


default search action
JSAI 2025: Osaka, Japan
- Yukiko I. Nakano

, Toyotaro Suzumura
:
New Frontiers in Artificial Intelligence - JSAI International Symposium on Artificial Intelligence, JSAI-isAI 2025, Osaka, Japan, May 26-27, 2025, Proceedings. Lecture Notes in Computer Science 15692, Springer 2025, ISBN 978-981-96-7070-3
JURISIN 2025
- Ngoc-Duy Mai, Minh-Tuan Nguyen, Van-Huan Nguyen, Xuan-Bach Le, Ha-Thanh Nguyen, Ken Satoh, Hideaki Takeda, Thi-Hai-Yen Vuong:

Towards Accurate Legal Term Detection: Insights from Dependency Tree-Based and Large Language Model Approaches. 3-19 - Livio Robaldo

, Davide Liga
:
On the Interplay Between Entailments Among Obligations and their Violations. 20-35 - Jia-Yin Du

, Peng-Yuan Li:
Legal Regulation of Knowledge Distillation: From a Trade Secret Perspective. 36-48 - Bianca Steffes

, Nils Torben Wiedemann:
Generating Guiding Principles: Evaluating Large Language Models for Complex German Legal Summaries. 49-65 - Wachara Fungwacharakorn

, Kanae Tsushima
, Hiroshi Hosobe
, Hideaki Takeda
, Ken Satoh
:
On the Normative Status and Argumentation Semantics of Soft-Constraint Norms. 66-79 - Michele Corazza

, Salvatore Sapienza
, Monica Palmirani
, Generoso Longo
, Leonardo Zilli
, Emanuele Di Sante
:
Hybrid AI for Supporting the European Drafting Legislation. 80-95 - Chao-Lin Liu, Po-Hsien Wu, Yi-Ting Yu:

Labeling Case Similarity Based on Co-Citation of Legal Articles in Judgment Documents with Empirical Dispute-Based Evaluation. 96-113 - Taiyo Maehara

, Tomoya Sano
, Yoichi Takenaka
:
Automating the Creation of Legislative Article Histories in Japanese Commercial Law: A Method for Identifying Corresponding Articles Before and After Amendments. 114-129 - Diogo Sasdelli

, Bianca Steffes
:
PROLEG and Normative Diagrams. 130-145 - Toshinori Takahashi, Tarou Shibuya, Makoto Nakamura:

A Multilingual Legal Provision Mapping Across Jurisdictions: A One-to-Many Approach. 146-160 - Ho-Chien Huang

, Chao-Lin Liu
:
Nearest-Neighbor Search or Distance-Based Search, Which is Better for Finding Relevant Articles? 161-175
SCIDOCA 2025
- Dang Hoang Anh, Vu Tran

, Nguyen Le Minh:
Analyzing Logical Fallacies in Large Language Models: A Study on Hallucination in Mathematical Reasoning. 179-195 - Dieu-Hien Nguyen

, Nguyen-Khang Le
, Le-Minh Nguyen
:
AuthNet: A Framework for Research Expert Discovery and Network Visualization Based on Topic-Specific Queries. 196-209 - Tuan-An Dao

, Hiroki Teranishi
, Yuji Matsumoto
, Akiko Aizawa
:
Entity-Based Synthetic Data Generation for Named Entity Recognition in Low-Resource Domains. 210-225 - Dat Le, Son Nguyen:

Embedding-Based Retrieval Approaches for Automated Citation Prediction. 226-236 - Long Do Ngoc, Hieu Phi Minh, Toan Tran Tien, Anh Phan Viet:

An Attention-Driven Framework for Citation Discovery and Recommendation. 237-249
AI-Biz 2025
- Marina Yagi

, Sejun Woo
, Ying Zhang, Hiroshi Takahashi
:
Financial Inclusion with Large Language Models: Prompt Design and Evaluation for Easy Japanese Generation. 255-269 - Grace-Sakura Izawa, Akiko Kawahara, Ryoko Madono, Ryo Yoshioka, Ryo Yoshida, Takashi Yamada

:
How Students Made Use of an On-Campus Car Sharing System in a University of a Regional Area in Japan. 270-282 - Sejun Woo

, Eiji Murakami, Hiroshi Takahashi
:
Developing an Energy Utilization Mechanism for Sustainable Societies: Household Fuel Cells (Ene-Farm), the J-Credit Scheme, and Collaborative Models. 283-297 - Jing Wang, Akinobu Sakata, Shingo Takahashi:

Analyzing the Impact of Cognitive Representation on the Performance of Post-Merger Companies. 298-311 - Mari Ueda:

Research on Information Transmission Methods in Consideration of Regional Characteristics to Promote Evacuation Actions During Flood Disasters. 312-324
AI Security and Privacy 2025
- Rodrigo Roman

:
Design of a Bachelor's Degree in Cybersecurity and Artificial Intelligence. 327-339 - Hiroaki Maeshima, Akira Otsuka

:
Robustness Bounds on the Successful Adversarial Examples in Probabilistic Models: Implications from Gaussian Processes. 340-354 - Ryotaro Toma, Hiroaki Kikuchi

:
Empirical Evaluation of Record Reconstruction Risk from Model Explanations with Differential Privacy. 355-367 - Yeonhee Kim

, Jeeeun Park, Jongkil Kim
:
Anomaly Detection for Multi-tenant Networks Based on AutoEncoder. 368-382 - Stephen A. Holmes

:
Cryptographic Authentication for Private RAG-Enabled LLMs. 383-396

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














