IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 86  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SITE, IPSJ-EIP 2024-06-06
09:55
Tokyo Rikkyo Univ. (Ikebukuro) Addressing 'systemic risk' in EU digital policy. -- A study from regulatory trends in the financial domain --
Hideyuki Fujii (NRI Secure)
 [more]
CQ, CS
(Joint)
2024-05-17
14:10
Aichi
(Primary: On-site, Secondary: Online)
Study on Indoor Radio Tomographic Imaging using LOS Component Estimation and TOA-based Localization
Shino Shiraki (Tokyo Metropolitan Univ.), Yoshiaki Nishikawa (Secure System Platform Research Laboratories, NEC Corporation), Takahiro Matsuda (Tokyo Metropolitan Univ.), Eiji Takahashi, Takeo Onishi (Secure System Platform Research Laboratories, NEC Corporation), Toshiki Takeuchi (Advanced Network Research Laboratories, NEC Corporation)
(To be available after the conference date) [more]
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
11:20
Hokkaido Hokkaido Jichiro Kaikan A Study on the Application of Nudge to Improve Cybersecurity
Hideyuki Fujii (NRI Secure) ISEC2023-50 SITE2023-44 BioX2023-53 HWS2023-50 ICSS2023-47 EMM2023-50
One possible measure to improve cybersecurity is the use of "Nudge". Nudge is designed (choice architectures) that chang... [more] ISEC2023-50 SITE2023-44 BioX2023-53 HWS2023-50 ICSS2023-47 EMM2023-50
pp.232-238
MSS, CAS, SIP, VLD 2023-07-07
14:30
Hokkaido
(Primary: On-site, Secondary: Online)
CAS2023-26 VLD2023-26 SIP2023-42 MSS2023-26 (To be available after the conference date) [more] CAS2023-26 VLD2023-26 SIP2023-42 MSS2023-26
pp.131-136
SITE, IPSJ-EIP 2023-06-12
16:50
Tokyo Rissho Univ. Shinagawa Campus [Invited Talk] Please fill in this blank.
Hideyuki Fujii (NRI SecureTechnologies)
 [more]
SITE, IPSJ-EIP 2023-06-13
11:40
Tokyo Rissho Univ. Shinagawa Campus Digital Identity Regulatory Trends Worldwide
Hideyuki Fujii (NRI Secure) SITE2023-3
 [more] SITE2023-3
pp.13-19
ICSS, IPSJ-SPT 2023-03-13
17:50
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
URL Warning List Creation and Manage Methods using VirusTotal and Web Access Log
Kyohei Takao, Chika Hiraishi (YNU), Kazuki Takada (SecureBrain), Akira Fujita, Daisuke Inoue (NICT), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2022-66
Security services such as URL blocklists are widely used to prevent users from accessing malicious websites.
However, ... [more]
ICSS2022-66
pp.109-114
ICSS, IPSJ-SPT 2023-03-14
13:10
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Towards observation of online fraud exploiting multiple SNS
Yamato Kawaguchi (Yokohama National Univ.), Kazuki Takada (SecureBrain), Yin Minn Pa Pa, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2022-77
SNS (Social Networking Service) fraud has been reported in accordance with the increase in SNS users. In this study, we ... [more] ICSS2022-77
pp.175-180
ISEC, SITE, LOIS 2022-11-18
10:05
Online Online [Invited Talk] About "Ctrl + Z: Right to be forgotten"(1)
Hideyuki Fujii (NRI Secure)
 [more]
SITE, IPSJ-EIP 2022-06-10
13:15
Tokyo
(Primary: On-site, Secondary: Online)
Trends regarding access to vehicle data in European Union
Hideyuki Fujii (NRI Secure) SITE2022-9
As the distribution of connected cars expands, discussions on the handling of vehicle data are becoming more active. In ... [more] SITE2022-9
pp.52-58
ICSS, IPSJ-SPT 2022-03-08
10:00
Online Online Input predictive attack by keyboard acoustic emanations using BERT and its countermeasures
Masahiro Iida (Teikyo Univ.), Mitsuaki Akiyama (NTT), Masaki Kamizono (DTCY), Takahiro Kasama (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Kyoto Sangyo Univ.), Atsuo Inomata (Osaka Univ.) ICSS2021-67
The Keyboard Acoustic Emanations has been proposed to estimate the input key from keystroke sounds as a kind of side-cha... [more] ICSS2021-67
pp.49-54
SITE, ISEC, LOIS 2021-11-12
13:50
Online Online Security notions of decryption-controllable identity-based encryption
Hidekazu Miyanaga, Atsushi Fujioka, Taroh Sasaki (Kanagawa Univ.), Yuki Okano (NTT), Koutarou Suzuki (Toyohashi Univ. of Tech.), Kazuki Yoneyama (Ibaraki Univ.) ISEC2021-43 SITE2021-37 LOIS2021-26
In recent years, there have been increasing opportunities for a single user to have multiple devices. A similar situati... [more] ISEC2021-43 SITE2021-37 LOIS2021-26
pp.13-17
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2021-07-20
11:20
Online Online ISEC2021-33 SITE2021-27 BioX2021-34 HWS2021-33 ICSS2021-38 EMM2021-38 (To be available after the conference date) [more] ISEC2021-33 SITE2021-27 BioX2021-34 HWS2021-33 ICSS2021-38 EMM2021-38
pp.141-146
QIT
(2nd)
2021-05-24
09:00
Online Online [Invited Talk] Classical Verification of Quantum Computations with Efficient Verifier
Takashi Yamakawa (NTT)
 [more]
WBS, IT, ISEC 2021-03-05
13:30
Online Online Information retrieval for security reports using behavior of cyber attacker
Yuki Kawaguchi, Mayo Yamasaki (NTT) IT2020-154 ISEC2020-84 WBS2020-73
Cyber security incident responders require related information about related incidents for the quick and comprehensive
... [more]
IT2020-154 ISEC2020-84 WBS2020-73
pp.257-264
ICSS, IPSJ-SPT 2021-03-01
10:00
Online Online Understanding the Adoption and Operation of DNS Cookie: Current State and Future Prospects
Masanori Yajima (Waseda Univ.), Daiki Chiba (NTT), Yoshiro Yoneya (JPRS), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-28
DNS cache poisoning attacks have received increasing attention these days.
As a countermeasure against such attacks, DN... [more]
ICSS2020-28
pp.13-18
ICSS, IPSJ-SPT 2021-03-01
09:10
Online Online On the Privacy Risk of Exposure Notification Framework: Assessment and Countermeasures
Kazuki Nomoto (Waseda Univ.), Mitsuaki Akiyama (NTT), Masashi Eto (NICT), Atsuo Inomata (Osaka Univ.), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-34
The Exposure Notification Framework uses the Bluetooth Low Energy (BLE) signal generated by a smartphone to determine cl... [more] ICSS2020-34
pp.49-54
ICSS, IPSJ-SPT 2021-03-01
09:35
Online Online A Method for Reconstructing Hidden Background Image in Tele-conference with Virtual Background
Satoki Tsuji, Ryusei Ishikawa (Ritsumeikan Univ.), Masashi Eto (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Hiroshima City Univ.) ICSS2020-35
Interpersonal communications through video chat software has become essential since a remote work is now encouraged. Whe... [more] ICSS2020-35
pp.55-60
ICSS, IPSJ-SPT 2021-03-01
10:00
Online Online Implementation and Evaluation of a Plagiarism Detection Method for Source Code on Programming Contest
Ryusei Ishikawa (Ritsumeikan Univ.), Yuichi Hattori (Secure Cycle), Hiroyuki Inoue (Hiroshima City Univ.), Atsuo Inomata (Osaka Univ.) ICSS2020-36
Programming competitions are held all over the world to write programs accurately in a short time. However, because many... [more] ICSS2020-36
pp.61-65
ICSS, IPSJ-SPT 2021-03-01
14:55
Online Online Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox
Takahiro Inoue (YNU), Satoshi Hara (YNU/FUJISOFT), Hironobu Sakaki, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-41
Malware that infects vulnerable IoT devices is becoming more sophisticated. Unlike legacy IoT malware, cases of persiste... [more] ICSS2020-41
pp.90-95
 Results 1 - 20 of 86  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan