IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 1130  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SP, IPSJ-MUS, IPSJ-SLP [detail] 2024-06-15
13:50
Tokyo
(Primary: On-site, Secondary: Online)
Discussion toward Accurate Analysis of Speech Signals
Shigeki Sagayama (UT/UEC)
 [more]
MRIS, ITE-MMS 2024-06-06
15:00
Miyagi Tohoku Univ., RIEC
(Primary: On-site, Secondary: Online)
High rate RF sputtering of MgO underlayer by hot cathode method with porous target for heat asissted magnetic recording media
Kota Yamada, Daiki Miyazaki, Yuki Hirokawa, Seong-Jae Jeon, Akihiro Shimizu (Tohoku Univ.), Kosaku Iwatani (TOSHIMA Manufacturing Co., Ltd.), Shintaro Hinata, Tomoyuki Ogawa, Shin Saito (Tohoku Univ.)
 [more]
NLP, CCS 2024-06-06
13:55
Fukuoka West Japan General Exhibition Center AIM Conflict-free multi-walker quantum walk based on entanglement
Honoka Shiratori, Andre Roehm, Tomoki Yamagami (UT), Etsuo Segawa (YNU), Takatomo Mihana, Ryoich Horisaki (UT)
 [more]
IT, EMM 2024-05-31
10:35
Chiba Chiba University (Nishi-Chiba Campus) Enocoding Scheme for DNA storage using Maximum Transition Run Constraint and Charge Constraint
Shunsuke Kobayashi, Akiko Manada (NUT)
 [more]
IT, EMM 2024-05-31
11:00
Chiba Chiba University (Nishi-Chiba Campus) Proposal and performance evaluation of a constrained QR code using finder patterns as prohibited words
Kaito Abe, Akiko Manada (NUT)
 [more]
EMT, IEE-EMT 2024-05-27
11:30
Tokyo The Institute of Electrical Engineers of Japan Diffraction of an H-polarized plane wave by a slit in a thin conducting screen -- Derivation of a solution incorporating arbitrary edge property --
Hirohide Serizawa, Yamato Matsuyama, Yuto Ooba (NIT, Numazu College)
(To be available after the conference date) [more]
ISEC 2024-05-15
16:00
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Identity-Based Matchmaking Encryption Secure Against Key Generation Center (from ProvSec 2023)
Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU)
(To be available after the conference date) [more]
NLP 2024-05-09
14:05
Kagawa Kagawa Prefecture Social Welfare Center Experiment of Synchronization phenomena in rocking robots on a suspension bridge
Yuta Togashi, Tadashi Tsbone (NUT)
(To be available after the conference date) [more]
HWS 2024-04-19
15:25
Tokyo
(Primary: On-site, Secondary: Online)
Applying Ring Oscillator-based Laser Detection Sensor to AES Circuitry on FPGA
Shungo Hayashi, Junichi Sakamoto, Tsutomu Matsumoto (AIST/YNU) HWS2024-3
 [more] HWS2024-3
pp.8-13
ICD 2024-04-12
14:55
Kanagawa
(Primary: On-site, Secondary: Online)
[Invited Lecture] 遠端ビット線プリチャージとウィークビットトラッキング回路を用いて0.48 - 1.2V動作電圧範囲と27.6Mbit/mm^2の高集積密度を実現する3ナノメートルSRAM
Yumito Aoyagi, Makoto Yabuuchi, Tomotaka Tanaka, Yuichiro Ishii, Yoshiaki Osada, Takaaki Nakazato, Koji Nii, Isabel Wang, Yu-Hao Hsu, Hong-Chen Cheng, Hung-Jen Liao, Tsung-Yung Jonathan Chang (TSMC)
 [more]
ICSS, IPSJ-SPT 2024-03-21
11:20
Okinawa OIST
(Primary: On-site, Secondary: Online)
Analyzing Attackers and Victims Actions via LockBit3.0 Website Data Dynamics
Yuji Sekine, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-70
LockBit3.0 is one of the top ransomware groups that has been active since July 2022, targeting over 1,000 companies. In ... [more] ICSS2023-70
pp.9-16
ICSS, IPSJ-SPT 2024-03-21
12:10
Okinawa OIST
(Primary: On-site, Secondary: Online)
Unveiling the Shadows: Analyzing Cryptocurrency Address Management and Fund Movement of Darknet Markets
Aiman Syazwan Bin Abdul Razak, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-72
Darknet markets use cryptocurrencies like Bitcoin for anonymous transactions in exchanging illicit goods and services. T... [more] ICSS2023-72
pp.25-32
ICSS, IPSJ-SPT 2024-03-21
15:20
Okinawa OIST
(Primary: On-site, Secondary: Online)
Investigating the functionalities of IoT malware to disrupt the activities of other intruders
Shun Ikeda, Hiroki Yasui, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-76
 [more] ICSS2023-76
pp.51-56
ICSS, IPSJ-SPT 2024-03-21
15:45
Okinawa OIST
(Primary: On-site, Secondary: Online)
Enhanced Analysis of IoT Botnet Activity by Fusing Honeypots, Malware Dynamic Analysis, and C&C Observation
Yuki Endo, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-77
 [more] ICSS2023-77
pp.57-62
ICSS, IPSJ-SPT 2024-03-22
10:10
Okinawa OIST
(Primary: On-site, Secondary: Online)
Study of keyword-based search method for IoT devices deployed at important facilities
Mami Kawaguchi, Takayuki Sasaki, Kihara Momoka, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-86
IoT devices are increasingly deployed in various systems, including remote monitoring systems.Some of these IoT devices ... [more] ICSS2023-86
pp.123-128
ICSS, IPSJ-SPT 2024-03-22
11:45
Okinawa OIST
(Primary: On-site, Secondary: Online)
Impact of ChatGPT Assisted Polymorphic Malware on Antivirus Detection
Huang Zhewei, Yinn Minn Pa pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-89
With the rapid implementation of large-scale language models (LLMs), there are concerns about their misuse in cyberattac... [more] ICSS2023-89
pp.145-152
CAS, CS 2024-03-14
16:45
Okinawa   A Study of Designing Flat Passband FIR Filters with Specified Attenuation and Variable Multiple Factors in Stopband
Toma Miyata (Salesian Polytechnic), Yasunori Sugita (NUT), Naoyuki Aikawa (TUS) CAS2023-124 CS2023-117
In order to efficiently eliminate noise in weight measurement, design methods of FIR filters with high attenuation in a ... [more] CAS2023-124 CS2023-117
pp.74-77
RCC, ISEC, IT, WBS 2024-03-13
11:35
Osaka Osaka Univ. (Suita Campus) Proxy Re-Authentication Capable of Key and Data Compression
Yoshiro Matsuoka, Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65
In this paper, we propose a new cryptographic protocol called proxy re-authentication capable of key and data compressio... [more] IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65
pp.52-59
RCC, ISEC, IT, WBS 2024-03-13
14:15
Osaka Osaka Univ. (Suita Campus) Proxy Re-encryption based on LPN
Haruki Fujimoto, Shingo Sato, Junji Shikata (YNU) IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70
We propose a proxy re-encryption (PRE) scheme based on the Learning Parity with Noise (LPN) problem using error-correcti... [more] IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70
pp.79-86
RCC, ISEC, IT, WBS 2024-03-13
16:35
Osaka Osaka Univ. (Suita Campus) A Study on Polar Codes Design with Robustness against Channel SNR Fluctuation
Hidetake Matsui, Hideki Ochiai (YNU) IT2023-102 ISEC2023-101 WBS2023-90 RCC2023-84
Polar codes are known to achieve high reliability with low decoding complexity. The design of polar codes requires the s... [more] IT2023-102 ISEC2023-101 WBS2023-90 RCC2023-84
pp.179-184
 Results 1 - 20 of 1130  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan