Toru Fujiwara
Orcid: 0000-0002-3371-5745
According to our database1,
Toru Fujiwara
authored at least 105 papers
between 1985 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
2022
SPGC: Integration of Secure Multiparty Computation and Differential Privacy for Gradient Computation on Collaborative Learning.
J. Inf. Process., 2022
2021
The Weight Distributions of the (256, <i>k</i>) Extended Binary Primitive BCH Codes with <i>k</i>≤71 and <i>k</i>≥187.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
SPGC: An Integrated Framework of Secure Computation and Differential Privacy for Collaborative Learning.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021
2020
The Absolute Consistency Problem for Relational Schema Mappings with Functional Dependencies.
IEICE Trans. Inf. Syst., 2020
Proceedings of the International Symposium on Information Theory and Its Applications, 2020
2019
Workforce Scheduling System to Manage Static Optimization and Dynamic Re-optimization for Field Service.
Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics, 2019
Extraction of RNA from an intact single plant cell with cell wall using focused electric field.
Proceedings of the International Symposium on Micro-NanoMechatronics and Human Science, 2019
2018
Detecting Flooding Attack and Accommodating Burst Traffic in Delay-Tolerant Networks.
IEEE Trans. Veh. Technol., 2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
2017
Towards Efficient and Secure Encrypted Databases: Extending Message-Locked Encryption in Three-Party Model.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017
2016
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
IEICE Trans. Inf. Syst., 2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
2015
The consistency and absolute consistency problems of XML schema mappings between restricted DTDs.
World Wide Web, 2015
Enumerating Joint Weight of a Binary Linear Code Using Parallel Architectures: multi-core CPUs and GPUs.
Int. J. Netw. Comput., 2015
IEICE Trans. Inf. Syst., 2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Secure Routing Protocols for Sensor Networks: Construction with Signature Schemes for Multiple Signers.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the Third International Symposium on Computing and Networking, 2015
2014
A U-system approach for predicting metabolic behaviors and responses based on an alleged metabolic reaction network.
BMC Syst. Biol., 2014
A Parallel Algorithm for Enumerating Joint Weight of a Binary Linear Code in Network Coding.
Proceedings of the Second International Symposium on Computing and Networking, 2014
The Absolute Consistency Problem of XML Schema Mappings with Data Values between Restricted DTDs.
Proceedings of the Database and Expert Systems Applications, 2014
Proceedings of the 1st international workshop on Information hiding and its criteria for evaluation, 2014
2013
XPath Satisfiability with Parent Axes or Qualifiers Is Tractable under Many of Real-World DTDs.
Proceedings of the 14th International Symposium on Database Programming Languages (DBPL 2013), 2013
2012
A Recursive Method for Vector Generation in Non-increasing Order of Its Likelihood for All Binary Vectors and Its Application for Linear Block Code Decodings.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Decidability of the Security against Inference Attacks Using a Functional Dependency on XML Databases.
IEICE Trans. Inf. Syst., 2012
XPath satisfiability with downward and sibling axes is tractable under most of real-world DTDs.
Proceedings of the Twelfth International Workshop on Web Information and Data Management, 2012
Proceedings of the Advances in Information and Computer Security, 2012
Proceedings of the International Symposium on Information Theory and its Applications, 2012
New hybrid additive-multiplicative watermarking with better tradeoff between image quality and detection accuracy.
Proceedings of the International Symposium on Information Theory and its Applications, 2012
Proceedings of the Information Theoretic Security - 6th International Conference, 2012
2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Proceedings of the Database Programming Languages, 2011
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
Proceedings of the Database and XML Technologies, 2010
A Metric of Search Efficiency and Preventability of Polluted Contents for Unstructured Overlay.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010
Proceedings of the International Symposium on Information Theory and its Applications, 2010
A New method to reduce the probability of detection errors for a digital watermark using complementary decoding algorithms and minimum weight codewords of linear code.
Proceedings of the International Symposium on Information Theory and its Applications, 2010
2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Trans. Inf. Syst., 2009
Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the Database Programming Languages, 2009
2008
J. Intell. Inf. Syst., 2008
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the Information Security and Cryptology, 2008
PRIUS: An Educational Framework on PRAGMA Fostering Globally-Leading Researchers in Integrated Sciences.
Proceedings of the Fourth International Conference on e-Science, 2008
2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
A New Scheme to Realize the Optimum Watermark Detection for the Additive Embedding Scheme with the Spatial Domain.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
Proceedings of the IEEE International Symposium on Information Theory, 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Correctable Errors of Weight Half the Minimum Distance Plus One for the First-Order Reed-Muller Codes.
Proceedings of the Applied Algebra, 2007
2006
IEEE Trans. Inf. Theory, 2006
Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks, 2006
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Security against Inference Attacks on Negative Information in Object-Oriented Databases.
IEICE Trans. Inf. Syst., 2005
Coin-based Anonymous Fingerprinting Scheme with Automatic Identification of Redistributors.
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005
Relations between the local weight distributions of a linear block code, its extended code, and its even weight subcode.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
Proceedings of the Information Security and Cryptology, 2005
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005
2004
Soft-input soft-output decoding algorithm of linear block codes based on minimum distance search.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases.
Proceedings of the Information and Communications Security, 6th International Conference, 2004
2002
IEEE Trans. Inf. Theory, 2002
2001
Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem.
Proceedings of the Cryptography and Coding, 2001
1999
Constructions of Generalized Concatenated Codes and Their Trellis-Based Decoding Complexity.
IEEE Trans. Inf. Theory, 1999
Proceedings of the 1999 International Symposium on Circuits and Systems, ISCAS 1999, Orlando, Florida, USA, May 30, 1999
An Optimality Testing Algorithm for a Decoded Codeword of Binary Block Codes and Its Computational Complexity.
Proceedings of the Applied Algebra, 1999
1998
A Trellis-Based Recursive Maximum-Likelihood Decoding Algorithm for Binary Linear Block Codes.
IEEE Trans. Inf. Theory, 1998
1997
IEEE Trans. Inf. Theory, 1997
J. Symb. Comput., 1997
The Split Weight (<i>w<sub>L</sub>, w<sub>R</sub></i>) Enumeration of Reed-Muller Codes for <i>w<sub>L</sub></i> + <i>w<sub>R</sub></i> < 2<i>d<sub>min</sub></i>.
Proceedings of the Applied Algebra, 1997
1996
IEEE Trans. Inf. Theory, 1996
1995
IEEE Trans. Computers, 1995
1994
An upper bound on the effective error coefficient of two-stage decoding, and good two-level decompositions of some Reed-Muller codes.
IEEE Trans. Commun., 1994
1993
IEEE Trans. Inf. Theory, 1993
On the optimum bit orders with respect to the state complexity of trellis diagrams for binary linear codes.
IEEE Trans. Inf. Theory, 1993
1992
Proceedings of the 10th IEEE VLSI Test Symposium (VTS'92), 1992
1991
On linear structure and phase rotation invariant properties of block M-PSK modulation codes.
IEEE Trans. Inf. Theory, 1991
On the monotonic property of the probability of undetected error for a shortened code.
IEEE Trans. Inf. Theory, 1991
IEEE Trans. Inf. Theory, 1991
1990
IEEE Trans. Commun., 1990
1989
Error detecting capabilities of the shortened Hamming codes adopted for error detection in IEEE Standard 802.3.
IEEE Trans. Commun., 1989
1988
IEEE Trans. Inf. Theory, 1988
1987
Syst. Comput. Jpn., 1987
1986
An approximation to the weight distribution of binary primitive BCH codes with designed distances 9 and 11.
IEEE Trans. Inf. Theory, 1986
1985
IEEE Trans. Inf. Theory, 1985
IEEE Trans. Commun., 1985