Toru Fujiwara

Orcid: 0000-0002-3371-5745

According to our database1, Toru Fujiwara authored at least 105 papers between 1985 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Backdoor Attacks Leveraging Latent Representation in Competitive Learning.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

2022
SPGC: Integration of Secure Multiparty Computation and Differential Privacy for Gradient Computation on Collaborative Learning.
J. Inf. Process., 2022

2021
The Weight Distributions of the (256, <i>k</i>) Extended Binary Primitive BCH Codes with <i>k</i>≤71 and <i>k</i>≥187.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

SPGC: An Integrated Framework of Secure Computation and Differential Privacy for Collaborative Learning.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021

2020
Model Extraction Attacks on Recurrent Neural Networks.
J. Inf. Process., 2020

The Absolute Consistency Problem for Relational Schema Mappings with Functional Dependencies.
IEICE Trans. Inf. Syst., 2020

Model Extraction Attacks against Recurrent Neural Networks.
CoRR, 2020

A Construction of Robustly Reusable Fuzzy Extractors over Blockchains.
Proceedings of the International Symposium on Information Theory and Its Applications, 2020

2019
Optimal Uniform Secret Sharing.
IEEE Trans. Inf. Theory, 2019

Workforce Scheduling System to Manage Static Optimization and Dynamic Re-optimization for Field Service.
Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics, 2019

Extraction of RNA from an intact single plant cell with cell wall using focused electric field.
Proceedings of the International Symposium on Micro-NanoMechatronics and Human Science, 2019

2018
Detecting Flooding Attack and Accommodating Burst Traffic in Delay-Tolerant Networks.
IEEE Trans. Veh. Technol., 2018

Tighter Reductions for Deterministic Identity-Based Signatures.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Sphere Packing Bound and Gilbert-Varshamov Bound for <i>b</i>-Symbol Read Channels.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

2017
Towards Efficient and Secure Encrypted Databases: Extending Message-Locked Encryption in Three-Party Model.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

2016
Efficient Usage of Cover Free Families in Broadcast Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Determinacy and Subsumption of Single-Valued Bottom-Up Tree Transducers.
IEICE Trans. Inf. Syst., 2016

ISDSR: Secure DSR with ID-based Sequential Aggregate Signature.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Web security model with cache.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

Towards a formal foundation of protection against data-oriented attacks.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

2015
The consistency and absolute consistency problems of XML schema mappings between restricted DTDs.
World Wide Web, 2015

Enumerating Joint Weight of a Binary Linear Code Using Parallel Architectures: multi-core CPUs and GPUs.
Int. J. Netw. Comput., 2015

Individual Restoration of Tampered Pixels for Statistical Fragile Watermarking.
IEICE Trans. Inf. Syst., 2015

On the Impossibility of <i>d</i>-Multiplicative Non-perfect Secret Sharing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Secure Routing Protocols for Sensor Networks: Construction with Signature Schemes for Multiple Signers.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Revisiting Authentication with Shoulder-Surfing Resistance for Smartphones.
Proceedings of the Third International Symposium on Computing and Networking, 2015

2014
A U-system approach for predicting metabolic behaviors and responses based on an alleged metabolic reaction network.
BMC Syst. Biol., 2014

A Parallel Algorithm for Enumerating Joint Weight of a Binary Linear Code in Network Coding.
Proceedings of the Second International Symposium on Computing and Networking, 2014

The Absolute Consistency Problem of XML Schema Mappings with Data Values between Restricted DTDs.
Proceedings of the Database and Expert Systems Applications, 2014

Salt-and-pepper image watermarking system for IHC evaluation criteria.
Proceedings of the 1st international workshop on Information hiding and its criteria for evaluation, 2014

2013
Toward Security Verification against Inference Attacks on Data Trees.
CoRR, 2013

XPath Satisfiability with Parent Axes or Qualifiers Is Tractable under Many of Real-World DTDs.
Proceedings of the 14th International Symposium on Database Programming Languages (DBPL 2013), 2013

2012
A Recursive Method for Vector Generation in Non-increasing Order of Its Likelihood for All Binary Vectors and Its Application for Linear Block Code Decodings.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Decidability of the Security against Inference Attacks Using a Functional Dependency on XML Databases.
IEICE Trans. Inf. Syst., 2012

XPath satisfiability with downward and sibling axes is tractable under most of real-world DTDs.
Proceedings of the Twelfth International Workshop on Web Information and Data Management, 2012

Generic Construction of GUC Secure Commitment in the KRK Model.
Proceedings of the Advances in Information and Computer Security, 2012

A soft-decision sphere decoding based on the recursive vector generator.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

New hybrid additive-multiplicative watermarking with better tradeoff between image quality and detection accuracy.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

Optimum General Threshold Secret Sharing.
Proceedings of the Information Theoretic Security - 6th International Conference, 2012

2011
Toward Digital Watermarking for Cryptographic Data.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Foreword.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Validity of Positive XPath Queries with Wildcard in the Presence of DTDs.
Proceedings of the Database Programming Languages, 2011

2010
On correctable errors of binary linear codes.
IEEE Trans. Inf. Theory, 2010

The Vector Decomposition Problem.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Extending the Tractability Results on XPath Satisfiability with Sibling Axes.
Proceedings of the Database and XML Technologies, 2010

A Metric of Search Efficiency and Preventability of Polluted Contents for Unstructured Overlay.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

Adaptive recursive MLD using ordered statistics for low rate codes.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

A New method to reduce the probability of detection errors for a digital watermark using complementary decoding algorithms and minimum weight codewords of linear code.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

2009
Flexible Timed-Release Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Verification of the Security against Inference Attacks on XML Databases.
IEICE Trans. Inf. Syst., 2009

Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009

Watermarking Cryptographic Data.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

A Tractable Subclass of DTDs for XPath Satisfiability with Sibling Axes.
Proceedings of the Database Programming Languages, 2009

2008
Bag-based data models for incomplete information and their closure properties.
J. Intell. Inf. Syst., 2008

Uncorrectable errors of weight half the minimum distance for binary linear codes.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Expiration Dated Fingerprinting.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Anonymous Fingerprinting for Predelivery of Contents.
Proceedings of the Information Security and Cryptology, 2008

PRIUS: An Educational Framework on PRAGMA Fostering Globally-Leading Researchers in Integrated Sciences.
Proceedings of the Fourth International Conference on e-Science, 2008

2007
Local Weight Distribution of the (256, 93) Third-Order Binary Reed-Muller Code.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

A Private and Consistent Data Retrieval Scheme with Log-Squared Communication.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

A New Scheme to Realize the Optimum Watermark Detection for the Additive Embedding Scheme with the Spatial Domain.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Secure Construction for Nonlinear Function Threshold Ramp Secret Sharing.
Proceedings of the IEEE International Symposium on Information Theory, 2007

A New Scheme for Optimum Decoding of Additive Watermarks Embedded in Spatial Domain.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Correctable Errors of Weight Half the Minimum Distance Plus One for the First-Order Reed-Muller Codes.
Proceedings of the Applied Algebra, 2007

2006
Determination of the Local Weight Distribution of Binary Linear Block Codes.
IEEE Trans. Inf. Theory, 2006

On the Security of Tag-KEM for Signcryption.
Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks, 2006

A New Optimum Detection Scheme for Additive Watermarks Embedded in Spatial Domain.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

2005
Unlinkable Delivery System for Interactive Dramas.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Security against Inference Attacks on Negative Information in Object-Oriented Databases.
IEICE Trans. Inf. Syst., 2005

Coin-based Anonymous Fingerprinting Scheme with Automatic Identification of Redistributors.
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005

Relations between the local weight distributions of a linear block code, its extended code, and its even weight subcode.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

A Timed-Release Key Management Scheme for Backward Recovery.
Proceedings of the Information Security and Cryptology, 2005

Schema update operations preserving the expressive power in XML databases.
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005

2004
Soft-input soft-output decoding algorithm of linear block codes based on minimum distance search.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

2002
Asymptotic optimality of the GMD and chase decoding algorithms.
IEEE Trans. Inf. Theory, 2002

2001
Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem.
Proceedings of the Cryptography and Coding, 2001

1999
Constructions of Generalized Concatenated Codes and Their Trellis-Based Decoding Complexity.
IEEE Trans. Inf. Theory, 1999

Recursive maximum likelihood decoder for high-speed satellite communication.
Proceedings of the 1999 International Symposium on Circuits and Systems, ISCAS 1999, Orlando, Florida, USA, May 30, 1999

An Optimality Testing Algorithm for a Decoded Codeword of Binary Block Codes and Its Computational Complexity.
Proceedings of the Applied Algebra, 1999

1998
A Trellis-Based Recursive Maximum-Likelihood Decoding Algorithm for Binary Linear Block Codes.
IEEE Trans. Inf. Theory, 1998

1997
The weight distributions of extended binary primitive BCH codes of length 128.
IEEE Trans. Inf. Theory, 1997

On bit-error probability of a concatenated coding scheme.
IEEE Trans. Commun., 1997

Solving a Unification Problem under Constrained Substitutions Using Tree Automata.
J. Symb. Comput., 1997

The Split Weight (<i>w<sub>L</sub>, w<sub>R</sub></i>) Enumeration of Reed-Muller Codes for <i>w<sub>L</sub></i> + <i>w<sub>R</sub></i> < 2<i>d<sub>min</sub></i>.
Proceedings of the Applied Algebra, 1997

1996
The weight distribution of the third-order Reed-Muller code of length 512.
IEEE Trans. Inf. Theory, 1996

1995
On the Maximum Value of Aliasing Probabilities for Single Input Signature Registers.
IEEE Trans. Computers, 1995

1994
Suboptimum decoding of decomposable block codes.
IEEE Trans. Inf. Theory, 1994

An upper bound on the effective error coefficient of two-stage decoding, and good two-level decompositions of some Reed-Muller codes.
IEEE Trans. Commun., 1994

1993
On complexity of trellis structure of linear block codes.
IEEE Trans. Inf. Theory, 1993

On the optimum bit orders with respect to the state complexity of trellis diagrams for binary linear codes.
IEEE Trans. Inf. Theory, 1993

1992
A defect-tolerant design for mask ROMs.
Proceedings of the 10th IEEE VLSI Test Symposium (VTS'92), 1992

1991
On multilevel block modulation codes.
IEEE Trans. Inf. Theory, 1991

On linear structure and phase rotation invariant properties of block M-PSK modulation codes.
IEEE Trans. Inf. Theory, 1991

On the monotonic property of the probability of undetected error for a shortened code.
IEEE Trans. Inf. Theory, 1991

Performance analysis of disk allocation method using error-correcting codes.
IEEE Trans. Inf. Theory, 1991

1990
An error control system with multiple-stage forward error corrections.
IEEE Trans. Commun., 1990

A concatenated coded modulation scheme for error control.
IEEE Trans. Commun., 1990

1989
Error detecting capabilities of the shortened Hamming codes adopted for error detection in IEEE Standard 802.3.
IEEE Trans. Commun., 1989

1988
A cascaded coding scheme for error control and its performance analysis.
IEEE Trans. Inf. Theory, 1988

1987
Decision problem concerning security for cryptographic protocols.
Syst. Comput. Jpn., 1987

1986
An approximation to the weight distribution of binary primitive BCH codes with designed distances 9 and 11.
IEEE Trans. Inf. Theory, 1986

A Concatenated Coding Scheme for Error Control.
IEEE Trans. Commun., 1986

1985
An approximation to the weight distribution of binary linear codes.
IEEE Trans. Inf. Theory, 1985

On the Undetected Error Probability for Shortened Hamming Codes.
IEEE Trans. Commun., 1985


  Loading...