Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SP, IPSJ-MUS, IPSJ-SLP [detail] |
2024-06-15 13:50 |
Tokyo |
(Primary: On-site, Secondary: Online) |
Discussion toward Accurate Analysis of Speech Signals Shigeki Sagayama (UT/UEC) |
[more] |
|
MRIS, ITE-MMS |
2024-06-06 15:00 |
Miyagi |
Tohoku Univ., RIEC (Primary: On-site, Secondary: Online) |
High rate RF sputtering of MgO underlayer by hot cathode method with porous target for heat asissted magnetic recording media Kota Yamada, Daiki Miyazaki, Yuki Hirokawa, Seong-Jae Jeon, Akihiro Shimizu (Tohoku Univ.), Kosaku Iwatani (TOSHIMA Manufacturing Co., Ltd.), Shintaro Hinata, Tomoyuki Ogawa, Shin Saito (Tohoku Univ.) |
[more] |
|
NLP, CCS |
2024-06-06 13:55 |
Fukuoka |
West Japan General Exhibition Center AIM |
Conflict-free multi-walker quantum walk based on entanglement Honoka Shiratori, Andre Roehm, Tomoki Yamagami (UT), Etsuo Segawa (YNU), Takatomo Mihana, Ryoich Horisaki (UT) |
[more] |
|
IT, EMM |
2024-05-31 10:35 |
Chiba |
Chiba University (Nishi-Chiba Campus) |
Enocoding Scheme for DNA storage using Maximum Transition Run Constraint and Charge Constraint Shunsuke Kobayashi, Akiko Manada (NUT) |
[more] |
|
IT, EMM |
2024-05-31 11:00 |
Chiba |
Chiba University (Nishi-Chiba Campus) |
Proposal and performance evaluation of a constrained QR code using finder patterns as prohibited words Kaito Abe, Akiko Manada (NUT) |
[more] |
|
EMT, IEE-EMT |
2024-05-27 11:30 |
Tokyo |
The Institute of Electrical Engineers of Japan |
Diffraction of an H-polarized plane wave by a slit in a thin conducting screen
-- Derivation of a solution incorporating arbitrary edge property -- Hirohide Serizawa, Yamato Matsuyama, Yuto Ooba (NIT, Numazu College) |
(To be available after the conference date) [more] |
|
ISEC |
2024-05-15 16:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Identity-Based Matchmaking Encryption Secure Against Key Generation Center (from ProvSec 2023) Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) |
(To be available after the conference date) [more] |
|
NLP |
2024-05-09 14:05 |
Kagawa |
Kagawa Prefecture Social Welfare Center |
Experiment of Synchronization phenomena in rocking robots on a suspension bridge Yuta Togashi, Tadashi Tsbone (NUT) |
(To be available after the conference date) [more] |
|
HWS |
2024-04-19 15:25 |
Tokyo |
(Primary: On-site, Secondary: Online) |
Applying Ring Oscillator-based Laser Detection Sensor to AES Circuitry on FPGA Shungo Hayashi, Junichi Sakamoto, Tsutomu Matsumoto (AIST/YNU) HWS2024-3 |
[more] |
HWS2024-3 pp.8-13 |
ICD |
2024-04-12 14:55 |
Kanagawa |
(Primary: On-site, Secondary: Online) |
[Invited Lecture]
遠端ビット線プリチャージとウィークビットトラッキング回路を用いて0.48 - 1.2V動作電圧範囲と27.6Mbit/mm^2の高集積密度を実現する3ナノメートルSRAM Yumito Aoyagi, Makoto Yabuuchi, Tomotaka Tanaka, Yuichiro Ishii, Yoshiaki Osada, Takaaki Nakazato, Koji Nii, Isabel Wang, Yu-Hao Hsu, Hong-Chen Cheng, Hung-Jen Liao, Tsung-Yung Jonathan Chang (TSMC) |
[more] |
|
ICSS, IPSJ-SPT |
2024-03-21 11:20 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Analyzing Attackers and Victims Actions via LockBit3.0 Website Data Dynamics Yuji Sekine, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-70 |
LockBit3.0 is one of the top ransomware groups that has been active since July 2022, targeting over 1,000 companies. In ... [more] |
ICSS2023-70 pp.9-16 |
ICSS, IPSJ-SPT |
2024-03-21 12:10 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Unveiling the Shadows: Analyzing Cryptocurrency Address Management and Fund Movement of Darknet Markets Aiman Syazwan Bin Abdul Razak, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-72 |
Darknet markets use cryptocurrencies like Bitcoin for anonymous transactions in exchanging illicit goods and services. T... [more] |
ICSS2023-72 pp.25-32 |
ICSS, IPSJ-SPT |
2024-03-21 15:20 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Investigating the functionalities of IoT malware to disrupt the activities of other intruders Shun Ikeda, Hiroki Yasui, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-76 |
[more] |
ICSS2023-76 pp.51-56 |
ICSS, IPSJ-SPT |
2024-03-21 15:45 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Enhanced Analysis of IoT Botnet Activity by Fusing Honeypots, Malware Dynamic Analysis, and C&C Observation Yuki Endo, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-77 |
[more] |
ICSS2023-77 pp.57-62 |
ICSS, IPSJ-SPT |
2024-03-22 10:10 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Study of keyword-based search method for IoT devices deployed at important facilities Mami Kawaguchi, Takayuki Sasaki, Kihara Momoka, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-86 |
IoT devices are increasingly deployed in various systems, including remote monitoring systems.Some of these IoT devices ... [more] |
ICSS2023-86 pp.123-128 |
ICSS, IPSJ-SPT |
2024-03-22 11:45 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Impact of ChatGPT Assisted Polymorphic Malware on Antivirus Detection Huang Zhewei, Yinn Minn Pa pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-89 |
With the rapid implementation of large-scale language models (LLMs), there are concerns about their misuse in cyberattac... [more] |
ICSS2023-89 pp.145-152 |
CAS, CS |
2024-03-14 16:45 |
Okinawa |
|
A Study of Designing Flat Passband FIR Filters with Specified Attenuation and Variable Multiple Factors in Stopband Toma Miyata (Salesian Polytechnic), Yasunori Sugita (NUT), Naoyuki Aikawa (TUS) CAS2023-124 CS2023-117 |
In order to efficiently eliminate noise in weight measurement, design methods of FIR filters with high attenuation in a ... [more] |
CAS2023-124 CS2023-117 pp.74-77 |
RCC, ISEC, IT, WBS |
2024-03-13 11:35 |
Osaka |
Osaka Univ. (Suita Campus) |
Proxy Re-Authentication Capable of Key and Data Compression Yoshiro Matsuoka, Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65 |
In this paper, we propose a new cryptographic protocol called proxy re-authentication capable of key and data compressio... [more] |
IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65 pp.52-59 |
RCC, ISEC, IT, WBS |
2024-03-13 14:15 |
Osaka |
Osaka Univ. (Suita Campus) |
Proxy Re-encryption based on LPN Haruki Fujimoto, Shingo Sato, Junji Shikata (YNU) IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70 |
We propose a proxy re-encryption (PRE) scheme based on the Learning Parity with Noise (LPN) problem using error-correcti... [more] |
IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70 pp.79-86 |
RCC, ISEC, IT, WBS |
2024-03-13 16:35 |
Osaka |
Osaka Univ. (Suita Campus) |
A Study on Polar Codes Design with Robustness against Channel SNR Fluctuation Hidetake Matsui, Hideki Ochiai (YNU) IT2023-102 ISEC2023-101 WBS2023-90 RCC2023-84 |
Polar codes are known to achieve high reliability with low decoding complexity. The design of polar codes requires the s... [more] |
IT2023-102 ISEC2023-101 WBS2023-90 RCC2023-84 pp.179-184 |