<?xml version="1.0"?>
<dblpperson name="Jun'ichi Takeuchi" pid="08/7" n="83">
<person key="homepages/08/7" mdate="2020-07-17">
<author pid="08/7">Jun'ichi Takeuchi</author>
<url>http://hyoka.ofc.kyushu-u.ac.jp/search/details/K002973/english.html</url>
<url>https://orcid.org/0000-0002-5819-3082</url>
<note type="affiliation">Kyushu University, Fukuoka, Graduate School of Information Science and Electrical Engineering</note>
</person>
<r><inproceedings key="conf/artman/KawanakaMHBTT25" mdate="2026-04-12">
<author orcid="0009-0007-9762-685X" pid="366/4060">Shota Kawanaka</author>
<author orcid="0000-0002-0977-4155" pid="213/3695">Kohei Miyamoto</author>
<author orcid="0000-0002-1728-5300" pid="186/6829">Chansu Han</author>
<author orcid="0000-0002-9616-3212" pid="80/861">Tao Ban</author>
<author orcid="0000-0002-6477-7770" pid="61/4099">Takeshi Takahashi 0001</author>
<author orcid="0000-0002-5819-3082" pid="08/7">Jun'ichi Takeuchi</author>
<title>Towards Explainable Machine Learning NIDS Reflecting Cyber-Attack Characteristics.</title>
<pages>34-44</pages>
<year>2025</year>
<booktitle>ARTMAN@CCS</booktitle>
<ee>https://doi.org/10.1145/3733821.3763023</ee>
<crossref>conf/artman/2025</crossref>
<url>db/conf/artman/artman2025.html#KawanakaMHBTT25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isw/MaHTTT25" mdate="2025-11-10">
<author pid="419/6610">Kensei Ma</author>
<author pid="186/6829">Chansu Han</author>
<author pid="19/6453">Akira Tanaka</author>
<author pid="61/4099">Takeshi Takahashi 0001</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Towards Architecture-Independent Function Call Analysis for IoT Malware.</title>
<pages>367-387</pages>
<year>2025</year>
<booktitle>ISC</booktitle>
<ee>https://doi.org/10.1007/978-3-032-08124-7_21</ee>
<crossref>conf/isw/2025</crossref>
<url>db/conf/isw/isc2025.html#MaHTTT25</url>
<stream>streams/conf/isw</stream>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2504-14262" mdate="2025-05-22">
<author pid="135/5009">Yoshinari Takeishi</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Sparse Superposition Codes with Binomial Dictionary are Capacity-Achieving with Maximum Likelihood Decoding.</title>
<year>2025</year>
<month>April</month>
<volume>abs/2504.14262</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2504.14262</ee>
<url>db/journals/corr/corr2504.html#abs-2504-14262</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2505-17907" mdate="2025-06-29">
<author pid="409/2434">Ka Long Keith Ho</author>
<author pid="135/5009">Yoshinari Takeishi</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Function Forms of Simple ReLU Networks with Random Hidden Weights.</title>
<year>2025</year>
<month>May</month>
<volume>abs/2505.17907</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2505.17907</ee>
<url>db/journals/corr/corr2505.html#abs-2505-17907</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2507-18555" mdate="2025-08-18">
<author pid="08/7">Jun'ichi Takeuchi</author>
<author pid="135/5009">Yoshinari Takeishi</author>
<author pid="88/822">Noboru Murata</author>
<author pid="37/57">Kazushi Mimura</author>
<author pid="409/2434">Ka Long Keith Ho</author>
<author pid="79/663">Hiroshi Nagaoka</author>
<title>Neural Tangent Kernels and Fisher Information Matrices for Simple ReLU Networks with Random Hidden Weights.</title>
<year>2025</year>
<month>July</month>
<volume>abs/2507.18555</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2507.18555</ee>
<url>db/journals/corr/corr2507.html#abs-2507-18555</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><inproceedings key="conf/acsac/MiyamotoHB0T24" mdate="2025-04-25">
<author pid="213/3695">Kohei Miyamoto</author>
<author pid="186/6829">Chansu Han</author>
<author pid="80/861">Tao Ban</author>
<author pid="61/4099">Takeshi Takahashi 0001</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Intrusion Detection Simplified: A Feature-free Approach to Traffic Classification Using Transformers.</title>
<pages>20-29</pages>
<year>2024</year>
<booktitle>ACSAC Workshops</booktitle>
<ee>https://doi.org/10.1109/ACSACW65225.2024.00011</ee>
<crossref>conf/acsac/2024w</crossref>
<url>db/conf/acsac/acsac2024w.html#MiyamotoHB0T24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isit/TakeishiT24" mdate="2024-10-11">
<author pid="135/5009">Yoshinari Takeishi</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Risk Bound on MDL Estimator for Simple ReLU Networks.</title>
<pages>256-261</pages>
<year>2024</year>
<booktitle>ISIT</booktitle>
<ee>https://doi.org/10.1109/ISIT57864.2024.10619170</ee>
<crossref>conf/isit/2024</crossref>
<url>db/conf/isit/isit2024.html#TakeishiT24</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2406-17929" mdate="2024-07-22">
<author pid="08/7">Jun'ichi Takeuchi</author>
<author pid="44/5985">Andrew R. Barron</author>
<title>Asymptotically Minimax Regret by Bayes Mixtures.</title>
<year>2024</year>
<volume>abs/2406.17929</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2406.17929</ee>
<url>db/journals/corr/corr2406.html#abs-2406-17929</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2407-03854" mdate="2024-08-07">
<author pid="135/5009">Yoshinari Takeishi</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Risk Bounds on MDL Estimators for Linear Regression Models with Application to Simple ReLU Neural Networks.</title>
<year>2024</year>
<volume>abs/2407.03854</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2407.03854</ee>
<url>db/journals/corr/corr2407.html#abs-2407-03854</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article key="journals/access/HeHITKT23" mdate="2025-05-01">
<author orcid="0000-0001-8767-817X" pid="254/9296">Tianxiang He</author>
<author orcid="0000-0002-1728-5300" pid="186/6829">Chansu Han</author>
<author pid="123/8335">Ryoichi Isawa</author>
<author orcid="0000-0002-6477-7770" pid="61/4099">Takeshi Takahashi 0001</author>
<author orcid="0000-0001-6061-2330" pid="74/656">Shuji Kijima</author>
<author orcid="0000-0002-5819-3082" pid="08/7">Jun'ichi Takeuchi</author>
<title>Scalable and Fast Algorithm for Constructing Phylogenetic Trees With Application to IoT Malware Clustering.</title>
<pages>8240-8253</pages>
<year>2023</year>
<volume>11</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2023.3238711</ee>
<url>db/journals/access/access11.html#HeHITKT23</url>
</article>
</r>
<r><article key="journals/access/MiyamotoIHBTT23" mdate="2023-12-10">
<author orcid="0000-0002-0977-4155" pid="213/3695">Kohei Miyamoto</author>
<author pid="307/5323">Masazumi Iida</author>
<author orcid="0000-0002-1728-5300" pid="186/6829">Chansu Han</author>
<author orcid="0000-0002-9616-3212" pid="80/861">Tao Ban</author>
<author orcid="0000-0002-6477-7770" pid="61/4099">Takeshi Takahashi 0001</author>
<author orcid="0000-0002-5819-3082" pid="08/7">Jun'ichi Takeuchi</author>
<title>Consolidating Packet-Level Features for Effective Network Intrusion Detection: A Novel Session-Level Approach.</title>
<pages>132792-132810</pages>
<year>2023</year>
<volume>11</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2023.3335600</ee>
<url>db/journals/access/access11.html#MiyamotoIHBTT23</url>
</article>
</r>
<r><article key="journals/ieicetd/NakaoYSTHTFTMSITITY23" mdate="2024-05-07">
<author pid="97/3551">Koji Nakao</author>
<author pid="66/3013">Katsunari Yoshioka</author>
<author pid="34/3589">Takayuki Sasaki</author>
<author pid="185/2301">Rui Tanabe</author>
<author pid="80/2439">Xuping Huang</author>
<author pid="61/4099">Takeshi Takahashi 0001</author>
<author pid="97/3642">Akira Fujita</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<author orcid="0000-0002-4258-6877" pid="88/822">Noboru Murata</author>
<author pid="65/4968">Junji Shikata</author>
<author pid="50/1311">Kazuki Iwamoto</author>
<author pid="357/2871">Kazuki Takada</author>
<author pid="224/9652">Yuki Ishida</author>
<author pid="58/546">Masaru Takeuchi</author>
<author orcid="0000-0002-0817-6188" pid="95/8821">Naoto Yanai</author>
<title>Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware.</title>
<pages>1302-1315</pages>
<year>2023</year>
<month>September</month>
<volume>106</volume>
<journal>IEICE Trans. Inf. Syst.</journal>
<number>9</number>
<ee>https://doi.org/10.1587/transinf.2022ici0001</ee>
<url>db/journals/ieicetd/ieicetd106.html#NakaoYSTHTFTMSITITY23</url>
</article>
</r>
<r><article key="journals/ieicetd/SultanaKJKT23" mdate="2023-11-29">
<author pid="165/9407">Tania Sultana</author>
<author pid="361/6899">Sho Kurosaki</author>
<author pid="29/1971">Yutaka Jitsumatsu</author>
<author pid="125/0250">Shigehide Kuhara</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Brain Tumor Classification using Under-Sampled k-Space Data: A Deep Learning Approach.</title>
<pages>1831-1841</pages>
<year>2023</year>
<month>November</month>
<volume>106</volume>
<journal>IEICE Trans. Inf. Syst.</journal>
<number>11</number>
<ee>https://doi.org/10.1587/transinf.2022edp7198</ee>
<url>db/journals/ieicetd/ieicetd106.html#SultanaKJKT23</url>
</article>
</r>
<r><article key="journals/nn/TakeishiIT23" mdate="2023-09-12">
<author orcid="0000-0002-8727-7445" pid="135/5009">Yoshinari Takeishi</author>
<author orcid="0000-0002-5203-8831" pid="307/5323">Masazumi Iida</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Approximate spectral decomposition of Fisher information matrix for simple ReLU networks.</title>
<pages>691-706</pages>
<year>2023</year>
<month>July</month>
<volume>164</volume>
<journal>Neural Networks</journal>
<ee type="oa">https://doi.org/10.1016/j.neunet.2023.05.017</ee>
<url>db/journals/nn/nn164.html#TakeishiIT23</url>
</article>
</r>
<r><inproceedings key="conf/asiajcis/KawanakaKMIHBTT23" mdate="2024-01-22">
<author pid="366/4060">Shota Kawanaka</author>
<author pid="366/2456">Yoshikatsu Kashiwabara</author>
<author pid="213/3695">Kohei Miyamoto</author>
<author pid="307/5323">Masazumi Iida</author>
<author pid="186/6829">Chansu Han</author>
<author pid="80/861">Tao Ban</author>
<author pid="61/4099">Takeshi Takahashi 0001</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Packet-Level Intrusion Detection Using LSTM Focusing on Personal Information and Payloads.</title>
<pages>88-94</pages>
<year>2023</year>
<booktitle>AsiaJCIS</booktitle>
<ee>https://doi.org/10.1109/AsiaJCIS60284.2023.00024</ee>
<crossref>conf/asiajcis/2023</crossref>
<url>db/conf/asiajcis/asiajcis2023.html#KawanakaKMIHBTT23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cf/HeHT0T23" mdate="2023-08-31">
<author orcid="0000-0001-8767-817X" pid="254/9296">Tianxiang He</author>
<author orcid="0000-0002-1728-5300" pid="186/6829">Chansu Han</author>
<author orcid="0000-0003-0055-8234" pid="19/6453">Akira Tanaka</author>
<author orcid="0000-0002-6477-7770" pid="61/4099">Takeshi Takahashi 0001</author>
<author orcid="0000-0002-5819-3082" pid="08/7">Jun'ichi Takeuchi</author>
<title>Work in Progress: New Seed Set Selection Method of the Scalable Method for Constructing Phylogenetic Trees.</title>
<pages>364-365</pages>
<year>2023</year>
<booktitle>CF</booktitle>
<ee>https://doi.org/10.1145/3587135.3592820</ee>
<crossref>conf/cf/2023</crossref>
<url>db/conf/cf/cf2023.html#HeHT0T23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/compsac/OshioTHHTTT23" mdate="2023-08-07">
<author pid="331/7262">Kei Oshio</author>
<author pid="143/6910">Satoshi Takada</author>
<author pid="254/9296">Tianxiang He</author>
<author pid="186/6829">Chansu Han</author>
<author pid="19/6453">Akira Tanaka</author>
<author pid="61/4099">Takeshi Takahashi 0001</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Towards Functional Analysis of IoT Malware Using Function Call Sequence Graphs and Clustering.</title>
<pages>1552-1557</pages>
<year>2023</year>
<booktitle>COMPSAC</booktitle>
<ee>https://doi.org/10.1109/COMPSAC57700.2023.00239</ee>
<crossref>conf/compsac/2023</crossref>
<url>db/conf/compsac/compsac2023.html#OshioTHHTTT23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icissp/HanTT0ML23" mdate="2023-05-11">
<author pid="186/6829">Chansu Han</author>
<author pid="19/6453">Akira Tanaka</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<author pid="61/4099">Takeshi Takahashi 0001</author>
<author pid="320/8945">Tomohiro Morikawa</author>
<author pid="67/859">Tsung-Nan Lin</author>
<title>Towards Long-Term Continuous Tracing of Internet-Wide Scanning Campaigns Based on Darknet Analysis.</title>
<pages>617-625</pages>
<year>2023</year>
<booktitle>ICISSP</booktitle>
<ee>https://doi.org/10.5220/0011769300003405</ee>
<crossref>conf/icissp/2023</crossref>
<url>db/conf/icissp/icissp2023.html#HanTT0ML23</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2311-03852" mdate="2023-11-14">
<author pid="213/3695">Kohei Miyamoto</author>
<author pid="44/5985">Andrew R. Barron</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Improved MDL Estimators Using Fiber Bundle of Local Exponential Families for Non-exponential Families.</title>
<year>2023</year>
<volume>abs/2311.03852</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2311.03852</ee>
<url>db/journals/corr/corr2311.html#abs-2311-03852</url>
</article>
</r>
<r><article key="journals/access/HanTTI22" mdate="2022-02-23">
<author orcid="0000-0002-1728-5300" pid="186/6829">Chansu Han</author>
<author orcid="0000-0002-5819-3082" pid="08/7">Jun'ichi Takeuchi</author>
<author orcid="0000-0002-6477-7770" pid="61/4099">Takeshi Takahashi 0001</author>
<author pid="62/5563">Daisuke Inoue</author>
<title>Dark-TRACER: Early Detection Framework for Malware Activity Based on Anomalous Spatiotemporal Patterns.</title>
<pages>13038-13058</pages>
<year>2022</year>
<volume>10</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2022.3145966</ee>
<url>db/journals/access/access10.html#HanTTI22</url>
</article>
</r>
<r><article key="journals/access/IshibashiMHBTT22" mdate="2022-06-02">
<author pid="303/7696">Ryosuke Ishibashi</author>
<author orcid="0000-0002-0977-4155" pid="213/3695">Kohei Miyamoto</author>
<author orcid="0000-0002-1728-5300" pid="186/6829">Chansu Han</author>
<author orcid="0000-0002-9616-3212" pid="80/861">Tao Ban</author>
<author orcid="0000-0002-6477-7770" pid="61/4099">Takeshi Takahashi 0001</author>
<author orcid="0000-0002-5819-3082" pid="08/7">Jun'ichi Takeuchi</author>
<title>Generating Labeled Training Datasets Towards Unified Network Intrusion Detection Systems.</title>
<pages>53972-53986</pages>
<year>2022</year>
<volume>10</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2022.3176098</ee>
<url>db/journals/access/access10.html#IshibashiMHBTT22</url>
</article>
</r>
<r><inproceedings key="conf/iscc/OshioTHTT22" mdate="2022-10-25">
<author pid="331/7262">Kei Oshio</author>
<author pid="143/6910">Satoshi Takada</author>
<author pid="186/6829">Chansu Han</author>
<author pid="19/6453">Akira Tanaka</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Poster: Flexible Function Estimation of IoT Malware Using Graph Embedding Technique.</title>
<pages>1-3</pages>
<year>2022</year>
<booktitle>ISCC</booktitle>
<ee>https://doi.org/10.1109/ISCC55528.2022.9912475</ee>
<crossref>conf/iscc/2022</crossref>
<url>db/conf/iscc/iscc2022.html#OshioTHTT22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isit/IidaTT22" mdate="2022-08-08">
<author pid="307/5323">Masazumi Iida</author>
<author pid="135/5009">Yoshinari Takeishi</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>On Fisher Information Matrix for Simple Neural Networks with Softplus Activation.</title>
<pages>3001-3006</pages>
<year>2022</year>
<booktitle>ISIT</booktitle>
<ee>https://doi.org/10.1109/ISIT50566.2022.9834516</ee>
<crossref>conf/isit/2022</crossref>
<url>db/conf/isit/isit2022.html#IidaTT22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ispr/MiyamotoGIHB0T22" mdate="2023-11-17">
<author pid="213/3695">Kohei Miyamoto</author>
<author pid="66/7961">Hiroki Goto</author>
<author pid="303/7696">Ryosuke Ishibashi</author>
<author pid="186/6829">Chansu Han</author>
<author pid="80/861">Tao Ban</author>
<author pid="61/4099">Takeshi Takahashi 0001</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Malicious Packet Classification Based on Neural Network Using Kitsune Features.</title>
<pages>306-314</pages>
<year>2022</year>
<booktitle>ISPR</booktitle>
<ee>https://doi.org/10.1007/978-3-031-08277-1_25</ee>
<crossref>conf/ispr/2022</crossref>
<url>db/conf/ispr/ispr2022.html#MiyamotoGIHB0T22</url>
</inproceedings>
</r>
<r><article key="journals/access/SunBHTYTSQI21" mdate="2021-07-15">
<author pid="35/892">Bo Sun</author>
<author orcid="0000-0002-9616-3212" pid="80/861">Tao Ban</author>
<author orcid="0000-0002-1728-5300" pid="186/6829">Chansu Han</author>
<author orcid="0000-0002-6477-7770" pid="61/4099">Takeshi Takahashi 0001</author>
<author pid="66/3013">Katsunari Yoshioka</author>
<author orcid="0000-0002-5819-3082" pid="08/7">Jun'ichi Takeuchi</author>
<author pid="99/6172">Abdolhossein Sarrafzadeh</author>
<author pid="q/MeikangQiu">Meikang Qiu</author>
<author pid="62/5563">Daisuke Inoue</author>
<title>Leveraging Machine Learning Techniques to Identify Deceptive Decoy Documents Associated With Targeted Email Attacks.</title>
<pages>87962-87971</pages>
<year>2021</year>
<volume>9</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2021.3082000</ee>
<url>db/journals/access/access9.html#SunBHTYTSQI21</url>
</article>
</r>
<r><inproceedings key="conf/asiajcis/IshibashiGHBTT21" mdate="2021-10-14">
<author pid="303/7696">Ryosuke Ishibashi</author>
<author pid="66/7961">Hiroki Goto</author>
<author pid="186/6829">Chansu Han</author>
<author pid="80/861">Tao Ban</author>
<author pid="61/4099">Takeshi Takahashi 0001</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Which Packet Did They Catch? Associating NIDS Alerts with Their Communication Sessions.</title>
<pages>9-16</pages>
<year>2021</year>
<booktitle>AsiaJCIS</booktitle>
<ee>https://doi.org/10.1109/AsiaJCIS53848.2021.00012</ee>
<crossref>conf/asiajcis/2021</crossref>
<url>db/conf/asiajcis/asiajcis2021.html#IshibashiGHBTT21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fmec/HeHTKT21" mdate="2025-05-01">
<author pid="254/9296">Tianxiang He</author>
<author pid="186/6829">Chansu Han</author>
<author pid="61/4099">Takeshi Takahashi 0001</author>
<author orcid="0000-0001-6061-2330" pid="74/656">Shuji Kijima</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Scalable and Fast Hierarchical Clustering of IoT Malware Using Active Data Selection.</title>
<pages>1-6</pages>
<year>2021</year>
<booktitle>FMEC</booktitle>
<ee>https://doi.org/10.1109/FMEC54266.2021.9732550</ee>
<crossref>conf/fmec/2021</crossref>
<url>db/conf/fmec/fmec2021.html#HeHTKT21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/percom/TakahashiUHBFNY21" mdate="2021-10-14">
<author pid="61/4099">Takeshi Takahashi 0001</author>
<author pid="293/9946">Yuki Umemura</author>
<author pid="186/6829">Chansu Han</author>
<author pid="80/861">Tao Ban</author>
<author pid="218/3276">Keisuke Furumoto</author>
<author pid="293/9846">Ohnori Nakamura</author>
<author pid="66/3013">Katsunari Yoshioka</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<author orcid="0000-0002-4258-6877" pid="88/822">Noboru Murata</author>
<author pid="55/5380">Yoshiaki Shiraishi</author>
<title>Designing Comprehensive Cyber Threat Analysis Platform: Can We Orchestrate Analysis Engines?</title>
<pages>376-379</pages>
<year>2021</year>
<booktitle>PerCom Workshops</booktitle>
<ee>https://doi.org/10.1109/PerComWorkshops51409.2021.9431125</ee>
<crossref>conf/percom/2021w</crossref>
<url>db/conf/percom/percomw2021.html#TakahashiUHBFNY21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sac/KawasoeHI0T21" mdate="2021-05-03">
<author pid="291/2444">Reo Kawasoe</author>
<author pid="186/6829">Chansu Han</author>
<author pid="123/8335">Ryoichi Isawa</author>
<author pid="61/4099">Takeshi Takahashi 0001</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Investigating behavioral differences between IoT malware via function call sequence graphs.</title>
<pages>1674-1682</pages>
<year>2021</year>
<booktitle>SAC</booktitle>
<ee>https://doi.org/10.1145/3412841.3442041</ee>
<crossref>conf/sac/2021</crossref>
<url>db/conf/sac/sac2021.html#KawasoeHI0T21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/trustcom/HanTTI21" mdate="2022-05-30">
<author pid="186/6829">Chansu Han</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<author pid="61/4099">Takeshi Takahashi 0001</author>
<author pid="62/5563">Daisuke Inoue</author>
<title>Automated Detection of Malware Activities Using Nonnegative Matrix Factorization.</title>
<pages>548-556</pages>
<year>2021</year>
<booktitle>TrustCom</booktitle>
<ee>https://doi.org/10.1109/TrustCom53373.2021.00085</ee>
<crossref>conf/trustcom/2021</crossref>
<url>db/conf/trustcom/trustcom2021.html#HanTTI21</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2111-15256" mdate="2021-12-01">
<author pid="135/5009">Yoshinari Takeishi</author>
<author pid="307/5323">Masazumi Iida</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Approximate Spectral Decomposition of Fisher Information Matrix for Simple ReLU Networks.</title>
<year>2021</year>
<volume>abs/2111.15256</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2111.15256</ee>
<url>db/journals/corr/corr2111.html#abs-2111-15256</url>
</article>
</r>
<r><article key="journals/ieicetd/HanSTITN20" mdate="2021-07-25">
<author orcid="0000-0002-1728-5300" pid="186/6829">Chansu Han</author>
<author pid="11/10041">Jumpei Shimamura</author>
<author pid="61/4099">Takeshi Takahashi 0001</author>
<author pid="62/5563">Daisuke Inoue</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<author pid="97/3551">Koji Nakao</author>
<title>Real-Time Detection of Global Cyberthreat Based on Darknet by Estimating Anomalous Synchronization Using Graphical Lasso.</title>
<pages>2113-2124</pages>
<year>2020</year>
<volume>103-D</volume>
<journal>IEICE Trans. Inf. Syst.</journal>
<number>10</number>
<ee>https://doi.org/10.1587/transinf.2020EDP7076</ee>
<ee>http://search.ieice.org/bin/summary.php?id=e103-d_10_2113</ee>
<url>db/journals/ieicetd/ieicetd103.html#HanSTITN20</url>
</article>
</r>
<r><article key="journals/tit/KawakitaT20" mdate="2023-07-27">
<author orcid="0000-0003-4224-8939" pid="21/5244">Masanori Kawakita</author>
<author orcid="0000-0002-5819-3082" pid="08/7">Jun'ichi Takeuchi</author>
<title>Minimum Description Length Principle in Supervised Learning With Application to Lasso.</title>
<pages>4245-4269</pages>
<year>2020</year>
<volume>66</volume>
<journal>IEEE Trans. Inf. Theory</journal>
<number>7</number>
<ee type="oa">https://doi.org/10.1109/TIT.2020.2998577</ee>
<url>db/journals/tit/tit66.html#KawakitaT20</url>
</article>
</r>
<r><inproceedings key="conf/isita/MiyamotoT20" mdate="2021-03-22">
<author pid="213/3695">Kohei Miyamoto</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>On MDL Estimation for Simple Contaminated Gaussian Location Families.</title>
<pages>587-591</pages>
<year>2020</year>
<booktitle>ISITA</booktitle>
<ee>https://ieeexplore.ieee.org/document/9366112</ee>
<crossref>conf/isita/2020</crossref>
<url>db/conf/isita/isita2020.html#MiyamotoT20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iconip/HeHI0KTN19" mdate="2021-07-25">
<author pid="254/9296">Tianxiang He</author>
<author orcid="0000-0002-1728-5300" pid="186/6829">Chansu Han</author>
<author pid="123/8335">Ryoichi Isawa</author>
<author pid="61/4099">Takeshi Takahashi 0001</author>
<author orcid="0000-0001-6061-2330" pid="74/656">Shuji Kijima</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<author pid="97/3551">Koji Nakao</author>
<title>A Fast Algorithm for Constructing Phylogenetic Trees with Application to IoT Malware Clustering.</title>
<pages>766-778</pages>
<year>2019</year>
<booktitle>ICONIP (1)</booktitle>
<ee>https://doi.org/10.1007/978-3-030-36708-4_63</ee>
<crossref>conf/iconip/2019-1</crossref>
<url>db/conf/iconip/iconip2019-1.html#HeHI0KTN19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isit/MiyamotoBT19" mdate="2024-02-05">
<author orcid="0000-0002-0977-4155" pid="213/3695">Kohei Miyamoto</author>
<author pid="44/5985">Andrew R. Barron</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Improved MDL Estimators Using Local Exponential Family Bundles Applied to Mixture Families.</title>
<pages>1442-1446</pages>
<year>2019</year>
<booktitle>ISIT</booktitle>
<ee>https://doi.org/10.1109/ISIT.2019.8849350</ee>
<crossref>conf/isit/2019</crossref>
<url>db/conf/isit/isit2019.html#MiyamotoBT19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/itw/MimuraT19" mdate="2020-02-18">
<author pid="37/57">Kazushi Mimura</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Dynamics of Damped Approximate Message Passing Algorithms.</title>
<pages>1-5</pages>
<year>2019</year>
<booktitle>ITW</booktitle>
<ee>https://doi.org/10.1109/ITW44776.2019.8989237</ee>
<crossref>conf/itw/2019</crossref>
<url>db/conf/itw/itw2019.html#MimuraT19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/trustcom/HanS0IKTN19" mdate="2021-07-25">
<author orcid="0000-0002-1728-5300" pid="186/6829">Chansu Han</author>
<author pid="11/10041">Jumpei Shimamura</author>
<author pid="61/4099">Takeshi Takahashi 0001</author>
<author pid="62/5563">Daisuke Inoue</author>
<author pid="21/5244">Masanori Kawakita</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<author pid="97/3551">Koji Nakao</author>
<title>Real-Time Detection of Malware Activities by Analyzing Darknet Traffic Using Graphical Lasso.</title>
<pages>144-151</pages>
<year>2019</year>
<booktitle>TrustCom/BigDataSE</booktitle>
<ee>https://doi.org/10.1109/TrustCom/BigDataSE.2019.00028</ee>
<crossref>conf/trustcom/2019</crossref>
<url>db/conf/trustcom/trustcom2019.html#HanS0IKTN19</url>
</inproceedings>
</r>
<r><article key="journals/coap/TakahashiKST18" mdate="2020-07-14">
<author orcid="0000-0001-8222-5593" pid="27/2253">Norikazu Takahashi</author>
<author pid="158/5772">Jiro Katayama</author>
<author pid="51/4410">Masato Seki</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>A unified global convergence analysis of multiplicative update rules for nonnegative matrix factorization.</title>
<pages>221-250</pages>
<year>2018</year>
<volume>71</volume>
<journal>Comput. Optim. Appl.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s10589-018-9997-y</ee>
<url>db/journals/coap/coap71.html#TakahashiKST18</url>
</article>
</r>
<r><inproceedings key="conf/isita/EtoKT18" mdate="2019-03-28">
<author pid="237/8361">Munenori Eto</author>
<author pid="21/5244">Masanori Kawakita</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Asymptotic Behavior of Typical Sets and the Smallest High Probability Set.</title>
<pages>717-721</pages>
<year>2018</year>
<booktitle>ISITA</booktitle>
<ee>https://doi.org/10.23919/ISITA.2018.8664327</ee>
<crossref>conf/isita/2018</crossref>
<url>db/conf/isita/isita2018.html#EtoKT18</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-1801-02930" mdate="2018-08-13">
<author pid="135/5009">Yoshinari Takeishi</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>An Improved Analysis of Least Squares Superposition Codes with Bernoulli Dictionary.</title>
<year>2018</year>
<volume>abs/1801.02930</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1801.02930</ee>
<url>db/journals/corr/corr1801.html#abs-1801-02930</url>
</article>
</r>
<r><article key="journals/ml/KawakitaT17" mdate="2020-03-02">
<author orcid="0000-0003-4224-8939" pid="21/5244">Masanori Kawakita</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>A note on model selection for small sample regression.</title>
<pages>1839-1862</pages>
<year>2017</year>
<volume>106</volume>
<journal>Mach. Learn.</journal>
<number>11</number>
<ee type="oa">https://doi.org/10.1007/s10994-017-5645-5</ee>
<url>db/journals/ml/ml106.html#KawakitaT17</url>
</article>
</r>
<r><inproceedings key="conf/itw/TakeuchiN17" mdate="2018-02-03">
<author pid="08/7">Jun'ichi Takeuchi</author>
<author pid="79/663">Hiroshi Nagaoka</author>
<title>Information geometry of the family of Markov kernels defined by a context tree.</title>
<pages>429-433</pages>
<year>2017</year>
<booktitle>ITW</booktitle>
<ee>https://doi.org/10.1109/ITW.2017.8278008</ee>
<crossref>conf/itw/2017</crossref>
<url>db/conf/itw/itw2017.html#TakeuchiN17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icml/KawakitaT16" mdate="2019-05-29">
<author pid="21/5244">Masanori Kawakita</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Barron and Cover's Theory in Supervised Learning and its Application to Lasso.</title>
<pages>1958-1966</pages>
<year>2016</year>
<booktitle>ICML</booktitle>
<ee type="oa">http://proceedings.mlr.press/v48/kawakita16.html</ee>
<crossref>conf/icml/2016</crossref>
<url>db/conf/icml/icml2016.html#KawakitaT16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iconip/HanKTKT16" mdate="2021-07-25">
<author orcid="0000-0002-1728-5300" pid="186/6829">Chansu Han</author>
<author pid="186/6897">Kento Kono</author>
<author pid="186/6931">Shoma Tanaka</author>
<author pid="21/5244">Masanori Kawakita</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Botnet Detection Using Graphical Lasso with Graph Density.</title>
<pages>537-545</pages>
<year>2016</year>
<booktitle>ICONIP (1)</booktitle>
<ee>https://doi.org/10.1007/978-3-319-46687-3_59</ee>
<crossref>conf/iconip/2016-1</crossref>
<url>db/conf/iconip/iconip2016-1.html#HanKTKT16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iconip/TanakaKKMT16" mdate="2018-11-02">
<author pid="186/6931">Shoma Tanaka</author>
<author pid="166/2785">Yuki Kawamura</author>
<author pid="21/5244">Masanori Kawakita</author>
<author orcid="0000-0002-4258-6877" pid="88/822">Noboru Murata</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>MDL Criterion for NMF with Application to Botnet Detection.</title>
<pages>570-578</pages>
<year>2016</year>
<booktitle>ICONIP (1)</booktitle>
<ee>https://doi.org/10.1007/978-3-319-46687-3_63</ee>
<crossref>conf/iconip/2016-1</crossref>
<url>db/conf/iconip/iconip2016-1.html#TanakaKKMT16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isit/TakeishiT16" mdate="2017-05-24">
<author pid="135/5009">Yoshinari Takeishi</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>An improved upper bound on block error probability of least squares superposition codes with unbiased Bernoulli dictionary.</title>
<pages>1168-1172</pages>
<year>2016</year>
<booktitle>ISIT</booktitle>
<ee>https://doi.org/10.1109/ISIT.2016.7541483</ee>
<crossref>conf/isit/2016</crossref>
<url>db/conf/isit/isit2016.html#TakeishiT16</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/KawakitaT16" mdate="2018-08-13">
<author pid="21/5244">Masanori Kawakita</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Minimum Description Length Principle in Supervised Learning with Application to Lasso.</title>
<year>2016</year>
<volume>abs/1607.02914</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1607.02914</ee>
<url>db/journals/corr/corr1607.html#KawakitaT16</url>
</article>
</r>
<r><article key="journals/nn/KawakitaT14" mdate="2018-11-14">
<author pid="21/5244">Masanori Kawakita</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Safe semi-supervised learning based on weighted likelihood.</title>
<pages>146-164</pages>
<year>2014</year>
<volume>53</volume>
<journal>Neural Networks</journal>
<ee>https://doi.org/10.1016/j.neunet.2014.01.016</ee>
<ee>https://www.wikidata.org/entity/Q50678000</ee>
<url>db/journals/nn/nn53.html#KawakitaT14</url>
</article>
</r>
<r><article key="journals/tit/TakeishiKT14" mdate="2020-03-10">
<author pid="135/5009">Yoshinari Takeishi</author>
<author pid="21/5244">Masanori Kawakita</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Least Squares Superposition Codes With Bernoulli Dictionary are Still Reliable at Rates up to Capacity.</title>
<pages>2737-2750</pages>
<year>2014</year>
<volume>60</volume>
<journal>IEEE Trans. Inf. Theory</journal>
<number>5</number>
<ee>https://doi.org/10.1109/TIT.2014.2312728</ee>
<url>db/journals/tit/tit60.html#TakeishiKT14</url>
</article>
</r>
<r><inproceedings key="conf/isit/TakeuchiB14" mdate="2017-05-24">
<author pid="08/7">Jun'ichi Takeuchi</author>
<author pid="44/5985">Andrew R. Barron</author>
<title>Asymptotically minimax regret for models with hidden variables.</title>
<pages>3037-3041</pages>
<year>2014</year>
<booktitle>ISIT</booktitle>
<ee>https://doi.org/10.1109/ISIT.2014.6875392</ee>
<crossref>conf/isit/2014</crossref>
<url>db/conf/isit/isit2014.html#TakeuchiB14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/itw/TakeuchiB14" mdate="2017-05-22">
<author pid="08/7">Jun'ichi Takeuchi</author>
<author pid="44/5985">Andrew R. Barron</author>
<title>Stochastic Complexity for tree models.</title>
<pages>222-226</pages>
<year>2014</year>
<booktitle>ITW</booktitle>
<ee>https://doi.org/10.1109/ITW.2014.6970825</ee>
<crossref>conf/itw/2014</crossref>
<url>db/conf/itw/itw2014.html#TakeuchiB14</url>
</inproceedings>
</r>
<r><article key="journals/imt/FengHST13" mdate="2024-08-31">
<author pid="12/1181">Yaokai Feng</author>
<author pid="88/576">Yoshiaki Hori</author>
<author pid="16/3865">Kouichi Sakurai</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>A Behavior-based Method for Detecting Distributed Scan Attacks in Darknets.</title>
<pages>843-854</pages>
<year>2013</year>
<volume>8</volume>
<journal>Inf. Media Technol.</journal>
<number>3</number>
<ee>https://doi.org/10.11185/imt.8.843</ee>
<url>db/journals/imt/imt8.html#FengHST13</url>
<stream>streams/journals/imt</stream>
</article>
</r>
<r><article key="journals/jip/FengHST13" mdate="2021-02-16">
<author pid="12/1181">Yaokai Feng</author>
<author pid="88/576">Yoshiaki Hori</author>
<author pid="16/3865">Kouichi Sakurai</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>A Behavior-based Method for Detecting Distributed Scan Attacks in Darknets.</title>
<pages>527-538</pages>
<year>2013</year>
<volume>21</volume>
<journal>J. Inf. Process.</journal>
<number>3</number>
<ee type="oa">https://doi.org/10.2197/ipsjjip.21.527</ee>
<url>db/journals/jip/jip21.html#FengHST13</url>
</article>
</r>
<r><article key="journals/tit/TakeuchiKB13" mdate="2020-03-10">
<author pid="08/7">Jun'ichi Takeuchi</author>
<author pid="10/5426">Tsutomu Kawabata</author>
<author pid="44/5985">Andrew R. Barron</author>
<title>Properties of Jeffreys Mixture for Markov Sources.</title>
<pages>438-457</pages>
<year>2013</year>
<volume>59</volume>
<journal>IEEE Trans. Inf. Theory</journal>
<number>1</number>
<ee>https://doi.org/10.1109/TIT.2012.2219171</ee>
<url>db/journals/tit/tit59.html#TakeuchiKB13</url>
</article>
</r>
<r><inproceedings key="conf/camsap/KatayamaTT13" mdate="2025-10-14">
<author pid="158/5772">Jiro Katayama</author>
<author orcid="0000-0001-8222-5593" pid="27/2253">Norikazu Takahashi</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Boundedness of modified multiplicative updates for nonnegative matrix factorization.</title>
<pages>252-255</pages>
<year>2013</year>
<booktitle>CAMSAP</booktitle>
<ee>https://doi.org/10.1109/CAMSAP.2013.6714055</ee>
<crossref>conf/camsap/2013</crossref>
<url>db/conf/camsap/camsap2013.html#KatayamaTT13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isit/TakeishiKT13" mdate="2017-05-24">
<author pid="135/5009">Yoshinari Takeishi</author>
<author pid="21/5244">Masanori Kawakita</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Least squares superposition codes with Bernoulli dictionary are still reliable at rates up to capacity.</title>
<pages>1396-1400</pages>
<year>2013</year>
<booktitle>ISIT</booktitle>
<ee>https://doi.org/10.1109/ISIT.2013.6620456</ee>
<crossref>conf/isit/2013</crossref>
<url>db/conf/isit/isit2013.html#TakeishiKT13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/itw/TakeuchiB13" mdate="2017-05-22">
<author pid="08/7">Jun'ichi Takeuchi</author>
<author pid="44/5985">Andrew R. Barron</author>
<title>Asymptotically minimax regret by Bayes mixtures for non-exponential families.</title>
<pages>1-5</pages>
<year>2013</year>
<booktitle>ITW</booktitle>
<ee>https://doi.org/10.1109/ITW.2013.6691254</ee>
<crossref>conf/itw/2013</crossref>
<url>db/conf/itw/itw2013.html#TakeuchiB13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/est/YamaguchiKTT12" mdate="2023-03-23">
<author pid="119/7931">Kotaro Yamaguchi</author>
<author pid="21/5244">Masanori Kawakita</author>
<author orcid="0000-0001-8222-5593" pid="27/2253">Norikazu Takahashi</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Information Theoretic Limit of Single-Frame Super-Resolution.</title>
<pages>82-85</pages>
<year>2012</year>
<booktitle>EST</booktitle>
<ee>https://doi.org/10.1109/EST.2012.32</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/EST.2012.32</ee>
<crossref>conf/est/2012</crossref>
<url>db/conf/est/est2012.html#YamaguchiKTT12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iconip/YamauchiKT12" mdate="2017-05-24">
<author pid="120/8986">Sayaka Yamauchi</author>
<author pid="21/5244">Masanori Kawakita</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Botnet Detection Based on Non-negative Matrix Factorization and the MDL Principle.</title>
<pages>400-409</pages>
<year>2012</year>
<booktitle>ICONIP (5)</booktitle>
<ee>https://doi.org/10.1007/978-3-642-34500-5_48</ee>
<crossref>conf/iconip/2012-5</crossref>
<url>db/conf/iconip/iconip2012-5.html#YamauchiKT12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isit/TsurusakiT12" mdate="2017-05-24">
<author pid="12/11154">Mariko Tsurusaki</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Constant Markov Portfolio and its application to universal portfolio with side information.</title>
<pages>1623-1627</pages>
<year>2012</year>
<booktitle>ISIT</booktitle>
<ee>https://doi.org/10.1109/ISIT.2012.6283550</ee>
<crossref>conf/isit/2012</crossref>
<url>db/conf/isit/isit2012.html#TsurusakiT12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/saint/FengHST12" mdate="2023-03-23">
<author pid="12/1181">Yaokai Feng</author>
<author pid="88/576">Yoshiaki Hori</author>
<author pid="16/3865">Kouichi Sakurai</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>A Behavior-Based Detection Method for Outbreaks of Low-Rate Attacks.</title>
<pages>267-272</pages>
<year>2012</year>
<booktitle>SAINT</booktitle>
<ee>https://doi.org/10.1109/SAINT.2012.50</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SAINT.2012.50</ee>
<crossref>conf/saint/2012</crossref>
<url>db/conf/saint/saint2012.html#FengHST12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isit/TsurusakiT11" mdate="2017-05-24">
<author pid="12/11154">Mariko Tsurusaki</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Stochastic interpretation of universal portfolio and generalized target classes.</title>
<pages>390-394</pages>
<year>2011</year>
<booktitle>ISIT</booktitle>
<ee>https://doi.org/10.1109/ISIT.2011.6034153</ee>
<crossref>conf/isit/2011</crossref>
<url>db/conf/isit/isit2011.html#TsurusakiT11</url>
</inproceedings>
</r>
<r><inproceedings key="journals/jmlr/KawakitaITHTK11" mdate="2019-05-29">
<author pid="21/5244">Masanori Kawakita</author>
<author pid="20/10549">Ryota Izumi</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<author pid="77/1274">Yi Hu</author>
<author pid="70/10549">Tetsuya Takamori</author>
<author pid="21/10386">Hirokazu Kameyama</author>
<title>Acceleration technique for boosting classification and its application to face detection.</title>
<pages>335-349</pages>
<booktitle>ACML</booktitle>
<year>2011</year>
<crossref>conf/acml/2011</crossref>
<ee type="oa">http://proceedings.mlr.press/v20/kawakita11/kawakita11.pdf</ee>
<url>db/journals/jmlr/jmlrp20.html#KawakitaITHTK11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isita/KawakitaOT10" mdate="2017-05-25">
<author pid="21/5244">Masanori Kawakita</author>
<author pid="65/8822">Yoko Oie</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>A note on model selection for small sample regression.</title>
<pages>112-117</pages>
<year>2010</year>
<booktitle>ISITA</booktitle>
<ee>https://doi.org/10.1109/ISITA.2010.5649443</ee>
<crossref>conf/isita/2010</crossref>
<url>db/conf/isita/isita2010.html#KawakitaOT10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isit/Takeuchi09" mdate="2017-05-24">
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Fisher information determinant and stochastic complexity for Markov models.</title>
<pages>1894-1898</pages>
<year>2009</year>
<booktitle>ISIT</booktitle>
<ee>https://doi.org/10.1109/ISIT.2009.5205510</ee>
<crossref>conf/isit/2009</crossref>
<url>db/conf/isit/isit2009.html#Takeuchi09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iconip/InoueYEYNTON09" mdate="2022-10-02">
<author pid="62/5563">Daisuke Inoue</author>
<author orcid="0000-0003-0964-8631" pid="66/3013">Katsunari Yoshioka</author>
<author orcid="0000-0002-7699-5476" pid="60/6094">Masashi Eto</author>
<author pid="29/7230">Masaya Yamagata</author>
<author pid="29/7231">Eisuke Nishino</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<author pid="16/7230">Kazuya Ohkouchi</author>
<author pid="97/3551">Koji Nakao</author>
<title>An Incident Analysis System NICTER and Its Analysis Engines Based on Data Mining Techniques.</title>
<pages>579-586</pages>
<year>2008</year>
<booktitle>ICONIP (1)</booktitle>
<ee>https://doi.org/10.1007/978-3-642-02490-0_71</ee>
<crossref>conf/iconip/2009-1</crossref>
<url>db/conf/iconip/iconip2009-1.html#InoueYEYNTON09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isit/TakeuchiK07" mdate="2018-06-08">
<author pid="08/7">Jun'ichi Takeuchi</author>
<author pid="10/5426">Tsutomu Kawabata</author>
<title>Exponential Curvature of Markov Models.</title>
<pages>2891-2895</pages>
<year>2007</year>
<booktitle>ISIT</booktitle>
<ee>https://doi.org/10.1109/ISIT.2007.4557657</ee>
<crossref>conf/isit/2007</crossref>
<url>db/conf/isit/isit2007.html#TakeuchiK07</url>
</inproceedings>
</r>
<r><article key="journals/tkde/TakeuchiY06" mdate="2025-03-03">
<author pid="08/7">Jun'ichi Takeuchi</author>
<author orcid="0000-0001-7370-9991" pid="88/5479">Kenji Yamanishi</author>
<title>A Unifying Framework for Detecting Outliers and Change Points from Time Series.</title>
<pages>482-492</pages>
<year>2006</year>
<volume>18</volume>
<journal>IEEE Trans. Knowl. Data Eng.</journal>
<number>4</number>
<ee>https://doi.org/10.1109/TKDE.2006.1599387</ee>
<url>db/journals/tkde/tkde18.html#TakeuchiY06</url>
</article>
</r>
<r><article key="journals/tit/TakeuchiA05" mdate="2025-01-19">
<author pid="08/7">Jun'ichi Takeuchi</author>
<author pid="11/3260">Shun-ichi Amari</author>
<title>&#945;-parallel prior and its properties.</title>
<pages>1011-1023</pages>
<year>2005</year>
<volume>51</volume>
<journal>IEEE Trans. Inf. Theory</journal>
<number>3</number>
<ee>https://doi.org/10.1109/TIT.2004.842703</ee>
<ee>https://www.wikidata.org/entity/Q126245462</ee>
<url>db/journals/tit/tit51.html#TakeuchiA05</url>
</article>
</r>
<r><article key="journals/datamine/YamanishiTWM04" mdate="2025-03-03">
<author orcid="0000-0001-7370-9991" pid="88/5479">Kenji Yamanishi</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<author pid="w/GrahamJWilliams">Graham J. Williams</author>
<author pid="13/1738">Peter Milne</author>
<title>On-Line Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms.</title>
<pages>275-300</pages>
<year>2004</year>
<volume>8</volume>
<journal>Data Min. Knowl. Discov.</journal>
<number>3</number>
<ee>https://doi.org/10.1023/B:DAMI.0000023676.72185.7c</ee>
<url>db/journals/datamine/datamine8.html#YamanishiTWM04</url>
</article>
</r>
<r><inproceedings key="conf/kdd/NakataT04" mdate="2018-11-06">
<author pid="14/1987">Takayuki Nakata</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Mining traffic data from probe-car system for travel time prediction.</title>
<pages>817-822</pages>
<year>2004</year>
<crossref>conf/kdd/2004</crossref>
<booktitle>KDD</booktitle>
<ee>https://doi.org/10.1145/1014052.1016920</ee>
<url>db/conf/kdd/kdd2004.html#NakataT04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/kdd/MorinagaYT03" mdate="2025-03-03">
<author pid="34/4591">Satoshi Morinaga</author>
<author orcid="0000-0001-7370-9991" pid="88/5479">Kenji Yamanishi</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Distributed cooperative mining for information consortia.</title>
<pages>619-624</pages>
<year>2003</year>
<crossref>conf/kdd/2003</crossref>
<booktitle>KDD</booktitle>
<ee>https://doi.org/10.1145/956750.956829</ee>
<url>db/conf/kdd/kdd2003.html#MorinagaYT03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/kdd/YamanishiT02" mdate="2025-03-03">
<author orcid="0000-0001-7370-9991" pid="88/5479">Kenji Yamanishi</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>A unifying framework for detecting outliers and change points from non-stationary time series data.</title>
<pages>676-681</pages>
<year>2002</year>
<crossref>conf/kdd/2002</crossref>
<booktitle>KDD</booktitle>
<ee>https://doi.org/10.1145/775047.775148</ee>
<url>db/conf/kdd/kdd2002.html#YamanishiT02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/kdd/YamanishiT01" mdate="2025-03-03">
<author orcid="0000-0001-7370-9991" pid="88/5479">Kenji Yamanishi</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Discovering outlier filtering rules from unlabeled data: combining a supervised learner with an unsupervised learner.</title>
<pages>389-394</pages>
<year>2001</year>
<crossref>conf/kdd/2001</crossref>
<booktitle>KDD</booktitle>
<ee>https://doi.org/10.1145/502512.502570</ee>
<url>db/conf/kdd/kdd2001.html#YamanishiT01</url>
</inproceedings>
</r>
<r><article key="journals/jcss/TakeuchiAA00" mdate="2021-02-16">
<author pid="08/7">Jun'ichi Takeuchi</author>
<author pid="88/6485">Naoki Abe</author>
<author pid="11/3260">Shun-ichi Amari</author>
<title>The Lob-Pass Problem.</title>
<pages>523-557</pages>
<year>2000</year>
<volume>61</volume>
<journal>J. Comput. Syst. Sci.</journal>
<number>3</number>
<url>db/journals/jcss/jcss61.html#TakeuchiAA00</url>
<ee type="oa">https://doi.org/10.1006/jcss.2000.1718</ee>
</article>
</r>
<r><inproceedings key="conf/kdd/YamanishiTWM00" mdate="2025-03-03">
<author orcid="0000-0001-7370-9991" pid="88/5479">Kenji Yamanishi</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<author pid="w/GrahamJWilliams">Graham J. Williams</author>
<author pid="13/1738">Peter Milne</author>
<title>On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms.</title>
<pages>320-324</pages>
<year>2000</year>
<crossref>conf/kdd/2000</crossref>
<booktitle>KDD</booktitle>
<ee>https://doi.org/10.1145/347090.347160</ee>
<url>db/conf/kdd/kdd2000.html#YamanishiTWM00</url>
</inproceedings>
</r>
<r><article key="journals/amai/NakamuraTA98" mdate="2017-05-28">
<author pid="64/6487">Atsuyoshi Nakamura</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<author pid="88/6485">Naoki Abe</author>
<title>Efficient Distribution-Free Population Learning of Simple Concepts.</title>
<pages>53-82</pages>
<year>1998</year>
<volume>23</volume>
<journal>Ann. Math. Artif. Intell.</journal>
<number>1-2</number>
<url>db/journals/amai/amai23.html#NakamuraTA98</url>
<ee>https://doi.org/10.1023/A:1018908122958</ee>
</article>
</r>
<r><article key="journals/ieicet/Takeuchi95" mdate="2020-04-11">
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Improved Sample Complexity Bounds for Parameter Estimation.</title>
<pages>526-531</pages>
<year>1995</year>
<volume>78-D</volume>
<journal>IEICE Trans. Inf. Syst.</journal>
<number>5</number>
<ee>http://search.ieice.org/bin/summary.php?id=e78-d_5_526</ee>
<url>db/journals/ieicet/ieicet78d.html#Takeuchi95</url>
</article>
</r>
<r><inproceedings key="conf/alt/NakamuraAT94" mdate="2017-05-20">
<author pid="64/6487">Atsuyoshi Nakamura</author>
<author pid="88/6485">Naoki Abe</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Efficient Distribution-free Population Learning of Simple Concepts.</title>
<pages>500-515</pages>
<year>1994</year>
<crossref>conf/alt/1994</crossref>
<booktitle>AII/ALT</booktitle>
<url>db/conf/alt/alt1994.html#NakamuraAT94</url>
<ee>https://doi.org/10.1007/3-540-58520-6_86</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/colt/AbeT93" mdate="2018-11-06">
<author pid="88/6485">Naoki Abe</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>The &#34;lob-pass&#34; Problem and an On-line Learning Model of Rational Choice.</title>
<pages>422-428</pages>
<year>1993</year>
<crossref>conf/colt/1993</crossref>
<booktitle>COLT</booktitle>
<ee>https://doi.org/10.1145/168304.168389</ee>
<url>db/conf/colt/colt1993.html#AbeT93</url>
</inproceedings>
</r>
<r><inproceedings key="conf/alt/Takeuchi92" mdate="2017-05-20">
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Some Improved Sample Complexity Bounds in the Probabilistic PAC Learning Model.</title>
<pages>208-219</pages>
<year>1992</year>
<crossref>conf/alt/1992</crossref>
<booktitle>ALT</booktitle>
<url>db/conf/alt/alt1992.html#Takeuchi92</url>
<ee>https://doi.org/10.1007/3-540-57369-0_40</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/colt/AbeWT91" mdate="2016-07-12">
<author pid="88/6485">Naoki Abe</author>
<author pid="w/ManfredKWarmuth">Manfred K. Warmuth</author>
<author pid="08/7">Jun'ichi Takeuchi</author>
<title>Polynomial Learnability of Probabilistic Concepts with Respect to the Kullback-Leibler Divergence.</title>
<pages>277-289</pages>
<year>1991</year>
<crossref>conf/colt/1991</crossref>
<booktitle>COLT</booktitle>
<ee>http://dl.acm.org/citation.cfm?id=114863</ee>
<url>db/conf/colt/colt1991.html#AbeWT91</url>
</inproceedings>
</r>
<coauthors n="83" nc="3">
<co c="0"><na f="a/Abe:Naoki" pid="88/6485">Naoki Abe</na></co>
<co c="0"><na f="a/Amari:Shun=ichi" pid="11/3260">Shun-ichi Amari</na></co>
<co c="0"><na f="b/Ban:Tao" pid="80/861">Tao Ban</na></co>
<co c="0"><na f="b/Barron:Andrew_R=" pid="44/5985">Andrew R. Barron</na></co>
<co c="0"><na f="e/Eto:Masashi" pid="60/6094">Masashi Eto</na></co>
<co c="0"><na f="e/Eto:Munenori" pid="237/8361">Munenori Eto</na></co>
<co c="0"><na f="f/Feng:Yaokai" pid="12/1181">Yaokai Feng</na></co>
<co c="0"><na f="f/Fujita:Akira" pid="97/3642">Akira Fujita</na></co>
<co c="0"><na f="f/Furumoto:Keisuke" pid="218/3276">Keisuke Furumoto</na></co>
<co c="0"><na f="g/Goto:Hiroki" pid="66/7961">Hiroki Goto</na></co>
<co c="0"><na f="h/Han:Chansu" pid="186/6829">Chansu Han</na></co>
<co c="0"><na f="h/He:Tianxiang" pid="254/9296">Tianxiang He</na></co>
<co c="0"><na f="h/Ho:Ka_Long_Keith" pid="409/2434">Ka Long Keith Ho</na></co>
<co c="0"><na f="h/Hori:Yoshiaki" pid="88/576">Yoshiaki Hori</na></co>
<co c="0"><na f="h/Hu:Yi" pid="77/1274">Yi Hu</na></co>
<co c="0"><na f="h/Huang:Xuping" pid="80/2439">Xuping Huang</na></co>
<co c="0"><na f="i/Iida:Masazumi" pid="307/5323">Masazumi Iida</na></co>
<co c="0"><na f="i/Inoue:Daisuke" pid="62/5563">Daisuke Inoue</na></co>
<co c="0"><na f="i/Isawa:Ryoichi" pid="123/8335">Ryoichi Isawa</na></co>
<co c="0"><na f="i/Ishibashi:Ryosuke" pid="303/7696">Ryosuke Ishibashi</na></co>
<co c="0"><na f="i/Ishida:Yuki" pid="224/9652">Yuki Ishida</na></co>
<co c="0"><na f="i/Iwamoto:Kazuki" pid="50/1311">Kazuki Iwamoto</na></co>
<co c="0"><na f="i/Izumi:Ryota" pid="20/10549">Ryota Izumi</na></co>
<co c="2"><na f="j/Jitsumatsu:Yutaka" pid="29/1971">Yutaka Jitsumatsu</na></co>
<co c="0"><na f="k/Kameyama:Hirokazu" pid="21/10386">Hirokazu Kameyama</na></co>
<co c="0"><na f="k/Kashiwabara:Yoshikatsu" pid="366/2456">Yoshikatsu Kashiwabara</na></co>
<co c="0"><na f="k/Katayama:Jiro" pid="158/5772">Jiro Katayama</na></co>
<co c="0"><na f="k/Kawabata:Tsutomu" pid="10/5426">Tsutomu Kawabata</na></co>
<co c="0"><na f="k/Kawakita:Masanori" pid="21/5244">Masanori Kawakita</na></co>
<co c="0"><na f="k/Kawamura:Yuki" pid="166/2785">Yuki Kawamura</na></co>
<co c="0"><na f="k/Kawanaka:Shota" pid="366/4060">Shota Kawanaka</na></co>
<co c="0"><na f="k/Kawasoe:Reo" pid="291/2444">Reo Kawasoe</na></co>
<co c="0"><na f="k/Kijima:Shuji" pid="74/656">Shuji Kijima</na></co>
<co c="0"><na f="k/Kono:Kento" pid="186/6897">Kento Kono</na></co>
<co c="2"><na f="k/Kuhara:Shigehide" pid="125/0250">Shigehide Kuhara</na></co>
<co c="2"><na f="k/Kurosaki:Sho" pid="361/6899">Sho Kurosaki</na></co>
<co c="0" n="2"><na f="l/Lin:Tsungnan" pid="67/859">Tsungnan Lin</na><na>Tsung-Nan Lin</na></co>
<co c="0"><na f="m/Ma:Kensei" pid="419/6610">Kensei Ma</na></co>
<co c="1"><na f="m/Milne:Peter" pid="13/1738">Peter Milne</na></co>
<co c="0"><na f="m/Mimura:Kazushi" pid="37/57">Kazushi Mimura</na></co>
<co c="0"><na f="m/Miyamoto:Kohei" pid="213/3695">Kohei Miyamoto</na></co>
<co c="0"><na f="m/Morikawa:Tomohiro" pid="320/8945">Tomohiro Morikawa</na></co>
<co c="1"><na f="m/Morinaga:Satoshi" pid="34/4591">Satoshi Morinaga</na></co>
<co c="0"><na f="m/Murata:Noboru" pid="88/822">Noboru Murata</na></co>
<co c="0"><na f="n/Nagaoka:Hiroshi" pid="79/663">Hiroshi Nagaoka</na></co>
<co c="0"><na f="n/Nakamura:Atsuyoshi" pid="64/6487">Atsuyoshi Nakamura</na></co>
<co c="0"><na f="n/Nakamura:Ohnori" pid="293/9846">Ohnori Nakamura</na></co>
<co c="0"><na f="n/Nakao:Koji" pid="97/3551">Koji Nakao</na></co>
<co c="1"><na f="n/Nakata:Takayuki" pid="14/1987">Takayuki Nakata</na></co>
<co c="0"><na f="n/Nishino:Eisuke" pid="29/7231">Eisuke Nishino</na></co>
<co c="0"><na f="o/Ohkouchi:Kazuya" pid="16/7230">Kazuya Ohkouchi</na></co>
<co c="0"><na f="o/Oie:Yoko" pid="65/8822">Yoko Oie</na></co>
<co c="0"><na f="o/Oshio:Kei" pid="331/7262">Kei Oshio</na></co>
<co c="0"><na f="q/Qiu:Meikang" pid="q/MeikangQiu">Meikang Qiu</na></co>
<co c="0"><na f="s/Sakurai:Kouichi" pid="16/3865">Kouichi Sakurai</na></co>
<co c="0"><na f="s/Sarrafzadeh:Abdolhossein" pid="99/6172">Abdolhossein Sarrafzadeh</na></co>
<co c="0"><na f="s/Sasaki:Takayuki" pid="34/3589">Takayuki Sasaki</na></co>
<co c="0"><na f="s/Seki:Masato" pid="51/4410">Masato Seki</na></co>
<co c="0"><na f="s/Shikata:Junji" pid="65/4968">Junji Shikata</na></co>
<co c="0"><na f="s/Shimamura:Jumpei" pid="11/10041">Jumpei Shimamura</na></co>
<co c="0"><na f="s/Shiraishi:Yoshiaki" pid="55/5380">Yoshiaki Shiraishi</na></co>
<co c="2"><na f="s/Sultana:Tania" pid="165/9407">Tania Sultana</na></co>
<co c="0"><na f="s/Sun:Bo" pid="35/892">Bo Sun</na></co>
<co c="0"><na f="t/Takada:Kazuki" pid="357/2871">Kazuki Takada</na></co>
<co c="0"><na f="t/Takada:Satoshi" pid="143/6910">Satoshi Takada</na></co>
<co c="0"><na f="t/Takahashi:Norikazu" pid="27/2253">Norikazu Takahashi</na></co>
<co c="0"><na f="t/Takahashi_0001:Takeshi" pid="61/4099">Takeshi Takahashi 0001</na></co>
<co c="0"><na f="t/Takamori:Tetsuya" pid="70/10549">Tetsuya Takamori</na></co>
<co c="0"><na f="t/Takeishi:Yoshinari" pid="135/5009">Yoshinari Takeishi</na></co>
<co c="0"><na f="t/Takeuchi:Masaru" pid="58/546">Masaru Takeuchi</na></co>
<co c="0"><na f="t/Tanabe:Rui" pid="185/2301">Rui Tanabe</na></co>
<co c="0"><na f="t/Tanaka:Akira" pid="19/6453">Akira Tanaka</na></co>
<co c="0"><na f="t/Tanaka:Shoma" pid="186/6931">Shoma Tanaka</na></co>
<co c="-1"><na f="t/Tsurusaki:Mariko" pid="12/11154">Mariko Tsurusaki</na></co>
<co c="0"><na f="u/Umemura:Yuki" pid="293/9946">Yuki Umemura</na></co>
<co c="0"><na f="w/Warmuth:Manfred_K=" pid="w/ManfredKWarmuth">Manfred K. Warmuth</na></co>
<co c="1"><na f="w/Williams:Graham_J=" pid="w/GrahamJWilliams">Graham J. Williams</na></co>
<co c="0"><na f="y/Yamagata:Masaya" pid="29/7230">Masaya Yamagata</na></co>
<co c="0"><na f="y/Yamaguchi:Kotaro" pid="119/7931">Kotaro Yamaguchi</na></co>
<co c="1"><na f="y/Yamanishi:Kenji" pid="88/5479">Kenji Yamanishi</na></co>
<co c="0"><na f="y/Yamauchi:Sayaka" pid="120/8986">Sayaka Yamauchi</na></co>
<co c="0"><na f="y/Yanai:Naoto" pid="95/8821">Naoto Yanai</na></co>
<co c="0"><na f="y/Yoshioka:Katsunari" pid="66/3013">Katsunari Yoshioka</na></co>
</coauthors>
</dblpperson>

