International Conference Papers

  • Abbreviation:
    ISIT: IEEE International Symposium on Information Theory
    ITW: IEEE International Workshop on Information Theory
    ISITA: International Symposium on Information Theory and its Applications
    DCC: Data Compression Conference
    WCIT: Japan-Benelux Workshop on Coding and Information Theory
    AEWn: n-th Asian-European Workshop on Information Theory
    JW-ISC: Japan-Korea Joint Workshop on Information Security and Cryptology
    JWIS: Joint Workshop on Information Security
    ADMA: Advanced Data Mining and Applications
    ICMLC: International Conference on Machine Learning and Cybernetics
    WISA: International Workshop on Information Security Applications
    HPSR: International Conference on High Performance Switching and Routing

    2020-

  1. R.Fujita, K.Iwata, H.Yamamoto, "On a Redundancy of AIFV-m Codes for m=3,5," IEEE ISIT2020, pp.2373--2377, June 21-26, 2020, Los Angeles, USA (Virtual Conference).
  2. H.Yamamoto, K.Imaeda, K.Hashimoto, K.Iwata "A Universal Data Compression Scheme based on the AIFV Coding Techniques," IEEE ISIT2020, pp.2378--2382, June 21-26, 2020, Los Angeles, USA (Virtual Conference).
  3. 2015-2019

  4. K.Hashimoto, K.Iwata and H.Yamamoto, "Enumeration and Coding of Compact Code Trees for Binary AIFV Codes", IEEE ISIT2019, pp.1527-1531, July7-12, 2019, Paris, France.
  5. R.Fujita, K.Iwata and H.Yamamoto, "An Iterative Algorithm to Optimize the Average Performance of Markov Chains with Finite States", IEEE ISIT2019, pp.1902-1906, July7-12, 2019, Paris, France.
  6. H.Yamamoto, K.Hashimoto, and K.Iwata, "A Universal Source Code Based on the AIVF Coding Strategy" AEW11, P.26, July 3-5, Rotterdam, Holland.
  7. T.Hiraoka and H.Yamamoto, "Dynamic AIFV Coding", ISITA2018, pp.577-581, Oct. 28-31, 2018, Singapore.
  8. K.Hashimoto, K.Iwata, and H.Yamamoto, "Enumeration of Compact Trees of AIFV codes", ISITA2018, p.496 (Poster Session), Oct. 28-31, 2018, Singapore.
  9. T.Hiraoka and H.Yamamoto, "Alphabetic AIFV codes Constructed from Hu-Tucker Codes", IEEE ISIT2018, pp.2182-2186, June 17-22, 2018, Vail, Colorado, USA.
  10. R.Fujita, K.Iwata and H.Yamamoto, " An Optimality Proof of the Iterative Algorithm for AIFV-m Codes", IEEE ISIT2018, pp.2187-2191, June 17-22, 2018, Vail, Colorado, USA.
  11. H.Yamamoto, " Easy Construction of Alphabetic AIFV codes", Japan-Singapore Workshop on Coding and Information Theory, Mach 4-7, 2018
  12. H.Yamamoto, "Almost Instantaneous Fixed-to-Variable Length Codes", `9th Takayanagi Kenjiro Memorial Symposium, Nov.21-22, 2017, Hamamatsu, Japan. (invited talk)
  13. K.Iwata, H.Yamamoto, "An Iterative Alrogrithm to Construct Optimal Binary AIFV-m Codes", IEEE-ITW2017, pp.519-523, Nov.6-10, 2017, Kaohsiung, Taiwan.
  14. H.Yamamoto, "AIFV codes and their extended codes," Workshop on Beyond I.I.D. in Information Theory, July 24-28, 2017, Singapore. (invited talk)
  15. K.Sumigawa and H.Yamamoto, "Coding of Binary AIFV Code Trees," IEEE ISIT2017, pp.1152-1156, June 25-30, 2017, Aachen, Germany.
  16. H.Yamamoto and S.Hara, "Application of Yamamoto-Itoh Coding Scheme to Discrete Memoryless Broadcast Channels," IEEE ISIT2017, pp.1878-1882, June 25-30, 2017, Aachen, Germany.
  17. M.V.Burnashev and H.Yamamoto, "On Optimal Error Exponents in Noiseless Channel Identification," IEEE ISIT2017, pp.2742-2745, June 25-30, 2017, Aachen, Germany.
  18. J.Honda and H.Yamamoto, "Variable-to-Fixed Length Homophonic Coding Suitable for Asymmetric Channel Coding," IEEE ISIT2017, pp.2860-2864, June 25-30, 2017, Aachen, Germany.
  19. H.Yamamoto, "AIFV Codes and Related Topics," AEW10, June 21-23, 2017, Boppard, Germany. (invited talk)
  20. J.Honda, H.Yamamoto, "Variable-to-Fixed Length Homophonic Coding with a Modified Shannon-Fano-Elias Code", ISITA2016, pp.11-15, Oct.30-Nov.2, 2016, Monterey, Calfornia, USA.
  21. W.Nakamura, H.Yamamoto, T.Chan, "A Ramp Threshold Secret Sharing Scheme against Cheating by Substitution Attacks", ISITA2016, pp.345-349, Oct.30-Nov.2, 2016, Monterey, Calfornia, USA.
  22. K.Iwata, H.Yamamoto, "A Dynamic Programming Algorithm to Construct Optimal Code Trees of AIFV Codes", ISITA2016, pp.672-676, Oct.30-Nov.2, 2016, Monterey, Calfornia, USA.
  23. W.Hu, H.Yamamoto, J.Honda, "Tight Upper Bounds on the Redundancy of Optimal Binary AIFV Codes", IEEE ISIT2016, pp.6-10, July 10-15, 2016, Barcelona, Spain.
  24. H.Yamamoto, Q.Liu, "Highly Sensitive Universal Statistical Test", IEEE ISIT2016, pp.700-704, July 10-15, 2016, Barcelona, Spain.
  25. M.V.Marat, H.Yamamoto, "On Optimal Transmission Strategies for Channels with Noiseless Feedback", IEEE ISIT2016, pp.1282-1286, July 10-15, 2016, Barcelona, Spain.
  26. R.Wang, J.Honda, H.Yamamoto, R.Liu, Y.Hou, "Construction of Polar Codes for Channels with Memory", IEEE ITW2015, pp.187-191, Oct. 11-15 , 2015, Jeju Island, Korea.
  27. L.V.Truong, H.Yamamoto, "On the Capacity of Symmetric Gaussian Interference Channels with Feedback", IEEE ISIT2015, pp.201-205, June 14-19, 2015, Hong Kong.
  28. R.Wang, J.Honda, H.Yamamoto, RongKe Liu, " FV Polar Coding for Lossy Compression with and Improved Exponent", IEEE ISIT2015, pp.1517-1521, June 14-19, 2015, Hong Kong.
  29. T.H.Chan, S-W. Ho, H.Yamamoto, " Private Information Retrieval for Coded Storage", IEEE ISIT2015, pp.2842-2846, June 14-19, 2015, Hong Kong.
  30. H.Yamamoto,Y.Kuwori, "Direct or Efficient Access Decoding for VF Codes" AEW9, May 27-29, 2015, Matsuyama, Japan.
  31. 2010-2014

  32. H.Yamamoto, "Topics in FV and VF Source Coding" , ISITA2014, October 26-29, 2014, Melbourne Australia. (Plenary Talk)
  33. H.Yamamoto, M.Ueda, "Identification Codes to Identify Multiple Objects", IEEE ISIT2014, pp.1241-1245, June 29- July 4, 2014, Honolulu, Hawaii, USA.
  34. M.Burnashev, H.Yamamoto, "Noisy Feedback Improves the Gaussian Channel Reliability Function", IEEE ISIT2014, pp.2554-2558, June 29- July 4, 2014, Honolulu, Hawaii, USA.
  35. E.Cocker, F.Ghazzi, U.Speide, M.-C.Dong, V.Wong, A.J.H.Vinck, H.Yamamoto, H.Yokoo, H.Morita, H.Ferreira, A.Emleh, R.McFadzien, S.Palelei, R.Eimann, "Measurement of Buffer Requirement Trends for Real Time Traffic Over TCP", IEEE HPSR 2014, pp.120-124, July 1-4, 2014, Vancouver, British Columbia, Canada
  36. H.Yamamoto, X.Wei, "Almost Instantaneous FV Codes", IEEE ISIT2013, pp.1759-1763, July 7-12, 2013, Istanbul, Turkey.
  37. S.Maya, H.Yamamoto, "Complexity based on Reduplication Parsing ", AEW8, pp.17-19, May 17-19, 2013, Kamakura, Kanagawa, JAPAN
  38. J.Honda, H.Yamamoto, "Fast Linear-Programming Decoding of LDPC Codes with over GF(2^m)", ISITA2012, pp.754-758, Oct.28-31, 2012, Honolulu, Hawaii, USA
  39. J.Honda, H.Yamamoto, "Polar Coding without Alphabet Extension for Asymmetric Channels", IEEE ISIT2012, pp.2157-2161, July 1-6, 2012, MIT, Cambridge, USA
  40. M. Burnashev, H.Yamamoto, "On Decoding Error Exponent of Gaussian Channel with Noisy Feedback: Nonexponential Number of Messages", IEEE ISIT2012, pp. 2964-2968, July 1-6, 2012, MIT, Cambridge, USA
  41. J. Kogure, N. Kunihiro, H. Yamamoto, "Generalized Security Analysis of the Random Key Bits Leakage Attack," WISA2011, Aug. 22-24, Jeju Island, Korea, 2011 (Springer LNCS 7115, pp.13-27, 2012)
  42. H.Yamamoto, K.Okudera, "Channel Coding Theorem for the Number of Guesses in Decoding," IEEE-ISIT2011, pp.419-423, Saint Petersburg, July 31-Aug. 5, 2011
  43. T. Kubo, K. Harada and H. Yamamoto,"Secure Network Coding with Helper Nodes," AEW7, Boppard, German, July27-29, 2011
  44. H.Yamamoto, K.Okudera, "The Number of Guesses in Channel Coding," AEW6, Ishigaki Island, Okinawa, Japan, Oc.22-24, 2010
  45. A.Sato, H.Yamamoto, "Error Exponents of Discrete Memoryless Channels and AWGN Channels with Noisy Feedback," ISITA2010, pp.452-457, Taichung, Taiwan, Oct.17-20, 2010
  46. S.J.Skudlarek, H. Yamamoto, "Representative Sequence Selection in Unsupervised Anomaly Detection using Spectrum Kernel with Theoretical Parameter Setting," ICMLC2010, pp.2099-2104, Qingdao, China, July 11-14, 2010
  47. M.Koide, H.Yamamoto, "Coding Theorems for Biometric Systems", IEEE ISIT2010, pp.2647-2651, June13-18, 2010, Austin, Texas, USA.
  48. K.Hamano, H.Yamamoto, "Data Compression based on a Dictionary Method using Recursive Construction of T-Codes", DCC2010, p.531, March 24-26, 2010, Snowbird, Utah, USA
  49. 2005-2009

  50. H.Koga, M.Iwamoto, H.Yamamoto, "Coding Theorems for a (2, 2)-Threshold Scheme Secure against Impersonation by an Opponent," IEEE-ITW2009, Oct. 11-16, 2009, Taomina, Sicily, Italy
  51. J. Kogure, N. Kunihiro, H. Yamamoto, "On the Hardness of Subset Sum Problem," JWIS2009, p.29, Oct. 6 - 7, 2009, Takao, Taiwan
  52. S. J. Skudlarek, H. Yamamoto, "Anomaly Detection Using Time Index Differences of Identical Symbols with and without Training Data", ADMA 2009, Springer LNAI 5678, pp.619-626, August 17-19, 2009, BeiJing Chaina,
  53. K.Harada, H.Yamamoto, "Separate Network Coding for Private and Common Messages from One Source to Two Sinks", IEEE-ISIT2009, pp.418-422, June 28- July 3, 2009, Seoul, Korea
  54. K.Hamano, H.Yamamoto, "A Differential Equation Method to Derive the Formulas of the T-complexity and the LZ-complexity ", IEEE-ISIT2009, pp.625-629, June 28- July 3, 2009, Seoul, Korea
  55. M.Iwamoto, H.Yamamoto, H. Koga "A Coding Theorem for Cheating-Detectable (2, 2)-Threshold Blockwise Secret Sharing Schemes", IEEE-ISIT2009, pp.1308-1312, June 28- July 3, 2009, Seoul, Korea
  56. M.V.Burnashev, H.Yamamoto, "Noisy Feedback Improves the BSC Reliability Function", IEEE-ISIT2009, pp.1501-1505, June 28- July 3, 2009, Seoul, Korea
  57. J.Honda, H.Yamamoto, "Variable Length Lossy Coding using an LDPC Code", IEEE-ISIT2009, pp.1973-1977, June 28- July 3, 2009, Seoul, Korea
  58. E.T.Taniguchi, H.Yamamoto, "Deniable Ring Authenticated Private Key Establishment", ISITA2008, pp.519--524, Dec. 7-10, Auckland New Zealand
  59. S.Miyake, J.Honda, H.Yamamoto, "Application of LCLP to Lossy Source Coding", ISITA2008, pp.589--594, Dec. 7-10, Auckland New Zealand
  60. K.Hamano, H.Yamamoto, "A Randomness Test based on T-Codes", ISITA2008, pp.1095-1100, Dec. 7-10, Auckland New Zealand
  61. M.Burnashev, H.Yamamoto, "On BSC, noisy feedback and three messages," IEEE-ISIT2008, pp.886-889, July 6-11, 2008, Toronto, Canada
  62. H.Yamamoto, D.Isami, "Multiplex coding of bit commitment based on a discrete memoryless channel," IEEE-ISIT2007, pp.721-725, June 24-29, 2007, Nice, France
  63. T.Honda, Y. Tashiro, H.Yamamoto, "FV code trees with no self-synchronizing string," ITA Workshop, paper-no. 378, Jan.29- Feb.3, 2007, San Diego, USA
  64. Y.Tashiro and H. Yamamoto, "FV code trees with no synchronizing string," AEW5, Oct.25-27, 2006, Jeju, Korea
  65. Y.Hayashi and H.Yamamoto, "The coding theorems for the Shannon cipher system with a guessing wiretapper and correlated source outputs," IEEE-ISIT2006, pp.1169-1173, July 9-14, 2006, Seattle, USA
  66. D.Kobayashi, H.Yamamot, T.Ogawa, "How to attain the ordinary channel capacity securely in wiretap channels," IEEE-ITW2005 on Theory and Parctice in Information-Theoretic Security, pp.13-18, Oct.16-19, 2005, Awaji Island , Japan
