almost Instantaneous Fix-to-Variable Length Codes.
CoRR, 2015

On Using Feedback in a Gaussian Channel.
CoRR, 2015

Construction of polar codes for channels with memory.
Proceedings of the 2015 IEEE Information Theory Workshop, 2015

FV polar coding for lossy compression with an improved exponent.
Proceedings of the IEEE International Symposium on Information Theory, 2015

On the capacity of symmetric Gaussian interference channels with feedback.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Private information retrieval for coded storage.
Proceedings of the IEEE International Symposium on Information Theory, 2015

2014
Variable Length Lossy Coding Using an LDPC Code.
IEEE Trans. Inf. Theory, 2014

On using noisy feedback in a Gaussian channel.
Probl. Inf. Transm., 2014

Identification codes to identify multiple objects.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Noisy feedback improves the Gaussian channel reliability function.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

2013
Secure Multiplex Coding Attaining Channel Capacity in Wiretap Channels.
IEEE Trans. Inf. Theory, 2013

Polar Coding Without Alphabet Extension for Asymmetric Models.
IEEE Trans. Inf. Theory, 2013

Almost instantaneous FV codes.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

2012
Coding Theorems for a (2, 2)-Threshold Scheme With Detectability of Impersonation Attacks.
IEEE Trans. Inf. Theory, 2012

On the reliability function for a noisy feedback Gaussian channel: Zero rate.
Probl. Inf. Transm., 2012

On the Hardness of Subset Sum Problem from Different Intervals.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

On Reliability Function of Gaussian Channel with Noisy Feedback: Zero Transmission Rate
CoRR, 2012

Fast Linear-Programming decoding of LDPC codes over GF(2<sup>m</sup>).
Proceedings of the International Symposium on Information Theory and its Applications, 2012

Polar coding without alphabet extension for asymmetric channels.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

On decoding error exponent of Gaussian channel with noisy feedback: Nonexponential number of messages.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

2011
Generalized Security Analysis of the Random Key Bits Leakage Attack.
Proceedings of the Information Security Applications - 12th International Workshop, 2011

Channel coding theorem for the number of guesses in decoding.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

2010
On the reliability function for a BSC with noisy feedback.
Probl. Inf. Transm., 2010

A Randomness Test Based on T-Complexity.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Coding Theorems for Cheating-Detectable Secret Sharing Schemes with Two Shares
CoRR, 2010

Error exponents of discrete memoryless channels and AWGN channels with noisy feedback.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

Coding theorems for biometric systems.
Proceedings of the IEEE International Symposium on Information Theory, 2010

Representative sequence selection in unsupervised anomaly detection using spectrum kernel with theoretical parameter setting.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

Data Compression Based on a Dictionary Method Using Recursive Construction of T-Codes.
Proceedings of the 2010 Data Compression Conference (DCC 2010), 2010

2009
Foreword.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

A New Randomness Test Based on Linear Complexity Profile.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Noisy feedback improves the BSC reliability function.
Proceedings of the IEEE International Symposium on Information Theory, 2009

A coding theorem for cheating-detectable (2, 2)-threshold blockwise secret sharing schemes.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Separate network coding for private and common messages from one source to two sinks.
Proceedings of the IEEE International Symposium on Information Theory, 2009

A differential equation method to derive the formulas of the T-complexity and the LZ-complexity.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Anomaly Detection Using Time Index Differences of Identical Symbols with and without Training Data.
Proceedings of the Advanced Data Mining and Applications, 5th International Conference, 2009

2008
Coding Theorems for the Shannon Cipher System With a Guessing Wiretapper and Correlated Source Outputs.
IEEE Trans. Inf. Theory, 2008

On the zero-rate error exponent for a BSC with noisy feedback.
Probl. Inf. Transm., 2008

Strongly Secure Linear Network Coding.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

On BSC, noisy feedback and three messages.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

2007
Optimal Multiple Assignments Based on Integer Programming in Secret Sharing Schemes with General Access Structures.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Multiplex Coding of Bit Commitment Based on a Discrete Memoryless Channel.
Proceedings of the IEEE International Symposium on Information Theory, 2007

2006
Strongly secure ramp secret sharing schemes for general access structures.
Inf. Process. Lett., 2006

2005
Asymptotic properties on codeword lengths of an optimal FV code for general sources.
IEEE Trans. Inf. Theory, 2005

Asymptotic redundancy of the MTF scheme for stationary ergodic sources.
IEEE Trans. Inf. Theory, 2005

Secure multiplex coding to attain the channel capacity in wiretap channels
CoRR, 2005

Asymptotically Optimal Tree-based Group Key Management Schemes
CoRR, 2005

Asymptotic optimality of tree-based group key management schemes.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

Strongly secure ramp secret sharing schemes.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

How to attain the ordinary channel capacity securely in wiretap channels.
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005

2004
Optimal multiple assignments based on integer programming in secret sharing schemes.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

2003
A coding theorem for lossy data compression by LDPC codes.
IEEE Trans. Inf. Theory, 2003

A Construction Method of Visual Secret Sharing Schemes for Plural Secret Images.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

2002
The Optimal <i>n</i>-out-of-<i>n</i> Visual Secret Sharing Scheme for Gray-Scale Images.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

2001
Average-sense optimality and competitive optimality for almost instantaneous VF codes.
IEEE Trans. Inf. Theory, 2001

2000
A new recursive universal code of the positive integers.
IEEE Trans. Inf. Theory, 2000

1997
Rate-distortion theory for the Shannon cipher system.
IEEE Trans. Inf. Theory, 1997

1996
Source coding theory for a triangular communication system.
IEEE Trans. Inf. Theory, 1996

1995
Competitive optimality of source codes.
IEEE Trans. Inf. Theory, 1995

1994
Coding theorems for Shannon's cipher system with correlated source outputs, and common information.
IEEE Trans. Inf. Theory, 1994

1991
A new asymptotically optimal code for the positive integers.
IEEE Trans. Inf. Theory, 1991

A coding theorem for secret sharing communication systems with two Gaussian wiretap channels.
IEEE Trans. Inf. Theory, 1991

A new implementation of the Ziv-Lempel incremental parsing algorithm.
IEEE Trans. Inf. Theory, 1991

1989
Coding theorem for secret sharing communication systems with two noisy channels.
IEEE Trans. Inf. Theory, 1989

Evaluation of a retrieval system using content addressable memory.
Syst. Comput. Jpn., 1989

1988
A rate-distortion problem for a communication system with a secondary decoder to be hindered.
IEEE Trans. Inf. Theory, 1988

1986
On secret sharing communication systems with two or three channels.
IEEE Trans. Inf. Theory, 1986

1983
A source coding problem for sources with additional outputs to keep secret from the receiver or wiretappers.
IEEE Trans. Inf. Theory, 1983

Correction to 'Wyner-Ziv theory for a general function of the correlated sources' (Sep 82 803-807).
IEEE Trans. Inf. Theory, 1983

1982
Wyner-Ziv theory for a general function of the correlated sources.
IEEE Trans. Inf. Theory, 1982

1981
Source coding theory for cascade and branching communication systems.
IEEE Trans. Inf. Theory, 1981

1980
Viterbi decoding algorithm for convolutional codes with repeat request.
IEEE Trans. Inf. Theory, 1980

Correction to 'Asymptotic Performance of a Modified Schalkwijk-Barron Scheme for Channels with Noiseless Feedback'.
IEEE Trans. Inf. Theory, 1980

1979
Asymptotic performance of a modified Schalkwijk-Barron scheme for channels with noiseless feedback (Corresp.).
IEEE Trans. Inf. Theory, 1979


  Loading...