


default search action
Masatsugu Ichino
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Takumi Nakamura, Shusuke Kawamura, Hiroshi Yoshiura, Masatsugu Ichino:
Personal Authentication for Periocular Region in Thermal and Visible Light Images by Using CNN. J. Inf. Process. 32: 396-406 (2024) - [c30]Takeya Horiuchi, Ryunosuke Shimmura, Hiroshi Yoshiura, Yoichi Midorikawa, Hideki Yoshii, Masatsugu Ichino:
Machine-Learning-Based Re-identification of Location Histories Using Features Considering Sparsity Obtained from Social Networking Services. GCCE 2024: 176-177 - 2023
- [c29]Shusuke Kawamura, Hiroshi Yoshiura, Masatsugu Ichino:
Cross-Spectral Periocular Recognition by Translating Thermal Images into Visible Light Images. GCCE 2023: 654-655 - 2022
- [c28]Takeya Horiuchi, Hiroshi Yoshiura, Yoichi Midorikawa, Hideki Yoshii, Masatsugu Ichino:
Machine Learning based Re-identification of Location Histories using Contact Information Collected from Social Networking Services. QRS Companion 2022: 129-136 - [c27]Eina Hashimoto, Masatsugu Ichino, Hiroshi Yoshiura:
Breaking Anonymity of Social Media by Profiling from Multimodal Information. QRS Companion 2022: 137-144 - 2021
- [c26]Takumi Nakamura, Hiroshi Yoshiura, Masatsugu Ichino:
Periocular Recognition Based on Features from Thermal and Visible-Light Images. GCCE 2021: 980-981 - [c25]Kento Yoshikawa, Masatsugu Ichino, Hiroshi Yoshiura:
Modeling Malicious Behaviors and Fake News Dissemination on Social Networks. I3E 2021: 643-655 - [c24]Kento Yoshikawa, Takumi Awa, Risa Kusano, Masatsugu Ichino, Hiroshi Yoshiura:
Reliability-Disguised Attacks on Social Network to Accelerate Fake News Dissemination. QRS Companion 2021: 841-848 - 2020
- [c23]Kento Yoshikawa, Takumi Awa, Risa Kusano, Hiroyuki Sato, Masatsugu Ichino, Hiroshi Yoshiura:
A Fake News Dissemination Model Based on Updating Reliability and Doubt among Individuals. iCAST 2020: 1-8 - [c22]Takuto Ohka, Shun Matsumoto, Masatsugu Ichino, Hiroshi Yoshiura:
Time-aware multi-resolutional approach to re-identifying location histories by using social networks. QRS Companion 2020: 176-183
2010 – 2019
- 2019
- [c21]Daisuke Uenoyama, Hiroshi Yoshiura, Masatsugu Ichino:
Personal Authentication of Iris and Periocular Recognition using XGBoost. GCCE 2019: 186-187 - [c20]Eina Hashimoto, Masatsugu Ichino, Hiroshi Yoshiura:
A Re-Identification Strategy Using Machine Learning that Exploits Better Side Data. iCAST 2019: 1-8 - 2018
- [j5]Shintaro Oishi, Yoshihiro Shirakawa, Masatsugu Ichino, Hiroshi Yoshiura:
Personal Identification by Integrating a Number of Features from Iris and Periocular Region Using AdaBoost. J. Inf. Process. 26: 518-528 (2018) - 2016
- [j4]Masatsugu Ichino, Hiroaki Maeda, Hiroshi Yoshiura:
Score Level Fusion for Network Traffic Application Identification. IEICE Trans. Commun. 99-B(6): 1341-1352 (2016) - [c19]Eina Hashimoto, Masatsugu Ichino, Tetsuji Kuboyama, Isao Echizen, Hiroshi Yoshiura:
Breaking Anonymity of Social Network Accounts by Using Coordinated and Extensible Classifiers Based on Machine Learning. I3E 2016: 455-470 - [c18]Masatsugu Ichino:
Lip-Movement Based Speaker Recognition Focused on the Distributed Structure of Lip-Movement Data. IIAI-AAI 2016: 1132-1135 - 2015
- [j3]Masatsugu Ichino, Kenji Kawamoto, Toru Iwano, Mitsuhiro Hatada, Hiroshi Yoshiura:
Evaluating Header Information Features for Malware Infection Detection. J. Inf. Process. 23(5): 603-612 (2015) - [j2]Masatsugu Ichino, Yasushi Yamazaki, Hiroshi Yoshiura:
Speaker verification method for operation system of consumer electronic devices. IEEE Trans. Consumer Electron. 61(1): 96-102 (2015) - [c17]Yohei Ogawa, Eina Hashimoto, Masatsugu Ichino, Isao Echizen, Hiroshi Yoshiura:
De-anonymising Social Network Posts by Linking with Résumé. BIS (Workshops) 2015: 248-260 - [c16]Masatsugu Ichino, Hiroshi Yoshiura, Jiro Katto
:
Transportation means identification of content delivery system for consumer electronic devices. ICCE 2015: 118-119 - [c15]Shintaro Oishi, Masatsugu Ichino, Hiroshi Yoshiura:
Fusion of iris and periocular user authentication by AdaBoost for mobile devices. ICCE 2015: 428-429 - 2014
- [j1]Yusuke Otsuki, Masatsugu Ichino, Soichi Kimura, Mitsuhiro Hatada, Hiroshi Yoshiura:
Evaluating payload features for malware infection detection. J. Inf. Process. 22(2): 376-387 (2014) - [c14]Masatsugu Ichino:
Lip-movement based speaker recognition using fusion of canonical angles. ICARCV 2014: 958-963 - 2013
- [c13]Masatsugu Ichino, Hiroki Kasahara, Hideki Yoshii, Kazuhiro Tsurumaru, Naohisa Komatsu, Jiro Katto
:
A study on gait recognition using LPC cepstrum for mobile terminal. ICIS 2013: 11-16 - [c12]Tomoya Muraki, Shintaro Oishi, Masatsugu Ichino, Isao Echizen, Hiroshi Yoshiura:
Anonymizing Face Images by Using Similarity-Based Metric. ARES 2013: 517-524 - [c11]Yukari Koga, Yasushi Yamazaki, Masatsugu Ichino:
A study on the surveillance system using soft biometric information. GCCE 2013: 262-266 - [c10]Masatsugu Ichino, Yusuke Otsuki, Mitsuhiro Hatada, Hiroshi Yoshiura:
Detection of malware infection using score level fusion with Kernel Fisher Discriminant Analysis. GCCE 2013: 536-537 - [c9]Tomotaka Okuno, Akira Utsumi, Masatsugu Ichino, Hiroshi Yoshiura, Isao Echizen:
Ineluctable background checking on social networks: Linking job seeker's résumé and posts. PerCom Workshops 2013: 273-278 - 2012
- [c8]Masatsugu Ichino, Yasushi Yamazaki, Jian-Gang Wang, Wei-Yun Yau:
Text independent speaker gender recognition using lip movement. ICARCV 2012: 176-181 - 2011
- [c7]Masatsugu Ichino, Hiroaki Maeda, Kentaro Hoshi, Naohisa Komatsu, Kei Takeshita, Masayuki Tsujino, Haruhisa Hasegawa, Hideaki Yoshino:
Internet Traffic Classification Using LPC Cepstrum. ICC 2011: 1-6 - [c6]Tomotaka Okuno, Masatsugu Ichino, Tetsuji Kuboyama
, Hiroshi Yoshiura:
Content-Based De-anonymisation of Tweets. IIH-MSP 2011: 53-56 - 2010
- [c5]Masatsugu Ichino, Hiroaki Maeda, Takeshi Yamashita, Kentaro Hoshi, Naohisa Komatsu, Kei Takeshita, Masayuki Tsujino, Motoi Iwashita, Hideaki Yoshino:
Internet Traffic Classification Using Score Level Fusion of Multiple Classifier. ACIS-ICIS 2010: 105-110 - [c4]Masatsugu Ichino, Naohisa Komatsu, Jian-Gang Wang, Wei Yun You:
Speaker gender recognition using score level fusion by AdaBoost. ICARCV 2010: 648-653
2000 – 2009
- 2008
- [c3]Masatsugu Ichino, Hitoshi Sakano, Naohisa Komatsu:
Text-indicated speaker recognition using kernel mutual subspace method. ICARCV 2008: 957-961 - 2006
- [c2]Masatsugu Ichino, Hitoshi Sakano, Naohisa Komatsu:
Multimodal Biometrics of Lip Movements and Voice using Kernel Fisher Discriminant Analysis. ICARCV 2006: 1-6 - 2004
- [c1]Masatsugu Ichino, Hitoshi Sakano, Naohisa Komatsu:
Speaker recognition using kernel mutual subspace method. ICARCV 2004: 397-402
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-16 21:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint