IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 46 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
10:20
Kochi Kochi University of Technology Instrumentation Security of Ranging Pulse LIDARs Using Multiple Photodetectors
Tatsuya Suehiro, Ryuya Ichinose, Satoru Sakurazawa, Naoki Yoshida, Tsutomu Matsumoto (YNU) ISEC2019-41 SITE2019-35 BioX2019-33 HWS2019-36 ICSS2019-39 EMM2019-44
Instrumentation security, that is the security at the sensing or instrumentation stage, is recognized as a major issue i... [more] ISEC2019-41 SITE2019-35 BioX2019-33 HWS2019-36 ICSS2019-39 EMM2019-44
pp.239-242
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
15:25
Kochi Kochi University of Technology Possibility of Identifying USB Device by Voltage Changing
Taku Toyama, Junichi Sakamoto, Naoki Yoshida, Tsutomu Matsumoto (YNU) ISEC2019-61 SITE2019-55 BioX2019-53 HWS2019-56 ICSS2019-59 EMM2019-64
In recent years, illegal USB devices have become problematic, such as malware infection by USB memory, incorrect key inp... [more] ISEC2019-61 SITE2019-55 BioX2019-53 HWS2019-56 ICSS2019-59 EMM2019-64
pp.391-396
HWS 2019-04-12
13:55
Miyagi Tohoku University Construction of a System to Evaluate Instrumentation Security Enhancement Techniques for Ranging Pulse LIDARs
Tatsuya Suehiro, Satoru Sakurazawa, Naoki Yoshida, Tsutomu Matsumoto (YNU) HWS2019-2
Since the output of instrumentation systems such as sensors in a broad sense can have a significant impact on a system t... [more] HWS2019-2
pp.7-12
HWS, VLD 2019-03-02
13:55
Okinawa Okinawa Ken Seinen Kaikan A Study of Collision Attacks on Moving Vehicle Equipped with Stereo Vision Camera
Hiroki Nohira, Yasushi Iwata, Naoki Yoshida, Tsutomu Matsumoto (YNU) VLD2018-142 HWS2018-105
Stereo vision cameras that measure distances based on the principle of triangulation are used in various fields. In orde... [more] VLD2018-142 HWS2018-105
pp.289-293
HWS, VLD 2019-03-02
14:20
Okinawa Okinawa Ken Seinen Kaikan Conditions for Successful Attacks on Ultrasonic Range Finder to Output Incorrect Values
Yuya Inoue, Hiroki Nohira, Naoki Yoshida, Daisuke Fujimoto, Tsutomu Matumoto (YNU) VLD2018-143 HWS2018-106
Discussion is made on the condition that an attacking device installed at a place not detected from the target ultrasoni... [more] VLD2018-143 HWS2018-106
pp.295-299
HWS
(2nd)
2018-12-13
16:10
Tokyo Tokyo Univ. Takeda Bldg. Takeda Hall [Poster Presentation] Demonstration of Illusion Attack on Object Detection Algorithm of Stereo Vision Camera
Hiroki Nohira, Yasushi Iwata, Naoki Yoshida, Tsutomu Matsumoto (YNU)
(Advance abstract in Japanese is available) [more]
HWS
(2nd)
2018-12-13
16:10
Tokyo Tokyo Univ. Takeda Bldg. Takeda Hall [Poster Presentation] A System of Evaluating Instrumentation Security Enhancement Techniques for Ranging Pulse LIDARs
Tatsuya Suehiro, Satoru Sakurazawa, Naoki Yoshida, Tsutomu Matsumoto (YNU)
(Advance abstract in Japanese is available) [more]
CQ, ICM, NS, NV
(Joint)
2018-11-16
12:20
Ishikawa   Automation of Fault Isolation with Workflow Engine
Tao Kawarai, Naoki Yoshida (Osaka City Univ.), Hiroki Nakayama, Tsunemasa Hayashi (BOSCO Tech.), Shingo Ata (Osaka City Univ.) ICM2018-34
Recent years, increasing the operational cost of network management due to complicated IT infrastructure is becoming a s... [more] ICM2018-34
pp.57-62
HWS, ICD 2018-10-29
14:30
Osaka Kobe Univ. Umeda Intelligent Laboratory An Acceleration of Compressed Squaring for Pairing Implementation with Pipeline Modular Multiplier
Yota Okuaki, Junichi Sakamoto, Naoki Yoshida, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) HWS2018-50 ICD2018-42
One of the biggest problems of the emerging cyber-physical and cloud computing systems is how to ensure security with en... [more] HWS2018-50 ICD2018-42
pp.19-24
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
14:00
Hokkaido Sapporo Convention Center How to Evaluate Instrumentation Security of Stereo Vision Cameras against DoS and Illusion Attacks
Naoki Yoshida, Hiroki Nohira, Yasushi Iwata, Tsutomu Matsumoto (YNU) ISEC2018-19 SITE2018-11 HWS2018-16 ICSS2018-22 EMM2018-18
Stereo vision cameras that instrument distances by the principle of triangulation are used in various fields. Instrument... [more] ISEC2018-19 SITE2018-11 HWS2018-16 ICSS2018-22 EMM2018-18
pp.69-75
HWS 2018-04-13
11:35
Fukuoka   Optical 3D Nano Artifact-metrics using White Light Interferometry
Naoki Yoshida (YNU), Yosuke Ueba, Shumpei Nishio, Yasuyuki Ohyagi (DNP), Morihisa Hoga (Compass21), Naoya Tate (KU), Makoto Naruse (NICT), Tsutomu Matsumoto (YNU) HWS2018-3
We propose an artificial-metric system which authenticates nanostructures with random irregularities by means of an inte... [more] HWS2018-3
pp.11-16
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2017-07-15
13:50
Tokyo   Security Evaluation of the Software Architecture of TEE-enabled Device and Its Open-source Implementation
Naoki Yoshida (YNU), Kazuhiko Fukushima, Shigenori Miyauchi (Renesas Electronics), Junichi Sakamoto, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) ISEC2017-36 SITE2017-28 ICSS2017-35 EMM2017-39
It emerges that the use of security systems which separate device resources into Trusted Execution Environment (TEE) and... [more] ISEC2017-36 SITE2017-28 ICSS2017-35 EMM2017-39
pp.267-274
ISEC, WBS, IT 2017-03-10
11:20
Tokyo TOKAI University Software Protection by Hash-Table-Based Interlocking of Self Integrity Verification
Naoki Watanabe, Naoki Yoshida, Tsutomu Matsumoto (YNU) IT2016-120 ISEC2016-110 WBS2016-96
In order to detect unauthorized modification, tamper-resistant software often adopts self integrity verification mechani... [more] IT2016-120 ISEC2016-110 WBS2016-96
pp.137-144
VLD 2017-03-03
09:25
Okinawa Okinawa Seinen Kaikan A precise state-of-charge estimation system of primary battery for IoT devices
Hirofumi Shioura, Naoki Yoshida, Lei Lin, Masahiro Fukui (Ritsumeikan Univ.) VLD2016-123
Due to the spread of portable devices, small primary batteries are used in various places. Due to the attention of IoT, ... [more] VLD2016-123
pp.115-120
ICM, LOIS 2017-01-20
11:35
Nagasaki The Nagasaki Chamber of Commerce & Industry A Framework for Automating Operation and Management with Combination of Traffic and Configuration Histories
Shingo Ata, Naoki Yoshida (Osaka City Univ.), Hiroki Nakayama, Tsunemasa Hayashi (BOSCO Technologies) ICM2016-52 LOIS2016-61
 [more] ICM2016-52 LOIS2016-61
pp.75-80
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-15
15:20
Yamaguchi   A Durability Evaluation for Metallic-Foil Artifact-Metrics
Naoki Yoshida, Tsutomu Matsumoto (YNU) ISEC2016-37 SITE2016-31 ICSS2016-37 EMM2016-45
We proposed that metallic foils such as aluminum foils and gold foils can be applied to artifact-metrics, because the me... [more] ISEC2016-37 SITE2016-31 ICSS2016-37 EMM2016-45
pp.229-236
PRMU, IBISML, IPSJ-CVIM [detail] 2015-09-15
13:15
Ehime   [Invited Talk] A large-sky survey and statistical computational cosmology
Naoki Yoshida (The Univ. of Tokyo) PRMU2015-86 IBISML2015-46
We explore the frontier of statistical computaional cosmology using the large imaging data delivered by Subaru Hyper-Sup... [more] PRMU2015-86 IBISML2015-46
p.141
PRMU, BioX 2015-03-20
10:00
Kanagawa   How to Design Scanning Resolution in Artifact-metrics
Takuya Iwayoshi, Naoki Yoshida, Tsutomu Matsumoto (YNU) BioX2014-62 PRMU2014-182
Artifact-metrics is a security technology which authenticates individual artifacts based on intrinsic unique features wh... [more] BioX2014-62 PRMU2014-182
pp.141-146
ICSS 2015-03-04
15:55
Okinawa Meio Univiersity An Experimental Implementation of Self Destructive Tamper Resistant Software and Its Evaluation
Kazuomi Oishi (SIST), Naoki Yoshida, Naoki Watanabe, Jun'ichi Sakamoto, Tsutomu Matsumoto (YNU) ICSS2014-99
Self destructive tamper resistant software (SDTRS) has strong resistance
against attacker's analysis or modification
... [more]
ICSS2014-99
pp.217-222
R 2014-06-13
14:20
Tokyo   Improvement idea of SA algorithms for optimal arrangement problem in a Multi-state k-out-of-n:F system
Naoki Yoshida, Hisashi Yamamoto (Tokyo Metropolitan University), Koji Shingyochi (Jumonji Univ.), Tomoaki Akiba (Chiba Inst. of Tech.), Xiao Xiao (Tokyo Metropolitan University) R2014-11
 [more] R2014-11
pp.13-18
 Results 21 - 40 of 46 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan