Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
R |
2019-12-13 14:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Analysis of trust growth in the human-to-machine system Shinji Yokogawa, Shun Endo (U.E.C.) R2019-50 |
The purpose of this study is to investigate the formation process of human-machine systems, which are expected to be fur... [more] |
R2019-50 pp.1-6 |
SR |
2019-12-05 13:50 |
Okinawa |
Ishigaki City Hall (Ishigaki Island) |
[Poster Presentation]
Performance Evaluation of Secure Wireless Communications for PLNC with Untrusted Relay by Double-objective Optimization Problem Go Ikeuchi, Osamu Takyu (Shinshu Univ), Takeo Fujii (UEC), Tomoaki Ohtsuki (Keio Univ), Fumihito Sasamori, Shiro Handa (Shinshu Univ) SR2019-88 |
In this study, we have focused on wireless communication networks which can easily construct a network by using the rela... [more] |
SR2019-88 pp.15-22 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 16:00 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
[Invited Talk]
Trends and Countermeasures of Cyber Attacks
-- Introduction to Cyber Security for Network Engineers -- Yukiko Yano (NEC) CQ2019-93 |
In recent years, cyber attacks have spreading, information leaks such as confidential information of public institutions... [more] |
CQ2019-93 p.27 |
CS |
2019-07-04 09:00 |
Kagoshima |
Amami City Social Welfare Center |
Trust-based Verification Attack Prevention Scheme using Tendency of Contents Request on NDN Hironori Nakano, Hiroya Kato, Shuichiro Haruta, Masashi Yoshida, Iwao Sasase (Keio Univ.) CS2019-13 |
In this paper, we propose a trust-based verification attack prevention scheme using tendency of contents request on NDN.... [more] |
CS2019-13 pp.1-6 |
HCS, HIP, HI-SIGCOASTER [detail] |
2019-05-17 15:10 |
Okinawa |
Okinawa Industry Support Center |
Cheaters put on a smile with turning the left cheek forward Matia Okubo, Kenta Ishikawa (Senshu Univ.) HCS2019-23 HIP2019-23 |
Cheaters in an economic game tend to show the left side of the face to increase their facial trustworthiness. The presen... [more] |
HCS2019-23 HIP2019-23 pp.197-200 |
SSS |
2019-04-23 14:10 |
Tokyo |
|
A method inducing safe behavior by indeterminate information and low sense of security Kenji Tanaka (UEC) SSS2019-3 |
(To be available after the conference date) [more] |
SSS2019-3 pp.9-12 |
IT, ISEC, WBS |
2019-03-07 10:20 |
Tokyo |
University of Electro-Communications |
Coherence-based Spoken Machine Translation Recognition: Towards an Efficient Gateway to Detect Untrusted Information Nguyen Son Hoang Quoc, Tran Phuong Thao, Seira Hidano, Shinsaku Kiyomoto (KDDI Research) IT2018-77 ISEC2018-83 WBS2018-78 |
The machine-translated text is playing an important role in modern life which establishes wide communication among vario... [more] |
IT2018-77 ISEC2018-83 WBS2018-78 pp.13-19 |
RCS, SR, SRW (Joint) |
2019-03-08 13:45 |
Kanagawa |
YRP |
Consideration of security for PLNC with Untrusted Relay by double-objective optimization problem Go Ikeuchi, Osamu Takyu (Shinshu Univ), Takeo Fujii (UEC), Tomoaki Ohtsuki (Keio Univ), Fumihito Sasamori, Shiro Handa (Shinshu Univ) RCS2018-335 |
In this study, we have focused on wireless communication networks which can easily construct a network by using the rela... [more] |
RCS2018-335 pp.279-284 |
IBISML |
2019-03-05 14:30 |
Tokyo |
RIKEN AIP |
Efficient Exploration by Variational Information Maximizing Exploration on Reinforcement Learning Kazuki Doi, Keigo Okawa (Gifu Univ.), Motoki Shiga (Gifu Univ./JST/RIKEN) IBISML2018-107 |
In reinforcement learning,the policy function may not be optimized properly if the observed state space is limited to lo... [more] |
IBISML2018-107 pp.17-22 |
HCGSYMPO (2nd) |
|
Mie |
Sinfonia Technology Hibiki Hall Ise |
Analysis of dependence and over-trust on driving support robot Junya Matsukawa, Tomoki Miyamato, Daisuke Katagami (Tokyo Polytechnic Univ.), Takahiro Tanaka, Hitoshi Kanamori, Yuki Yoshihara, Kazuhiro Fujikake (Nagoya Univ.) |
The purpose of this research is to analyze the dependence and the over-trust caused by receiving the utterance from the ... [more] |
|
ICSS |
2018-11-22 14:45 |
Kagoshima |
|
ICSS2018-67 |
(To be available after the conference date) [more] |
ICSS2018-67 pp.79-84 |
SR, RCS (Joint) (2nd) |
2018-10-30 10:30 |
Overseas |
Mandarin Hotel, Bangkok, Thailand |
[Poster Presentation]
Multi-agent Trust Evaluation in Vehicular Internet of Things Celimuge Wu, Tsutomu Yoshinaga (UEC), Yusheng Ji (NII) |
We propose a decentralized trust management scheme for vehicular networks. The proposed scheme uses a fuzzy logic-based ... [more] |
|
PRMU, IBISML, IPSJ-CVIM [detail] |
2018-09-20 09:30 |
Fukuoka |
|
Proposal of Continuous Authentication Algorithm DPTM Using Dynamic Biometrics of Keystroke and Mouse Dynamics Takeshi Yamada (DIT), Shinya Fukumoto, Masayuki Kashima, Kiminori Sato, Mutsumi Watanabe (Kagoshima Univ.) PRMU2018-42 IBISML2018-19 |
Current computers mostly authenticate only once at login, and continuous authentication after login has not been done. C... [more] |
PRMU2018-42 IBISML2018-19 pp.41-46 |
HCS |
2018-03-14 13:30 |
Miyagi |
Research Institute of Electrical Communication, Tohoku University |
How do people change their trust relationship depending on listener attitude and white lie Haruki Nishibori, Yugo Takeuchi (Shizuoka Univ) HCS2017-113 |
People build or maintain trust relationship by telling a lie instead of telling all honestly when telling with others. T... [more] |
HCS2017-113 pp.119-124 |
CS |
2017-07-27 09:36 |
Nagasaki |
Fukue Bunka Kaikan |
Low Cost Dummy Generation using Non-Trusted LBS Sanghun Choi, Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2017-14 |
Although LBS(Location Based Service) is quite convenient and usually used these days, The location privacy of the user i... [more] |
CS2017-14 pp.7-12 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-15 13:50 |
Tokyo |
|
Security Evaluation of the Software Architecture of TEE-enabled Device and Its Open-source Implementation Naoki Yoshida (YNU), Kazuhiko Fukushima, Shigenori Miyauchi (Renesas Electronics), Junichi Sakamoto, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) ISEC2017-36 SITE2017-28 ICSS2017-35 EMM2017-39 |
It emerges that the use of security systems which separate device resources into Trusted Execution Environment (TEE) and... [more] |
ISEC2017-36 SITE2017-28 ICSS2017-35 EMM2017-39 pp.267-274 |
ISEC, LOIS, SITE |
2016-11-08 13:55 |
Fukui |
Community Hall & AOSSA Mall, Fukui |
Effect of Country-of-origin Image on the Perception of Foreign Online Stores Vanessa Bracamonte, Hitoshi Okada (NII) ISEC2016-65 SITE2016-55 LOIS2016-43 |
Consumer perception and evaluation of foreign goods can be affected by the perception of the different characteristics o... [more] |
ISEC2016-65 SITE2016-55 LOIS2016-43 pp.81-84 |
SWIM |
2016-08-26 15:25 |
Tokyo |
|
A Proposal for Trust-ability Evaluation Model of Information Systems Yohtaro Miyanishi (ISEM, Inc.), Shinji Kitagami (Waseda Univ.), Tadashi Ogino (Meisei Univ.), Funiaki Sato (Toho Univ), Yoriyoshi Urano, Norio Shiratori (Waseda Univ.) SWIM2016-9 |
Abstract: Recently, it became usual style to use external information systems even for business use system, due to spre... [more] |
SWIM2016-9 pp.15-22 |
SC |
2016-08-26 11:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. B2F Room No.2 |
Improvement of Trust Value Prediction Using Text Mining for Recommender System Incheon Paik, Tomoya Maemori (UoA) SC2016-12 |
Recommender system will help to provide a list of items information that users are interested in. And with growth of soc... [more] |
SC2016-12 pp.7-11 |
SIP, RCS |
2015-01-23 11:55 |
Okayama |
Okayama Univ. |
Secure Cooperation Scheme Using Fountain codes to Resist Untrustworthy Relay Hao Niu, Tiantian Jiang, Masaki Ito, Kaoru Sezaki (Univ. of Tokyo) SIP2014-106 RCS2014-294 |
Physical layer security, which exploits wireless channel fading to realize secure transmission, has been an emerging res... [more] |
SIP2014-106 RCS2014-294 pp.147-150 |