IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   Prev IT Conf / Next IT Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 

===============================================
Technical Committee on Information Theory (IT)
Chair: Masayoshi Ohashi (Fukuoka Univ.) Vice Chair: Jun Muramatsu (NTT)
Secretary: Takahiro Yoshida (Yokohama College of Commerce), Hideki Yagi (UEC)
Assistant: Sigeaki Kuzuoka (wakayama univ.)

===============================================
Technical Committee on Information Security (ISEC)
Chair: Kazuto Ogawa (NHK) Vice Chair: Atsushi Fujioka (Kanagawa Univ.), Shiho Moriai (NICT)
Secretary: Takaaki Mizuki (Tohoku Univ.), Toshihiro Ohigashi (Tokai Univ.)
Assistant: Keita Emura (NICT), Yuichi Komano (TOSHIBA), Yuuji Suga (IIJ)

===============================================
Technical Committee on Wideband System (WBS)
Chair: Fumiaki Maehara (Waseda Univ.) Vice Chair: Masanori Hamamura (Kochi Univ. of Tech.), Fumie Ono (NICT)
Secretary: Yasunori Nouda (Mitsubishi Electric), Yusuke Kozawa (Ibaraki Univ.)
Assistant: Akira Nakamura (Tokyo Univ. of Science), Ryohei Nakamura (National Defense Academy)

DATE:
Thu, Mar 8, 2018 09:00 - 17:50
Fri, Mar 9, 2018 09:00 - 17:00

PLACE:


TOPICS:
joint meeting of IT, ISEC, and WBS

----------------------------------------
Thu, Mar 8 AM (09:00 - 10:40)
----------------------------------------

(1) 09:00 - 09:25
Evaluation of Bayes Predictive Distributions under Unknown Parametric Models on Misspecified Models
Hirokazu Kono, Shota Saito, Toshiyasu Matsushima (Waseda Univ.)

(2) 09:25 - 09:50
Information Geometrical Study of Cluster-Model Approximation for Boltzmann Machines
Kenta Toyoda, Tomohiro Ogawa (Univ. of Electro- Commu.)

(3) 09:50 - 10:15
Redundancy Analysis of Univarsal Lossless Source Coding via Estimation of Prior
-- Relaxing an Ergodicity Condition --
Ryosuke Ikarashi, Tsutomu Kawabata (UEC)

(4) 10:15 - 10:40
Evaluation of the Worst-Case Redundancy of Strongly Universal FV Source Codes Using the Source Approximation and the Asymptotically Sufficient Statistic
Mitsuharu Arimura (Shonan Inst. Tech.), Hiroshi Nagaoka (Univ. of Electro-Comm.)

----- Break ( 10 min. ) -----

----------------------------------------
Thu, Mar 8 AM (10:50 - 12:05)
----------------------------------------

(5) 10:50 - 11:15
The Access Structure of a Secret Sharing Scheme Using Locally Repairable Codes
Masanobu Nakata, Tomohiko Uyematsu, Tetsunao Matsuta (Tokyo Tech)

(6) 11:15 - 11:40
Construction of Secret Sharing Schemes with Small Thresholds for Countably Infinite Participants
Takashi Hisatome, Hiroki Koga (Univ. Tsukuba)

(7) 11:40 - 12:05
Constructions of the (3,n) and (4,n) Threshold Visual Cryptography Using Combinatorial Designs and Their Performance Evaluation
Kotaro Okada, Hiroki Koga (Univ. of Tsukuba)

----- Lunch Break ( 55 min. ) -----

----------------------------------------
Thu, Mar 8 PM (13:00 - 14:40)
----------------------------------------

(8) 13:00 - 13:25
Outage Capacity of a Two-User MIMO Interference Channel for Simultaneous Information and Energy Transfer
Kengo Ikebata, Tomohiko Uyematsu (Tokyo Tech), Ryutaroh Matsumoto (Nagoya Univ), Tetsunao Matsuta (Tokyo Tech)

(9) 13:25 - 13:50
Optimality for the Iterative Construction Scheme of AIFV-$m$ codes
Ryusei Fujita, Ken-ichi Iwata (Univ. of Fukui), Hirosuke Yamamoto (The Univ. of Tokyo)

(10) 13:50 - 14:15
Optimal Coded Caching using Linear Programming
Shota Kamiya, Hiroki Koga (Univ. Tsukuba)

(11) 14:15 - 14:40
Shifted Coded Slotted ALOHA
Tomokazu Emoto, Takayuki Nozaki (Yamaguchi Univ.)

----- Break ( 20 min. ) -----

----------------------------------------
Thu, Mar 8 PM (15:00 - 15:50)
----------------------------------------

(12) 15:00 - 15:50
[Invited Talk]
On Traitor Tracings and Related Topics
Shota Yamada (AIST)

----- Break ( 10 min. ) -----

----------------------------------------
Thu, Mar 8 PM (16:00 - 16:50)
----------------------------------------

(13) 16:00 - 16:50
[Invited Talk]
Research and Development of Transmission Technologies for the Next Generation Terrestrial Broadcasting
Tomoaki Takeuchi (NHK)

----- Break ( 10 min. ) -----

----------------------------------------
Thu, Mar 8 PM (17:00 - 17:50)
----------------------------------------

(14) 17:00 - 17:50
[Invited Talk]
On fast multiplications of multiple-valued logic polynomials by discrete Fourier transforms
Hajime Matsui (Toyota Technological Institute)

----------------------------------------
Thu, Mar 8 AM (09:00 - 10:40)
----------------------------------------

(15) 09:00 - 09:25
Effect on randomizing components to the security of Minalpher
Yuki Kishi, Keita Osafune, Yuta Kuwano, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ)

(16) 09:25 - 09:50
A study on hierarchical secret sharing schemes applicable to any level based on XOR operations
Koji Shima, Hiroshi Doi (IISEC)

(17) 09:50 - 10:15
Succinct Oblivious RAM
Taku Onodera, Tetsuo Shibuya (IMSUT)

(18) 10:15 - 10:40
High Efficient Scalar Multiplication in Elliptic Curve Cryptography
Noboru Takeuchi, Toshiyuki Kinoshita (TUT)

----- Break ( 10 min. ) -----

----------------------------------------
Thu, Mar 8 AM (10:50 - 12:05)
----------------------------------------

(19) 10:50 - 11:15
Digital watermark using deep-learning classification
Mashu Sakai, Taiki Shigeta, Hikaru Morita (Kanagawa Univ.)

(20) 11:15 - 11:40
Evaluation of deep learning method for detection of intrusion packets
Tomoki Ueno, Mitiko Harayama (GIFU Univ)

(21) 11:40 - 12:05
Reply analysis between Twitter users using machine learning
-- Distinguish real-life/online friends --
Takakuwa Ranka, Sasaki Taroh, Fujioka Atsushi (KU)

----- Lunch Break ( 55 min. ) -----

----------------------------------------
Thu, Mar 8 PM (13:00 - 13:50)
----------------------------------------

(22) 13:00 - 13:25
On the Number of Rounds by Card-based Cryptographic Protocols Using Private Operations
Hibiki Ono, Yoshifumi Manabe (Kogakuin Univ.)

(23) 13:25 - 13:50
Card-Based Cryptographic Protocols with Private Operations which can Prevent Malicious Behaviors
Youhei Shimizu, Yuki Kishi, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ)

----------------------------------------
Fri, Mar 9 AM (09:25 - 10:40)
----------------------------------------

(24) 09:25 - 09:50
A study on segmented deletion error correction using polar code
Hikari Koremura, Haruhiko Kaneko (Tokyo Tech)

(25) 09:50 - 10:15
Bayes Optimal AMP Decoder for Sparse Superposition Codes
Yuwa Hatae (Kyushu Univ.), Kazushi Mimura (Hiroshima City Univ.), Masanori Kawakita, Jun'ichi Takeuchi (Kyushu Univ.)

(26) 10:15 - 10:40
Ordered Shuffle-BP Decoding Based on the Loops of LDPC Code
Ryoma Sakai, Kazuhiko Yamaguchi (UEC)

----- Break ( 10 min. ) -----

----------------------------------------
Fri, Mar 9 AM (10:50 - 12:30)
----------------------------------------

(27) 10:50 - 11:15
Efficient Scheduling of Serial Iterative Decoding for Zigzag Decodable Fountain Codes
Yoshihiro Murayama, Takayuki Nozaki (Yamaguchi Univ.)

(28) 11:15 - 11:40
Non-binary codes correcting a burst of deletions or insertions
Toyohiko Saeki, Takayuki Nozaki (Yamaguchi Univ.)

(29) 11:40 - 12:05
Asymptotic Analysis of LDPC Codes for Two-Way Relay Channels
Yuta Ishimatsu, Satoshi Takabe, Tadashi Wadayama (NITech), Masahito Hayashi (Nagoya Univ.)

(30) 12:05 - 12:30
Consideration of error correction code suitable for WBAN
Akihiro Yamada, Hiroyoshi Morita, Akiko Manada (The Univ. of Electro-Communications)

----- Lunch Break ( 60 min. ) -----

----------------------------------------
Fri, Mar 9 PM (13:30 - 15:10)
----------------------------------------

(31) 13:30 - 13:55
On the Generalization of Fano's Inequality for Countably Infinite Alphabets, List-Decoding, and General Conditional Information Measures
Yuta Sakai (Univ. Fukui)

(32) 13:55 - 14:20
Parameter orthogonalization method in quantum parameter estimation problem
Jun Suzuki (UEC)

(33) 14:20 - 14:45
Improved Lossless Compression by Substring Enumeration Using Sorting
Takahiro Ota (NPIT), Akiko Manada (UEC)

(34) 14:45 - 15:10
The Error Performance Analysis of the K-best Viterbi Decoding Algorithm
Hideki Yoshikawa (Tohoku Gakuin Univ.)

----- Break ( 35 min. ) -----

----------------------------------------
Fri, Mar 9 PM (15:45 - 16:35)
----------------------------------------

(35) 15:45 - 16:10
Quantum &Classical Radar Camera for Automotive and Effect of Fog-2
-- Sparse Modeling --
Osamu Hirota (Tamagawa Univ.)

(36) 16:10 - 16:35
Attacks on several Multivariate PKCs
-- Attack on K(AVII)MVPKC --
Ryuichi Sakai (Osaka Electro-Communication Univ.), Masao Kasahara (Waseda Univ.)

----------------------------------------
Fri, Mar 9 AM (09:00 - 10:40)
----------------------------------------

(37) 09:00 - 09:25
A Note on Security Notions of Anonymity in Identity-Based Encryption
-- Case of ID-CCA2 Security --
Honomu Ohtomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.)

(38) 09:25 - 09:50
On Confirming Ciphertext Update in Key-Updatable Public-key Encryption with Keyword Search
Yuka Sakoda, Honomu Ohtomo, Naoki Matsunaga, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.)

(39) 09:50 - 10:15
On (Un)Deniability of Plausible Deniability
Atsushi Waseda, Ryo Nojima (NICT)

(40) 10:15 - 10:40
Information-Theoretically Secure Authentication Codes with Arbitration using Non-Uniformly Random Keys
Miho Ishikawa, Junji Shikata (Yokohama National Univ.)

----- Break ( 10 min. ) -----

----------------------------------------
Fri, Mar 9 AM (10:50 - 11:40)
----------------------------------------

(41) 10:50 - 11:15
On Security Evaluation for Coset Coding in Wiretap Channel Coding
Yuki Mori, Tomohiro Ogawa (UEC)

(42) 11:15 - 11:40
Secure Communications over the Two-Way Wiretap Channel II with Noisy Main Channel Using Cooperative Jamming
Hiroki Iizuka, Ryota Tanaka, Junji Shikata (Yokohama National Univ.)

----- Lunch Break ( 110 min. ) -----

----------------------------------------
Fri, Mar 9 PM (13:30 - 15:10)
----------------------------------------

(43) 13:30 - 13:55
Time-Space Jointly Path-Matched MC-CDM Wide Band Radio Modulation with TX and RX Array Antennas
-- for High Performance Error-Control Coding --
Kohji Itoh, Akira Nakamura, Makoto Itami (TUS)

(44) 13:55 - 14:20
Influence of Channel Estimation Error on Noise Enhancement Suppression by Using Novel Multilevel Spreading Codes
Tatsuya Motoki, Takehiko Kobayashi (Tokyo Denki Univ.)

(45) 14:20 - 14:45
Performance Comparison of User Position Detection Method using Multiple Unmanned Aerial Vehicles based Positioning Accuracy Index
Hiroyasu Ishikawa, Hiroki Onuki (Nihon Univ.)

(46) 14:45 - 15:10
Study on Aerial Cooperative Relaying for Coverage Extension of High-Altitude Unmanned Aircraft Systems
Fumie Ono (NICT), Hideki Ochiai (Yokohama National Univ.), Ryu Miura, Fumihide Kojima (NICT)

----- Break ( 10 min. ) -----

----------------------------------------
Fri, Mar 9 PM (15:20 - 17:00)
----------------------------------------

(47) 15:20 - 15:45
On Adaptive Self-Interference Suppression for Full Duplex Filter-and-Forward Relaying
Hayato Teshiromori, Teruyuki Miyajima, Yoshiki Sugitani (Ibaraki Univ.)

(48) 15:45 - 16:10
Evaluation of synchronization jitter caused by the distance from base-station on optical wireless RVC system using CSK-MPPM
Masayuki Ishikawa, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.)

(49) 16:10 - 16:35
A study of Bit Error Rate Taking into Account Synchronization Performance on Optical Wireless Framed-DOOK System
Yuta Asano, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.)

(50) 16:35 - 17:00
BER Performance Evaluation of ROD-WSN using Modified Pseudo Orthogonal M-sequences under Fading Channel
Tomohiro Okawa, Hiromasa Habuchi (Ibaraki Univ.), Koichiro Hashiura (Akita Prefectural Univ.)

# Information for speakers
General Talk will have 20 minutes for presentation and 5 minutes for discussion.

# CONFERENCE SPONSORS:
- This conference is co-sponsored by IEEE IT Society Japan Chapter.


=== Technical Committee on Information Theory (IT) ===
# FUTURE SCHEDULE:

Thu, May 17, 2018 - Fri, May 18, 2018: Ookayama Campus, Tokyo Institute of Technology [Thu, Mar 15], Topics: Information Security, Information Theory, Information Hiding, etc.

# SECRETARY:
E-mail:it-c(to IT Secretaries)
.
Takahiro Yoshida (Yokohama College of Commerce)
Hideki Yagi (University of Electro-Communications)
Shigeaki Kuzuoka (Wakayama University)

=== Technical Committee on Information Security (ISEC) ===
# FUTURE SCHEDULE:

Wed, May 16, 2018: Ookayama Campus, Tokyo Institute of Technology [Tue, Mar 13]

# SECRETARY:
Takaaki Mizuki (Tohoku University)
E-mail: ic-c (to ISEC secretaries)

=== Technical Committee on Wideband System (WBS) ===
# FUTURE SCHEDULE:

Thu, May 24, 2018 - Fri, May 25, 2018: Kagoshima University [Fri, Mar 16], Topics: Coding, Modulation, Signal processing and General

# SECRETARY:
Yasunori Nouda (Mitsubishi Electric Corporation)
TEL +81-467-41-2850
E-mail: yum


Last modified: 2018-03-01 18:09:22


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to IT Schedule Page]   /   [Return to ISEC Schedule Page]   /   [Return to WBS Schedule Page]   /  
 
 Go Top  Go Back   Prev IT Conf / Next IT Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan