IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 21  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM 2022-03-07
14:15
Online (Primary: Online, Secondary: On-site)
(Primary: Online, Secondary: On-site)
[Poster Presentation] Development of XR-based Earthquake Experience Application for Enhancing Self-efficacy
Soma Nomoto, Kazuhiro Kono (Kansai Univ.) EMM2021-96
This paper develops an earthquake experience application using XR (Extended Reality) technology. Our application enables... [more] EMM2021-96
pp.23-28
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2021-07-20
10:30
Online Online Development of an AI Literacy Learning Tool Using Minecraft
Suika Kishimoto, Kazuhiro Kono (Kansai Univ.) ISEC2021-31 SITE2021-25 BioX2021-32 HWS2021-31 ICSS2021-36 EMM2021-36
AI literacy education is one of the essential educational fields. There are various educational services for improving l... [more] ISEC2021-31 SITE2021-25 BioX2021-32 HWS2021-31 ICSS2021-36 EMM2021-36
pp.131-135
EMM 2021-03-04
14:45
Online Online [Poster Presentation] Improvement of Video Forgery Detection Using Generative Adversarial Networks
Yutaro Osako (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Noboru Babaguchi (Osaka Univ.) EMM2020-72
Our work aims to detect tampered objects in the spatial domain of videos with high accuracy. We target videos, including... [more] EMM2020-72
pp.28-33
EA, ASJ-H, EMM 2020-11-20
09:00
Online Online [Poster Presentation] Development of VR-based Learning System for Disaster Prevention/Mitigation Focusing on Expression of Interaction
Soma Nomoto, Kazuhiro Kono (Kansai Univ.) EA2020-31 EMM2020-46
This paper develops a learning system for disaster prevention/mitigation using virtual reality to realize effective disa... [more] EA2020-31 EMM2020-46
pp.54-57
EMM 2020-03-05
16:45
Okinawa
(Cancelled but technical report was issued)
[Poster Presentation] Video Forgery Detection Using Generative Adversarial Networks
Shoken Ohshiro (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Noboru Babaguchi (Osaka Univ.) EMM2019-122
The purpose of our work is to detect the regions of tampered objects in the spatial domain of videos by passive approach... [more] EMM2019-122
pp.107-112
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
11:45
Kochi Kochi University of Technology A Study on Suppression of Inappropriate Use of Illegal Contents Based on Conformity Caused by Normative Influence
Hiroki Yamaguchi, Kazuhiro Kono (Kansai Univ.) ISEC2019-47 SITE2019-41 BioX2019-39 HWS2019-42 ICSS2019-45 EMM2019-50
Copyright infringement by illegal contents uploaded on the Internet has become a social issue. However, it is hard to su... [more] ISEC2019-47 SITE2019-41 BioX2019-39 HWS2019-42 ICSS2019-45 EMM2019-50
pp.305-310
EMM 2019-03-13
15:15
Okinawa TBD [Poster Presentation] A Consideration on Spatio-Temporal Feature Learning for Video Forgery Detection
Shoken Ohshiro (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Noboru Babaguchi (Osaka Univ.) EMM2018-104
The purpose of our work is to detect objects tampered in the spatial domain of videos including dynamic scenes such as a... [more] EMM2018-104
pp.67-72
EA, ASJ-H, EMM, IPSJ-MUS [detail] 2018-11-21
13:30
Ishikawa Hotel Koshuen [Poster Presentation] Video Forgery Detection Using Spatio-Temporal Convolutional Neural Network
Shoken Ohshiro (Osaka Univ), Kazuhiro Kono (Kainsai Univ), Noboru Babaguchi (Osaka Univ) EA2018-71 EMM2018-71
It is easy to tamper with videos due to the improvement of video editing technology.We need to develop forgery detection... [more] EA2018-71 EMM2018-71
pp.49-52
SSS 2018-08-14
14:10
Kyoto   A Study on Measures to Prevent College Students from Viewing Illegally Uploaded Videos -- Focused on The Fraud Triangle Theory and The Situational Crime Prevention Theory --
Kazuhiro Kono (Kansai Univ.) SSS2018-15
In this paper, we consider a method for suppressing the viewing of illegally uploaded videos them by using the fraud tri... [more] SSS2018-15
pp.9-12
EMM 2018-03-05
14:35
Kagoshima Naze Community Center (Amami-Shi, Kagoshima) [Poster Presentation] Video Forgery Detection Considering Spatio-Temporal Consistency
Takaaki Yoshida (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Noboru Babaguchi (Osaka Univ.) EMM2017-81
This paper proposes a video forgery detection method in dynamic scenes such as dynamic background or dynamic perspective... [more] EMM2017-81
pp.23-28
EMM 2017-03-06
14:30
Okinawa Miyakojima Marin Terminal Building (Okinawa) [Poster Presentation] User Authentication Using Heart Rate Sequences during Walking toward Continuous Authentication
Takaaki Yoshida (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Babaguchi Noboru (Osaka Univ.) EMM2016-90
 [more] EMM2016-90
pp.25-30
IT, EMM 2016-05-19
15:35
Hokkaido Otaru Economic Center Multimodal User Authentication Focusing on Long-term Heart Rate Sequences from Wearable Devices
Takaaki Yoshida (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Babaguchi Noboru (Osaka Univ.) IT2016-9 EMM2016-9
This paper proposes a multimodal authentication system for smartphones
by using two sequences of different measurement ... [more]
IT2016-9 EMM2016-9
pp.49-54
EMM 2016-03-02
14:30
Kagoshima Yakushima Environ. and Cultural Vill. Center [Poster Presentation] Video Forgery Detection Using a Time Series Model in Dynamic Scenes
Shigeki Karita (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Noboru Babaguchi (Osaka Univ.) EMM2015-80
This paper proposes a robust video forgery detection method in dynamic scenes such as dynamic background or camera jitte... [more] EMM2015-80
pp.25-30
EMM 2016-03-02
14:30
Kagoshima Yakushima Environ. and Cultural Vill. Center [Poster Presentation] Data Anonymization based on TF-IDF Method Using Hierarchies Built from Attributes of Recommended Targets
Kensuke Arai (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Noboru Babaguchi (Osaka Univ.) EMM2015-81
This paper proposes a personal data anonymization method using hierarchies considering information recommendation for us... [more] EMM2015-81
pp.31-36
EMM, IT 2015-05-21
15:45
Kyoto Kyoto International Community House Data Anonymization for Information Recommendation Based on TF-IDF Method
Kensuke Arai (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Noboru Babaguchi (Osaka Univ.) IT2015-10 EMM2015-10
This paper proposes a data anonymization method considering information recommendation for users.
Attaching importance ... [more]
IT2015-10 EMM2015-10
pp.51-56
EMM 2015-03-12
16:00
Okinawa   [Poster Presentation] Generation Methods of Secret Sharing QR Codes
Masaki Kuramoto (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Yoshimichi Ito (Osaka Electro-Communication Univ.), Noboru Babaguchi (Osaka Univ.) EMM2014-92
This paper proposes methods for generating a set of multiple QR codes, in which each QR code contains a share of secret ... [more] EMM2014-92
pp.91-96
EMM 2015-03-12
16:00
Okinawa   [Poster Presentation] Usability Evaluation of Multi-Touch Actions Considering the Structure of Hand-Fingers and Its Constraints on Movement
Kumi Nakamura (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Yoshimichi Ito (OECU), Noboru Babaguchi (Osaka Univ.) EMM2014-93
In this paper, we evaluate the usability of multi-touch actions, which are actions using several fingers, in order to f... [more] EMM2014-93
pp.97-102
SSS 2015-02-23
16:20
Osaka   A Study on Information Security from a Viewpoint of International Safety Standards
Kazuhiro Kono (Kansai Univ.) SSS2014-29
In this paper, we investigate international safety standards from a viewpoint of information security and consider infor... [more] SSS2014-29
pp.21-24
SSS 2015-02-23
17:00
Osaka   A Study on Improvement of User's Consciousness for Security -- Extraction of Security Risk in the Future Considered from Present Security Incidents and Iconization of Terms and Conditions of Use --
Sosuke Matsusaka, Naoki Nakagawa, Kazuhiro Kono (Kansai Univ.) SSS2014-30
This paper describes two researches for improving user's consciousness for security. First, we extract future security r... [more] SSS2014-30
pp.25-28
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
13:25
Hokkaido San-Refure Hakodate Authentication for mobile devices using behavioral biometrics with adaptive templates
Shigeki Karita, Kumi Nakamura (Osaka Univ.), Kazuhiro Kono (Kansai Univ), Yoshimichi Ito (Osaka Electro-Communication Univ.), Noboru Babaguchi (Osaka Univ.) ISEC2014-21 SITE2014-16 ICSS2014-25 EMM2014-21
This paper proposes a template renewal method for improving authentication accuracy in biometric authentication with beh... [more] ISEC2014-21 SITE2014-16 ICSS2014-25 EMM2014-21
pp.133-138
 Results 1 - 20 of 21  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan