東北大学
データ駆動科学・AI教育研究センター 教授
栗林 稔 博士(工学)
TEL: 022-795-3376

English

学術論文リスト

  1. A. Malanowska, W. Mazurczyk, T. K. Araghi, D. Megías, M. Kuribayashi, “Digital watermarking – A meta-survey and techniques for fake news detection,” IEEE Access, vol.12, pp.36311-36345, 2024. (download)
  2. J. N. Chaudhari, H. Galiyawala, M. Kuribayashi, P. Sharma, M. S. Raval, “Designing practical end-to-end system for soft biometric-based person retrieval from surveillance videos,” IEEE Access, vol.11, pp.133640-133657, 2023. (download)
  3. A. H. Zim, A. Iqbal, L. Hossani, S. Arif, A. Malik, I Rasool, M. Kuribayashi, F. Ahmad, “Smart manufacturing with transfer learning under limited data: Towards Data-Driven Intelligences,” Materials Today Communications, vol.37, pages 107357, 2023. (download)
  4. M. Kuribayashi, T. Yasui, A. Malik, “White box watermarking for convolution layers in fine-tuning model using the constant weight code,” Journal of Imaging, vol.9, no.6, 117, 2023. (download)
  5. Y. Y. F. Panduman, N. Funabiki, S. Ito, R. Husna, M. Kuribayashi, M. Okayasu, J. Shimazu, S. Sukaridhoto, “An edge device framework in SEMAR IoT application server platform,” Information, vol.14, no.6, 312, 2023. (download)
  6. Y.-Z. Huo, P. Puspitaningayu, N. Funabiki, K.i Hamazaki, M. Kuribayashi Y. Zhao, K. Kojima, “Three diverse applications of general-purpose parameter optimization algorithm,” Algorithms, vol.16, no.1, 45, 2023. (download)
  7. T. V. Bui, I. Echizen, M. Kuribayashi, T. Kojima, T. D. Nguyen, “Group testing with blocks of positives and inhibitors,” Entropy, vol.24, no.11, 12pages, 2022. (download)
  8. K. I. Munene, N. Funabiki, M. M. Rahman, H. Briantoro, S. C. Roy, M. Kuribayashi, “A throughput drop estimation model and its application to joint optimization of transmission power, frequency channel, and channel bonding in IEEE 802.11n WLAN for large-scale IoT environments,” Internet of Things, vol. 20, 2022. (download)
  9. M. M. Rahman, N. Funabiki, K. I. Munene, S. C. Roy, M. Kuribayashi, M. M. Gulo, W.-C. Kao, “A Throughput Request Satisfaction Method for Concurrently Communicating Multiple Hosts in Wireless Local Area Network,” Sensor, vol.22, no.22, 21pages, 2022. (download)
  10. Y. Y. F. Panduman, N. Funabiki, P. Puspitaningayu, M. Kuribayashi, S. Sukaridhoto, W.-C. Kao, “Design and implementation of SEMAR IoT server platform with applications,” Sensors, vol.22, no.17, 28pages, 2022. (download)
  11. P. Puspitaningayu, N. Funabiki, Y.-Z. Huo, K. Hamazaki, M. Kuribayashi, W.-C. Kao, “A Fingerprint-Based Indoor Localization System Using IEEE 802.15.4 for Staying Room Detection,” International Journal of Mobile Computing and Multimedia Communications, vol.13, no.1, pp.1-21, 2022. (download)
  12. M. M. Rahman, N. Funabiki, K. I. Munene, S. C. Roy, M. Kuribayashi, W.-C. Kao, “A Throughput Fairness Control Method for Concurrent Communications in Wireless Local-Area Network with Multiple Access-Points,” Journal of Communications, vol.17, no.8, pp.592-599, 2022. (download)
  13. T. Yasui, T. Tanaka, A. Malik, M. Kuribayashi, “Coded DNN watermark: robustness against pruning models using constant weight code,” Journal of Imaging, vol.8, no.6, 16pages, 2022. (download)
  14. D. Megias, M. Kuribayashi, A. Rosales, K. Cabaj, W. Mazurczyk, “Architecture of a fake news detection system combining digital watermarking, signal processing, and machine learning”, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), vol.13, no.1, pp.33-55, 2022. (download)
  15. A. Malik, M. Kuribayashi, S. M. Abdullahi, A. N. Khan, “DeepFake Detection for Human Face Images and Videos: A Survey,” IEEE Access, vol.10, pp.18757-18775, 2022. (download)
  16. Y.-Z. Huo, P. Puspitaningayu, N. Funabiki, K. Hamazaki, M. Kuribayashi, K. Kojima, “A Proposal of the Fingerprint Optimization Method for the Fingerprint-Based Indoor Localization System with IEEE 802.15.4 Devices,” Information, vol.13, no.5-211, 2022.
  17. H. H. Nguyen, M. Kuribayashi, J. Yamagishi, I. Echizen, “Effects of Image Processing Operations on Adversarial Noise and Their Use in Detecting and Correcting Adversarial Images,” IEICE Trans. Inf. Syst., vol.E105-D, no.1, pp.65-77, 2022. (download) 2022年度電子情報通信学会論文賞
  18. M. Kuribayashi and K.S. Wong, “StealthPDF: Data hiding method for PDF file with no visual degradation,” Journal of Information Security and Applications, vol.61, no.102875, 10pages, 2021. (download)
  19. H. Briantoro, N. Funabiki, M. M. Rahman, K. I. Munene, M. Kuribayashi, W.-C. Kao, “Joint optimization method of channel assignment and transmission power for concurrently communicating multiple access-points in wireless local-area network,” Int. J. Network Computing, vol.11, no.2, pp.251-266, 2021. (download)
  20. K. I. Munene, N. Funabiki, H. Briantoro, M. M. Rahman, F. Akhter, M. Kuribayashi, and W.-C. Kao, “A throughput drop estimation model for concurrent communications under partially overlapping channels without channel bonding and its application to channel assignment in IEEE 802.11n WLAN,” IEICE Trans. Inf. Syst. vol.104-D, no.5, pp.585-596, 2021.(download)
  21. Y. W. Syaifudin, N. Funabiki, M. Kuribayashi, and W.-C. Kao, “A proposal of advanced widgets learning topic for interactive application in Android programming learning assistance system,” SN Computer Science, vol.2, no.172, 2021. (download)
  22. R. W. Sudibyo, N. Funabiki, M. Kuribayashi, K. I. Munene, H. Briantoro, M. Manowarul Islam, and W.-C. Kao, “A generalized TCP fairness control method for multiple-Host concurrent communications in elastic WLAN system using Raspberry Pi access point,” Int. J. Mobile Computing and Multimedia Communications, vol.11, no.2, pp.18-40, 2020. (download)
  23. H. Briantoro, N. Funabiki, M. Kuribayashi, K. I. Munene, R. W. Sudibyo, M. M. Islam, and W.-C. Kao, “Transmission power optimization of concurrently communicating two access points in wireless local area network,” Int. J. Mobile Computing and Multimedia Communications, vol.11, no.4, pp.1-25, 2020 (download)
  24. Y. W. Syaifudin, N. Funabiki, M. Kuribayashi, and W.-C. Kao, “A proposal of Android programming learning assistant system with implementation of basic application learning,” Int. J. Web Information Systems, vol.16, no.1, pp.115-135, 2020. (download)
  25. D. Megias, M. Kuribayashi, and A. Qureshi, “Survey on decentralized fingerprinting solutions: copyright protection through piracy tracing,” MDPI Computers, vol.9, no.2, 2020. (download)
  26. S. Huda, N. Funabiki, M. Kuribayashi, and W.-C. Kao, “A proposal of calligraphy learning assistant system with letter portion practice function using projection mapping,” Int. J. Web Information System, vol.16, no.2, pp.137-149, 2020. (download)
  27. T. Yasui, M. Kuribayashi, N. Funabiki, and I. Echizen, “Near-optimal detector for binary Tardos code by estimating collusion strategy” IEEE Trans. Information Forensics and Security, vol.15, pp.2069-2080, 2020. (download)
  28. M. Saha, R. W. Sudibyo, N. Funabiki, M. Kuribayashi, S. K. Debnath, and W.-C. Kao, “Throughput measurement and estimation model for concurrent communications of multiple Raspberry Pi access-points in wireless local-area network,”. J. Communications, vol.14, no.11, pp.1009-1016, 2019. (download)
  29. T. V. Bui, M. Kuribayashi, M. Cheraghchi, and I. Echizen, “Efficiently decodable non-adaptive threshold group testing” IEEE Trans. Information Theory, vol.65, no.9, pp.5519-5528, 2019. (download)
  30. E. E. Mon, N. Funabiki, M. Kuribayashi, and W.-C. Kao, “An informative test code approach in code writing problem for Java collections framework in Java programming learning assistant system,” J. Software, vol.14, no.5, pp.200-208, 2019. (download)
  31. Y. Kodera, M. Kuribayashi, T. Kusaka, and Y. Nogami, “Advanced searchable encryption: an adaptively secure keyword search for matrix-type storages,” Int. Journal of Networking and Computing, vol.9, no.2, pp.171-187, 2019. (download)
  32. T. V. Bui, M. Kuribayashi, T. Kojima, R. Haghvirdinezhad, and I. Echizen, “Efficient (nonrandom) construction and decoding for non-adaptive group testing,” JIP, vol.27, pp.245-256, 2019. (download)
  33. K. S. Lwin, N. Funabiki, S. K. Debnath, K. I. Munene, R. W. Sudibyo, M. Kuribayashi, and W.-C. Kao, “Enhancements of minimax access-point setup optimisation approach for IEEE 802.11 WLAN,” Int. J. Space-Based and Situated Computing, vol.9, no.1, pp.47-59, 2019.(download)
  34. M. Kuribayashi and N. Funabiki, “Decentralized tracing protocol for fingerprinting system,” APSIPA Trans. Signal and Information Processing, vol.8, 8 pages, 2019. (download)
  35. M. Kuribayashi, T. Fukushima, and N. Funabiki, “Robust and secure data hiding for PDF text document,” IEICE Trans. Information and Systems, vol.E102-D, no.1, pp.41-47, 2019 (download).
  36. I. M. Kwenga, N. Funabiki, M. Kuribayashi and R. W. Sudibyo, “A throughput estimation model under two-link concurrent communications with partially overlapping channels and its application to channel assignment in IEEE 802.11n WLAN,” Int. J. Space-Based and Situated Computing, vol.8, no.3, pp.123-137, 2018.
  37. M. Kuribayashi, “Bias-based binary fingerprinting code under erasure channel,” IEEE Signal Processing Letters, vol.25, no.9, pp.1423-1427, 2018. (download)
  38. M. Kuribayashi and N. Funabiki, “Fingerprinting for multimedia content broadcasting system,” J. Information Security and Applications, vol.41, pp.52-61, 2018. (download)
  39. M. M. Islam, N. Funabiki, M. Kuribayashi, S. K. Debnath, K. I. Munene, K. S. Lwin, R. W. Sudibyo, and M. Selim A. Mamun, “Dynamic access-point configuration approach for elastic wireless local-area network system and its implementation using Raspberry Pi,” Int. J. Networking and Computing, vol.8, no.2, pp.254-281, 2018.
  40. M. Kuribayashi and N. Funabiki, “Universal scoring function based on bias equalizer for bias-based fingerprinting codes,” IEICE Trans. Fundamentals, vol.E101-A, no.1, pp.119-128, 2018. (download)
  41. V. B. Joshi, M. S. Raval, and M. Kuribayashi, “Reversible data hiding based compressible privacy preserving system for color image,” Springer Multimedia Tools and Applications, vol.77, no.13, pp.16597-16622, 2018. (download)
  42. N. Ishihara, N. Funabiki, M. Kuribayashi, and W.-C. Kao, “A software architecture for Java programming learning assistant system,” Int. J. Computer & Software Engineering, vol.2, no.1, 2017. (download)
  43. K. S. Lwin, N. Funabiki, C. Taniguchi, K. K. Zaw, M. S. A. Mamun, M. Kuribayashi, and W.-C. Kao, “A minimax approach for access point setup optimization in IEEE 802.11n wireless networks,” Int. J. Networking and Computing, vol.7, no.2, pp.187-207, 2017. (download)
  44. N. Funabiki, K. S. Lwin, Y. Aoyagi, M. Kuribayashi, and W.-C. Kao, “A user-PC computing system as ultralow-cost computation platform for small groups,” Application and Theory of Computer Technology, vol.2, no.3, pp.10-24, 2017. (download)
  45. H. G. Schaathun and M. Kuribayashi, “Obfuscation in digital fingerprinting,” Int. J. Information and Coding Theory, vol.4, no.2/3, pp.185-200, 2017. (download)
  46. M. Kuribayashi, S. Shigemoto, and N. Funabiki, “DCT-OFDM watermarking scheme based on communication system model,” IEICE Trans. Fundamentals, vol.E100-A, no.4, pp.944-952, 2017. (download)
  47. H. Tian, Z. Chen, C.-C. Chang, M. Kuribayashi, Y. Huang, Y. Cai, Y. Chen, and T. Wang, “Enabling public auditability for operation behaviors in cloud storage,” Soft Computing, vol.21, no.8, pp.2175-2187, 2017. (download)
  48. M. Kuribayashi and M. Morii, “Aesthetic QR code based on modified systematic encoding function,” IEICE Trans. Information and Systems, vol.E100-D, no.1, pp.42-51, 2017. (download)
  49. K. Iwamura, M. Kawamura, M. Kuribayashi, M. Iwata, H. Kang, S. Gohshi, and A. Nishimura, “Information hiding and its criteria for evaluation,” IEICE Trans. Information and Systems, vol.E100-D, no.1, pp.2-12, 2017. (download)
  50. M. S. A. Mamun, M. E. Islam, N. Funabiki, M. Kuribayashi, and I-W. Lai, “An active access-point configuration algorithm for elastic wireless local-area network system using heterogeneous devices,” IJNC, vol.6, no.2, pp.395-419, 2016. (download)
  51. M. Kuribayashi, “Simple countermeasure to non-linear collusion attacks targeted for spread-spectrum fingerprinting scheme,” IEICE Trans. Information and Systems, vol.E99-D, no.1, pp.50-59, 2016. (download)
  52. M. Kuribayashi, “Simplified MAP detector for binary fingerprinting code embedded by spread spectrum watermarking scheme,” IEEE Trans. Information Forensics and Security, vol.9, no.4, pp.610-623, 2014. (download)
  53. M. Kuribayashi, “Interference removal operation for spread spectrum fingerprinting scheme,” IEEE Trans. Information Forensics and Security, vol.7, no.2, pp.403-417, 2012. (download)
  54. M. Kuribayashi, “Hierarchical spread spectrum fingerprinting scheme based on the CDMA technique,” EURASIP Journal on Information Security, vol.2011, Article ID 502782, 16 pages, 2011. (download)
  55. M. Kuribayashi and H. Kato, “Impact of rounding error on spread spectrum fingerprinting scheme,” IEEE Trans. Information Forensics and Security, vol.5, no.4, pp.670-680, 2010. (download)
  56. M. Kuribayashi, “On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol,” EURASIP Journal on Information Security, vol. 2010, Article ID 694797, 11 pages, 2010. (download)
  57. M. Kuribayashi and M. Morii, “Systematic generation of Tardos’s fingerprinting codes,” IEICE Trans. Fundamentals, vol.E93-A, no.2, pp.508-515, 2010. (download)
  58. M. Kuribayashi, M. Morii, and H. Tanaka, “Reversible watermark with large capacity based on the prediction error expansion,” IEICE Trans. Fundamentals, vol.E91-A, no.7, pp.1780-1790, 2008. (download)
  59. 田中敏也,栗林稔,森井昌克, “一方向性関数を用いた任意の有効期間設定が可能な時限付き鍵管理技術,” 情報処理学会論文誌, vol.48, no.9, pp.3089-3098, 2007. (download)
  60. M. Kuribayashi and H. Tanaka, “How to generate cyclically permutable code from cyclic codes,” IEEE Trans. Inform. Theory, vol.52, no.10, pp.4660-4663, 2006. (download)
  61. U. Shinmyo, M. Kuribayashi, M. Morii and H. Tanaka, “Fingerprinting protocol based on distributed providers using oblivious transfer,” IEICE Trans. Fundamentals, vol.E89-A, no.10, pp.2597-2602, 2006. (download)
  62. M. Kuribayashi and H. Tanaka, “Fingerprinting protocol for on-line trade using information gap between buyer and merchant,” IEICE Trans. Fundamentals, vol.E89-A, no.4, pp.1108-1115, 2006. (download)
  63. M. Kuribayashi and H. Tanaka, “Fingerprinting protocol for images based on additive homomorphic property,” IEEE Trans. Image Processing, vol.14, no.12, pp.2129-2139, 2005. (download)
  64. 久永隆治,栗林稔, 田中初一, “幾何学的歪みの局所的な補正による電子透かし検出能力の改善,” 電子情報通信学会論文誌, vol.J88-A, no.10, pp.1146-1153, 2005. (download)

    R. Hisanaga, M. Kuribayashi, and H. Tanaka, “Improvement of watermark detection ability based on blockwise image compensation for geometrical distortions,” Wiley, Electronics and Communications in Japan, PartIII: Fundamental Electronic Science, vol.89, no.12, pp.1-9, 2006. (download)
  65. M. Kuribayashi and H. Tanaka, “Video watermarking of which embedded information depends on the distance between two signal positions,” IEICE Trans. Fundamentals, vol.E86-A, no.12, pp.3267-3275, 2003. (download)
  66. 栗林稔, 田中初一, “DCT係数間の加法特性に基づく電子透かし,” 電子情報通信学会論文誌, vol.J85-A, no.3, pp.322-333, 2002. (download)

    M. Kuribayashi and H. Tanaka, “Watermarking schemes using the addition property among DCT coefficients,” Wiley, Electronics and Communications in Japan, PartIII: Fundamental Electronic Science, vol.86, no.5, pp.11-23, 2003. (download)
  67. M. Kuribayashi and H. Tanaka, “A new digital watermarking scheme applying locally the wavelet transform,” IEICE Trans. Fundamentals, vol.E84-A, no.10, pp.2500-2507, 2001. (download)