Toru Fujiwara
Orcid: 0000-0002-3371-5745
  According to our database1,
  Toru Fujiwara
  authored at least 107 papers
  between 1985 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2025
Backdoor Attacks by Leveraging Latent Representation in Competitive Learning for Resistance to Removal.
    
  
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2025
    
  
  2024
    Proceedings of the 34th International Conference on Artificial Reality and Telexistence, 2024
    
  
  2023
    Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
    
  
  2022
SPGC: Integration of Secure Multiparty Computation and Differential Privacy for Gradient Computation on Collaborative Learning.
    
  
    J. Inf. Process., 2022
    
  
  2021
The Weight Distributions of the (256, <i>k</i>) Extended Binary Primitive BCH Codes with <i>k</i>≤71 and <i>k</i>≥187.
    
  
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
    
  
SPGC: An Integrated Framework of Secure Computation and Differential Privacy for Collaborative Learning.
    
  
    Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021
    
  
  2020
The Absolute Consistency Problem for Relational Schema Mappings with Functional Dependencies.
    
  
    IEICE Trans. Inf. Syst., 2020
    
  
    Proceedings of the International Symposium on Information Theory and Its Applications, 2020
    
  
  2019
Workforce Scheduling System to Manage Static Optimization and Dynamic Re-optimization for Field Service.
    
  
    Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics, 2019
    
  
Extraction of RNA from an intact single plant cell with cell wall using focused electric field.
    
  
    Proceedings of the International Symposium on Micro-NanoMechatronics and Human Science, 2019
    
  
  2018
Detecting Flooding Attack and Accommodating Burst Traffic in Delay-Tolerant Networks.
    
  
    IEEE Trans. Veh. Technol., 2018
    
  
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
    
  
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
    
  
  2017
Towards Efficient and Secure Encrypted Databases: Extending Message-Locked Encryption in Three-Party Model.
    
  
    Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017
    
  
  2016
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
    
  
    Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
    
  
    Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
    
  
    Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
    
  
  2015
Enumerating Joint Weight of a Binary Linear Code Using Parallel Architectures: multi-core CPUs and GPUs.
    
  
    Int. J. Netw. Comput., 2015
    
  
    IEICE Trans. Inf. Syst., 2015
    
  
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
    
  
Secure Routing Protocols for Sensor Networks: Construction with Signature Schemes for Multiple Signers.
    
  
    Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
    
  
    Proceedings of the Third International Symposium on Computing and Networking, 2015
    
  
  2014
A U-system approach for predicting metabolic behaviors and responses based on an alleged metabolic reaction network.
    
  
    BMC Syst. Biol., 2014
    
  
A Parallel Algorithm for Enumerating Joint Weight of a Binary Linear Code in Network Coding.
    
  
    Proceedings of the Second International Symposium on Computing and Networking, 2014
    
  
The Absolute Consistency Problem of XML Schema Mappings with Data Values between Restricted DTDs.
    
  
    Proceedings of the Database and Expert Systems Applications, 2014
    
  
    Proceedings of the 1st international workshop on Information hiding and its criteria for evaluation, 2014
    
  
  2013
XPath Satisfiability with Parent Axes or Qualifiers Is Tractable under Many of Real-World DTDs.
    
  
    Proceedings of the 14th International Symposium on Database Programming Languages (DBPL 2013), 2013
    
  
    Proceedings of the Language and Automata Theory and Applications, 2013
    
  
The Consistency and Absolute Consistency Problems of XML Schema Mappings between Restricted DTDs.
    
  
    Proceedings of the Web Technologies and Applications - 15th Asia-Pacific Web Conference, 2013
    
  
  2012
A Recursive Method for Vector Generation in Non-increasing Order of Its Likelihood for All Binary Vectors and Its Application for Linear Block Code Decodings.
    
  
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
    
  
Decidability of the Security against Inference Attacks Using a Functional Dependency on XML Databases.
    
  
    IEICE Trans. Inf. Syst., 2012
    
  
XPath satisfiability with downward and sibling axes is tractable under most of real-world DTDs.
    
  
    Proceedings of the Twelfth International Workshop on Web Information and Data Management, 2012
    
  
    Proceedings of the Advances in Information and Computer Security, 2012
    
  
    Proceedings of the International Symposium on Information Theory and its Applications, 2012
    
  
New hybrid additive-multiplicative watermarking with better tradeoff between image quality and detection accuracy.
    
  
    Proceedings of the International Symposium on Information Theory and its Applications, 2012
    
  
    Proceedings of the Information Theoretic Security - 6th International Conference, 2012
    
  
  2011
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
    
  
    Proceedings of the Database Programming Languages, 2011
    
  
  2010
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
    
  
    Proceedings of the Database and XML Technologies, 2010
    
  
A Metric of Search Efficiency and Preventability of Polluted Contents for Unstructured Overlay.
    
  
    Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010
    
  
    Proceedings of the International Symposium on Information Theory and its Applications, 2010
    
  
A New method to reduce the probability of detection errors for a digital watermark using complementary decoding algorithms and minimum weight codewords of linear code.
    
  
    Proceedings of the International Symposium on Information Theory and its Applications, 2010
    
  
  2009
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
    
  
Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking.
    
  
    Proceedings of the Digital Watermarking, 8th International Workshop, 2009
    
  
    Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
    
  
    Proceedings of the Database Programming Languages, 2009
    
  
  2008
    J. Intell. Inf. Syst., 2008
    
  
    Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008
    
  
    Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
    
  
    Proceedings of the Information Security and Cryptology, 2008
    
  
PRIUS: An Educational Framework on PRAGMA Fostering Globally-Leading Researchers in Integrated Sciences.
    
  
    Proceedings of the Fourth International Conference on e-Science, 2008
    
  
    Proceedings of the Progress in WWW Research and Development, 2008
    
  
  2007
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
    
  
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
    
  
A New Scheme to Realize the Optimum Watermark Detection for the Additive Embedding Scheme with the Spatial Domain.
    
  
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
    
  
    Proceedings of the IEEE International Symposium on Information Theory, 2007
    
  
    Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
    
  
Correctable Errors of Weight Half the Minimum Distance Plus One for the First-Order Reed-Muller Codes.
    
  
    Proceedings of the Applied Algebra, 2007
    
  
  2006
    IEEE Trans. Inf. Theory, 2006
    
  
    Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks, 2006
    
  
    Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
    
  
  2005
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
    
  
Coin-based Anonymous Fingerprinting Scheme with Automatic Identification of Redistributors.
    
  
    Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005
    
  
Relations between the local weight distributions of a linear block code, its extended code, and its even weight subcode.
    
  
    Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
    
  
    Proceedings of the Information Security and Cryptology, 2005
    
  
    Proceedings of the 21st International Conference on Data Engineering Workshops, 2005
    
  
  2004
Soft-input soft-output decoding algorithm of linear block codes based on minimum distance search.
    
  
    Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
    
  
Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases.
    
  
    Proceedings of the Information and Communications Security, 6th International Conference, 2004
    
  
  2002
    IEEE Trans. Inf. Theory, 2002
    
  
Security against Inference Attacks on Negative Information in Object-Oriented Databases.
    
  
    Proceedings of the Information and Communications Security, 4th International Conference, 2002
    
  
  2001
Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem.
    
  
    Proceedings of the Cryptography and Coding, 2001
    
  
  1999
Constructions of Generalized Concatenated Codes and Their Trellis-Based Decoding Complexity.
    
  
    IEEE Trans. Inf. Theory, 1999
    
  
    Proceedings of the 1999 International Symposium on Circuits and Systems, ISCAS 1999, Orlando, Florida, USA, May 30, 1999
    
  
An Optimality Testing Algorithm for a Decoded Codeword of Binary Block Codes and Its Computational Complexity.
    
  
    Proceedings of the Applied Algebra, 1999
    
  
  1998
A Trellis-Based Recursive Maximum-Likelihood Decoding Algorithm for Binary Linear Block Codes.
    
  
    IEEE Trans. Inf. Theory, 1998
    
  
  1997
    IEEE Trans. Inf. Theory, 1997
    
  
The Split Weight (<i>w<sub>L</sub>, w<sub>R</sub></i>) Enumeration of Reed-Muller Codes for <i>w<sub>L</sub></i> + <i>w<sub>R</sub></i> < 2<i>d<sub>min</sub></i>.
    
  
    Proceedings of the Applied Algebra, 1997
    
  
  1996
    IEEE Trans. Inf. Theory, 1996
    
  
  1994
An upper bound on the effective error coefficient of two-stage decoding, and good two-level decompositions of some Reed-Muller codes.
    
  
    IEEE Trans. Commun., 1994
    
  
    Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 1994
    
  
  1993
    IEEE Trans. Inf. Theory, 1993
    
  
On the optimum bit orders with respect to the state complexity of trellis diagrams for binary linear codes.
    
  
    IEEE Trans. Inf. Theory, 1993
    
  
    Proceedings of the 11th IEEE VLSI Test Symposium (VTS'93), 1993
    
  
  1992
    Proceedings of the 10th IEEE VLSI Test Symposium (VTS'92), 1992
    
  
  1991
On linear structure and phase rotation invariant properties of block M-PSK modulation codes.
    
  
    IEEE Trans. Inf. Theory, 1991
    
  
On the monotonic property of the probability of undetected error for a shortened code.
    
  
    IEEE Trans. Inf. Theory, 1991
    
  
    IEEE Trans. Inf. Theory, 1991
    
  
  1990
    IEEE Trans. Commun., 1990
    
  
  1989
Error detecting capabilities of the shortened Hamming codes adopted for error detection in IEEE Standard 802.3.
    
  
    IEEE Trans. Commun., 1989
    
  
  1988
    IEEE Trans. Inf. Theory, 1988
    
  
  1987
    Syst. Comput. Jpn., 1987
    
  
  1986
An approximation to the weight distribution of binary primitive BCH codes with designed distances 9 and 11.
    
  
    IEEE Trans. Inf. Theory, 1986
    
  
  1985
    IEEE Trans. Inf. Theory, 1985
    
  
    IEEE Trans. Commun., 1985