IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 202  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
HWS, VLD [detail] 2021-03-04
Online Online Survey on intrusion detection system for Vehicle Security Techniques
Ayaka Matsushita, Takao Okubo (IISEC) VLD2020-88 HWS2020-63
The purpose of this paper is to identify the factors that cause the characteristics of voltage waveforms of ECUs in auto... [more] VLD2020-88 HWS2020-63
SWIM 2020-11-28
Online Online Governance and accessment of the use of IT and AI for sustainable development
Hiroyuki Ogura (Nihon Univ.), Yonosuke Harada (Inst. of Information Security), Shunsuke Managi (Kyushu Univ.) SWIM2020-8
It is required that the management of everything surrounding the organization becomes smarter and that it is transformed... [more] SWIM2020-8
IN, ICTSSL, NWS 2020-10-22
Online Online Resilience of IoT device sensor against physical attack threats
Michihiko Anzai, Atsuhiro Goto (iisec) ICTSSL2020-14
(To be available after the conference date) [more] ICTSSL2020-14
ICSS, IPSJ-SPT 2020-03-02
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Search for Similar Binary Code in Cross-Architecture Using Neural Machine Translation Model
Moritoshi Aoyanagi, Hidenori Tsuji, Masaki Hashimoto (IISEC) ICSS2019-75
Binary code similarity comparison plays an important role in binary code analysis, vulnerability detection, and stolen c... [more] ICSS2019-75
ICSS, IPSJ-SPT 2020-03-03
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
A research of HTTP request and an identification method of fake User-Agent values
Masato Inoue, Masaki Hashimoto (IISEC) ICSS2019-83
Almost all websites that are open to the public are subject to scan and attack, and have received a lot of anomaly reque... [more] ICSS2019-83
ICSS, IPSJ-SPT 2020-03-03
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Development of an expert system for automatic classification of illegal and harmful information on the dark web
Hanae Kobayashi, Masaki Hashimoto (IISEC) ICSS2019-87
(To be available after the conference date) [more] ICSS2019-87
COMP 2019-09-02
Okayama Tsushima Campus, Okayama University On the number of complete k-ary trees of height h
Yosuke Kikuchi (NIT, Tsuyama College), Yume Ikeda (NTTEast-Minamikanto) COMP2019-15
We give the number of complete $k$-ary trees of height $h$.
It is known that the number of complete binary trees of hei... [more]
ICSS, IPSJ-SPT 2019-03-07
Okinawa NICT Okinawa Electromagnetic Technology Center Regulatory Compliance Monitoring on the Web Using Paragraph Vector
Mitsuharu Sasaki (NTT EAST), Taishi Nishiyama, Atsutoshi Kumagai, Kazunori Kamiya (NTT) ICSS2018-71
There are a certain number of employees who violate regulatory compliance by non-malicious acts. Since their violation m... [more] ICSS2018-71
EMCJ, IEE-EMC 2018-12-14
Aichi   Study on Electromagnetic Inducted Voltage on Multi-point Grounded Conductor Based on 1/1000 Scale Model
Atsushi Nagao, Tetsuo Iezuka, Tetsuya Kaiden, Norihito Hirasawa, Hidenori Itou, Ryuichi Kobayashi (NTT East) EMCJ2018-94
Electromagnetic induction between power and telecommunication lines has been studied since early 1900’s [1]-[5], because... [more] EMCJ2018-94
ICSS 2018-11-21
Kagoshima   Spoofed Website Detection using Machine Learning
Naoki Kurihara, Hidenori Tsuji, Masaki Hashimoto (Institute of Information Security) ICSS2018-56
In recent years, the damage by fake site has been rapidly increasing. Because fake sites are ceremonious as if they are ... [more] ICSS2018-56
IA 2018-09-04
Hokkaido Hokkaido Univ. Conference Hall A Study on OTT and Access networks
Ichiro Mizukoshi (IISEC/NTT EAST), Miya Kohno (Cisco Systems), Kenichi Nagami (INTEC) IA2018-22
According to Geoff Houston(2017), “The Internet is now composed of OTT and access networks” [1]. In this report we 1) an... [more] IA2018-22
(Joint) [detail]
Hokkaido Hakodate Hokuyo Building 8Kai Hall Investigation on Cross-sectional Brillouin Gain depending on the Electric Field Distribution
Tomokazu Oda (NTT), Hiroshi Takahashi (NTT East), Kunihiro Toge, Tetsuya Manabe (NTT) OFT2018-6
Mode division multiplexing technique has been intensively studied for realization of large capacity optical communicatio... [more] OFT2018-6
(Joint) [detail]
Hokkaido Hakodate Hokuyo Building 8Kai Hall Operation technology for efficient maintenance of underground optical cable
Miho Akamatsu, Chihiro Kito, Koji Mine, Takashi Ebine (NTT EAST) OFT2018-12
We are developing an efficient maintenance operation system for underground optical cable. Since water penetration gradu... [more] OFT2018-12
NC, IBISML, IPSJ-BIO, IPSJ-MPS [detail] 2018-06-13
Okinawa Okinawa Institute of Science and Technology A Study of Numerical Prediction of 2-hour Plasma Glucose Level during OGTT using Machine Learning
Katsutoshi Maeta, Yu Nishiyama (UEC), Kazutoshi Fujibayashi (JUN), Toshiaki Gunji, Noriko Sasabe, Kimiko Iijima (NTT Medical Center Tokyo), Toshio Naito (JUN) IBISML2018-9
Oral glucose tolerance test (OGTT) is a method used to diagnose diabetes. Subjects take a 75 g glucose solution in a sho... [more] IBISML2018-9
SSS 2018-04-24
Tokyo   Study on equipment for mitigation of security damages in connected vehicles
Midori Inaba (IISEC) SSS2018-4
Safety of connected and autonomous vehicles relies on security. Therefore, prevention of automotive networks from malici... [more] SSS2018-4
WBS, IT, ISEC 2018-03-08
Tokyo Katsusika Campas, Tokyo University of Science A study on hierarchical secret sharing schemes applicable to any level based on XOR operations
Koji Shima, Hiroshi Doi (IISEC) IT2017-118 ISEC2017-106 WBS2017-99
Hierarchical secret sharing schemes are known for how they share a secret among a group of participants partitioned into... [more] IT2017-118 ISEC2017-106 WBS2017-99
ICSS, IPSJ-SPT 2018-03-07
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center A Preliminary Study on Defining Malignant Activity by Linking in-System Elements
Takuya Koike (IISEC), Miyuu Okubo (IRI), Hidenori Tsuji, Masaki Hashimoto (IISEC) ICSS2017-60
In recent years, cyber-attacks have become large-scale and complicated, and the impact on society continues to become in... [more] ICSS2017-60
ICSS, IPSJ-SPT 2018-03-08
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Research on an Evaluation Method for Memory Forensics Tools
Makoto Ashitsu, Ikuo Tanaka, Hidenori Tsuji, Masaki Hashimoto (IISEC) ICSS2017-70
 [more] ICSS2017-70
ICSS, IPSJ-SPT 2018-03-08
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center A Malware Detection Method by Machine Learning Focused on Malignant Activity
Tadashi Shimomura, Nobuki Suetsugu, Hidenori Tsuji, Masaki Hashimoto (IISEC) ICSS2017-71
In recent years, many researches on detection and classification of malware have been done. Among them, researches on te... [more] ICSS2017-71
KBSE 2018-03-01
Okinawa   Development of a System Supporting Security Design from Security Requirements Analysis using a Software Security Knowledge Base
Hikaru Miyahara, Atsuo Hazeyama (Tokyo Gakugei Univ.), Takafumi Tanaka (TUAT), Hironori Washizaki (Waseda Univ.), Haruhiko Kaiya (Kanagawa Univ.), Takao Okubo (IISEC), Nobukazu Yoshioka (NII) KBSE2017-50
The importance of software security is recognized because the Internet is permeating into our society. In particular, di... [more] KBSE2017-50
 Results 1 - 20 of 202  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)

[Return to Top Page]

[Return to IEICE Web Page]

The Institute of Electronics, Information and Communication Engineers (IEICE), Japan