IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 34  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2024-03-21
14:55
Okinawa OIST
(Primary: On-site, Secondary: Online)
ICSS2023-75 With the proliferation of IoT devices, there has been an increase in security incidents targeting IoT devices. To active... [more] ICSS2023-75
pp.43-50
PRMU, IBISML, IPSJ-CVIM 2024-03-04
09:12
Hiroshima Hiroshima Univ. Higashi-Hiroshima campus
(Primary: On-site, Secondary: Online)
Creating Adversarial Examples to Deceive Both Humans and Machine Learning Models
Ko Fujimori (Waseda Univ.), Toshiki Shibahara (NTT), Daiki Chiba (NTT Security), Mitsuaki Akiyama (NTT), Masato Uchida (Waseda Univ.) PRMU2023-65
One of the vulnerability attacks against neural networks is the generation of Adversarial Examples (AE), which induce mi... [more] PRMU2023-65
pp.82-87
IA, ICSS 2023-06-21
09:30
Saga Saga Univ.
(Primary: On-site, Secondary: Online)
A Precise Approach of Software Vulnerability Detection Using Set Similarity Calculation Algorithm
Reika Arakawa, Yo Kanemoto, Eitaro Shioji, Mitsuaki Akiyama (NTT) IA2023-7 ICSS2023-7
(To be available after the conference date) [more] IA2023-7 ICSS2023-7
pp.32-39
ICSS, IPSJ-SPT 2023-03-13
15:00
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
ICSS2022-58 (To be available after the conference date) [more] ICSS2022-58
pp.61-66
ICSS, IPSJ-SPT 2023-03-13
15:20
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
ICSS2022-59 (To be available after the conference date) [more] ICSS2022-59
pp.67-72
ICSS, IPSJ-SPT 2023-03-14
10:30
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Port-aware IPv6 Scanning and Large-scale Security Surveys
Tatsuya Takemura, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama (NTT) ICSS2022-73
(To be available after the conference date) [more] ICSS2022-73
pp.151-156
SITE, IPSJ-CE 2022-12-04
15:05
Fukuoka
(Primary: On-site, Secondary: Online)
[Invited Talk] ** Please fill in this blank. **
Mitsuaki Akiyama (NTT Social Informatics Laboratories)
 [more]
CCS 2022-11-18
10:30
Mie
(Primary: On-site, Secondary: Online)
Analysis of Homophily Effects on Information Diffusion on Social Networks
Satoshi Furutani (NTT/TMU), Toshiki Shibahara, Mitsuaki Akiyama (NTT), Masaki Aida (TMU) CCS2022-55
Modeling the information diffusion process on networks is an important issue for analyzing information diffusion pattern... [more] CCS2022-55
pp.61-66
ICSS 2022-11-07
15:25
Hokkaido Hokkaido Jichiro Kaikan
(Primary: On-site, Secondary: Online)
Analysis of Environmental Sensitivity of Persistent IoT Malware using Sandboxes with File Systems from Various IoT Devices
Takahiro Inoue (YNU), Eizo Okada, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2022-45
(To be available after the conference date) [more] ICSS2022-45
pp.43-48
ICSS, IPSJ-SPT 2022-03-08
10:00
Online Online Input predictive attack by keyboard acoustic emanations using BERT and its countermeasures
Masahiro Iida (Teikyo Univ.), Mitsuaki Akiyama (NTT), Masaki Kamizono (DTCY), Takahiro Kasama (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Kyoto Sangyo Univ.), Atsuo Inomata (Osaka Univ.) ICSS2021-67
The Keyboard Acoustic Emanations has been proposed to estimate the input key from keystroke sounds as a kind of side-cha... [more] ICSS2021-67
pp.49-54
ICSS, IPSJ-SPT 2021-03-01
09:10
Online Online On the Privacy Risk of Exposure Notification Framework: Assessment and Countermeasures
Kazuki Nomoto (Waseda Univ.), Mitsuaki Akiyama (NTT), Masashi Eto (NICT), Atsuo Inomata (Osaka Univ.), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-34
The Exposure Notification Framework uses the Bluetooth Low Energy (BLE) signal generated by a smartphone to determine cl... [more] ICSS2020-34
pp.49-54
ICSS, IPSJ-SPT 2021-03-01
14:55
Online Online Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox
Takahiro Inoue (YNU), Satoshi Hara (YNU/FUJISOFT), Hironobu Sakaki, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-41
Malware that infects vulnerable IoT devices is becoming more sophisticated. Unlike legacy IoT malware, cases of persiste... [more] ICSS2020-41
pp.90-95
ICSS, IPSJ-SPT 2021-03-02
14:05
Online Online Developing an Interactive Analysis System for Voice Assistant Apps
Atsuko Natatsuka (Waseda Univ.), Ryo Iijima (Waseda Univ./NICT), Takuya Watanabe, Mitsuaki Akiyama (NTT), Tetsuya Sakai (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-48
In Voice Assistant Services, official or third-party Voice Assistant Apps (VA apps) are provided. Since a VA app works a... [more] ICSS2020-48
pp.132-137
ICSS, IPSJ-SPT 2021-03-02
09:10
Online Online A Study on the Adoption of Link Preview by the Phishing Sites
Norihito Omori (Waseda Univ.), Satoshi Furutani, Takuya Watanabe, Toshiki Shibahara, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.) ICSS2020-54
Search engines are not the only means of accessing online content. The distribution of malicious content has become mor... [more] ICSS2020-54
pp.166-171
ICSS, IPSJ-SPT 2020-03-02
13:30
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
ICSS2019-74 (To be available after the conference date) [more] ICSS2019-74
pp.37-42
ICSS, IPSJ-SPT 2019-03-07
16:15
Okinawa NICT Okinawa Electromagnetic Technology Center Analyzing Deceptive Internationalized Domain Names
Daiki Chiba, Ayako Akiyama Hasegawa, Takashi Koide (NTT), Yuta Sawabe, Shigeki Goto (Waseda Univ.), Mitsuaki Akiyama (NTT) ICSS2018-76
Internationalized domain names (IDNs) are abused to create domain names visually similar to those of legitimate brands. ... [more] ICSS2018-76
pp.47-52
ICSS, IPSJ-SPT 2018-03-08
09:45
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Automatically Collecting User-initiated Web-based Attacks
Takashi Koide, Daiki Chiba, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT) ICSS2017-66
Recently, web content uses social engineering techniques to lure victims into clicking on them, originating malware down... [more] ICSS2017-66
pp.91-96
ICSS, IPSJ-SPT 2018-03-08
10:10
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center An Empirical Analysis of Online Advertising Fraud by analyzing User Activities Observed in the Ad Network
Fumihiro Kanei, Daiki Chiba, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT) ICSS2017-67
With the growth of online advertising market, it has become the target of abuse, such as ad fraud by adware and bots. To... [more] ICSS2017-67
pp.97-102
ICSS, IPSJ-SPT 2018-03-08
11:35
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Predicting Website Abuse Using Update Histories
Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT), Shigeki Goto (Waseda Univ.) ICSS2017-73
Threats of abusing websites that webmasters abandoned updates has increased.
In this paper, we propose a method of pred... [more]
ICSS2017-73
pp.133-138
ICSS, IPSJ-SPT 2018-03-08
14:15
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center A Survey of Factors Influencing Progress of HTTPS Adoption
Tetsuya Okuda, Naoko Chiba, Mitsuaki Akiyama, Yuki Okano (NTT) ICSS2017-80
(To be available after the conference date) [more] ICSS2017-80
pp.187-192
 Results 1 - 20 of 34  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan