Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SIS |
2024-06-07 12:40 |
Hiroshima |
Hiroshima University (Primary: On-site, Secondary: Online) |
A Discriminator for Calcification Regions detector in Dental Panoramic Radiographs Sota Nakano, Mitsuji Muneyasu, Soh Yoshida, Akira Asano (Kansai Univ.), Nanae Dewake, Nobuo Yoshinari (Matsumoto Dental Univ.), Keiichi Uchida (Matsumoto Dental Univ. Hospital) |
(To be available after the conference date) [more] |
|
SR |
2024-05-21 10:15 |
Kagoshima |
Yokacenter (Kagoshima) (Primary: On-site, Secondary: Online) |
[Short Paper]
An Implementation of Radio Propagation Graph Representation Learning in Multi-hop Path Situations Shimon Takagi, Katsuya Suto (UEC) |
(To be available after the conference date) [more] |
|
EST |
2024-05-17 11:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Numerical evaluation of the accuracy of source estimation in various forward problem head models Masamune Niitsu, Yuji Tanaka, Chun-Ren Phang, Sachiko Kodera, Toshiaki Wasaka, Akimasa Hirata (NITech) |
(To be available after the conference date) [more] |
|
ICTSSL |
2024-05-16 14:45 |
Tokyo |
NEXCO-EAST ENGINEERING (Primary: On-site, Secondary: Online) |
On Some results on extended distance coloring of graphs Hiroshi Tamura (Chuo Univ.), Kazuyuki Miyakita, Keisuke Nakano (Niigata Univ.) |
(To be available after the conference date) [more] |
|
CQ, CS (Joint) |
2024-05-17 14:10 |
Aichi |
(Primary: On-site, Secondary: Online) |
Study on Indoor Radio Tomographic Imaging using LOS Component Estimation and TOA-based Localization Shino Shiraki (Tokyo Metropolitan Univ.), Yoshiaki Nishikawa (Secure System Platform Research Laboratories, NEC Corporation), Takahiro Matsuda (Tokyo Metropolitan Univ.), Eiji Takahashi, Takeo Onishi (Secure System Platform Research Laboratories, NEC Corporation), Toshiki Takeuchi (Advanced Network Research Laboratories, NEC Corporation) |
(To be available after the conference date) [more] |
|
ISEC |
2024-05-15 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Single-Shuffle Physical Zero-Knowledge Proof for Sudoku using Interactive Inputs Tomoki Ono, Suthee Ruangwises (UEC), Yoshiki Abe (UEC/AIST), Kyosuke Hatsugai, Mitsugu Iwamoto (UEC) |
[more] |
|
CCS |
2024-03-27 16:50 |
Hokkaido |
RUSUTSU RESORT |
JPEG Compression Quality Setting Considering Image Quality and Information Loss for Correlated Steganography Mariiko Aikawa, Sumiko Miyata (SIT), Kaito Hosono, Hirotsugu Kinoshita (KU) CCS2023-50 |
As more and more confidential information, including personal information, is transmitted and received over the Internet... [more] |
CCS2023-50 pp.64-69 |
ICSS, IPSJ-SPT |
2024-03-21 11:45 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Security Analysis on End-to-End Encryption of Zoom Mail Shogo Shiraki, Takanori Isobe (Univ.Hyogo) ICSS2023-71 |
Zoom Mail, an email service offered by Zoom Video Communications, incorporates an end-to-end encryption (E2EE) scheme, t... [more] |
ICSS2023-71 pp.17-24 |
ICM |
2024-03-22 16:50 |
Okinawa |
Okinawa Prefectural Museum and Art Museum (Primary: On-site, Secondary: Online) |
A Proposal for System Monitoring, Operations, and Maintenance Utilizing the Integration of Graph Databases and AI Masashi Sugimoto, Ryuya Hasegawa, Ryo Sasaki, Tetsushi Endo, Kenta Oonoki (NTT CW) ICM2023-66 |
We have developed numerous operational systems supporting Japan's telecommunication networks. The monitoring, operation,... [more] |
ICM2023-66 pp.113-118 |
ICSS, IPSJ-SPT |
2024-03-22 10:55 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Discovery of a Vulnerable Structure of SIMON Variants Hayato Watanabe (Tokai Univ.), Ryoma Ito (NICT), Toshihiro Ohigashi (Tokai Univ.) ICSS2023-92 |
In SCIS 2024, Watanabe et al. applied a deep learning-based output prediction attack to SIMON variants, which are varian... [more] |
ICSS2023-92 pp.166-173 |
CAS, CS |
2024-03-14 16:20 |
Okinawa |
|
An Approximate Solution Using K-Shortest Path and Reinforcement Learning for a Load Balancing Problem in Communication Networks Himeno Takahashi, Norihiko Shinomiya (Soka Univ.) CAS2023-123 CS2023-116 |
In recent years, the amount of data traffic in information and communication networks has been increasing and the risk o... [more] |
CAS2023-123 CS2023-116 pp.70-73 |
SIS |
2024-03-14 14:50 |
Kanagawa |
Kanagawa Institute of Technology (Primary: On-site, Secondary: Online) |
Improvement of Detection Accuracy for Detection of Calcification Regions in Dental Panoramic Radiographs Using LVAT Naoki Ikeda, Sei Takano, Mitsuji Muneyasu, Soh Yoshida, Akira Asano (Kansai Univ.), Nanae Dewake, Nobuo Yoshinari (Matsumoto Dental Univ.), Keiichi Uchida (Matsumoto Dental Univ. Hospital) SIS2023-50 |
Carotid arteries on dental panoramic radiographs may show areas of calcification, a sign of vascular disease. The sudden... [more] |
SIS2023-50 pp.27-32 |
RCC, ISEC, IT, WBS |
2024-03-13 14:15 |
Osaka |
Osaka Univ. (Suita Campus) |
Proxy Re-encryption based on LPN Haruki Fujimoto, Shingo Sato, Junji Shikata (YNU) IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70 |
We propose a proxy re-encryption (PRE) scheme based on the Learning Parity with Noise (LPN) problem using error-correcti... [more] |
IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70 pp.79-86 |
RCS, SR, SRW (Joint) |
2024-03-13 10:25 |
Tokyo |
The University of Tokyo (Hongo Campus), and online (Primary: On-site, Secondary: Online) |
[Short Paper]
A Study on the use of Advanced Cryptography in Sensor Network Takuya Kurihara, Keiichiro Mori, Kazuto Yano, Toshikazu Sakano (ATR) SR2023-87 |
Post-quantum cryptography (PQC) is a technology necessary to ensure security in the era of quantum computers. However, P... [more] |
SR2023-87 pp.1-3 |
RCC, ISEC, IT, WBS |
2024-03-14 09:30 |
Osaka |
Osaka Univ. (Suita Campus) |
Security Analysis of Backdoored Classic McEliece in a Multi-User Setting Dai Miura, Hyungrok Jo, Shingo Sato, Junji Shikata (Yokohama National Univ.) IT2023-105 ISEC2023-104 WBS2023-93 RCC2023-87 |
Several attacks have been proposed for the Classic McEliece cryptosystem, which is one of the 4th round candidates of th... [more] |
IT2023-105 ISEC2023-104 WBS2023-93 RCC2023-87 pp.197-204 |
RCC, ISEC, IT, WBS |
2024-03-14 09:55 |
Osaka |
Osaka Univ. (Suita Campus) |
A generalization of ISD algorithm for Syndrome Decoding Problem Asuka Wakasugi (EAGLYS), Tada Mitsuru (Chiba Univ.) IT2023-106 ISEC2023-105 WBS2023-94 RCC2023-88 |
The Information Set Decoding (ISD) algorithm is the best-known decoding algorithm for the syndrome decoding problem, whi... [more] |
IT2023-106 ISEC2023-105 WBS2023-94 RCC2023-88 pp.205-211 |
RCC, ISEC, IT, WBS |
2024-03-14 11:00 |
Osaka |
Osaka Univ. (Suita Campus) |
[Invited Talk]
Cryptographic Research Based on Algebraic Curve Computation Katsuyuki Takashima (Waseda Univ.) IT2023-116 ISEC2023-115 WBS2023-104 RCC2023-98 |
We have a wide range of cryptographic primitives based on elliptic curves, i.e., widely deployed public key cryptosystem... [more] |
IT2023-116 ISEC2023-115 WBS2023-104 RCC2023-98 p.265 |
RCC, ISEC, IT, WBS |
2024-03-14 15:30 |
Osaka |
Osaka Univ. (Suita Campus) |
Phishing Detection Method Based on Machine Learning Using DNS Graph Yuki Ishida, Syota Nihei, Junko Sato, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of Information Sciences) IT2023-129 ISEC2023-128 WBS2023-117 RCC2023-111 |
Recently, phishing scams have been on the rise, the need for effective defense methods against this phishing scams.
A b... [more] |
IT2023-129 ISEC2023-128 WBS2023-117 RCC2023-111 pp.337-342 |
RCC, ISEC, IT, WBS |
2024-03-14 17:00 |
Osaka |
Osaka Univ. (Suita Campus) |
Reconstruction of Boyer quantum algorithm and its application to hash puzzles Chris Idota, Yuichi Kaji (Nagoya Univ.) IT2023-132 ISEC2023-131 WBS2023-120 RCC2023-114 |
This study investigates the computational complexity of solving hash puzzles using quantum algorithms. A hash puzzle is ... [more] |
IT2023-132 ISEC2023-131 WBS2023-120 RCC2023-114 pp.358-365 |
IE, MVE, CQ, IMQ (Joint) [detail] |
2024-03-13 15:40 |
Okinawa |
Okinawa Sangyo Shien Center (Primary: On-site, Secondary: Online) |
A Study of an Automated Photography System for a Three-Dimensional Archive of Food Appearance Sakiho Horibe, Hiromi Nakamura (UTokyo), Yuichi Hiroi (Cluster), Fabre Émilie, Masanori Yoshihira, Jun Rekimoto (UTokyo) IMQ2023-33 IE2023-88 MVE2023-62 |
This study investigates a system that improves 3D reconstruction using Neural Radiance Fields (NeRF) by integrating a ro... [more] |
IMQ2023-33 IE2023-88 MVE2023-62 pp.114-119 |