Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
OFT, OCS, IEE-CMN, ITE-BCT [detail] |
2021-11-19 13:25 |
Online |
Online |
Four-mode multiplexed real-time 16QAM transmission using high-accuracy frequency offset estimation algorithm Shohei Beppu (KDDI Research, Inc.), Masahiro Kikuta (NEC Platforms, Ltd.), Koji Igarashi (Osaka University), Hiroshi Mukai, Masahiro Shigihara (NEC Platforms, Ltd.), Daiki Soma, Hidenori Takahashi, Noboru Yoshikane, Takehiro Tsuritani (KDDI Research, Inc.) OCS2021-31 |
Mode-division-multiplexed (MDM) transmission systems with multiple-input multiple-output digital signal processing (MIMO... [more] |
OCS2021-31 pp.15-20 |
SITE, ISEC, LOIS |
2021-11-12 13:50 |
Online |
Online |
Security notions of decryption-controllable identity-based encryption Hidekazu Miyanaga, Atsushi Fujioka, Taroh Sasaki (Kanagawa Univ.), Yuki Okano (NTT), Koutarou Suzuki (Toyohashi Univ. of Tech.), Kazuki Yoneyama (Ibaraki Univ.) ISEC2021-43 SITE2021-37 LOIS2021-26 |
In recent years, there have been increasing opportunities for a single user to have multiple devices. A similar situati... [more] |
ISEC2021-43 SITE2021-37 LOIS2021-26 pp.13-17 |
NLC |
2021-09-16 17:30 |
Online |
Online |
A Survey of Russian Citizens' Attitudes Toward the Northern Territorial Issue Using Text Mining
-- An Exploratory Analysis of Russian Comments on Video Posting Sites -- Akira Sano (ITF) |
[more] |
|
QIT (2nd) |
2021-05-24 09:00 |
Online |
Online |
[Invited Talk]
Classical Verification of Quantum Computations with Efficient Verifier Takashi Yamakawa (NTT) |
[more] |
|
WBS, IT, ISEC |
2021-03-05 13:30 |
Online |
Online |
Information retrieval for security reports using behavior of cyber attacker Yuki Kawaguchi, Mayo Yamasaki (NTT) IT2020-154 ISEC2020-84 WBS2020-73 |
Cyber security incident responders require related information about related incidents for the quick and comprehensive
... [more] |
IT2020-154 ISEC2020-84 WBS2020-73 pp.257-264 |
ICSS, IPSJ-SPT |
2021-03-01 09:10 |
Online |
Online |
On the Privacy Risk of Exposure Notification Framework: Assessment and Countermeasures Kazuki Nomoto (Waseda Univ.), Mitsuaki Akiyama (NTT), Masashi Eto (NICT), Atsuo Inomata (Osaka Univ.), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-34 |
The Exposure Notification Framework uses the Bluetooth Low Energy (BLE) signal generated by a smartphone to determine cl... [more] |
ICSS2020-34 pp.49-54 |
ICSS, IPSJ-SPT |
2021-03-01 14:55 |
Online |
Online |
Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox Takahiro Inoue (YNU), Satoshi Hara (YNU/FUJISOFT), Hironobu Sakaki, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-41 |
Malware that infects vulnerable IoT devices is becoming more sophisticated. Unlike legacy IoT malware, cases of persiste... [more] |
ICSS2020-41 pp.90-95 |
ICSS, IPSJ-SPT |
2021-03-02 14:05 |
Online |
Online |
Developing an Interactive Analysis System for Voice Assistant Apps Atsuko Natatsuka (Waseda Univ.), Ryo Iijima (Waseda Univ./NICT), Takuya Watanabe, Mitsuaki Akiyama (NTT), Tetsuya Sakai (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-48 |
In Voice Assistant Services, official or third-party Voice Assistant Apps (VA apps) are provided. Since a VA app works a... [more] |
ICSS2020-48 pp.132-137 |
ICSS, IPSJ-SPT |
2021-03-02 09:10 |
Online |
Online |
A Study on the Adoption of Link Preview by the Phishing Sites Norihito Omori (Waseda Univ.), Satoshi Furutani, Takuya Watanabe, Toshiki Shibahara, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.) ICSS2020-54 |
Search engines are not the only means of accessing online content. The distribution of malicious content has become mor... [more] |
ICSS2020-54 pp.166-171 |
ICSS, IPSJ-SPT |
2021-03-02 10:00 |
Online |
Online |
Evaluation of Uncertain Reports by Multiple Anti-virus Engines Kazuya Nomura (Waseda Univ.), Mistuaki Akiyama (NTT), Masaki Kamizono (Deloitte Tohmatsu Cyber LLC), Takahiro Kasama (NICT) ICSS2020-56 |
VirusTotal is an online service that provides detection results from multiple anti-virus engines. It is used in a wide r... [more] |
ICSS2020-56 pp.178-183 |
EE, OME, CPM |
2020-12-11 10:45 |
Online |
Online |
Introduction of Power DEM (Device Embedded Module) technology & CSIPOS Shigehiro Hayashi, Haruki Sueyoshi, Kanta Nogita (Fukuoka IST), Younggun HAN, Yoshihisa Katoh (CSIPOS), Tadashi Suetsugu (ukuoka Univ.) EE2020-16 CPM2020-48 OME2020-1 |
(To be available after the conference date) [more] |
EE2020-16 CPM2020-48 OME2020-1 pp.1-6 |
ICD, HWS [detail] |
2020-10-26 13:50 |
Online |
Online |
Security Threats and Preventions for Photonics Computing Model Junko Takahashi, Koji Chida, Takeshi Sakamoto (NTT) HWS2020-33 ICD2020-22 |
This paper presents security analysis on photonic computing models in All-Photonics Network (APN). New computing archite... [more] |
HWS2020-33 ICD2020-22 pp.48-53 |
OPE, OCS, LQE |
2020-10-23 11:10 |
Online |
Online |
Real-time strongly-coupled 4-core fiber transmission Shohei Beppu (KDDI Research, Inc.), Koji Igarashi (Osaka University), Hiroshi Mukai, Masahiro Kikuta, Masahiro Shigihara (NEC Platforms, Ltd.), Daiki Soma, Hidenori Takahashi, Noboru Yoshikane, Takehiro Tsuritani (KDDI Research, Inc.) OCS2020-12 OPE2020-35 LQE2020-15 |
[more] |
OCS2020-12 OPE2020-35 LQE2020-15 pp.21-25 |
ISEC |
2020-05-20 16:05 |
Online |
Online |
Identity-based Authenticated Key Exchange for IoT Devices and its Security against Malicious Private Key Generator Kazuma Wariki, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.), Koutarou Suzuki (Toyohashi Univ. of Tech.), Junichi Tomida (NTT) ISEC2020-12 |
With a rapid increase in the number of IoT devices, many
identity-based authenticated key exchange (IBAKE) protocols fo... [more] |
ISEC2020-12 pp.55-61 |
HWS |
2020-04-07 |
Online |
Online |
A Study on Timing Information Acquiring Methodology for TLB Side-Channel Attacks Yuki Matsumoto (Kyushu Univ.), Yuichiro Dan, Junko Takahashi (NTT), Takatsugu Ono (Kyushu Univ.) HWS2020-6 |
We report on the method of acquiring Translation Look-aside Buffer (TLB) access latency which required
for implementing... [more] |
HWS2020-6 pp.29-34 |
WIT, IPSJ-AAC |
2020-03-13 15:45 |
Ibaraki |
Tsukuba University of Technology (Cancelled but technical report was issued) |
The relationship between the seated postures and pressure relief movements Takashi Handa, Yoshihiko Kozai (SAITEC), Satoshi Shirogane (NRC), Tadahiko Kamegaya (TFU) WIT2019-48 |
(To be available after the conference date) [more] |
WIT2019-48 pp.55-56 |
ICSS, IPSJ-SPT |
2020-03-02 13:30 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
ICSS2019-74 |
(To be available after the conference date) [more] |
ICSS2019-74 pp.37-42 |
ICSS, IPSJ-SPT |
2020-03-03 11:00 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Model checking RNNs with modal μ-calculus Tatsuhiro Aoshima, Toshinori Usui (NTT) ICSS2019-88 |
Machine learning models have been applied to many cyber-physical systems such as self-driving cars, robotics, and factor... [more] |
ICSS2019-88 pp.119-124 |
RISING (2nd) |
2019-11-27 13:55 |
Tokyo |
Fukutake Learning Theater, Hongo Campus, Univ. Tokyo |
[Poster Presentation]
Modeling of Utility Function for Real-time Prediction of Spatial Information Using Machine Learning Keiichiro Sato, Ryoichi Shinkuma, Takehiro Sato, Eiji Oki (Kyoto Univ.), Takahiro Iwai, Takeo Onishi, Takahiro Nobukiyo, Dai Kanetomo, Kozo satoda (System platform Research Labs, NEC Corporation) |
Real-time prediction of spatial information has attracted a lot of attention. Machine learning enables us to provide rea... [more] |
|
SRW, SeMI, CNR (Joint) |
2019-11-05 11:10 |
Tokyo |
Kozo Keisaku Engineering Inc. |
User behavior analysis for danger notification from vehicle to pedestrian Kyoko Yamori (Asahi Univ.), Iwai Takanori, Dai Kanetomo, Kozo Satoda (System platform Research Labs, NEC Corporation), Yoshiaki Tanaka (Waseda Univ.) SeMI2019-66 |
In recent years, research on autonomous driving has been progressing, especially research that considers the safety of p... [more] |
SeMI2019-66 pp.23-26 |