IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 87 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2021-03-01
14:55
Online Online Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox
Takahiro Inoue (YNU), Satoshi Hara (YNU/FUJISOFT), Hironobu Sakaki, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-41
Malware that infects vulnerable IoT devices is becoming more sophisticated. Unlike legacy IoT malware, cases of persiste... [more] ICSS2020-41
pp.90-95
ICSS, IPSJ-SPT 2021-03-02
14:05
Online Online Developing an Interactive Analysis System for Voice Assistant Apps
Atsuko Natatsuka (Waseda Univ.), Ryo Iijima (Waseda Univ./NICT), Takuya Watanabe, Mitsuaki Akiyama (NTT), Tetsuya Sakai (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-48
In Voice Assistant Services, official or third-party Voice Assistant Apps (VA apps) are provided. Since a VA app works a... [more] ICSS2020-48
pp.132-137
ICSS, IPSJ-SPT 2021-03-02
09:10
Online Online A Study on the Adoption of Link Preview by the Phishing Sites
Norihito Omori (Waseda Univ.), Satoshi Furutani, Takuya Watanabe, Toshiki Shibahara, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.) ICSS2020-54
Search engines are not the only means of accessing online content. The distribution of malicious content has become mor... [more] ICSS2020-54
pp.166-171
ICSS, IPSJ-SPT 2021-03-02
10:00
Online Online Evaluation of Uncertain Reports by Multiple Anti-virus Engines
Kazuya Nomura (Waseda Univ.), Mistuaki Akiyama (NTT), Masaki Kamizono (Deloitte Tohmatsu Cyber LLC), Takahiro Kasama (NICT) ICSS2020-56
VirusTotal is an online service that provides detection results from multiple anti-virus engines. It is used in a wide r... [more] ICSS2020-56
pp.178-183
ICD, HWS [detail] 2020-10-26
13:50
Online Online Security Threats and Preventions for Photonics Computing Model
Junko Takahashi, Koji Chida, Takeshi Sakamoto (NTT) HWS2020-33 ICD2020-22
This paper presents security analysis on photonic computing models in All-Photonics Network (APN). New computing archite... [more] HWS2020-33 ICD2020-22
pp.48-53
SITE, IPSJ-EIP [detail] 2020-06-04
10:55
Online Online Reconsideration of 'Risk' in information security/cybersecurity governance -- Based on the discussion in Science, Technology and Society (STS) --
Takumi Kimura (NRI SecureTechnologies) SITE2020-2
As information security/cybersecurity has been increasing, so is the importance of (Information) Security Governance. Ho... [more] SITE2020-2
pp.7-12
ISEC 2020-05-20
16:05
Online Online Identity-based Authenticated Key Exchange for IoT Devices and its Security against Malicious Private Key Generator
Kazuma Wariki, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.), Koutarou Suzuki (Toyohashi Univ. of Tech.), Junichi Tomida (NTT) ISEC2020-12
With a rapid increase in the number of IoT devices, many
identity-based authenticated key exchange (IBAKE) protocols fo... [more]
ISEC2020-12
pp.55-61
HWS 2020-04-07 Online Online A Study on Timing Information Acquiring Methodology for TLB Side-Channel Attacks
Yuki Matsumoto (Kyushu Univ.), Yuichiro Dan, Junko Takahashi (NTT), Takatsugu Ono (Kyushu Univ.) HWS2020-6
We report on the method of acquiring Translation Look-aside Buffer (TLB) access latency which required
for implementing... [more]
HWS2020-6
pp.29-34
ICSS, IPSJ-SPT 2020-03-02
13:30
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
ICSS2019-74 (To be available after the conference date) [more] ICSS2019-74
pp.37-42
ICSS, IPSJ-SPT 2020-03-03
11:00
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Model checking RNNs with modal μ-calculus
Tatsuhiro Aoshima, Toshinori Usui (NTT) ICSS2019-88
Machine learning models have been applied to many cyber-physical systems such as self-driving cars, robotics, and factor... [more] ICSS2019-88
pp.119-124
HWS
(2nd)
2019-12-06
16:00
Tokyo Asakusabashi Hulic Conference [Poster Presentation] Comparison of 3 TEEs (Intel SGX, ARM TrustZone, RISC-V Keystone)
Kuniyasu Suzaki, Akira Tsukamoto (AIST), Kazumoto Kojima (TRASIO), Hoang Trong-Thuc, Akira Moroo (AIST)
 [more]
ISEC, SITE, LOIS 2019-11-01
14:00
Osaka Osaka Univ. Lattice basis reduction over projected lattices and its application to solving the LWE problem
Satoshi Nakamura, Nariaki Tateiwa (Kyushu Univ.), Koha Kinjo (NTT), Yasuhiko Ikematsu, Masaya Yasuda (Kyushu Univ.) ISEC2019-68 SITE2019-62 LOIS2019-27
The security of modern lattice-based schemes is based on the computational hardness of solving the learning with errors ... [more] ISEC2019-68 SITE2019-62 LOIS2019-27
pp.41-48
ISEC, SITE, LOIS 2019-11-02
13:30
Osaka Osaka Univ. Consideration regarding Critical Infrastructure Protection Policies in Cybersecurity -- Approach from the "Science and Technology Studies (STS)" --
Hideyuki Fujii, Takumi Kimura (NRI Secure) ISEC2019-80 SITE2019-74 LOIS2019-39
A comparison of critical infrastructure protection strategies in each country's cyber security policy reveals that there... [more] ISEC2019-80 SITE2019-74 LOIS2019-39
pp.115-120
ICSS, IPSJ-SPT 2019-03-07
16:15
Okinawa NICT Okinawa Electromagnetic Technology Center Analyzing Deceptive Internationalized Domain Names
Daiki Chiba, Ayako Akiyama Hasegawa, Takashi Koide (NTT), Yuta Sawabe, Shigeki Goto (Waseda Univ.), Mitsuaki Akiyama (NTT) ICSS2018-76
Internationalized domain names (IDNs) are abused to create domain names visually similar to those of legitimate brands. ... [more] ICSS2018-76
pp.47-52
IBISML 2019-03-05
17:00
Tokyo RIKEN AIP A Study on Automatic Generation of False Data Injection Attack against Connected Car Service Based on Reinforcement Learning
Yuichiro Dan, Keita Hasegawa, Takafumi Harada, Tomoaki Washio, Yoshihito Oshima (NTT) IBISML2018-109
While the connected car is predicted to prevail by 2025, the appearance of novel cyber attacks is concerned. In this pap... [more] IBISML2018-109
pp.31-38
HWS, VLD 2019-03-01
17:10
Okinawa Okinawa Ken Seinen Kaikan An Extended of Secure Remote Management Architecture for IoT-device
Masahiro Shiraishi, Hiroki Ito, Keiichi Okabe (NTT) VLD2018-136 HWS2018-99
This paper provides a feasibility study of secure remote management architecture for IoT-device. IoT services exist in v... [more] VLD2018-136 HWS2018-99
pp.255-260
QIT
(2nd)
2018-11-26
13:30
Tokyo The University of Tokyo [Poster Presentation] Graph Convolutional Network for Topological stabilizer code.
Amarsanaa Davaasuren (Tokyo Univ.), Yasunari Suzuki (NTT), Keisuke Fujii (Kyoto Univ.), Yasunobu Nakamura (Tokyo Univ.)
Quantum Error Correction (QEC) is vital for fault tolerant quantum computation and requires fast and high-performance de... [more]
QIT
(2nd)
2018-11-26
13:30
Tokyo The University of Tokyo [Poster Presentation] Optimal condition for a cavity QED-based quantum gate
Rui Asaoka, Rina Kanamoto (Meiji Univ,), Yuuki Tokunaga (NTT SP Labs.), Takao Aoki (Waseda Univ.)
 [more]
QIT
(2nd)
2018-11-26
13:30
Tokyo The University of Tokyo [Poster Presentation] Cross-Resonance gate on 2D-integrated system of superconducting qubits
Kentaro Heya, Kiyoto Mekami, Amarsanaa Davaasuren, Yutaka Takeda, Akhil Pratap Singh, Singo Kono (UT), Yasunari Suzuki (NTT), Koh-ich Nittoh, Koichi Kusuyama (RIKEN), Shuhei Tamate, Yutaka Tabuchi (UT), Yasunobu Nakamura (UT/RIKEN)
Quantum Error Correction is indispensable for large-scale quantum computing. However, quantum error correction codes suc... [more]
ICSS 2018-11-22
11:15
Kagoshima   [Invited Talk] An Overview of Cyber Security for Connected Vehicles
Junko Takahashi (NTT) ICSS2018-63
This paper presents an overview of cyber security for connected vehicles based on the recent previous studies of vehicle... [more] ICSS2018-63
pp.55-59
 Results 21 - 40 of 87 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan