Thu, Jun 8 PM Opening 12:50 - 13:00 |
|
12:50-13:00 |
Opening Address ( 10 min. ) |
Thu, Jun 8 PM IA Session 1 13:00 - 14:15 |
(1) |
13:00-13:25 |
Study of a Load Equalization Method Using Phase Shift for Distributed Sensor Data Stream Delivery |
Tomoya Kawakami (NAIST), Yoshimasa Ishi, Tomoki Yoshihisa (Osaka Univ.), Yuuichi Teranishi (NICT/Osaka Univ.) |
(2) |
13:25-13:50 |
Development and evaluation of wild bird identification system using audio sensing and machine learning |
Takemi Morimatsu (Nagoya Univ.), Hiroshi Yamamoto (Ritsumeikan Univ.) |
(3) |
13:50-14:15 |
Development and evaluation of victim detection system using autonomous UAV flight based on beacon radio sensing |
Seiji Andon, Hiroshi Yamamoto (Ritsumeikan Univ.) |
|
14:15-14:25 |
Break ( 10 min. ) |
Thu, Jun 8 PM ICSS Session 1 14:25 - 16:05 |
(4) |
14:25-14:50 |
A First Trend Review of Runtime Packers for IoT Malware |
Ryoichi Isawa (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Tao Ban, Daisuke Inoue (NICT) |
(5) |
14:50-15:15 |
Study on Email address harvesting by free service |
Keisuke Hashida, Masaru Kawakita, Shigeyoshi Shima (NEC) |
(6) |
15:15-15:40 |
Digital Contract Protocols using Blockchain |
Atsumu Mishima, Takashi Nishide (Tsukuba Univ.) |
(7) |
15:40-16:05 |
On the Zero Knowledge Proof Type Authentication Scheme Using LDPC Codes |
Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) |
|
16:05-16:15 |
Break ( 10 min. ) |
Thu, Jun 8 PM IA Session 2 16:15 - 17:25 |
(8) |
16:15-16:40 |
Training simulator for creating list of victims at the disaster medical base |
Keijiro Okamura (Excite), Sato Fumiya, Fukumoto masahiro (Kochi Univ.of Tech) |
(9) |
16:40-17:05 |
Raspberry Guardian: Security Management for IoT Environment using Social Network Systems |
Hiroyuki Ohno, Yoshiaki Kitaguchi (Kanazawa Univ), Hironobu Suzuki (Senshu Univ) |
|
17:05-17:15 |
IA award ( 10 min. ) |
|
17:15-17:25 |
ICS award ( 10 min. ) |
|
18:00-20:00 |
( 120 min. ) |
Fri, Jun 9 AM IA Session 3 09:30 - 10:20 |
(10) |
09:30-09:55 |
Analysis of First Meeting Time of Two Random Walkers toward Understanding Information Dissemination and Gathering with Mobile users |
Yusuke Sakumoto (Tokyo Metropolitan Univ.), Hiroyuki Ohsaki (Kwansei Gakuin Univ.) |
(11) |
09:55-10:20 |
A Solution for Minimum Link Flow Problem with Sparse Modeling |
Ryotaro Matsuo, Ryo Nakamura, Hiroyuki Ohsaki (Kwansei Gakuin Univ.) |
|
10:20-10:30 |
Break ( 10 min. ) |
Fri, Jun 9 AM Invited Talk 10:30 - 11:50 |
(12) |
10:30-11:10 |
[Invited Talk]
Applying AI for Cyber Security |
Jun'ichi Takeuchi (Kyushu Univ./NICT) |
(13) |
11:10-11:50 |
[Invited Talk]
WarpDrive: Web-based Attack Response with Practical and Deployable Research InitiatiVE |
Akira Yamada (KDDI Research) |
Fri, Jun 9 AM Closing 11:50 - 12:05 |
|
11:50-12:00 |
Break ( 10 min. ) |
|
12:00-12:05 |
Closing Address ( 5 min. ) |