IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 41 - 60 of 107 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
R 2019-12-13
14:00
Tokyo Kikai-Shinko-Kaikan Bldg. Analysis of trust growth in the human-to-machine system
Shinji Yokogawa, Shun Endo (U.E.C.) R2019-50
The purpose of this study is to investigate the formation process of human-machine systems, which are expected to be fur... [more] R2019-50
pp.1-6
SR 2019-12-05
13:50
Okinawa Ishigaki City Hall (Ishigaki Island) [Poster Presentation] Performance Evaluation of Secure Wireless Communications for PLNC with Untrusted Relay by Double-objective Optimization Problem
Go Ikeuchi, Osamu Takyu (Shinshu Univ), Takeo Fujii (UEC), Tomoaki Ohtsuki (Keio Univ), Fumihito Sasamori, Shiro Handa (Shinshu Univ) SR2019-88
In this study, we have focused on wireless communication networks which can easily construct a network by using the rela... [more] SR2019-88
pp.15-22
NS, ICM, CQ, NV
(Joint)
2019-11-21
16:00
Hyogo Rokkodai 2nd Campus, Kobe Univ. [Invited Talk] Trends and Countermeasures of Cyber Attacks -- Introduction to Cyber Security for Network Engineers --
Yukiko Yano (NEC) CQ2019-93
In recent years, cyber attacks have spreading, information leaks such as confidential information of public institutions... [more] CQ2019-93
p.27
CS 2019-07-04
09:00
Kagoshima Amami City Social Welfare Center Trust-based Verification Attack Prevention Scheme using Tendency of Contents Request on NDN
Hironori Nakano, Hiroya Kato, Shuichiro Haruta, Masashi Yoshida, Iwao Sasase (Keio Univ.) CS2019-13
In this paper, we propose a trust-based verification attack prevention scheme using tendency of contents request on NDN.... [more] CS2019-13
pp.1-6
HCS, HIP, HI-SIGCOASTER [detail] 2019-05-17
15:10
Okinawa Okinawa Industry Support Center Cheaters put on a smile with turning the left cheek forward
Matia Okubo, Kenta Ishikawa (Senshu Univ.) HCS2019-23 HIP2019-23
Cheaters in an economic game tend to show the left side of the face to increase their facial trustworthiness. The presen... [more] HCS2019-23 HIP2019-23
pp.197-200
SSS 2019-04-23
14:10
Tokyo   A method inducing safe behavior by indeterminate information and low sense of security
Kenji Tanaka (UEC) SSS2019-3
(To be available after the conference date) [more] SSS2019-3
pp.9-12
IT, ISEC, WBS 2019-03-07
10:20
Tokyo University of Electro-Communications Coherence-based Spoken Machine Translation Recognition: Towards an Efficient Gateway to Detect Untrusted Information
Nguyen Son Hoang Quoc, Tran Phuong Thao, Seira Hidano, Shinsaku Kiyomoto (KDDI Research) IT2018-77 ISEC2018-83 WBS2018-78
The machine-translated text is playing an important role in modern life which establishes wide communication among vario... [more] IT2018-77 ISEC2018-83 WBS2018-78
pp.13-19
RCS, SR, SRW
(Joint)
2019-03-08
13:45
Kanagawa YRP Consideration of security for PLNC with Untrusted Relay by double-objective optimization problem
Go Ikeuchi, Osamu Takyu (Shinshu Univ), Takeo Fujii (UEC), Tomoaki Ohtsuki (Keio Univ), Fumihito Sasamori, Shiro Handa (Shinshu Univ) RCS2018-335
In this study, we have focused on wireless communication networks which can easily construct a network by using the rela... [more] RCS2018-335
pp.279-284
IBISML 2019-03-05
14:30
Tokyo RIKEN AIP Efficient Exploration by Variational Information Maximizing Exploration on Reinforcement Learning
Kazuki Doi, Keigo Okawa (Gifu Univ.), Motoki Shiga (Gifu Univ./JST/RIKEN) IBISML2018-107
In reinforcement learning,the policy function may not be optimized properly if the observed state space is limited to lo... [more] IBISML2018-107
pp.17-22
HCGSYMPO
(2nd)

Mie Sinfonia Technology Hibiki Hall Ise Analysis of dependence and over-trust on driving support robot
Junya Matsukawa, Tomoki Miyamato, Daisuke Katagami (Tokyo Polytechnic Univ.), Takahiro Tanaka, Hitoshi Kanamori, Yuki Yoshihara, Kazuhiro Fujikake (Nagoya Univ.)
The purpose of this research is to analyze the dependence and the over-trust caused by receiving the utterance from the ... [more]
ICSS 2018-11-22
14:45
Kagoshima   ICSS2018-67 (To be available after the conference date) [more] ICSS2018-67
pp.79-84
SR, RCS
(Joint)
(2nd)
2018-10-30
10:30
Overseas Mandarin Hotel, Bangkok, Thailand [Poster Presentation] Multi-agent Trust Evaluation in Vehicular Internet of Things
Celimuge Wu, Tsutomu Yoshinaga (UEC), Yusheng Ji (NII)
We propose a decentralized trust management scheme for vehicular networks. The proposed scheme uses a fuzzy logic-based ... [more]
PRMU, IBISML, IPSJ-CVIM [detail] 2018-09-20
09:30
Fukuoka   Proposal of Continuous Authentication Algorithm DPTM Using Dynamic Biometrics of Keystroke and Mouse Dynamics
Takeshi Yamada (DIT), Shinya Fukumoto, Masayuki Kashima, Kiminori Sato, Mutsumi Watanabe (Kagoshima Univ.) PRMU2018-42 IBISML2018-19
Current computers mostly authenticate only once at login, and continuous authentication after login has not been done. C... [more] PRMU2018-42 IBISML2018-19
pp.41-46
HCS 2018-03-14
13:30
Miyagi Research Institute of Electrical Communication, Tohoku University How do people change their trust relationship depending on listener attitude and white lie
Haruki Nishibori, Yugo Takeuchi (Shizuoka Univ) HCS2017-113
People build or maintain trust relationship by telling a lie instead of telling all honestly when telling with others. T... [more] HCS2017-113
pp.119-124
CS 2017-07-27
09:36
Nagasaki Fukue Bunka Kaikan Low Cost Dummy Generation using Non-Trusted LBS
Sanghun Choi, Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2017-14
Although LBS(Location Based Service) is quite convenient and usually used these days, The location privacy of the user i... [more] CS2017-14
pp.7-12
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2017-07-15
13:50
Tokyo   Security Evaluation of the Software Architecture of TEE-enabled Device and Its Open-source Implementation
Naoki Yoshida (YNU), Kazuhiko Fukushima, Shigenori Miyauchi (Renesas Electronics), Junichi Sakamoto, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) ISEC2017-36 SITE2017-28 ICSS2017-35 EMM2017-39
It emerges that the use of security systems which separate device resources into Trusted Execution Environment (TEE) and... [more] ISEC2017-36 SITE2017-28 ICSS2017-35 EMM2017-39
pp.267-274
ISEC, LOIS, SITE 2016-11-08
13:55
Fukui Community Hall & AOSSA Mall, Fukui Effect of Country-of-origin Image on the Perception of Foreign Online Stores
Vanessa Bracamonte, Hitoshi Okada (NII) ISEC2016-65 SITE2016-55 LOIS2016-43
Consumer perception and evaluation of foreign goods can be affected by the perception of the different characteristics o... [more] ISEC2016-65 SITE2016-55 LOIS2016-43
pp.81-84
SWIM 2016-08-26
15:25
Tokyo   A Proposal for Trust-ability Evaluation Model of Information Systems
Yohtaro Miyanishi (ISEM, Inc.), Shinji Kitagami (Waseda Univ.), Tadashi Ogino (Meisei Univ.), Funiaki Sato (Toho Univ), Yoriyoshi Urano, Norio Shiratori (Waseda Univ.) SWIM2016-9
Abstract: Recently, it became usual style to use external information systems even for business use system, due to spre... [more] SWIM2016-9
pp.15-22
SC 2016-08-26
11:00
Tokyo Kikai-Shinko-Kaikan Bldg. B2F Room No.2 Improvement of Trust Value Prediction Using Text Mining for Recommender System
Incheon Paik, Tomoya Maemori (UoA) SC2016-12
Recommender system will help to provide a list of items information that users are interested in. And with growth of soc... [more] SC2016-12
pp.7-11
SIP, RCS 2015-01-23
11:55
Okayama Okayama Univ. Secure Cooperation Scheme Using Fountain codes to Resist Untrustworthy Relay
Hao Niu, Tiantian Jiang, Masaki Ito, Kaoru Sezaki (Univ. of Tokyo) SIP2014-106 RCS2014-294
Physical layer security, which exploits wireless channel fading to realize secure transmission, has been an emerging res... [more] SIP2014-106 RCS2014-294
pp.147-150
 Results 41 - 60 of 107 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan