(1) |
13:00-13:05 |
Opening |
Thu, Jun 23 PM IA1 13:05 - 14:20 |
(1) |
13:05-13:30 |
Towards a Collaborative Operational Data Analysis for Automated Network Management |
Satoru Kobayashi, Kensuke Fukuda (NII) |
(2) |
13:30-13:55 |
Distributed Clock Synchronization Protocol for Proof of Stake Blockchain |
Yuya Miki, Kazuyuki Shudo (Tokyo Tech) |
(3) |
13:55-14:20 |
Decentralized Identifier and Access Control based Architecture for Privacy-Sensitive Data Distribution Service |
Reiya Oku, Kohei Shiomoto (Tokyo City Univ.), Yoshihiro Ohba (Kioxia) |
|
14:20-14:30 |
Break ( 10 min. ) |
Thu, Jun 23 PM ICSS1 Chair: Hiroki Kuzuno (Kobe Univ.) 14:30 - 15:45 |
(4) |
14:30-14:55 |
Discussion about improving a detection accuracy of malware variants using time series differences in latent representation. |
Atsushi Shinoda, Hajime Shimada, Yukiko Yamaguti (Nagoya Univ.), Hirokazu Hasegawa (NII) |
(5) |
14:55-15:20 |
Control method for web push notification by browser extension |
Masaya Sato, Hibiki Watanabe (OPU) |
(6) |
15:20-15:45 |
An Investigation of Abuse Possibility of IoT Devices After Unauthorized Login |
Kosuke Murakami (NICT/KDDIR), Takahiro Kasama, Daisuke Inoue (NICT) |
|
15:45-15:55 |
Break ( 10 min. ) |
Thu, Jun 23 PM IA2 15:55 - 17:30 |
(7) |
15:55-16:20 |
Development and Evaluation of Indoor Activity Tracking System Using Sensor Fusion with Audio and 3D Point Cloud Observation |
Mana Nishigaki, Hiroshi Yamamoto (Ritsumei Univ.) |
(8) |
16:20-16:45 |
Development and Evaluation of Behavior Observation System for Elderly People Living Alone Using 3D Point Cloud Data Analysis by Edge AI |
Keigo Shimatani, Yamamoto Hiroshi (Ritsumei Univ) |
(9) |
16:45-17:10 |
Implementation and Performance Evaluation of TCP/IP Communication Using 920MHz Private LoRa |
Jumpei Sakamoto, Daiki Nobayashi, Kazuya Tsukamoto, Takeshi Ikenaga (Kyutech), Goshi Sato, Kenichi Takizawa (NICT) |
(10) |
17:10-17:20 |
|
(11) |
17:20-17:30 |
|
Fri, Jun 24 AM ICSS2 Chair: Katsunari Yoshioka (Yokohama National Univ.) 10:00 - 10:50 |
(12) |
10:00-10:25 |
Anonymity and Usefulness of combining Random sampling and Patient characteristics format statistics |
Kenta Kitamura, Irvan Mhd, Rie Shigetomi Yamaguchi (UTokyo) |
(13) |
10:25-10:50 |
Application of Adversarial Examples to Physical ECG Signals |
Taiga Ono (Waseda Univ.), Takeshi Sugawara (UEC), Jun Sakuma (Tsukuba Univ./RIKEN), Tatsuya Mori (Waseda Univ./RIKEN/NICT) |
|
10:50-11:00 |
Break ( 10 min. ) |
Fri, Jun 24 AM IA3 11:00 - 12:35 |
(14) |
11:00-11:25 |
Identification of Information Security Issues in Small and Medium Enterprises - Interview Analysis Using M-GTA |
Keisuke Tanaka, Tetsutaro Uehara (Ritsumeikan Univ), Yoshikazu Furukawa, Motoki Noda (Osaka Chamber of Commerce and Industry) |
(15) |
11:25-11:50 |
An Experimental Study on Name Resolution History Basis Abnormal Detection and Blocking Using SDN and DNS RPZ |
Hikaru Ichise, Yong Jin (Tokyo Tech), Katsuyoshi Iida (Hokkaido Univ) |
(16) |
11:50-12:15 |
Studies on Blacklists based DNS Query Analysis for Malicious Domain Detection |
Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (Kyutech) |
(17) |
12:15-12:25 |
|
(18) |
12:25-12:35 |
Closing |