default search action
Masayuki Hashimoto
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j8]Tomoaki Mimoto, Hiroyuki Yokoyama, Toru Nakamura, Takamasa Isohara, Masayuki Hashimoto, Ryosuke Kojima, Aki Hasegawa, Yasushi Okuno:
Privacy-Preserving Correlation Coefficient. IEICE Trans. Inf. Syst. 106(5): 868-876 (2023) - 2022
- [j7]Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai:
A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity. Cryptogr. 6(1): 3 (2022) - [j6]Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai:
Certificate Management Scheme for VANETs Using Blockchain Structure. Cryptogr. 6(2): 20 (2022) - [c29]Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai:
Decentralized and Collaborative Tracing for Group Signatures. AsiaCCS 2022: 1258-1260 - [c28]Tomoaki Mimoto, Masayuki Hashimoto, Hiroyuki Yokoyama, Toru Nakamura, Takamasa Isohara, Ryosuke Kojima, Aki Hasegawa, Yasushi Okuno:
Differential Privacy under Incalculable Sensitivity. CSP 2022: 27-31 - 2021
- [j5]Tomoaki Mimoto, Masayuki Hashimoto, Shinsaku Kiyomoto, Koji Kitamura, Atsuko Miyaji:
Privacy Risk of Document Data and a Countermeasure Framework. J. Inf. Process. 29: 778-786 (2021) - [j4]Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Kouichi Sakurai:
Almost fully anonymous attribute-based group signatures with verifier-local revocation and member registration from lattice assumptions. Theor. Comput. Sci. 891: 131-148 (2021) - [c27]Yuto Nakano, Toru Nakamura, Yasuaki Kobayashi, Takashi Ozu, Masahito Ishizaka, Masayuki Hashimoto, Hiroyuki Yokoyama, Yutaka Miyake, Shinsaku Kiyomoto:
Automatic Security Inspection Framework for Trustworthy Supply Chain. SERA 2021: 45-50 - 2020
- [j3]Shohei Kakei, Yoshiaki Shiraishi, Masami Mohri, Toru Nakamura, Masayuki Hashimoto, Shoichi Saito:
Cross-Certification Towards Distributed Authentication Infrastructure: A Case of Hyperledger Fabric. IEEE Access 8: 135742-135757 (2020) - [c26]Yuto Nakano, Toru Nakamura, Yasuaki Kobayashi, Masahito Ishizaka, Masayuki Hashimoto, Hiroyuki Yokoyama, Yutaka Miyake, Shinsaku Kiyomoto:
Consideration on Data Conformance Toward Building Trust in Supply Chain. EuCNC 2020: 128-132
2010 – 2019
- 2019
- [c25]Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama:
Traceable and Fully Anonymous Attribute Based Group Signature Scheme with Verifier Local Revocation from Lattices. NSS 2019: 675-684 - [c24]Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama:
Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with VLR. WISA 2019: 126-140 - 2018
- [j2]Panikos Heracleous, Jani Even, Fumiaki Sugaya, Masayuki Hashimoto, Akio Yoneyama:
Exploiting alternative acoustic sensors for improved noise robustness in speech communication. Pattern Recognit. Lett. 112: 191-197 (2018) - 2017
- [c23]Panikos Heracleous, Keiji Yasuda, Fumiaki Sugaya, Akio Yoneyama, Masayuki Hashimoto:
Speech emotion recognition in noisy and reverberant environments. ACII 2017: 262-266 - [c22]Panikos Heracleous, Akio Ishikawa, Keiji Yasuda, Hiroyuki Kawashima, Fumiaki Sugaya, Masayuki Hashimoto:
Machine Learning Approaches for Speech Emotion Recognition: Classic and Novel Advances. CICLing (2) 2017: 180-191 - [c21]Keiji Yasuda, Panikos Heracleous, Akio Ishikawa, Masayuki Hashimoto, Kazunori Matsumoto, Fumiaki Sugaya:
Building a Location Dependent Dictionary for Speech Translation Systems. CICLing (2) 2017: 482-491 - [c20]Keiji Yasuda, Izuru Nogaito, Hiroyuki Kawashima, Hiroaki Kimura, Masayuki Hashimoto:
Automatic Scoring Method for Descriptive Test Using Recurrent Neural Network. EDM 2017 - 2016
- [c19]Masatoshi Nagata, Kazunori Matsumoto, Masayuki Hashimoto:
Prediction for Disease Risk and Medical Cost using Time Series Healthcare Data. HEALTHINF 2016: 517-522 - 2015
- [c18]Masayuki Hashimoto, Umi Nakamura, Miki Akiyama, Toru Takebayashi, Marino Oshima, Tomoki Kumegawa, Hitomi Imachi, Koji Murao:
Meal-Camera System to Support Nutritional Tele-Consultation for Diabetics. AMIA 2015 - [c17]Akiko Shibuya, Keisuke Ogawa, Kazunori Matsumoto, Masayuki Hashimoto, Yukihiro Maeda, Yoshiaki Kondo:
Implementation of a Mobile Electronic Medical Record System that Uses a Problem-oriented Contiguous Timeline View. AMIA 2015 - [c16]Keisuke Ogawa, Kazunori Matsumoto, Masayuki Hashimoto, Ryoichi Nagatomi:
Method of Screening the Health of Persons with High Risk for Potential Lifestyle-related Diseases using LDA - Toward a Better Screening Method for Persons with High Health Risks. HEALTHINF 2015: 502-507 - [c15]Do Van Nguyen, Keisuke Ogawa, Kazunori Matsumoto, Masayuki Hashimoto:
Editing Training Sets from Imbalanced Data Using Fuzzy-Rough Sets. AIAI 2015: 115-129 - 2014
- [c14]Keisuke Ogawa, Kazunori Matsumoto, Masayuki Hashimoto, Akiko Shibuya, Yoshiaki Kondo:
Clarifying requirements chronological visualization of medical data by investigating medical journal articles. AMIA 2014 - 2012
- [c13]Keisuke Ogawa, Kazunori Matsumoto, Masayuki Hashimoto, Tatsuaki Hamai, Akiko Shibuya, Yoshiaki Kondo:
Mobile TimeLine - Mobile Charting System that Provides a Graphical Summary of a Patient's Medical Record. HEALTHINF 2012: 23-29 - 2011
- [c12]Keisuke Ogawa, Kazunori Matsumoto, Masayuki Hashimoto, Tatsuaki Hamai, Yoshiaki Kondo:
Mobile Timeline EMR System - Support System for Doctors' Cognition/Analysis. HEALTHINF 2011: 405-410 - 2010
- [c11]Yusuke Uchida, Masayuki Hashimoto, Ryoichi Kawada:
Fast and robust content-based copy detection based on quadrant of luminance centroid and adaptive feature comparison. ICIP 2010: 1021-1024
2000 – 2009
- 2007
- [c10]Kenji Matsuo, Fuminori Okumura, Masayuki Hashimoto, Shigeyuki Sakazawa, Yoshinori Hatori:
Arm Swing Identification Method with Template Update for Long Term Stability. ICB 2007: 211-221 - 2005
- [j1]Masayuki Hashimoto, Kenji Matsuo, Atsushi Koike:
JPEG 2000 Encoding Method for Reducing Tiling Artifacts. IEICE Trans. Inf. Syst. 88-D(12): 2839-2848 (2005) - [c9]Masayuki Hashimoto, Yoriyuki Minami, Kenji Matsuo, Atsushi Koike:
Hierarchical secret image sharing method using JPEG 2000 codestream syntax. EUSIPCO 2005: 1-4 - 2004
- [c8]Kenji Matsuo, Masayuki Hashimoto, Atsushi Koike:
A face image recognition scheme with strong tolerances to lighting fluctuations. ICIP 2004: 1987-1990 - [c7]Masayuki Hashimoto, Kenji Matsuo, Atsushi Koike, Hiroki Hayashi, Tetsuo Shimono:
CT image compression with level of interest. ICIP 2004: 3185-3188 - [c6]Kenji Matsuo, Masayuki Hashimoto, Atsushi Koike:
A Dictionary Registration Method for Reducing Lighting Fluctuations in Subspace Face Recognition. PCM (2) 2004: 593-600 - 2003
- [c5]Masayuki Hashimoto, Kenji Matsuo, Atsushi Koike:
JPEG2000 encoder for reducing tiling artifacts and accelerating the coding process. ICIP (1) 2003: 645-648 - 2002
- [c4]Masayuki Hashimoto, Kenji Matsuo, Atsushi Koike, Yasuyuki Nakajima:
Tile boundary artifact reduction algorithms for tile size conversion of wavelet image. ACM Multimedia 2002: 97-105
1990 – 1999
- 1998
- [c3]Kotaro Hirasawa, Masanao Ohbayashi, Masayuki Hashimoto, Jinglu Hu, Junichi Murata:
A new nonlinear system control method using second order derivatives of universal learning network. SMC 1998: 3775-3780 - 1997
- [c2]Masanao Ohbayashi, Masayuki Hashimoto, Kotaro Hirasawa, Hiroto Takata, Mitsuo Ikeuchi:
An escape method from local minimum by orbital correction method for controller learning. ICNN 1997: 749-754 - [c1]Masayuki Hashimoto, Seiichi Sampei, Norihiko Morinaga:
Forward and reverse link capacity enhancement of DS/CDMA cellular system using channel activation and soft power control techniques. PIMRC 1997: 246-250
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint