IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 3349  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IN, RCS, NV
(Joint)
2024-05-30
10:50
Fukuoka Fukuoka University Performance Analysis of Null-Space Expansion in Line-of-Sight Environment
Kazuki Maruta (Tokyo Univ. of Science), Koji Ikuta (Kyocera)
 [more]
IN, RCS, NV
(Joint)
2024-05-31
14:40
Fukuoka Fukuoka University Performance Evaluation of Collaborative Uplink MIMO Transmission Considering Overhead
Rena Kurokawa, Kazuki Maruta (Tokyo Univ. of Science)
 [more]
IN, RCS, NV
(Joint)
2024-05-31
15:05
Fukuoka Fukuoka University [Encouragement Talk] NOMA-Based Highly-Efficient Low-Latency HARQ Method with Inter-Base Station Cooperation for URLLC
Kenichi Higuchi, Ryota Kobayashi, Takanori Hara (Tokyo Univ. of Science), Yasuaki Yuda (Panasonic Holdings)
 [more]
CQ, CS
(Joint)
2024-05-17
14:35
Aichi
(Primary: On-site, Secondary: Online)
A study on a method for estimating the optimal pear pollen collection time
Keita Endo (NIT), Tomotaka Kimura (Doshisha Univ.), Hiroyuki Shimizu (NIT), Tomohito Shimada (SATRC), Akane Shibasaki (SAFPC), Chisa Suzuki (SATRC), Ryota Fujinuma (DKK), Yoshihiro Takemura (Tottori Univ.), Takefumi Hiraguri (NIT)
 [more]
RCS 2024-04-26
09:55
Hiroshima
(Primary: On-site, Secondary: Online)
Dimensionality Reduction of Interference Subspace on Simplified Null-Space Expansion for Massive MIMO
Soya Nakamura, Yuki Sasaki, Kazuki Maruta (Tokyo Univ. of Science)
 [more]
RCS 2024-04-26
10:20
Hiroshima
(Primary: On-site, Secondary: Online)
Beam Selection Based on Expanded Angle-Domain Beam Grouping for Massive MIMO Analog Beamforming Using NOMA in Cellular Downlink
Nobuhide Nonaka, Kenichi Higuchi (Tokyo Univ. of Science)
 [more]
HWS 2024-04-19
16:50
Tokyo
(Primary: On-site, Secondary: Online)
Supply chain risk and hardware trojan protection
Shinichi Kawamura, Tsutomu Matsumoto, Hirotaka Yoshida (AIST), Yasuyoshi Uemura (SCU), Makoto Nagata (Kobe Univ.), Makoto Ikeda (Tokyo Univ.), Ken Takano (LINTEC)
 [more]
MW, WPT 2024-04-18
14:45
Kanagawa Kanagawa University
(Primary: On-site, Secondary: Online)
A 125 GHz Broadband Compact CMOS Power Divider
Shun Beppu, Kyoya Takano (Tokyo Univ. of Sciencee)
 [more]
CCS 2024-03-27
10:15
Hokkaido RUSUTSU RESORT Performance Evaluation of Coupling Models between Oscillators for Performance Improving of Desynchronization-type TDMA
Hiroyuki Yasuda (The Univ. of Tokyo), Mikio Hasegawa (Tokyo Univ. of Science), Kazuyuki Aihara (The Univ. of Tokyo) CCS2023-39
 [more] CCS2023-39
pp.1-5
CCS 2024-03-27
11:05
Hokkaido RUSUTSU RESORT Implementation of Wireless Spiking Neural Networks with Asynchronous Pulse Code Multiple Access
Haruto Ota, Ryuji Nagazawa, Jiaying Lin, Kien Nguyen (Chiba Univ.), Hiroyuki Torikai (Housei Univ.), Mikio Hasegawa (Tokyo Univ. of Science), Woo-Joo Hwang (Pusan National Univ.), Hiroo Sekiya (Chiba Univ.) CCS2023-41
(To be available after the conference date) [more] CCS2023-41
pp.12-17
RCC, ISEC, IT, WBS 2024-03-13
- 2024-03-14
Osaka Osaka Univ. (Suita Campus) Research Directions in Formal Verification of Transport Layer Security Protocols
Hideki Sakurada (NTT/Kyushu Univ.), Kouichi Sakurai (Kyushu Univ./ATR) IT2023-121 ISEC2023-120 WBS2023-109 RCC2023-103
The TLS protocol is used to secure communications between web servers and clients, and is essential for security: it all... [more] IT2023-121 ISEC2023-120 WBS2023-109 RCC2023-103
pp.287-293
RCC, ISEC, IT, WBS 2024-03-13
- 2024-03-14
Osaka Osaka Univ. (Suita Campus) Improvement of non-interactive privacy-preserving document classification
Yuhei Kitahara (Tokyo Tech), Hibiki Oka, Akira Nakahashi (iric), Wakaha Ogata (Tokyo Tech) IT2023-120 ISEC2023-119 WBS2023-108 RCC2023-102
In the Machine Learning as a Service model, where clients delegate inference to servers, leakage of client inputs or mac... [more] IT2023-120 ISEC2023-119 WBS2023-108 RCC2023-102
pp.279-286
RCC, ISEC, IT, WBS 2024-03-13
- 2024-03-14
Osaka Osaka Univ. (Suita Campus) Integral Attack with Bit-Based Division Property on Block Cipher LBC
Naoki Shibayama, Yasutaka Igarashi (Tokyo Univ. of Science) IT2023-131 ISEC2023-130 WBS2023-119 RCC2023-113
LBC is a block cipher proposed by Kapalova et al. in 2023. The block size is 64-bit, the secret key size is 80-bit, and ... [more] IT2023-131 ISEC2023-130 WBS2023-119 RCC2023-113
pp.350-357
RCC, ISEC, IT, WBS 2024-03-13
- 2024-03-14
Osaka Osaka Univ. (Suita Campus) A Study on Malicious Communication Detection Using Attack Characteristics of Malware on an Internal Network.
Ken Aono, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95
Recently, targeted attacks have been increasing.
Malicious attackers use malware to gain access to the organization's ... [more]
IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95
pp.249-253
RCC, ISEC, IT, WBS 2024-03-13
- 2024-03-14
Osaka Osaka Univ. (Suita Campus) Phishing Detection Method Based on Content-Similarity in DNS Graph
WenBo Zhou, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110
Phishing attacks, known as a prevalent form of social engineering attacks, have become one of the most significant cyber... [more] IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110
pp.332-336
RCC, ISEC, IT, WBS 2024-03-13
- 2024-03-14
Osaka Osaka Univ. (Suita Campus) Phishing Detection Method Based on Machine Learning Using DNS Graph
Yuki Ishida, Syota Nihei, Junko Sato, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of Information Sciences) IT2023-129 ISEC2023-128 WBS2023-117 RCC2023-111
Recently, phishing scams have been on the rise, the need for effective defense methods against this phishing scams.
A b... [more]
IT2023-129 ISEC2023-128 WBS2023-117 RCC2023-111
pp.337-342
RCS, SR, SRW
(Joint)
2024-03-13
09:55
Tokyo The University of Tokyo (Hongo Campus), and online
(Primary: On-site, Secondary: Online)
User Scheduling based on Expanded Null-Space for Massive MIMO
Yuki Sasaki (Tokyo Univ. of Scince), Kabuto Arai (The Univ. of Electro-Communications), Jin Nakazato (UTokyo), Kazuki Maruta (Tokyo Univ. of Scince) RCS2023-250
This paper proposes a user scheduling scheme for multi-user massive MIMO (MU-mMIMO), particularly effective in time-vary... [more] RCS2023-250
pp.1-6
NLP, MSS 2024-03-13
10:50
Misc. Kikai-Shinko-Kaikan Bldg. An Intelligent Traffic Signal Control Method for a Fukui-Ishibashi-Type Traffic Flow Model -- Applications to a Real City Model and Verification --
Takuya Akiyama, Tatsuya Kai (Tokyo Univ. of Science) MSS2023-72 NLP2023-124
 [more] MSS2023-72 NLP2023-124
pp.9-12
RCS, SR, SRW
(Joint)
2024-03-13
11:35
Tokyo The University of Tokyo (Hongo Campus), and online
(Primary: On-site, Secondary: Online)
[Technology Exhibit] Transparent flexible radio wave reflection film and anechoic box made of it
Satoru Shimizu (ATR), Hiroyuki Nomoto (SEKISUI), Susumu Ao (ATR), Toshio Enami (SEKISUI) RCS2023-254
Since radio waves in the millimeter wave band propagate in a straight line, communication is possible only within the li... [more] RCS2023-254
pp.23-24
RCS, SR, SRW
(Joint)
2024-03-13
10:25
Tokyo The University of Tokyo (Hongo Campus), and online
(Primary: On-site, Secondary: Online)
[Short Paper] A Study on the use of Advanced Cryptography in Sensor Network
Takuya Kurihara, Keiichiro Mori, Kazuto Yano, Toshikazu Sakano (ATR) SR2023-87
Post-quantum cryptography (PQC) is a technology necessary to ensure security in the era of quantum computers. However, P... [more] SR2023-87
pp.1-3
 Results 1 - 20 of 3349  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan