Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
CCS |
2024-03-27 10:15 |
Hokkaido |
RUSUTSU RESORT |
Performance Evaluation of Coupling Models between Oscillators for Performance Improving of Desynchronization-type TDMA Hiroyuki Yasuda (The Univ. of Tokyo), Mikio Hasegawa (Tokyo Univ. of Science), Kazuyuki Aihara (The Univ. of Tokyo) CCS2023-39 |
[more] |
CCS2023-39 pp.1-5 |
CCS |
2024-03-27 11:05 |
Hokkaido |
RUSUTSU RESORT |
Implementation of Wireless Spiking Neural Networks with Asynchronous Pulse Code Multiple Access Haruto Ota, Ryuji Nagazawa, Jiaying Lin, Kien Nguyen (Chiba Univ.), Hiroyuki Torikai (Housei Univ.), Mikio Hasegawa (Tokyo Univ. of Science), Woo-Joo Hwang (Pusan National Univ.), Hiroo Sekiya (Chiba Univ.) CCS2023-41 |
(To be available after the conference date) [more] |
CCS2023-41 pp.12-17 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Integral Attack with Bit-Based Division Property on Block Cipher LBC Naoki Shibayama, Yasutaka Igarashi (Tokyo Univ. of Science) IT2023-131 ISEC2023-130 WBS2023-119 RCC2023-113 |
LBC is a block cipher proposed by Kapalova et al. in 2023. The block size is 64-bit, the secret key size is 80-bit, and ... [more] |
IT2023-131 ISEC2023-130 WBS2023-119 RCC2023-113 pp.350-357 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
A Study on Malicious Communication Detection Using Attack Characteristics of Malware on an Internal Network. Ken Aono, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95 |
Recently, targeted attacks have been increasing.
Malicious attackers use malware to gain access to the organization's ... [more] |
IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95 pp.249-253 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Phishing Detection Method Based on Content-Similarity in DNS Graph WenBo Zhou, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110 |
Phishing attacks, known as a prevalent form of social engineering attacks, have become one of the most significant cyber... [more] |
IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110 pp.332-336 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Phishing Detection Method Based on Machine Learning Using DNS Graph Yuki Ishida, Syota Nihei, Junko Sato, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of Information Sciences) IT2023-129 ISEC2023-128 WBS2023-117 RCC2023-111 |
Recently, phishing scams have been on the rise, the need for effective defense methods against this phishing scams.
A b... [more] |
IT2023-129 ISEC2023-128 WBS2023-117 RCC2023-111 pp.337-342 |
RCS, SR, SRW (Joint) |
2024-03-13 09:55 |
Tokyo |
The University of Tokyo (Hongo Campus), and online (Primary: On-site, Secondary: Online) |
User Scheduling based on Expanded Null-Space for Massive MIMO Yuki Sasaki (Tokyo Univ. of Scince), Kabuto Arai (The Univ. of Electro-Communications), Jin Nakazato (UTokyo), Kazuki Maruta (Tokyo Univ. of Scince) RCS2023-250 |
This paper proposes a user scheduling scheme for multi-user massive MIMO (MU-mMIMO), particularly effective in time-vary... [more] |
RCS2023-250 pp.1-6 |
NLP, MSS |
2024-03-13 10:50 |
Misc. |
Kikai-Shinko-Kaikan Bldg. |
An Intelligent Traffic Signal Control Method for a Fukui-Ishibashi-Type Traffic Flow Model
-- Applications to a Real City Model and Verification -- Takuya Akiyama, Tatsuya Kai (Tokyo Univ. of Science) MSS2023-72 NLP2023-124 |
[more] |
MSS2023-72 NLP2023-124 pp.9-12 |
NLP, MSS |
2024-03-13 16:30 |
Misc. |
Kikai-Shinko-Kaikan Bldg. |
Stabilization Boundary Control and Stability Analysis for the Difference Burgers' Equation Based on Ultradiscretization Eiji Tanabe, Tatsuya Kai (Tokyo Univ. of Science) MSS2023-82 NLP2023-134 |
[more] |
MSS2023-82 NLP2023-134 pp.58-61 |
RCS, SR, SRW (Joint) |
2024-03-13 12:45 |
Tokyo |
The University of Tokyo (Hongo Campus), and online (Primary: On-site, Secondary: Online) |
[Invited Lecture]
Beyond 5G Open RAN Platform through Cross-Domain Collaboration Jin Nakazato (Univ. of Tokyo), Kazuki Maruta (Tokyo Univ. of Science), Gia Khanh Tran, Naoya Okubo, Kei Sakaguchi (Titech) SRW2023-51 |
Since the global launch of commercial services in 2019, 5G has already been around for approximately four years. During ... [more] |
SRW2023-51 pp.33-38 |
RCS, SR, SRW (Joint) |
2024-03-13 13:10 |
Tokyo |
The University of Tokyo (Hongo Campus), and online (Primary: On-site, Secondary: Online) |
[Invited Lecture]
Beamforming/Null-steering for Millimeter-wave Transmission in High Mobility Environment Kazuki Maruta, Yuki Sasaki, Sojin Ozawa (Tokyo Univ. of Science), Kazuto Arai (The Univ. of Electro-Communications), Jin Nakazato, Manabu Tsukada (UTokyo) SRW2023-52 |
Spatial multiplexing performance of the multi-user MIMO is deteriorated in the mobility environment, especially using th... [more] |
SRW2023-52 p.39 |
IE, MVE, CQ, IMQ (Joint) [detail] |
2024-03-14 15:20 |
Okinawa |
Okinawa Sangyo Shien Center (Primary: On-site, Secondary: Online) |
Efficient regularizer for 4D light field image denoising based on graph-learning Rino Yoshida (TUS), Kazuya Kodama (NII), Gene Cheung (York Univ.), Takayuki Hamamoto (TUS) IMQ2023-56 IE2023-111 MVE2023-85 |
Advanced 3D visual media as promising technology often require 4D light fields composed of dense multi-view images for a... [more] |
IMQ2023-56 IE2023-111 MVE2023-85 pp.235-240 |
IE, MVE, CQ, IMQ (Joint) [detail] |
2024-03-15 13:30 |
Okinawa |
Okinawa Sangyo Shien Center (Primary: On-site, Secondary: Online) |
Coexistence Scheme with Mobile Terminals by Null-Space Expansion in Wireless Power Transfer Shuma Okita, Yuki Sasaki (Tokyo Univ. of Science), Takahiro Matsuda (Tokyo Metropolitan Univ.), Tomotaka Kimura (Doshisha Univ.), Takefumi Hiraguri (NIT), Kazuki Maruta (Tokyo Univ. of Science) CQ2023-86 |
Wireless Power Transfer (WPT) is a promising technology that can supply energy to an increasing number of IoT terminals ... [more] |
CQ2023-86 pp.81-86 |
IA, SITE, IPSJ-IOT [detail] |
2024-03-12 11:10 |
Okinawa |
Miyakojima City Future Creation Center (Primary: On-site, Secondary: Online) |
A Routing Method Using Redirection Based on User Movement Prediction in CCN-based MANET Yuto Kanata, Masaki Hanada (Tokyo Univ. of information Sciences) SITE2023-70 IA2023-76 |
In recent years, many studies in terms of CCN-based MANET, applying CCN architecture to MANET, have been conducted with ... [more] |
SITE2023-70 IA2023-76 pp.12-17 |
ITS, IEE-ITS |
2024-03-11 13:35 |
Shiga |
BKC, Ritsumeikan Univ. (Primary: On-site, Secondary: Online) |
Automatic Path Following Control and Experimental Verification for Mobile Robots Based on Predictive Just-In-Time Modeling
-- An Extension to Forward and Backward Movements -- Takumi Kenmochi, Tatsuya Kai (Tokyo Univ. of Science) ITS2023-79 |
[more] |
ITS2023-79 pp.1-6 |
NC, MBE (Joint) |
2024-03-12 10:50 |
Tokyo |
The Univ. of Tokyo (Primary: On-site, Secondary: Online) |
Influence of ocular oscillation during PLR responses for a symptom of dementia Minoru Nakayama (Tokyo Tech.), Wioletta Nowak, Anna Zarowska (Wroclaw Univ. S&T) MBE2023-77 |
A Symptom detection procedure for dementia is discussed using features of waveforms in pupil light reflex (PLR). PLR fea... [more] |
MBE2023-77 pp.46-51 |
PRMU, IBISML, IPSJ-CVIM |
2024-03-03 15:00 |
Hiroshima |
Hiroshima Univ. Higashi-Hiroshima campus (Primary: On-site, Secondary: Online) |
The Generalized Denoising Autoencoder with Tweedie's Formula Yuta Aishima (NAIST), Sho Sonoda (RIKEN), Noboru Isobe (Tokyo Univ.), Kazushi Ikeda (NAIST) IBISML2023-40 |
Denoising autoencoders learn the score of the data-generating distribution, i.e., $nabla log p(x)$. However, theoretical... [more] |
IBISML2023-40 pp.1-5 |
NS, IN (Joint) |
2024-03-01 13:00 |
Okinawa |
Okinawa Convention Center |
Interest Packet Forwarding Scheme by MPR Set with Movement Prediction in CCN-based MANETs Haruya Matsumoto, Masaki Hanada (Tokyo Univ. of information Sciences) IN2023-110 |
In recent years, many studies in terms of CCN-based MANET, applying CCN architecture to MANET, have been conducted.In a ... [more] |
IN2023-110 pp.267-272 |
NS, IN (Joint) |
2024-03-01 13:25 |
Okinawa |
Okinawa Convention Center |
Cache Decision Policy Considering Node Movement in CCN-based MANETs Miharu Tsuge, Masaki Hanada (Tokyo Univ. of information Siences) IN2023-111 |
In recent years, the Internet traffic of large-volume contents such as video and music have been increasing .Because the... [more] |
IN2023-111 pp.273-278 |
ITS, IE, ITE-MMS, ITE-ME, ITE-AIT [detail] |
2024-02-19 14:30 |
Hokkaido |
Hokkaido Univ. |
Intelligent Traffic Signal Control of a Fukui-Ishibashi Traffic Flow Model with Left and Right Turns Tatsuya Kai, Takuya Akiyama (Tokyo Univ. of Science) ITS2023-55 IE2023-44 |
[more] |
ITS2023-55 IE2023-44 pp.50-55 |