Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-21 16:10 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Considerations on Differential Privacy Mechanisms in MNIST Naoki Kawahara, Pengxuan Wei, Ryunosuke Higashi, Kenta Okada, Tatsuhiro Yamatsuki, Atsuko Miyaji (Osaka Univ.) ICSS2023-81 |
In recent years, data utilization technologies, including machine learning, have been steadily advancing. One means of p... [more] |
ICSS2023-81 pp.85-92 |
ICSS, IPSJ-SPT |
2024-03-22 08:30 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Proposal of Moving Target Defense Approach on Reliability in Web Services Mamoru Saita (Keio Univ.), Shunsuke Hashimoto (Univ. of Hyogo), Atsuo Inomata (Osaka Univ.), Hiroyuki Inoue (Kyoto Sangyo Univ.) ICSS2023-82 |
Although modern Web services are built on a high level of security and reliability, the static properties of networks re... [more] |
ICSS2023-82 pp.93-99 |
ICSS, IPSJ-SPT |
2024-03-22 10:55 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Improved signature-embedding techniques against backdoor attacks on DNN models Akira Fujimoto, Yuntao Wang, Atsuko Miyaji (OU) ICSS2023-87 |
In recent years, machine learning, particularly deep learning, has made remarkable strides, and has great impact on our ... [more] |
ICSS2023-87 pp.129-136 |
ICSS, IPSJ-SPT |
2024-03-22 11:45 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Fast and Secure Scalar Multiplication for the GLS254 Binary Elliptic Curve Ryosuke Kido, Atsuko Miyaji (OU) ICSS2023-94 |
Elliptic curve cryptosystems (ECCs) are cryptographic schemes based on the discrete logarithm problem on an elliptic cur... [more] |
ICSS2023-94 pp.180-187 |
ICSS, IPSJ-SPT |
2024-03-22 12:10 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Extension of the linear approximation for stream cipher ChaCha Yurie Okada, Atsuko Miyaji (OU) ICSS2023-95 |
(To be available after the conference date) [more] |
ICSS2023-95 pp.188-193 |
DC, CPSY, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2024-03-22 16:10 |
Nagasaki |
Ikinoshima Hall (Primary: On-site, Secondary: Online) |
CPSY2023-48 DC2023-114 |
(To be available after the conference date) [more] |
CPSY2023-48 DC2023-114 pp.59-64 |
AP |
2024-03-15 10:25 |
Fukui |
UNIVERSITY OF FUKUI (Primary: On-site, Secondary: Online) |
A Study on Path loss characteristics estimation methods considering geographical conditions for designing narrowband DR-IoT communication system Takato Ikegame, Naoki Ikeda, Motonari Imai, Tetsushi Ikegami (Meiji Univ.), Mineo Takai (Osaka Univ.), Susumu Ishihara (Shizuoka Univ.), Arata Kato, Shugo Kajita (STE) AP2023-212 |
A versatile variable-range IoT communication system using the VHF-High band, Diversified-Range IoT (DR-IoT) is being con... [more] |
AP2023-212 pp.63-67 |
AP |
2024-03-15 13:00 |
Fukui |
UNIVERSITY OF FUKUI (Primary: On-site, Secondary: Online) |
A Study on K-factor estimation accuracy using momentum method for designing narrowband IoT communication system DR-IoT Naoki Ikeda, Motonari Imai, Takato Ikegame, Tetsushi Ikegami (Meiji Univ.), Susumu Ishihara (Shizuoka Univ.), Arata Kato, Syugo Kajita (スペースタイムエンジニアリング), Hiroshi Yamamoto (Ritsumeikan Univ.), Mineo Takai (Osaka Univ.) AP2023-215 |
A versatile variable-range IoT communication system using the VHF-high band, Diversified-Range IoT (DR-IoT)is being cons... [more] |
AP2023-215 pp.80-84 |
KBSE |
2024-03-14 13:45 |
Okinawa |
Okinawa Prefectual General Welfare Center (Primary: On-site, Secondary: Online) |
Consideration on System Safety Verification Based on User Personality Traits Ruka Narisawa, Shinpei Ogata (Shinshu Univ.), Yoshitaka Aoki (BIPROGY), Hiroyuki Nakagawa (Osaka Univ.), Kazuki Kobayashi, Kozo Okano (Shinshu Univ.) KBSE2023-72 |
(To be available after the conference date) [more] |
KBSE2023-72 pp.43-48 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
[Invited Talk]
Recent Developments in Quantum Statistics Akio Fujiwara (Osaka Univ.) IT2023-87 ISEC2023-86 WBS2023-75 RCC2023-69 |
Suppose that one has $n$ copies of a quantum system each in the same state depending on an unknown parameter $¥theta$, a... [more] |
IT2023-87 ISEC2023-86 WBS2023-75 RCC2023-69 p.78 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Study on the computatinal cost of Triple Sieve algorithm by applying in ideal property Seishiro Terada, Yuntao Wang, Atsuko Miyaji (Osaka Univ.) IT2023-100 ISEC2023-99 WBS2023-88 RCC2023-82 |
[more] |
IT2023-100 ISEC2023-99 WBS2023-88 RCC2023-82 pp.166-173 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Consideration on Definition Field for Efficient Ring-LWE Problem Rintaro Yamada, Shinya Okumura, Atsuko Miyaji (OU) IT2023-99 ISEC2023-98 WBS2023-87 RCC2023-81 |
Currently, as one of the candidates for the post-quantum cryptography, there are cryptosystems based on the difficulty o... [more] |
IT2023-99 ISEC2023-98 WBS2023-87 RCC2023-81 pp.158-165 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Proposal of Methods to Detect Backdoor Attacks Using Signature Embedding Techniques Shintaro Yamashita, Wang Yuntao, Atsuko Miyaji (OU) IT2023-126 ISEC2023-125 WBS2023-114 RCC2023-108 |
[more] |
IT2023-126 ISEC2023-125 WBS2023-114 RCC2023-108 pp.317-323 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Data processing methods for high-performance Privacy-Preserving Machine Learning Tatsuhiro Yamatsuki (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) IT2023-94 ISEC2023-93 WBS2023-82 RCC2023-76 |
Currently, attempts are being made in various fields to solve problems by utilizing big data. However, privacy protectio... [more] |
IT2023-94 ISEC2023-93 WBS2023-82 RCC2023-76 pp.118-126 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Consideration of BKZ by reordering lattice basis vectors Katsuya Katsuya, Yuntao Wang, Atsuko Miyaji (Osaka Univ.) IT2023-107 ISEC2023-106 WBS2023-95 RCC2023-89 |
[more] |
IT2023-107 ISEC2023-106 WBS2023-95 RCC2023-89 pp.212-219 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Efficient Key-Value Commitments with batch update and verification Toshiyuki Mineta, Atsuko Miyaji (OU) IT2023-112 ISEC2023-111 WBS2023-100 RCC2023-94 |
As Blockchain grows in size, the resources to validate that a transaction is true increase linearly. Key-value commitme... [more] |
IT2023-112 ISEC2023-111 WBS2023-100 RCC2023-94 pp.241-248 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Performance Evaluation of Post-Quantum Digital Signature Schemes Ryoto Morizono, Yuntao Wang, Atsuko Miyaji (Osaka Univ.) IT2023-89 ISEC2023-88 WBS2023-77 RCC2023-71 |
It is believed that RSA and elliptic curve cryptography, which are currently widely used, may be broken by quantum compu... [more] |
IT2023-89 ISEC2023-88 WBS2023-77 RCC2023-71 pp.87-93 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
On Privacy Mechanism to Discreat Data fit for Machine Learning Tomoshi Yagishita, Atsuko Miyaji (OU) IT2023-95 ISEC2023-94 WBS2023-83 RCC2023-77 |
In recent years, while the use of personal data has become increasingly active, the importance of privacy protection has... [more] |
IT2023-95 ISEC2023-94 WBS2023-83 RCC2023-77 pp.127-134 |
IE, MVE, CQ, IMQ (Joint) [detail] |
2024-03-13 10:00 |
Okinawa |
Okinawa Sangyo Shien Center (Primary: On-site, Secondary: Online) |
Estimation of Perceived Difficulty when reading VR-based Educational Comics Using Gaze and Facial Movement, Heart Rate, and Electroencephalography Hiroyuki Ishizuka (NAIST), Kenya Sakamoto, Shizuka Shirai, Jason Orlosky (OU), Yutaro Hirao, Monica Perusquia-Hernandez (NAIST), Naoya Isoyama (OWU), Hideaki Uchiyama, Kiyoshi Kiyokawa (NAIST) IMQ2023-13 IE2023-68 MVE2023-42 |
This study explores significant biometric features that can be used to estimate subjective difficulty while reading educ... [more] |
IMQ2023-13 IE2023-68 MVE2023-42 pp.1-6 |
IE, MVE, CQ, IMQ (Joint) [detail] |
2024-03-13 14:10 |
Okinawa |
Okinawa Sangyo Shien Center (Primary: On-site, Secondary: Online) |
Visualization method of three-dimensional radio wave conditions for drone teleoperation support Takumi Nagahara, Nattaon Techasarntikul, Yuichi Ohsita, Hideyuki Shimonishi (Osaka Univ.) IMQ2023-35 IE2023-90 MVE2023-64 |
Drones are used in a wide range of fields including inspection and logistics, but drone accidents are sometimes caused b... [more] |
IMQ2023-35 IE2023-90 MVE2023-64 pp.126-131 |