  67. M.Iwamoto and H. Yamamoto, "Strongly Secure Ramp Secret Sharing Schemes," IEEE-ISIT2005, pp.1221-1225, Sep. 4- 9, 2005, Adelaide, Australia
  68. H.Sakai and H. Yamamoto, "Asymptotic Optimality of Tree-based Group Key Management Schemes," IEEE-ISIT2005, pp.2275-2279, Sep. 4- 9, 2005, Adelaide, Australia
  69. 2000-2004

  70. T.Ogawa, A.Sasaki, M.Iwamoto, and H.Yamamoto, "Quantum Secret Sharing Schemes and Reversibility of Quantum Operations," ISITA2004, pp.1440-1445, Oct. 10-13, 2004, Parma Italy
  71. T.Honda and H.Yamamoto, "Synchronizing Strings of FV Codes and Identification of FV Code Trees," AEW4, pp.31-34, Oct. 6-8, 2004, Viareggio Italy
  72. M. Iwamoto, H. Yamamoto, and H. Ogawa, "Optimal Multiple Assignments Based on Integer Programming in Secret Sharing Schemes," IEEE-ISIT2004, p.16, June 27-July 2, 2004, Chicago, USA
  73. K.Ishii and H.Yamamoto, "Variation of Sequential MPM Codeswith O(1/log n) Maximum Redundancy", Workshop: General Theory of Information Transfer and Combinatorics, April 26-30, 2004, University of Bielefeld, ZiF, Germany
  74. M.Iwamoto and H.Yamamoto, "Visual Secret Sharing Schemes for Plural Secret Images," IEEE-ISIT2003, June 30-July 4, 2003, Yokohama, Japan
  75. Y.Kawamoto and H.Yamamoto, "Secret Function Sharing Schemes and their Applications on the Obvious Transfer," IEEE-ISIT2003, June 30-July 4, 2003, Yokohama, Japan
  76. H.Takekawa and H.Yamamoto, "Sequential MPM Coding," IEEE-ISIT2003, June 30-July 4, 2003, Yokohama, Japan
  77. D.Kobayashi and H.Yamamoto, "Modified Maurer-Wolf Privacy Amplification Schemes," AEW3, June 26 -27, 2003, Kamogawa, Japan
  78. M.Arimura and H.Yamamoto, "Redundancy of the MTF Scheme for Stationary Ergodic Sources", IEEE-ISIT2002, June 30-July 5, 2002, Lausanne, Switzerland
  79. Y.Matsunaga and H.Yamamoto, "A coding theorem for lossy data compression by LDPC codes", IEEE-ISIT2002, June 30-July 5, 2002, Lausanne, Switzerland
  80. G.Maruyama and H.Yamamoto, "Competitive Optimality of Alphabetic Codes", ISITA2000, pp.240-243, Nov. 5-8, 2000, Honolulu Hawaii, U.S.A.
  81. H.Koga, H.Yamamoto, and N.Yamaguchi, "Asymptotic Properties on Codeword Length Distribution of Optimal FV Codes for General Sources", IEEE-ISIT2000, June 25 - 30, 2000, Sorrent, Italy
  82. 1995-1999

  83. H.Koga, H.Yamamoto, and N.Yamaguchi, "Asymptotic Properties on Codeword Length Distribution of FV Codes for General Sources", IEEE-ITW'99, June 27 - July 1, 1999, Metsovo, Greece
  84. M.Arimura and H.Yamamoto, "Almost Sure Covergence of Coding Theorem for Block Sorting Data Compression Algorithm", ISITA'98, Oct. 14-16, 1998, Mexico City, Mexico
  85. H.Yamamoto, "New Recursive Universal Code of Positive Integers", IEEE-ISIT'98, August 16-21, 1998, Cambridge, MA, USA
  86. H.Koga and H.Yamamoto, "Coding Theorems for Secret-Key Authentication Systems", IEEE-ITW'98, 22-26 June, 1998, Killaney, Ireland
  87. H.Koga and H.Yamamoto, "Proposal of a Lattice-Based Secret Sharing Scheme for Color and Gray-Scale Images", JW-ISC'97, Oct. 26-28, 1997, Seoul, Koera
  88. H.Yamamoto , "Source Coding Theorem for an Extended Slepian-Wolf System with Two Interactive Decoders", IEEE-ISIT'97, June 29-July4, 1997, Ulm, Germany
  89. H.Koga and H.Yamamoto, "A Coding Theorem on Authentication Systems Based on Secret Key Cryptography", 7th Japan-Benelux WCIT, June 25-27, 1997, Eltville am Rheim, German
  90. N.Kunihiro and H.Yamamoto, "Extended Window Method for Addition-Subtraction Chain", 7th Japan-Benelux WCIT, June 25-27, 1997, Eltville am Rheim, German
  91. H.Yamamoto, "Source Coding Theory for a Triangular Communication System", 5th Japan-Benelux WCIT, Feb. 3-4, 1996, Hakone,Japan
  92. M.Arimura, H.Yamamoto and S.Arimoto, "A Bitplane Tree Weighting Method for Gray Scale Images", ISITA'96, Sep.17-20, 1996, Victoria, B.C, Canada
  93. H.Yamamoto, "Coding Theorem for the Protection of Parameter Estimation in Shannon Cipher System", JW-ISC '95, Jan.24-27, 1995, Inuyama, Aichi, Japan
  94. H.Yamamoto, "Rate-Distortion Theory for a Triangular Communication System", IEEE-ISIT'95, Sep.17-22, 1995, Whistler, British Columbia, Canada
  95. 1990-1994

  96. H.Fujiwara and H.Yamamoto, "A Convolutional Coded ARQ Scheme with Retransmission Criterion Based on an Estimated Decoding Error Rate for Time-Varying Channels", ISITA'94, Nov.20-24, 1994, Sydney, Australia
  97. H.Yamamoto and T.Itoh, "A Note on the Competitive Optimality of Source Codes", ISITA'94, Nov.20-24, 1994, Sydney, Australia
  98. H.Yamamoto, "Rate-Distortion Theory for the Shannon Cipher System", IEEE-ISIT'94, June 27-July 1, 1994, Trondhim, Norway
  99. H.Yamamoto and T.Itoh, "A Note the Competitive Optimality of Source Codes", 4th Japan-Benelux WCIT, June 22-24,1994, Eindhoven, Netherlands
  100. H.Yamamoto, "Rate-Distortion Theory for Shannon's Cipher System with a Noisy Channel", 1993 Japan-Korea JW-ISC,Oct.24-26,1993, Seul Korea
  101. H.Yamamoto, "Rate-Distortion Theory for Shannon's Cipher System", 1993 IEEE-ITW, June 4-8,1993, Susono-shi, Shizuoka, Japan
  102. H.Yamamoto, "Common Information of Two Correlated Random Variables", IEEE-ISIT'93,Jan.17-22, 1993, San Antorio, Texas, USA
  103. H.Yamamoto, "Coding Theorem for Shannon's Cipher System with Correlated Source Outputs", IEEE-ISIT'91, June 24-28, 1991, Budupest, Hungary
  104. H.Yamamoto, "Shannon's Cipher System with Correlated Source Outputs", ISITA'90, Nov.27-30, 1990, Hawaii, USA
  105. H.Yamamoto and H.Ochi, "A New Asymptotically Optimal Code of the Positive Integers", IEEE-ISIT'90, Jan.14-19, 1990, SanDiego, California, USA
  106. H.Yamamoto, "Coding Theory for Secret Sharing Communication Systems with Two Gaussian Wiretap Channels", IEEE-ISIT'90, Jan.14-19, 1990, SanDiego, California, USA
  107. -1989

  108. H.Yamamoto, "Coding Theorem for Secret Sharing Communication Systems with Two Noisy Channels", IEEE-ISIT'88, June 19-24, 1988, Kobe, Japan
  109. H.Yamamoto, "Minimum Achievable Distortion for Another Distortion Measure by Installing a Suitable Decoder in an Existing Communication System", IEEE-ISIT'83, Sep.26-30, 1983, st.Jovite Quebec, Canada