Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
AP |
2024-06-13 13:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. (Primary: On-site, Secondary: Online) |
Generation of Virtual City 3D Model and Analysis of Pathloss Distribution Rento Hagiwara, Koichi Ichige (Yokohama National Univ), Tatsuya Nagao, Takahiro Hayashi (KDDI Research) |
[more] |
|
NLP, CCS |
2024-06-06 13:55 |
Fukuoka |
West Japan General Exhibition Center AIM |
Conflict-free multi-walker quantum walk based on entanglement Honoka Shiratori, Andre Roehm, Tomoki Yamagami (UT), Etsuo Segawa (YNU), Takatomo Mihana, Ryoich Horisaki (UT) |
[more] |
|
ISEC |
2024-05-15 16:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Identity-Based Matchmaking Encryption Secure Against Key Generation Center (from ProvSec 2023) Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) |
(To be available after the conference date) [more] |
|
HWS |
2024-04-19 15:25 |
Tokyo |
(Primary: On-site, Secondary: Online) |
Applying Ring Oscillator-based Laser Detection Sensor to AES Circuitry on FPGA Shungo Hayashi, Junichi Sakamoto, Tsutomu Matsumoto (AIST/YNU) HWS2024-3 |
[more] |
HWS2024-3 pp.8-13 |
ICSS, IPSJ-SPT |
2024-03-21 11:20 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Analyzing Attackers and Victims Actions via LockBit3.0 Website Data Dynamics Yuji Sekine, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-70 |
LockBit3.0 is one of the top ransomware groups that has been active since July 2022, targeting over 1,000 companies. In ... [more] |
ICSS2023-70 pp.9-16 |
ICSS, IPSJ-SPT |
2024-03-21 12:10 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Unveiling the Shadows: Analyzing Cryptocurrency Address Management and Fund Movement of Darknet Markets Aiman Syazwan Bin Abdul Razak, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-72 |
Darknet markets use cryptocurrencies like Bitcoin for anonymous transactions in exchanging illicit goods and services. T... [more] |
ICSS2023-72 pp.25-32 |
ICSS, IPSJ-SPT |
2024-03-21 15:20 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Investigating the functionalities of IoT malware to disrupt the activities of other intruders Shun Ikeda, Hiroki Yasui, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-76 |
[more] |
ICSS2023-76 pp.51-56 |
ICSS, IPSJ-SPT |
2024-03-21 15:45 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Enhanced Analysis of IoT Botnet Activity by Fusing Honeypots, Malware Dynamic Analysis, and C&C Observation Yuki Endo, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-77 |
[more] |
ICSS2023-77 pp.57-62 |
ICSS, IPSJ-SPT |
2024-03-22 10:10 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Study of keyword-based search method for IoT devices deployed at important facilities Mami Kawaguchi, Takayuki Sasaki, Kihara Momoka, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-86 |
IoT devices are increasingly deployed in various systems, including remote monitoring systems.Some of these IoT devices ... [more] |
ICSS2023-86 pp.123-128 |
ICSS, IPSJ-SPT |
2024-03-22 11:45 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Impact of ChatGPT Assisted Polymorphic Malware on Antivirus Detection Huang Zhewei, Yinn Minn Pa pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-89 |
With the rapid implementation of large-scale language models (LLMs), there are concerns about their misuse in cyberattac... [more] |
ICSS2023-89 pp.145-152 |
EMCJ, MICT (Joint) |
2024-03-15 10:30 |
Shimane |
|
A Study on Estimation for Chronic Stress using Heart Rate Variability Takashi Sudo (Toshiba) MICT2023-78 |
This research goal is to early detect white collar workers’ mental disorder. In this paper, I propose improvement in chr... [more] |
MICT2023-78 pp.6-11 |
AP |
2024-03-14 15:15 |
Fukui |
UNIVERSITY OF FUKUI (Primary: On-site, Secondary: Online) |
[Invited Talk (Young Researcher)]
Study of non-contact PIM measurement systems for balanced transmission lines with electrically equivalent characteristics to microstrip lines Ryunosuke Murofushi (Yokohama Natl. Univ./Polytechnic Univ.), Nobuhiro Kuga (Yokohama Natl. Univ.), Eiji Hanayama (Polytechnic Univ.) AP2023-209 |
In many communication systems, passive intermoduration (PIM) is known as one of noises. The termination method standardi... [more] |
AP2023-209 pp.45-50 |
RCC, ISEC, IT, WBS |
2024-03-13 11:35 |
Osaka |
Osaka Univ. (Suita Campus) |
Proxy Re-Authentication Capable of Key and Data Compression Yoshiro Matsuoka, Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65 |
In this paper, we propose a new cryptographic protocol called proxy re-authentication capable of key and data compressio... [more] |
IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65 pp.52-59 |
RCC, ISEC, IT, WBS |
2024-03-13 14:15 |
Osaka |
Osaka Univ. (Suita Campus) |
Proxy Re-encryption based on LPN Haruki Fujimoto, Shingo Sato, Junji Shikata (YNU) IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70 |
We propose a proxy re-encryption (PRE) scheme based on the Learning Parity with Noise (LPN) problem using error-correcti... [more] |
IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70 pp.79-86 |
RCC, ISEC, IT, WBS |
2024-03-13 16:10 |
Osaka |
Osaka Univ. (Suita Campus) |
A consideration on the generation of algebraic surfaces that can evaluate the computational complexity of section-finding problem Kosuke Sakata (UTokyo), Koichiro Akiyama (Toshiba) IT2023-98 ISEC2023-97 WBS2023-86 RCC2023-80 |
We report that a method for generating algebraic surfaces, theoretically evaluable for the computational complexity of t... [more] |
IT2023-98 ISEC2023-97 WBS2023-86 RCC2023-80 pp.150-157 |
RCC, ISEC, IT, WBS |
2024-03-13 16:35 |
Osaka |
Osaka Univ. (Suita Campus) |
A Study on Polar Codes Design with Robustness against Channel SNR Fluctuation Hidetake Matsui, Hideki Ochiai (YNU) IT2023-102 ISEC2023-101 WBS2023-90 RCC2023-84 |
Polar codes are known to achieve high reliability with low decoding complexity. The design of polar codes requires the s... [more] |
IT2023-102 ISEC2023-101 WBS2023-90 RCC2023-84 pp.179-184 |
RCC, ISEC, IT, WBS |
2024-03-14 09:30 |
Osaka |
Osaka Univ. (Suita Campus) |
Security Analysis of Backdoored Classic McEliece in a Multi-User Setting Dai Miura, Hyungrok Jo, Shingo Sato, Junji Shikata (Yokohama National Univ.) IT2023-105 ISEC2023-104 WBS2023-93 RCC2023-87 |
Several attacks have been proposed for the Classic McEliece cryptosystem, which is one of the 4th round candidates of th... [more] |
IT2023-105 ISEC2023-104 WBS2023-93 RCC2023-87 pp.197-204 |
RCC, ISEC, IT, WBS |
2024-03-14 14:40 |
Osaka |
Osaka Univ. (Suita Campus) |
Performance Evaluation of OFDM Systems with Clipping and Partial Filtering Wataru Hatano, Hideki Ochiai (YNU) IT2023-123 ISEC2023-122 WBS2023-111 RCC2023-105 |
[more] |
IT2023-123 ISEC2023-122 WBS2023-111 RCC2023-105 pp.300-305 |
RCC, ISEC, IT, WBS |
2024-03-14 15:05 |
Osaka |
Osaka Univ. (Suita Campus) |
Secrity Oriented Design of Polar-Coded OFDM on Selective Fading Channels Yuki Kuraya, Hideki Ochiai (YNU) IT2023-124 ISEC2023-123 WBS2023-112 RCC2023-106 |
We introduce a physical layer security scheme based on a polar-coded OFDM system in wireless communication. Our approach... [more] |
IT2023-124 ISEC2023-123 WBS2023-112 RCC2023-106 pp.306-311 |
RCS, SR, SRW (Joint) |
2024-03-14 14:05 |
Tokyo |
The University of Tokyo (Hongo Campus), and online (Primary: On-site, Secondary: Online) |
[Invited Talk]
Real-time cloud robotics and related technologies toward Beyond 5G/6G Tomoya Tandai (TISS), Daisuke Uchida, Satoshi Takaya, Yuki Yonezawa (Toshiba), Hiroyuki Nishikawa (TISS), Daisuke Yamamoto (Toshiba) RCS2023-277 SR2023-100 SRW2023-64 |
This report proposes a Multi-access Edge Computing (MEC)-centralized mobile robots control and its related technologies ... [more] |
RCS2023-277 SR2023-100 SRW2023-64 p.126(RCS), p.58(SR), p.91(SRW) |