論文- 青木 孝文 -
表示方法: 表示形式: 表示順:
件数:428件
[2016]
1.Age estimation using effective brain local features from T1-weighted images.[Proceedings of 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society,(2016),5941-5944]Ryuichi Fujimoto, Chihiro Kondo, Koichi Ito, Kai Wu, Kazunori Sato, Yasuyuki Taki, Hiroshi Fukuda, Takafumi Aoki
2.A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths - Toward Efficient CBC-Mode Implementation.[Proceedings of Conference on Cryptographic Hardware and Embedded Systems,9813,(2016),538-558]Rei Ueno, Sumio Morioka, Naofumi Homma, and Takafumi Aoki
3.3D reconstruction of human body using structure from motion for 3D medical imaging.[Proceedings of 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society,(2016)]Shuya Ito, Koichi Ito, Takafumi Aoki, Jun Ohmiya and Satoshi Kondo
4.Formal Design of Pipelined GF Arithmetic Circuits and Its Application to Cryptographic Processors.[Proceedings of IEEE International Symposium on Multiple-Valued Logic,(2016),217-222]Rei Ueno, Yukihiro Sugawara, Naofumi Homma, and Takafumi Aoki
5.Side channel Security Evaluation for KCipher‐2 Software on Smart Cards.[Proceedings of 25th International Workshop on Post-Binary ULSI Systems,(2016)]Wataru Kawai, Rei Ueno, Naofumi Homma, Takafumi Aoki, Kazuhide Fukushima, and Shinsaku Kiyomoto
6.Enhancement of Reactive Countermeasure against Side‐Channel Attacks with Microprobing.[Proceedings of 25th International Workshop on Post-Binary ULSI Systems,(2016)]Daisuke Ishihata, Naofumi Homma, Yu‐ichi Hayashi, Noriyuki Miura,Daisuke Fujimoto, Makoto Nagata, and Takafumi Aoki
7.Power Analysis on Unrolled PRINCE Processor and its Countermeasure.[Proceedings of 25th International Workshop on Post-Binary ULSI Systems,(2016)]Ville Yli‐Mayry, Naofumi Homma, and Takafumi Aoki
8.A Formal Verification Method of Error Correction Code Processors Over Galois-Field Arithmetic.[Journal of Multiple-Valued Logic and Soft Computing,26(1-2),(2016),55-73]Rei Ueno, Naofumi Homma, and Takafumi Aoki
[2015]
9.A high-accuracy ultrasound contrast agent detection method for diagnostic ultrasound imaging systems.[Ultrasound in Medicine & Biology,41(12),(2015),3120-3130]Koichi Ito, Kazumasa Noro, Yukari Yanagisawa, Maya Sakamoto, Shiro Mori, Kiyoto Shiga, Tetsuya Kodama and Takafumi Aoki
10.回折格子レーザによる能動型3次元計測を用いた幾何補正手法と掌紋認証への応用.[映像情報メディア学会誌,69(9),(2015),J261-J270]佐藤拓杜, 青山章一郎, 酒井修二, 遊佐秀作, 伊藤康一, 青木孝文
11.An adherent raindrop detection method using MSER.[Proceedings of APSIPA Annual Summit and Conference,(2015),105-109]Koichi Ito, Kazumasa Noro and Takafumi Aoki
12.An extension of PatchMatch stereo for 3D reconstruction from multi-view images.[Proceedings of Asian Conference on Pattern Recognition,(PS1-02),(2015)]Mutsuki Hiradate, Koichi Ito, Takafumi Aoki, Takafumi Watanabe and Hiroki Unten
13.A person authentication system using second minor finger knuckles for door handle.[Proceedings of Asian Conference on Pattern Recognition,(OS9-01),(2015)]Daichi Kusanagi, Shoichiro Aoyama, Koichi Ito and Takafumi Aoki
14.災害犠牲者の身元確認と ICT.[電子情報通信学会 基礎・境界ソサイエティ Fundamentals Review,9(2),(2015),119-130]青木孝文, 伊藤康一, 青山章一郎
15.Phase-based window matching with geometric correction for multi-view stereo.[IEICE Transactions on Information and Systems,E98-D(10),(2015),1818-1828]Shuji Sakai, Koichi Ito, Takafumi Aoki, Takafumi Watanabe and Hiroki Unten
16.A silicon-level countermeasure against fault sensitivity analysis and its evaluation.[IEEE Transactions on Very Large Scale Integration Systems,23(8),(2015),1429-1438]Sho Endo, Yang Li, Naofumi Homma, Kazuo Sakiyama, Kazuo Ohta, Daisuke Fujimoto
17.周波数領域における暗号モジュールに対する電磁波解析の効率化.[電気学会論文誌A,135(9),(2015),515-521]林優一, 本間尚文, 水木敬明, 青木孝文, 曽根秀昭
18.Stereo radargrammetry using airborne SAR images without GCP.[Proceedings of IEEE International Conference on Image Processing,(COI-P2.5),(2015),1-5]Daiki Maruki, Shuji Sakai, Koichi Ito, Takafumi Aoki, Jyunpei Uemoto and Seiho Uratsuka
19.Score level fusion of multibiometrics using local phase array.[Lecture Notes in Computer Science (Pacific-Rim Conference on Multimedia),9315,(2015),215-224]Luis Rafael Marval Perez, Shoichiro Aoyama, Koichi Ito and Takafumi Aoki
20.Buffer overflow attack with multiple fault injection and a proven countermeasure.[Proceedings of PROOFS (Security Proofs for Embedded Systems) Workshop,(2015)]Shoei Nashimoto, Naofumi Homma, Yu-Ichi Hayashi and Takafumi Aoki
Page: [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [next]
戻るこのページのトップへ
copyright(c)2005 Tohoku University