- Abbreviation:

ISIT: IEEE International Symposium on Information Theory

ITW: IEEE International Workshop on Information Theory

ISITA: International Symposium on Information Theory and its Applications

DCC: Data Compression Conference

WCIT: Japan-Benelux Workshop on Coding and Information Theory

AEWn: n-th Asian-European Workshop on Information Theory

JW-ISC: Japan-Korea Joint Workshop on Information Security and Cryptology

JWIS: Joint Workshop on Information Security

ADMA: Advanced Data Mining and Applications

ICMLC: International Conference on Machine Learning and Cybernetics

WISA: International Workshop on Information Security Applications

HPSR: International Conference on High Performance Switching and Routing

- K.Hashimoto, K.Iwata and H.Yamamoto, "Enumeration and Coding of Compact Code Trees for Binary AIFV Codes", IEEE ISIT2019, pp.1527-1531, July7-12, 2019, Paris, France.
- R.Fujita, K.Iwata and H.Yamamoto, "An Iterative Algorithm to Optimize the Average Performance of Markov Chains with Finite States", IEEE ISIT2019, pp.1902-1906, July7-12, 2019, Paris, France.
- H.Yamamoto, K.Hashimoto, and K.Iwata, "A Universal Source Code Based on the AIVF Coding Strategy" AEW11, P.26, July 3-5, Rotterdam, Holland.
- T.Hiraoka and H.Yamamoto, "Dynamic AIFV Coding", ISITA2018, pp.577-581, Oct. 28-31, 2018, Singapore.
- K.Hashimoto, K.Iwata, and H.Yamamoto, "Enumeration of Compact Trees of AIFV codes", ISITA2018, p.496 (Poster Session), Oct. 28-31, 2018, Singapore.
- T.Hiraoka and H.Yamamoto, "Alphabetic AIFV codes Constructed from Hu-Tucker Codes", IEEE ISIT2018, pp.2182-2186, June 17-22, 2018, Vail, Colorado, USA.
- R.Fujita, K.Iwata and H.Yamamoto, " An Optimality Proof of the Iterative Algorithm for AIFV-m Codes", IEEE ISIT2018, pp.2187-2191, June 17-22, 2018, Vail, Colorado, USA.
- H.Yamamoto, " Easy Construction of Alphabetic AIFV codes", Japan-Singapore Workshop on Coding and Information Theory, Mach 4-7, 2018
- H.Yamamoto, "Almost Instantaneous Fixed-to-Vaariable Length Codes", `9th Takayanagi Kenjiro Memorial Symposium, Nov.21-22, 2017, Hamamatsu, Japan. (invited talk)
- K.Iwata, H.Yamamoto, "An Iterative Alrogrithm to Construct Optimal Binary AIFV-m Codes", IEEE-ITW2017, 1570369496, pp.1-5, Nov.6-10, 2017, Kaohsiung, Taiwan.
- H.Yamamoto, "AIFV codes and their extended codes," Workshop on Beyond I.I.D. in Information Theory, July 24-28, 2017, Singapore. (invited talk)
- K.Sumigawa and H.Yamamoto, "Coding of Binary AIFV Code Trees," IEEE ISIT2017, pp.1152-1156, June 25-30, 2017, Aachen, Germany.
- H.Yamamoto and S.Hara, "Application of Yamamoto-Itoh Coding Scheme to Discrete Memoryless Broadcast Channels," IEEE ISIT2017, pp.1878-1882, June 25-30, 2017, Aachen, Germany.
- M.V.Burnashev and H.Yamamoto, "On Optimal Error Exponents in Noiseless Channel Identification," IEEE ISIT2017, pp.2742-2745, June 25-30, 2017, Aachen, Germany.
- J.Honda and H.Yamamoto, "Variable-to-Fixed Length Homophonic Coding Suitable for Asymmetric Channel Coding," IEEE ISIT2017, pp.2860-2864, June 25-30, 2017, Aachen, Germany.
- H.Yamamoto, "AIFV Codes and Related Topics," AEW10, June 21-23, 2017, Boppard, Germany. (invited talk)
- J.Honda, H.Yamamoto, "Variable-to-Fixed Length Homophonic Coding with a Modified Shannon-Fano-Elias Code", ISITA2016, pp.11-15, Oct.30-Nov.2, 2016, Monterey, Calfornia, USA.
- W.Nakamura, H.Yamamoto, T.Chan, "A Ramp Threshold Secret Sharing Scheme against Cheating by Substitution Attacks", ISITA2016, pp.345-349, Oct.30-Nov.2, 2016, Monterey, Calfornia, USA.
- K.Iwata, H.Yamamoto, "A Dynamic Programming Algorithm to Construct Optimal Code Trees of AIFV Codes", ISITA2016, pp.672-676, Oct.30-Nov.2, 2016, Monterey, Calfornia, USA.
- W.Hu, H.Yamamoto, J.Honda, "Tight Upper Bounds on the Redundancy of Optimal Binary AIFV Codes", IEEE ISIT2016, pp.6-10, July 10-15, 2016, Barcelona, Spain.
- H.Yamamoto, Q.Liu, "Highly Sensitive Universal Statistical Test", IEEE ISIT2016, pp.700-704, July 10-15, 2016, Barcelona, Spain.
- M.V.Marat, H.Yamamoto, "On Optimal Transmission Strategies for Channels with Noiseless Feedback", IEEE ISIT2016, pp.1282-1286, July 10-15, 2016, Barcelona, Spain.
- R.Wang, J.Honda, H.Yamamoto, R.Liu, Y.Hou, "Construction of Polar Codes for Channels with Memory", IEEE ITW2015, pp.187-191, Oct. 11-15 , 2015, Jeju Island, Korea.
- L.V.Truong, H.Yamamoto, "On the Capacity of Symmetric Gaussian Interference Channels with Feedback", IEEE ISIT2015, pp.201-205, June 14-19, 2015, Hong Kong.
- R.Wang, J.Honda, H.Yamamoto, RongKe Liu, " FV Polar Coding for Lossy Compression with and Improved Exponent", IEEE ISIT2015, pp.1517-1521, June 14-19, 2015, Hong Kong.
- T.H.Chan, S-W. Ho, H.Yamamoto, " Private Information Retrieval for Coded Storage", IEEE ISIT2015, pp.2842-2846, June 14-19, 2015, Hong Kong.
- H.Yamamoto,Y.Kuwori, "Direct or Efficient Access Decoding for VF Codes" AEW9, May 27-29, 2015, Matsuyama, Japan.
- H.Yamamoto, "Topics in FV and VF Source Coding" , ISITA2014, October 26-29, 2014, Melbourne Australia. (Plenary Talk)
- H.Yamamoto, M.Ueda, "Identification Codes to Identify Multiple Objects", IEEE ISIT2014, pp.1241-1245, June 29- July 4, 2014, Honolulu, Hawaii, USA.
- M.Burnashev, H.Yamamoto, "Noisy Feedback Improves the Gaussian Channel Reliability Function", IEEE ISIT2014, pp.2554-2558, June 29- July 4, 2014, Honolulu, Hawaii, USA.
- E.Cocker, F.Ghazzi, U.Speide, M.-C.Dong, V.Wong, A.J.H.Vinck, H.Yamamoto, H.Yokoo, H.Morita, H.Ferreira, A.Emleh, R.McFadzien, S.Palelei, R.Eimann, "Measurement of Buffer Requirement Trends for Real Time Traffic Over TCP", IEEE HPSR 2014, pp.120-124, July 1-4, 2014, Vancouver, British Columbia, Canada
- H.Yamamoto, X.Wei, "Almost Instantaneous FV Codes", IEEE ISIT2013, pp.1759-1763, July 7-12, 2013, Istanbul, Turkey.
- S.Maya, H.Yamamoto, "Complexity based on Reduplication Parsing ", AEW8, pp.17-19, May 17-19, 2013, Kamakura, Kanagawa, JAPAN
- J.Honda, H.Yamamoto, "Fast Linear-Programming Decoding of LDPC Codes with over GF(2^m)", ISITA2012, pp.754-758, Oct.28-31, 2012, Honolulu, Hawaii, USA
- J.Honda, H.Yamamoto, "Polar Coding without Alphabet Extension for Asymmetric Channels", IEEE ISIT2012, pp.2157-2161, July 1-6, 2012, MIT, Cambridge, USA
- M. Burnashev, H.Yamamoto, "On Decoding Error Exponent of Gaussian Channel with Noisy Feedback: Nonexponential Number of Messages", IEEE ISIT2012, pp. 2964-2968, July 1-6, 2012, MIT, Cambridge, USA
- J. Kogure, N. Kunihiro, H. Yamamoto, "Generalized Security Analysis of the Random Key Bits Leakage Attack," WISA2011, Aug. 22-24, Jeju Island, Korea, 2011 (Springer LNCS 7115, pp.13-27, 2012)
- H.Yamamoto, K.Okudera, "Channel Coding Theorem for the Number of Guesses in Decoding," IEEE-ISIT2011, pp.419-423, Saint Petersburg, July 31-Aug. 5, 2011
- T. Kubo, K. Harada and H. Yamamoto,"Secure Network Coding with Helper Nodes," AEW7, Boppard, German, July27-29, 2011
- H.Yamamoto, K.Okudera, "The Number of Guesses in Channel Coding," AEW6, Ishigaki Island, Okinawa, Japan, Oc.22-24, 2010
- A.Sato, H.Yamamoto, "Error Exponents of Discrete Memoryless Channels and AWGN Channels with Noisy Feedback," ISITA2010, pp.452-457, Taichung, Taiwan, Oct.17-20, 2010
- S.J.Skudlarek, H. Yamamoto, "Representative Sequence Selection in Unsupervised Anomaly Detection using Spectrum Kernel with Theoretical Parameter Setting," ICMLC2010, pp.2099-2104, Qingdao, China, July 11-14, 2010
- M.Koide, H.Yamamoto, "Coding Theorems for Biometric Systems", IEEE ISIT2010, pp.2647-2651, June13-18, 2010, Austin, Texas, USA.
- K.Hamano, H.Yamamoto, "Data Compression based on a Dictionary Method using Recursive Construction of T-Codes", DCC2010, p.531, March 24-26, 2010, Snowbird, Utah, USA
- H.Koga, M.Iwamoto, H.Yamamoto, "Coding Theorems for a (2, 2)-Threshold Scheme Secure against Impersonation by an Opponent," IEEE-ITW2009, Oct. 11-16, 2009, Taomina, Sicily, Italy
- J. Kogure, N. Kunihiro, H. Yamamoto, "On the Hardness of Subset Sum Problem," JWIS2009, p.29, Oct. 6 - 7, 2009, Takao, Taiwan
- S. J. Skudlarek, H. Yamamoto, "Anomaly Detection Using Time Index Differences of Identical Symbols with and without Training Data", ADMA 2009, Springer LNAI 5678, pp.619-626, August 17-19, 2009, BeiJing Chaina,
- K.Harada, H.Yamamoto, "Separate Network Coding for Private and Common Messages from One Source to Two Sinks", IEEE-ISIT2009, pp.418-422, June 28- July 3, 2009, Seoul, Korea
- K.Hamano, H.Yamamoto, "A Differential Equation Method to Derive the Formulas of the T-complexity and the LZ-complexity ", IEEE-ISIT2009, pp.625-629, June 28- July 3, 2009, Seoul, Korea
- M.Iwamoto, H.Yamamoto, H. Koga "A Coding Theorem for Cheating-Detectable (2, 2)-Threshold Blockwise Secret Sharing Schemes", IEEE-ISIT2009, pp.1308-1312, June 28- July 3, 2009, Seoul, Korea
- M.V.Burnashev, H.Yamamoto, "Noisy Feedback Improves the BSC Reliability Function", IEEE-ISIT2009, pp.1501-1505, June 28- July 3, 2009, Seoul, Korea
- J.Honda, H.Yamamoto, "Variable Length Lossy Coding using an LDPC Code", IEEE-ISIT2009, pp.1973-1977, June 28- July 3, 2009, Seoul, Korea
- E.T.Taniguchi, H.Yamamoto, "Deniable Ring Authenticated Private Key Establishment", ISITA2008, pp.519--524, Dec. 7-10, Auckland New Zealand
- S.Miyake, J.Honda, H.Yamamoto, "Application of LCLP to Lossy Source Coding", ISITA2008, pp.589--594, Dec. 7-10, Auckland New Zealand
- K.Hamano, H.Yamamoto, "A Randomness Test based on T-Codes", ISITA2008, pp.1095-1100, Dec. 7-10, Auckland New Zealand
- M.Burnashev, H.Yamamoto, "On BSC, noisy feedback and three messages," IEEE-ISIT2008, pp.886-889, July 6-11, 2008, Toronto, Canada
- H.Yamamoto, D.Isami, "Multiplex coding of bit commitment based on a discrete memoryless channel," IEEE-ISIT2007, pp.721-725, June 24-29, 2007, Nice, France
- T.Honda, Y. Tashiro, H.Yamamoto, "FV code trees with no self-synchronizing string," ITA Workshop, paper-no. 378, Jan.29- Feb.3, 2007, San Diego, USA
- Y.Tashiro and H. Yamamoto, "FV code trees with no synchronizing string," AEW5, Oct.25-27, 2006, Jeju, Korea
- Y.Hayashi and H.Yamamoto, "The coding theorems for the Shannon cipher system with a guessing wiretapper and correlated source outputs," IEEE-ISIT2006, pp.1169-1173, July 9-14, 2006, Seattle, USA
- D.Kobayashi, H.Yamamot, T.Ogawa, "How to attain the ordinary channel capacity securely in wiretap channels," IEEE-ITW2005 on Theory and Parctice in Information-Theoretic Security, pp.13-18, Oct.16-19, 2005, Awaji Island , Japan
- M.Iwamoto and H. Yamamoto, "Strongly Secure Ramp Secret Sharing Schemes," IEEE-ISIT2005, pp.1221-1225, Sep. 4- 9, 2005, Adelaide, Australia
- H.Sakai and H. Yamamoto, "Asymptotic Optimality of Tree-based Group Key Management Schemes," IEEE-ISIT2005, pp.2275-2279, Sep. 4- 9, 2005, Adelaide, Australia
- T.Ogawa, A.Sasaki, M.Iwamoto, and H.Yamamoto, "Quantum Secret Sharing Schemes and Reversibility of Quantum Operations," ISITA2004, pp.1440-1445, Oct. 10-13, 2004, Parma Italy
- T.Honda and H.Yamamoto, "Synchronizing Strings of FV Codes and Identification of FV Code Trees," AEW4, pp.31-34, Oct. 6-8, 2004, Viareggio Italy
- M. Iwamoto, H. Yamamoto, and H. Ogawa, "Optimal Multiple Assignments Based on Integer Programming in Secret Sharing Schemes," IEEE-ISIT2004, p.16, June 27-July 2, 2004, Chicago, USA
- K.Ishii and H.Yamamoto, "Variation of Sequential MPM Codeswith O(1/log n) Maximum Redundancy", Workshop: General Theory of Information Transfer and Combinatorics, April 26-30, 2004, University of Bielefeld, ZiF, Germany
- M.Iwamoto and H.Yamamoto, "Visual Secret Sharing Schemes for Plural Secret Images," IEEE-ISIT2003, June 30-July 4, 2003, Yokohama, Japan
- Y.Kawamoto and H.Yamamoto, "Secret Function Sharing Schemes and their Applications on the Obvious Transfer," IEEE-ISIT2003, June 30-July 4, 2003, Yokohama, Japan
- H.Takekawa and H.Yamamoto, "Sequential MPM Coding," IEEE-ISIT2003, June 30-July 4, 2003, Yokohama, Japan
- D.Kobayashi and H.Yamamoto, "Modified Maurer-Wolf Privacy Amplification Schemes," AEW3, June 26 -27, 2003, Kamogawa, Japan
- M.Arimura and H.Yamamoto, "Redundancy of the MTF Scheme for Stationary Ergodic Sources", IEEE-ISIT2002, June 30-July 5, 2002, Lausanne, Switzerland
- Y.Matsunaga and H.Yamamoto, "A coding theorem for lossy data compression by LDPC codes", IEEE-ISIT2002, June 30-July 5, 2002, Lausanne, Switzerland
- G.Maruyama and H.Yamamoto, "Competitive Optimality of Alphabetic Codes", ISITA2000, Nov. 5-8, 2000, Honolulu Hawaii, U.S.A.
- H.Koga, H.Yamamoto, and N.Yamaguchi, "Asymptotic Properties on Codeword Length Distribution of Optimal FV Codes for General Sources", IEEE-ISIT2000, June 25 - 30, 2000, Sorrent, Italy
- H.Koga, H.Yamamoto, and N.Yamaguchi, "Asymptotic Properties on Codeword Length Distribution of FV Codes for General Sources", IEEE-ITW'99, June 27 - July 1, 1999, Metsovo, Greece

- M.Arimura and H.Yamamoto, "Almost Sure Covergence of Coding Theorem for Block Sorting Data Compression Algorithm", ISITA'98, Oct. 14-16, 1998, Mexico City, Mexico
- H.Yamamoto, "New Recursive Universal Code of Positive Integers", IEEE-ISIT'98, August 16-21, 1998, Cambridge, MA, USA
- H.Koga and H.Yamamoto, "Coding Theorems for Secret-Key Authentication Systems", IEEE-ITW'98, 22-26 June, 1998, Killaney, Ireland
- H.Koga and H.Yamamoto, "Proposal of a Lattice-Based Secret Sharing Scheme for Color and Gray-Scale Images", JW-ISC'97, Oct. 26-28, 1997, Seoul, Koera
- H.Yamamoto , "Source Coding Theorem for an Extended Slepian-Wolf System with Two Interactive Decoders", IEEE-ISIT'97, June 29-July4, 1997, Ulm, Germany
- H.Koga and H.Yamamoto, "A Coding Theorem on Authentication Systems Based on Secret Key Cryptography", 7th Japan-Benelux WCIT, June 25-27, 1997, Eltville am Rheim, German
- N.Kunihiro and H.Yamamoto, "Extended Window Method for Addition-Subtraction Chain", 7th Japan-Benelux WCIT, June 25-27, 1997, Eltville am Rheim, German
- H.Yamamoto, "Source Coding Theory for a Triangular Communication System", 5th Japan-Benelux WCIT, Feb. 3-4, 1996, Hakone,Japan
- M.Arimura, H.Yamamoto and S.Arimoto, "A Bitplane Tree Weighting Method for Gray Scale Images", ISITA'96, Sep.17-20, 1996, Victoria, B.C, Canada
- H.Yamamoto, "Coding Theorem for the Protection of Parameter Estimation in Shannon Cipher System", JW-ISC '95, Jan.24-27, 1995, Inuyama, Aichi, Japan
- H.Yamamoto, "Rate-Distortion Theory for a Triangular Communication System", IEEE-ISIT'95, Sep.17-22, 1995, Whistler, British Columbia, Canada
- H.Fujiwara and H.Yamamoto, "A Convolutional Coded ARQ Scheme with Retransmission Criterion Based on an Estimated Decoding Error Rate for Time-Varying Channels", ISITA'94, Nov.20-24, 1994, Sydney, Australia
- H.Yamamoto and T.Itoh, "A Note on the Competitive Optimality of Source Codes", ISITA'94, Nov.20-24, 1994, Sydney, Australia
- H.Yamamoto, "Rate-Distortion Theory for the Shannon Cipher System", IEEE-ISIT'94, June 27-July 1, 1994, Trondhim, Norway
- H.Yamamoto and T.Itoh, "A Note the Competitive Optimality of Source Codes", 4th Japan-Benelux WCIT, June 22-24,1994, Eindhoven, Netherlands
- H.Yamamoto, "Rate-Distortion Theory for Shannon's Cipher System with a Noisy Channel", 1993 Japan-Korea JW-ISC,Oct.24-26,1993, Seul Korea
- H.Yamamoto, "Rate-Distortion Theory for Shannon's Cipher System", 1993 IEEE-ITW, June 4-8,1993, Susono-shi, Shizuoka, Japan
- H.Yamamoto, "Common Information of Two Correlated Random Variables", IEEE-ISIT'93,Jan.17-22, 1993, San Antorio, Texas, USA
- H.Yamamoto, "Coding Theorem for Shannon's Cipher System with Correlated Source Outputs", IEEE-ISIT'91, June 24-28, 1991, Budupest, Hungary
- H.Yamamoto, "Shannon's Cipher System with Correlated Source Outputs", ISITA'90, Nov.27-30, 1990, Hawaii, USA
- H.Yamamoto and H.Ochi, "A New Asymptotically Optimal Code of the Positive Integers", IEEE-ISIT'90, Jan.14-19, 1990, SanDiego, California, USA
- H.Yamamoto, "Coding Theory for Secret Sharing Communication Systems with Two Gaussian Wiretap Channels", IEEE-ISIT'90, Jan.14-19, 1990, SanDiego, California, USA
- H.Yamamoto, "Coding Theorem for Secret Sharing Communication Systems with Two Noisy Channels", IEEE-ISIT'88, June 19-24, 1988, Kobe, Japan

- H.Yamamoto, "Minimum Achievable Distortion for Another Distortion Measure by Installing a Suitable Decoder in an Existing Communication System", IEEE-ISIT'83, Sep.26-30, 1983, st.Jovite Qiebec, Canada