Hirotsugu Kinoshita

According to our database1, Hirotsugu Kinoshita authored at least 27 papers between 1992 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
CNN-based perceptual hashing scheme for image groups suitable for security systems.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

2022
An access control model considering with transitions of access rights based on the blockchain.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

2021
Design Scheme of Perceptual Hashing based on Output of CNN for Digital Watermarking.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

2020
An Improved Design Scheme for Perceptual Hashing Based on CNN for Digital Watermarking.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

2018
Design Scheme of Copyright Management System Based on Digital Watermarking and Blockchain.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
Access Control Model for the Inference Attacks with Access Histories.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2015
DR-MPCP: Delayed REPORT message for multipoint control protocol in EPON.
Proceedings of the 7th International Workshop on Reliable Networks Design and Modeling, 2015

RDFization of database for folk implements and ontology-assisted information retrieval system.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2015

Development of the folk implements database for the digital archive.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2015

Exact Mean Packet Delay Analysis for Long-Reach Passive Optical Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Optimal Threshold Configuration Methods for Flow Admission Control with Cooperative Users.
IEICE Trans. Commun., 2014

Optimal threshold configuration with equality based call admission control with cooperative users (mixed loss and delay system).
Proceedings of the International Conference on Computing, Networking and Communications, 2014

Access Control Model for the My Number National Identification Program in Japan.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

2013
Game theoretic analysis of the value exchange system.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

2012
Agent-based social simulation model that accommodates diversity of human values.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012

A Local Currency System Reflecting Variety of Values with a Swarm Intelligence.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

2011
A Local Currency System Reflecting Variety of Values.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

2010
An Electronic Money System as Substitute for Banknotes.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

2009
A System for Search, Access Restriction, and Agents in the Clouds.
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009

Financial Securitization with Digital Rights Management System.
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009

2008
A Network for Copyright Management and Control of Private Information.
Proceedings of the 2008 International Symposium on Applications and the Internet, 2008

1999
An Image Retrieving Method Using the Object Index and the Motion.
Proceedings of the 1999 International Conference on Image Processing, 1999

1998
Generation of the signature with the structured information of the image.
Proceedings of the 9th European Signal Processing Conference, 1998

1996
An image digital signature system with ZKIP for the graph isomorphism.
Proceedings of the Proceedings 1996 International Conference on Image Processing, 1996

1995
An object extraction method using sampled active contour model.
Syst. Comput. Jpn., 1995

1993
Hand gesture recognition using a stick figure model.
Proceedings of the Visual Communications and Image Processing '93, 1993

1992
Communication protocols with untraceability of sender and receiver.
Syst. Comput. Jpn., 1992


  Loading...