Header

Program

K.1 Keynote Lecture I
Dec. 8 Wed.14:10〜15:50 Hikarinoma+Kazenoma
Chair: Hiroki Koga (University of Tsukuba)
K.1.1 The Black Hole Shadow Imaging of the Event Horizon Telescope Collaboration and Data Science
○Shiro Ikeda (The Institute of Statistical Mathematics)
K.1.2 Post-Quantum Cryptography – Focusing on Code-Based Cryptography –
○Keita Xagawa (Nippon Telegraph and Telephone Corporation)
K.2 Keynote Lecture II
Dec. 8 Wed.16:10〜17:50 Hikarinoma+Kazenoma
Chair: Motohiko Isaka (Kwansei Gakuin University)
K.2.1 Automorphism Group and Weight Distribution Computation for Linear Block Codes
○Toru Fujiwara (Osaka University)
K.2.2 Various Applied Technologies from Information Theory Supporting Cyber Society
○Masakatsu Morii (Kobe University)
1.1 Quantum Information Theory I -Quantum Error Correction-
Dec. 9 Thu.10:00〜11:20 Hikarinoma
Chair: Hiroshi Nagaoka (The University of Electro-Communications)
1.1.1 Commutativity of Kraus Operators for Quantum Deletion/Insertion Errors and Other Errors
◎Yuma Adachi (Meijo University), Shogo Usami (Meijo University), Tsuyoshi Sasaki Usuda (Aichi Prefectural University)
1.1.2 Single Quantum Insertion Error-Correcting Codes
◎Taro Shibayama (Chiba University), Manabu Hagiwara (Chiba University)
1.1.3 Explicit Method to Make Shortened EAQECC from QECC
◎Daiki Ueno (Tokyo Institute of Technology), Ryutaroh Matsumoto (Tokyo Institute of Technology)
1.1.4 Lee Weight for Nonbinary Quantum Error Correction
○Ryutaroh Matsumoto (Tokyo Institute of Technology)
1.2 Coding Theory I
Dec. 9 Thu.10:00〜11:20 Kazenoma
Chair: Masaya Fujisawa (Tokyo University of Science)
1.2.1 Factorization and Composition of Reversible Quasi-Cyclic Codes by Chinese Remainder Theorem
◎Norifumi Ojiro (Toyota Technological Institute), Kakeru Kaneko (Toyota Technological Institute), Hajime Matsui (Toyota Technological Institute)
1.2.2 Finding Reversible and Self-Dual Quasi-Cyclic Codes with High Error Correction Capability
◎Kakeru Kaneko (Toyota Technological Institute), Norifumi Ojiro (Toyota Technological Institute), Hajime Matsui (Toyota Technological Institute)
1.2.3 Research on Effect of Interleaving under Varying Models of Burst Error Communication Channels
◎Yuki Ishikawa (Tokai University), Hiroshi Yamamoto (Tokai University)
1.2.4 Improvement of Recognition Accuracy of Unreadable QR Code by Using GMD Decoding
◎Itsuki Hashimoto (Kobe University), Yoshiaki Shiraishi (Kobe University), Masakatu Morii (Kobe University)
1.3 Statistical Machine Learning I
Dec. 9 Thu.10:00〜11:20 Tsubasanoma
Chair: Mimura Kazushi (Hiroshima City University)
1.3.1 Bayes Optimal Estimation and Its Approximation Algorithm for the Difference with and without Measures for Population under the URL Model
◎Taisuke Ishiwatari (Waseda University), Shota Saito (Gunma University), Yuta Nakahara (Waseda University), Yuji Iikubo (Waseda University), Toshiyasu Matsushima (Waseda University)
1.3.2 Bayes Optimal Estimation and Its Approximation Algorithm for the Difference with and without Measures on New Sample under URL Model
◎Kazuki Yamada (Waseda University), Yuta Nakahara (Waseda University), Shota Saito (Gunma University), Yuji Iikubo (Waseda University), Toshiyasu Matsushima (Waseda University)
1.3.3 Probability Distribution on Full Rooted Trees
◎Yuta Nakahara (Waseda University), Shota Saito (Gumma University), Akira Kamatsuka (Shonan Institute of Technology), Toshiyasu Matsushima (Waseda University)
1.3.4 Conditional Average Treatment Effect Estimation based on Partially Linear Model with Gaussian Process Prior
○Shunsuke Horii (Waseda University)
1.4 Signal Processing / Pattern Recognition
Dec. 9 Thu.10:00〜11:20 Kagayakinoma
Chair: Manabu Kobayashi (Waseda University)
1.4.1 Visualization Analysis of Relationships between Employees Focusing on Content of Communication on Business Chat
◎Tatsuya Kawakami (Waseda University), Haruka Yamashita (Sophia University), Hajime Hotta (Laboratik Inc.), Masayuki Goto (Waseda University)
1.4.2 A Method for Automatic Generation of New Product Images of Fresh Flowers Based on CVAE Co-learning of Purchase History and Image Information
◎Aya Kitasato (Waseda University), Gendo Kumoi (Waseda University), Masayuki Goto (Waseda University)
1.4.3 A Proposal for an Extended Translation-based Recommendation Model Considering Sequential Purchased Product Information
◎Yashu Li (Waseda University), Ayako Yamagiwa (Waseda University), Tianxiang Yang (Waseda University), Masayuki Goto (Waseda University)
1.4.4 The Optimal Denoising Algorithm under The Bayesian Criterion in case The Best 2D Discrete Wavelet Packets Basis Is Unknown
◎Ryohei Oka (Waseda University), Yuta Nakahara (Waseda University), Toshiyasu Matsushima (Waseda University)
2.1 Quantum Information Theory II -Quantum Communication-
Dec. 9 Thu.11:40〜13:00 Hikarinoma
Chair: Jun Suzuki (The University of Electro-Communications)
2.1.1 Characteristics of Upper Bound of Quantum Reliability Function for M-ary PSK Signals and Application to Security Evaluation of KCQ Quantum Cryptographic Protocol
◎Ei Morimoto (Aichi Prefectural University), Ryota Nakagawa (Aichi Prefectural University), Tiancheng Wang (Aichi Prefectural University), Tsuyoshi Sasaki Usuda (Aichi Prefectural University)
2.1.2 Geometric Representation of the Belavkin Weighted Square-root Measurement for Trine States
◎Shogo Isokawa (Aichi Prefectural University), Ryota Nakagawa (Aichi Prefectural University), Tiancheng Wang (Aichi Prefectural University), Souichi Takahira (Osaka University), Tsuyoshi Sasaki Usuda (Aichi Prefectural University)
2.1.3 Effect of Coding on CPPM-Type KCQ Protocol Using Direct Detection
◎Yuki Wakahara (Meijo University), Yuma Adachi (Meijo University), Shogo Usami (Meijo University), Tsuyoshi Sasaki Usuda (Aichi Prefectural University)
2.1.4 On Multi-Level Modulation of Asymmetric Quantum Communication Using Quasi-Bell State
◎Suguru Sameshima (Meijo University), Tiancheng Wang (Aichi Prefectural University), Shogo Usami (Meijo University), Tsuyoshi Sasaki Usuda (Aichi Prefectural University)
2.2 Coding Theory II
Dec. 9 Thu.11:40〜13:00 Kazenoma
Chair: Takayuki Nozaki (Yamaguchi University)
2.2.1 Annealing Method for Deep Learning: Damped AMP Decoding Network for Sparse Superposition Codes
◎Toshihiro Yoshida (Toyohashi University of Technology), Keigo Takeuchi (Toyohashi University of Technology)
2.2.2 A Study on Irregular Multi-Kernel Polar Codes
◎Tomohiro Higuchi (Tokyo University of Science), Ryo Shibata (Tokyo University of Science), Hiroyuki Yashima (Tokyo University of Science)
2.2.3 Correcting Insertions and Deletions Using Cryptographic Hash Functions
◎Yasuaki Haseba (Osaka University), Kenji Yasunaga (Tokyo Institute of Technology)
2.3 Statistical Machine Learning II
Dec. 9 Thu.11:40〜13:00 Tsubasanoma
Chair: Takahiro Yoshida (Nihon University)
2.3.1 A Study on Demand Prediction for Seasonal Second-hand Fashion Items Based on a Two-Stage Machine Learning Prediction Model
◎Fuyu Saito (Waseda University), Haruka Yamashita (Sophia University), Hokuto Sasaki (ZOZO, Inc.), Masayuki Goto (Waseda University)
2.3.2 Time Window Topic Model for Analyzing Customer Browsing Behavior
◎Fumiyo Ito (Waseda University), Gendo Kumoi (Waseda University), Masayuki Goto (Waseda University)
2.3.3 A Study on a Demand Forecasting Model for Side Dish Items Based on Multi-task Learning Considering Sold Out Information
◎Ryosuke Uehara (Waseda University), Gendo Kumoi (Waseda University), Masayuki Goto (Waseda University), Tomohiro Yoshikai (Japan Weather Association)
2.3.4 Multivalued Classification Performance Based on Estimation Error of Binary Classifiers
◎Gendo Kumoi (Waseda University), Hideki Yagi (The University of Electro-Communications), Manabu Kobayashi (Waseda University), Masayuki Goto (Waseda University), Shigeichi Hirasawa (Waseda University)
2.4 Compressed Sensing and Sparsity
Dec. 9 Thu.11:40〜13:00 Kagayakinoma
Chair: Mimura Kazushi (Hiroshima City University)
2.4.1 Reduction of Communication Cost in Distributed Orthogonal Approximate Message Passing
◎Ken Hisanaga (Kwansei Gakuin University), Motohiko Isaka (Kwansei Gakuin University)
2.4.2 Hyper-Parameter Estimation of L1 Trend Filtering by Variational Approximation
◎Akiharu Omae (Toyohashi University of Technology), Kazuho Watanabe (Toyohashi University of Technology)
2.4.3 Deep Unfolded-Neumann Series Method for Accelerating Inversion of Linear Transformations
◎Yuan Qi (Nagoya Institute of Technology), Tadashi Wadayama (Nagoya Institute of Technology)
2.4.4 Optimized Sensing Matrices for Signal Recovery of Multivariate Complex Gaussian Vectors
◎Kento Yokoyama (Nagoya Institute of Technology), Tadashi Wadayama (Nagoya Institute of Technology)
3.1 Quantum Information Theory III -Fundamentals-
Dec. 9 Thu.15:00〜16:20 Hikarinoma
Chair: Souichi Takahira (Osaka University)
3.1.1 A Mathematical Formulation of Polarizing Beam Splitters and Its Application to Quantum Computer
◎Masaki Nakazato (Tokyo University of Science), Noboru Watanabe (Tokyo University of Science)
3.1.2 Quantum Information Geometry of Weakly Contaminated Models
○Jun Suzuki (The University of Electro-Communications)
3.1.3 A Distance Measure Induced from the Remote Cramer-Rao Inequality
○Hiroshi Nagaoka (The University of Electro-Communications), Hiroyasu Tajima (The University of Electro-Communications)
3.2 Coding and Signal Processing for Strorage
Dec. 9 Thu.15:00〜16:20 Kazenoma
Chair: Akiko Manada (Nagaoka University of Technology)
3.2.1 Encoding Algorithm for Maximum Run-Length Limited Non-Binary Tenengolts' Codes
◎Reona Takemoto (Yamaguchi University), Takayuki Nozaki (Yamaguchi University)
3.2.2 Balanced Coding with Lehmer Code
○Hiroshi Kamabe (Gifu University), Takumi Marumo (Gifu University), Shan Lu (Gifu University)
3.2.3 Signal Processing Schemes for Heated Dot Magnetic Recording with Double-layered Bit Patterned Media
○Hidetoshi Saito (Kogakuin University)
3.3 Information Theoretic Security
Dec. 9 Thu.15:00〜16:20 Tsubasanoma
Chair: Mitsugu Iwamoto (The University of Electro-Communications)
3.3.1 Multiplex Secret Sharing Schemes
○Hirosuke Yamamoto (The University of Tokyo)
3.3.2 Secure Broadcasting of Two Encrypted Sources and Wire-Tap Channels
◎Kazuma Nishiyama (The University of Electro-Communications), Yasutada Oohama (The University of Electro-Communications)
3.3.3 Secrecy Amplification of Broadcasting Two Encrypted Sources using Reed-Solomon Codes and Security Analysis
◎Kazuma Nishiyama (The University of Electro-Communications), Yasutada Oohama (The University of Electro-Communications)
3.3.4 A Generalization of the Stratonovich's Value of Information and Application to Privacy-Utility Trade-off
◎Akira Kamatsuka (Shonan Institute of Technology), Takahiro Yoshida (Nihon University), Toshiyasu Matsushima (Waseda University)
4.1 Stochastic Processes and Coding
Dec. 10 Fri.10:00〜11:00 Hikarinoma
Chair: Tetsunao Matsuta (Saitama University)
4.1.1 The Exponential Family of Reversible Markov Kernels
◎Geoffrey Wolfer (Tokyo University of Agriculture and Technology), Shun Watanabe (Tokyo University of Agriculture and Technology)
4.1.2 A Sufficient Condition on Uniquely Decodable Substrings and their Weights for Antidictionary Coding
○Takahiro Ota (Senshu University), Akiko Manada (Nagaoka University of Technology)
4.1.3 A Study of Computability in Distributed Computing With Joint Source-Channel Coding Over Multiple-Access Channel
◎Naruki Joki (Wakayama University), Shigeaki Kuzuoka (Wakayama University)
4.2 Coding Theory III
Dec. 10 Fri.10:00〜11:00 Kazenoma
Chair: Hidetoshi Saito (Kogakuin University)
4.2.1 Nested Lattice Codes With Regular Simplex Coarse Lattices
◎Leli Han (Kyushu University), Yutaka Jitsumatsu (Tokyo Institute of Technology)
4.2.2 Continuous Error Correcting Dynamical Systems based on Stochastic Differential Equations
○Tadashi Wadayama (Nagoya Institute of Technology)
4.2.3 A Study on Delayed Bit-Interleaved Coded Modulation
○Gou Hosoya (Waseda University)
4.3 Secure Computation
Dec. 10 Fri.10:00〜11:00 Tsubasanoma
Chair: Hirosuke Yamamoto (The University of Tokyo)
4.3.1 A Note on Secure Distributed Matrix Multiplication Methods Based on Secret Sharing Systems with General Access Structures
◎Koki Kazama (Waseda University), Toshiyasu Matsushima (Waseda University)
4.3.2 A Study on Information Security Scheme Using Discrete Fourier Transform and Reed-Solomon Codes
○Shoichiro Yamasaki (Hiroshima City University), Tomoko K. Matsushima (Yokohama College of Commerce), Hirokazu Tanaka (Hiroshima City University)
4.3.3 Preliminary Studies on the Card-Based AND Protocol That Allows Three Inputs(0, 1, and Indeterminate)
○Yuji Suga (Internet Initiative Japan Inc.)
5.1 Shannon Theory I -Hypothesis Testing-
Dec. 10 Fri.11:20〜12:20 Hikarinoma
Chair: Shun Watanabe (Tokyo University of Agriculture and Technology)
5.1.1 A Refined Analysis of Merhav and Ziv's Bayesian Approach for Classification of Markov Sources
○Shota Saito (Gunma University)
5.1.2 Analysis on Optimal Error Exponents of Binary Classification for Mixed Sources
◎Hiroto Kuramata (The University of Electro-Communications), Hideki Yagi (The University of Electro-Communications)
5.1.3 Converse Coding Theorem for the Distributed Hypothesis Testing Problem
○Yasutada Oohama (The University of Electro-Communications)
5.2 MIMO
Dec. 10 Fri.11:20〜12:20 Kazenoma
Chair: Kazunori Hayashi (Kyoto University)
5.2.1 PSOR Jacobi MMSE Detector for MIMO Signal Detection
◎Asahi Mizukoshi (Nagoya Institute of Technology), Tadashi Wadayama (Nagoya Institute of Technology)
5.2.2 Non-Coherent MIMO Communication Methods Using Schubert Cell Decomposition
○Tatsumi Konishi (Aichi Institute of Technology)
5.2.3 Optimization of Relay Linear Transformations of MIMO Relay Systems
◎Naoyuki Hayashi (Nagoya Institute of Technology), Tadashi Wadayama (Nagoya Institute of Technology)
5.3 Public Key Cryptography
Dec. 10 Fri.11:20〜12:20 Tsubasanoma
Chair: Noboru Kunihiro (University of Tsukuba)
5.3.1 Proposal of High-Density SOSI Knapsack Cryptosystem and Evaluation of Security against Low-Density Attack
◎Minami Sato (Osaka-Electro Communication University), Sosuke Minamoto (Osaka-Electro Communication University), Ryuichi Sakai (Osaka-Electro Communication University), Yasuyuki Murakami (Osaka-Electro Communication University)
5.3.2 Error Rate Evaluation of Pairwise Bit-Flipping Decoding of QC-MDPC Code
◎Eiki Shin (Tokyo Institute of Technology), Haruhiko Kaneko (Tokyo Institute of Technology)
5.3.3 Security Analysis for Algorithms Based on Framework of Strongly Asymmetric Public Key Agreement
◎Koki Jimbo (Tokyo University of Science), Satoshi Iriyama (Tokyo University of Science)
6.1 Shannon Theory II -Source Coding-
Dec. 10 Fri.14:20〜15:20 Hikarinoma
Chair: Shigeaki Kuzuoka (Wakayama University)
6.1.1 Relationship Between Error Exponent and Encoding Only Information That Cannot Be Decoded Correctly
○Kiminori Iriyama
6.1.2 A Unified Expression of Achievable Region in Privacy-Constrained Source Coding
◎Naruki Shinohara (The University of Electro-Communications), Hideki Yagi (The University of Electro-Communications)
6.1.3 An Equivalent Expression for the Source Coding Problem when Side Information May Be Absent
○Tetsunao Matsuta (Saitama University)
6.2 Optical Communications / Sequences
Dec. 10 Fri.14:20〜15:20 Kazenoma
Chair: Tetsuo Tsujioka (Osaka City University)
6.2.1 A Study on Orthogonal Variable Spreading Factor Codes over the Complex Number Field
○Tomoko K. Matsushima (Yokohama College of Commerce), Shoichiro Yamasaki (Hiroshima City University), Hirokazu Tanaka (Hiroshima City University)
6.2.2 A Study on Received Light Intensity Estimation in Synchronous Optical CDMA System Using Level Division Multiplexing
◎Ayari Kamikata (Polytechnic University), Shinichiro Miyazaki (Polytechnic University), Kotoku Omura (Polytechnic University), Shigeyoshi Ohno (Polytechnic University), Shoichiro Yamasaki (Hiroshima City University), Tomoko K. Matsushima (Yokohama College of Commerce)
6.2.3 Evaluation of Optimum Receiver considering Shot Noise over Turbulent Underwater Optical Wireless Channel
◎Kenzo Yamada (Nagoya University), Chedlia Ben Naila (Nagoya University), Hiraku Okada (Nagoya University), Masaaki Katayama (Nagoya University)
6.3 Security Systems
Dec. 10 Fri.14:20〜15:20 Tsubasanoma
Chair: Yuji Suga (Internet Initiative Japan Inc.)
6.3.1 New Authentication Architecture using the Fourth Key Sharing Scheme
○Takehiko Mieno (EPSON AVASYS Corp), Hiroyuki Okazaki (Shinshu University), Yuichi Futa (Tokyo University of Technology), Yasuyuki Murakami (Osaka Electro-Communication University)
6.3.2 A Study on Implementation and Security of a Biometric Authentication System Based on Verifiable Encryption
◎Maki Kihara (Tokyo University of Science), Satoshi Iriyama (Tokyo University of Science), Tomoharu Onodera (Tokyo University of Science)
6.3.3 Selection of Transactions for Approval in The Distributed Ledger Tangle
◎Takumi Nishimura (Kwansei Gakuin University), Motohiko Isaka (Kwansei Gakuin University)
7.1 Shannon Theory III -Channel Coding-
Dec. 10 Fri.15:40〜16:40 Hikarinoma
Chair: Yutaka Jitsumatsu (Tokyo Institute of Technology)
7.1.1 Performance Evaluation of Random Coding by Finite Length Analysis in Channel with Constraints on Time and Energy
◎Issei Yokosawa (Tokyo Institute of Technology), Tomohiko Uyematsu (Tokyo Institute of Technology)
7.1.2 Channel Coding with Asymptotic Cost Constraint
◎Masaki Hori (Shinshu University), Mikihiko Nishiara (Shinshu University)
7.1.3 An Algorithm for Computing the Capacity Region of Two Input One Output Multiple Access Channels
◎Tetta Kishimoto (The University of Electro-Communications), Yasutada Oohama (The University of Electro-Communications)
7.2 Wireless Communications
Dec. 10 Fri.15:40〜16:40 Kazenoma
Chair: Tatsumi Konishi (Aichi Institute of Technology)
7.2.1 Stitching Pieces of One Message Together By Clustering Fading Coefficients for Unsourced Random Access Communications
◎Hinako Nakanishi (Doshisha University), Tomotaka Kimura (Doshisha University), Jun Cheng (Doshisha University)
7.2.2 Performance Analysis of Cooperative Superposition-Coded Relay Systems over Quasi-State Nakagami-Rician Fading Channels
◎Masaya Kambara (Doshisha University), Tomotaka Kimura (Doshisha University), Jun Cheng (Doshisha University)
7.3 Secure Communication
Dec. 10 Fri.15:40〜16:40 Tsubasanoma
Chair: Hiroki Koga (University of Tsukuba)
7.3.1 Secret-Key Exchange Through Synchronization of Randomized Lorenz Oscillators
◎Koshiro Onuki (Ritsumeikan University), Yoshihiko Horio (Tohoku University), Takaya Miyano (Ritsumeikan University)
7.3.2 Privacy-preserved Speech Transmission by Using Visual Cryptography
○Yuuki Tachioka (Denso IT Laboratory)

◎:The presentation for SITA Young Researcher Paper Award, ○:A regular presentation