Thu, Mar 8 AM 09:00 - 10:40 |
(1) |
09:00-09:25 |
Evaluation of Bayes Predictive Distributions under Unknown Parametric Models on Misspecified Models |
Hirokazu Kono, Shota Saito, Toshiyasu Matsushima (Waseda Univ.) |
(2) |
09:25-09:50 |
Information Geometrical Study of Cluster-Model Approximation for Boltzmann Machines |
Kenta Toyoda, Tomohiro Ogawa (Univ. of Electro- Commu.) |
(3) |
09:50-10:15 |
Redundancy Analysis of Univarsal Lossless Source Coding via Estimation of Prior
-- Relaxing an Ergodicity Condition -- |
Ryosuke Ikarashi, Tsutomu Kawabata (UEC) |
(4) |
10:15-10:40 |
Evaluation of the Worst-Case Redundancy of Strongly Universal FV Source Codes Using the Source Approximation and the Asymptotically Sufficient Statistic |
Mitsuharu Arimura (Shonan Inst. Tech.), Hiroshi Nagaoka (Univ. of Electro-Comm.) |
|
10:40-10:50 |
Break ( 10 min. ) |
Thu, Mar 8 AM 10:50 - 12:05 |
(5) |
10:50-11:15 |
The Access Structure of a Secret Sharing Scheme Using Locally Repairable Codes |
Masanobu Nakata, Tomohiko Uyematsu, Tetsunao Matsuta (Tokyo Tech) |
(6) |
11:15-11:40 |
Construction of Secret Sharing Schemes with Small Thresholds for Countably Infinite Participants |
Takashi Hisatome, Hiroki Koga (Univ. Tsukuba) |
(7) |
11:40-12:05 |
Constructions of the (3,n) and (4,n) Threshold Visual Cryptography Using Combinatorial Designs and Their Performance Evaluation |
Kotaro Okada, Hiroki Koga (Univ. of Tsukuba) |
|
12:05-13:00 |
Lunch Break ( 55 min. ) |
Thu, Mar 8 PM 13:00 - 14:40 |
(8) |
13:00-13:25 |
Outage Capacity of a Two-User MIMO Interference Channel for Simultaneous Information and Energy Transfer |
Kengo Ikebata, Tomohiko Uyematsu (Tokyo Tech), Ryutaroh Matsumoto (Nagoya Univ), Tetsunao Matsuta (Tokyo Tech) |
(9) |
13:25-13:50 |
Optimality for the Iterative Construction Scheme of AIFV-$m$ codes |
Ryusei Fujita, Ken-ichi Iwata (Univ. of Fukui), Hirosuke Yamamoto (The Univ. of Tokyo) |
(10) |
13:50-14:15 |
Optimal Coded Caching using Linear Programming |
Shota Kamiya, Hiroki Koga (Univ. Tsukuba) |
(11) |
14:15-14:40 |
Shifted Coded Slotted ALOHA |
Tomokazu Emoto, Takayuki Nozaki (Yamaguchi Univ.) |
|
14:40-15:00 |
Break ( 20 min. ) |
Thu, Mar 8 PM 15:00 - 15:50 |
(12) |
15:00-15:50 |
[Invited Talk]
On Traitor Tracings and Related Topics |
Shota Yamada (AIST) |
|
15:50-16:00 |
Break ( 10 min. ) |
Thu, Mar 8 PM 16:00 - 16:50 |
(13) |
16:00-16:50 |
[Invited Talk]
Research and Development of Transmission Technologies for the Next Generation Terrestrial Broadcasting |
Tomoaki Takeuchi (NHK) |
|
16:50-17:00 |
Break ( 10 min. ) |
Thu, Mar 8 PM 17:00 - 17:50 |
(14) |
17:00-17:50 |
[Invited Talk]
On fast multiplications of multiple-valued logic polynomials by discrete Fourier transforms |
Hajime Matsui (Toyota Technological Institute) |
Thu, Mar 8 AM 09:00 - 10:40 |
(15) |
09:00-09:25 |
Effect on randomizing components to the security of Minalpher |
Yuki Kishi, Keita Osafune, Yuta Kuwano, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ) |
(16) |
09:25-09:50 |
A study on hierarchical secret sharing schemes applicable to any level based on XOR operations |
Koji Shima, Hiroshi Doi (IISEC) |
(17) |
09:50-10:15 |
Succinct Oblivious RAM |
Taku Onodera, Tetsuo Shibuya (IMSUT) |
(18) |
10:15-10:40 |
High Efficient Scalar Multiplication in Elliptic Curve Cryptography |
Noboru Takeuchi, Toshiyuki Kinoshita (TUT) |
|
10:40-10:50 |
Break ( 10 min. ) |
Thu, Mar 8 AM 10:50 - 12:05 |
(19) |
10:50-11:15 |
Digital watermark using deep-learning classification |
Mashu Sakai, Taiki Shigeta, Hikaru Morita (Kanagawa Univ.) |
(20) |
11:15-11:40 |
Evaluation of deep learning method for detection of intrusion packets |
Tomoki Ueno, Mitiko Harayama (GIFU Univ) |
(21) |
11:40-12:05 |
Reply analysis between Twitter users using machine learning
-- Distinguish real-life/online friends -- |
Takakuwa Ranka, Sasaki Taroh, Fujioka Atsushi (KU) |
|
12:05-13:00 |
Lunch Break ( 55 min. ) |
Thu, Mar 8 PM 13:00 - 13:50 |
(22) |
13:00-13:25 |
On the Number of Rounds by Card-based Cryptographic Protocols Using Private Operations |
Hibiki Ono, Yoshifumi Manabe (Kogakuin Univ.) |
(23) |
13:25-13:50 |
Card-Based Cryptographic Protocols with Private Operations which can Prevent Malicious Behaviors |
Youhei Shimizu, Yuki Kishi, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ) |
Fri, Mar 9 AM 09:25 - 10:40 |
(24) |
09:25-09:50 |
A study on segmented deletion error correction using polar code |
Hikari Koremura, Haruhiko Kaneko (Tokyo Tech) |
(25) |
09:50-10:15 |
Bayes Optimal AMP Decoder for Sparse Superposition Codes |
Yuwa Hatae (Kyushu Univ.), Kazushi Mimura (Hiroshima City Univ.), Masanori Kawakita, Jun'ichi Takeuchi (Kyushu Univ.) |
(26) |
10:15-10:40 |
Ordered Shuffle-BP Decoding Based on the Loops of LDPC Code |
Ryoma Sakai, Kazuhiko Yamaguchi (UEC) |
|
10:40-10:50 |
Break ( 10 min. ) |
Fri, Mar 9 AM 10:50 - 12:30 |
(27) |
10:50-11:15 |
Efficient Scheduling of Serial Iterative Decoding for Zigzag Decodable Fountain Codes |
Yoshihiro Murayama, Takayuki Nozaki (Yamaguchi Univ.) |
(28) |
11:15-11:40 |
Non-binary codes correcting a burst of deletions or insertions |
Toyohiko Saeki, Takayuki Nozaki (Yamaguchi Univ.) |
(29) |
11:40-12:05 |
Asymptotic Analysis of LDPC Codes for Two-Way Relay Channels |
Yuta Ishimatsu, Satoshi Takabe, Tadashi Wadayama (NITech), Masahito Hayashi (Nagoya Univ.) |
(30) |
12:05-12:30 |
Consideration of error correction code suitable for WBAN |
Akihiro Yamada, Hiroyoshi Morita, Akiko Manada (The Univ. of Electro-Communications) |
|
12:30-13:30 |
Lunch Break ( 60 min. ) |
Fri, Mar 9 PM 13:30 - 15:10 |
(31) |
13:30-13:55 |
On the Generalization of Fano's Inequality for Countably Infinite Alphabets, List-Decoding, and General Conditional Information Measures |
Yuta Sakai (Univ. Fukui) |
(32) |
13:55-14:20 |
Parameter orthogonalization method in quantum parameter estimation problem |
Jun Suzuki (UEC) |
(33) |
14:20-14:45 |
Improved Lossless Compression by Substring Enumeration Using Sorting |
Takahiro Ota (NPIT), Akiko Manada (UEC) |
(34) |
14:45-15:10 |
The Error Performance Analysis of the K-best Viterbi Decoding Algorithm |
Hideki Yoshikawa (Tohoku Gakuin Univ.) |
|
15:10-15:45 |
Break ( 35 min. ) |
Fri, Mar 9 PM 15:45 - 16:35 |
(35) |
15:45-16:10 |
Quantum &Classical Radar Camera for Automotive and Effect of Fog-2
-- Sparse Modeling -- |
Osamu Hirota (Tamagawa Univ.) |
(36) |
16:10-16:35 |
Attacks on several Multivariate PKCs
-- Attack on K(AVII)MVPKC -- |
Ryuichi Sakai (Osaka Electro-Communication Univ.), Masao Kasahara (Waseda Univ.) |
Fri, Mar 9 AM 09:00 - 10:40 |
(37) |
09:00-09:25 |
A Note on Security Notions of Anonymity in Identity-Based Encryption
-- Case of ID-CCA2 Security -- |
Honomu Ohtomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) |
(38) |
09:25-09:50 |
On Confirming Ciphertext Update in Key-Updatable Public-key Encryption with Keyword Search |
Yuka Sakoda, Honomu Ohtomo, Naoki Matsunaga, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) |
(39) |
09:50-10:15 |
On (Un)Deniability of Plausible Deniability |
Atsushi Waseda, Ryo Nojima (NICT) |
(40) |
10:15-10:40 |
Information-Theoretically Secure Authentication Codes with Arbitration using Non-Uniformly Random Keys |
Miho Ishikawa, Junji Shikata (Yokohama National Univ.) |
|
10:40-10:50 |
Break ( 10 min. ) |
Fri, Mar 9 AM 10:50 - 11:40 |
(41) |
10:50-11:15 |
On Security Evaluation for Coset Coding in Wiretap Channel Coding |
Yuki Mori, Tomohiro Ogawa (UEC) |
(42) |
11:15-11:40 |
Secure Communications over the Two-Way Wiretap Channel II with Noisy Main Channel Using Cooperative Jamming |
Hiroki Iizuka, Ryota Tanaka, Junji Shikata (Yokohama National Univ.) |
|
11:40-13:30 |
Lunch Break ( 110 min. ) |
Fri, Mar 9 PM 13:30 - 15:10 |
(43) |
13:30-13:55 |
Time-Space Jointly Path-Matched MC-CDM Wide Band Radio Modulation with TX and RX Array Antennas
-- for High Performance Error-Control Coding -- |
Kohji Itoh, Akira Nakamura, Makoto Itami (TUS) |
(44) |
13:55-14:20 |
Influence of Channel Estimation Error on Noise Enhancement Suppression by Using Novel Multilevel Spreading Codes |
Tatsuya Motoki, Takehiko Kobayashi (Tokyo Denki Univ.) |
(45) |
14:20-14:45 |
Performance Comparison of User Position Detection Method using Multiple Unmanned Aerial Vehicles based Positioning Accuracy Index |
Hiroyasu Ishikawa, Hiroki Onuki (Nihon Univ.) |
(46) |
14:45-15:10 |
Study on Aerial Cooperative Relaying for Coverage Extension of High-Altitude Unmanned Aircraft Systems |
Fumie Ono (NICT), Hideki Ochiai (Yokohama National Univ.), Ryu Miura, Fumihide Kojima (NICT) |
|
15:10-15:20 |
Break ( 10 min. ) |
Fri, Mar 9 PM 15:20 - 17:00 |
(47) |
15:20-15:45 |
On Adaptive Self-Interference Suppression for Full Duplex Filter-and-Forward Relaying |
Hayato Teshiromori, Teruyuki Miyajima, Yoshiki Sugitani (Ibaraki Univ.) |
(48) |
15:45-16:10 |
Evaluation of synchronization jitter caused by the distance from base-station on optical wireless RVC system using CSK-MPPM |
Masayuki Ishikawa, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.) |
(49) |
16:10-16:35 |
A study of Bit Error Rate Taking into Account Synchronization Performance on Optical Wireless Framed-DOOK System |
Yuta Asano, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.) |
(50) |
16:35-17:00 |
BER Performance Evaluation of ROD-WSN using Modified Pseudo Orthogonal M-sequences under Fading Channel |
Tomohiro Okawa, Hiromasa Habuchi (Ibaraki Univ.), Koichiro Hashiura (Akita Prefectural Univ.) |