Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SIP, SP, EA, IPSJ-SLP [detail] |
2024-02-29 15:10 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Cramér-Rao Lower Bound for Parameter Estimation from Observation with Irreversible Saturation Effects Natsuki Ueno, Hirokazu Kameoka (NTT) EA2023-84 SIP2023-131 SP2023-66 |
For probabilistic models involving irreversible saturation effects, we provide extended definitions of the score functio... [more] |
EA2023-84 SIP2023-131 SP2023-66 pp.139-144 |
IA |
2023-11-22 16:50 |
Aomori |
Aomori Prefecture Tourist Center ASPM (Aomori) (Primary: On-site, Secondary: Online) |
IA2023-42 |
When a spam scam email is reported, it is desirable to share the data so that many researchers aiming to improve informa... [more] |
IA2023-42 pp.41-47 |
LOIS, SITE, ISEC |
2023-11-09 13:55 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
ISEC2023-58 SITE2023-52 LOIS2023-16 |
With the spread of work style reforms such as remote work, communication about information security risks tends to be in... [more] |
ISEC2023-58 SITE2023-52 LOIS2023-16 pp.26-32 |
ICSS, IPSJ-SPT |
2023-03-13 16:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Evaluation and countermeasures of notification destination restoration attacks using password recovery functions of multiple web services Ryusei Ishikawa, Soramichi Akiyama (Ritsumeikan Univ.), Atsuo Inomata (Ritsumeikan Univ., Osaka Univ.), Tetsutaro Uehara (Ritsumeikan Univ.) ICSS2022-62 |
Many web services with a login function using pair of ID and password have the password recovery function in case the us... [more] |
ICSS2022-62 pp.85-90 |
MSS, NLP (Joint) |
2020-03-09 13:55 |
Aichi |
(Cancelled but technical report was issued) |
Effect of Non-learned Words in Spam Mail Filtering Kazuya Nakatani, Seiya Temma, Manabu Sugii, Hiroshi Matsuno (Yamaguchi Univ.) MSS2019-59 |
Machine learning mail filtering is usually performed based on words used for the learning.
This study evaluates the eff... [more] |
MSS2019-59 pp.9-12 |
MSS, NLP (Joint) |
2020-03-09 17:25 |
Aichi |
(Cancelled but technical report was issued) |
Feature Analysis of Strange Words for Spam Mail Filtering Seiya Temma, Kazuya Nakatani, Manabu Sugii, Hiroshi Matsuno (Yamaguchi Univ.) MSS2019-60 |
In this study, we discuss preparing processes of text for mail filtering, and improve the accuracy of the mail classific... [more] |
MSS2019-60 pp.13-18 |
ICSS |
2019-11-13 14:55 |
Miyazaki |
MRT Terrace(Miyazaki) |
ICSS2019-63 |
E-mail has been one of the most widely used tools for computer-based communication since the early days of the Internet.... [more] |
ICSS2019-63 pp.19-23 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 13:35 |
Kochi |
Kochi University of Technology |
Proposal of Spam Filter by Applying Neural Network for Mitigating Catastrophic Forgetting Shuiti Kawahara, Lu Chen, Hiroyuki Inaba (KIT) ISEC2019-32 SITE2019-26 BioX2019-24 HWS2019-27 ICSS2019-30 EMM2019-35 |
The trend of spam mails is changing. Since, in recent years, spam mails sent from overseas mail serversare increasing, s... [more] |
ISEC2019-32 SITE2019-26 BioX2019-24 HWS2019-27 ICSS2019-30 EMM2019-35 pp.171-178 |
NLP, MSS (Joint) |
2019-03-15 09:00 |
Fukui |
Bunkyo Camp., Univ. of Fukui |
Words co-occurrence-based mail filtering using Jaccard coefficient Seiya Temma, Manabu Sugii, Hiroshi Matsuno (Yamaguchi Univ) MSS2018-92 |
The validity of mail filtering method with co-occurrence index of words has been shown experimentally. In this study, we... [more] |
MSS2018-92 pp.59-64 |
ICSS, IPSJ-SPT |
2019-03-08 14:25 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
ICSS2018-91 |
(To be available after the conference date) [more] |
ICSS2018-91 pp.191-196 |
MSS, NLP (Joint) |
2018-03-13 09:15 |
Osaka |
|
Searching attribute information for mail filtering based on text mining Seiya Temma, Manabu Sugii, Hiroshi Matsuno (Yamaguchi Univ.) MSS2017-82 |
Many mail filters use the in function of words in the text. The purpose of this research is to develop a method of mail ... [more] |
MSS2017-82 pp.27-30 |
AI |
2018-02-17 16:00 |
Tokyo |
|
Open innovation case study using Innovators Marketplace on Data Jackets Takeshi Ui (ToppanF) AI2017-32 |
This is an activity report of Database Marketing Committee of Japan Direct Mail Association. The shift from paper to dig... [more] |
AI2017-32 pp.83-86 |
LOIS, ISEC, SITE |
2017-11-09 11:40 |
Kyoto |
|
Attempt to apply 3-Aufheben/MELT-UP for social issues "Realization of Safe and Secure E-mail Exchange Framework" Toshiaki Saisho, Shigeo Tshujii (Research and Development Initiative, Chuo University) ISEC2017-54 SITE2017-36 LOIS2017-31 |
The importance of "3-Shiyou(3-Aufheben)" on solving social problems (overcome), and the importance of the idea of MELT-U... [more] |
ISEC2017-54 SITE2017-36 LOIS2017-31 pp.33-40 |
SSS |
2017-09-19 15:40 |
Tokyo |
|
[Invited Talk]
The mission of Product Test of National Consumer Affairs Center of Japan(NCAC) Koji Matsumoto (NCAC) SSS2017-23 |
Consumer inquiries received by local consumer centers across Japan include information on accidents (e.g. injuries incur... [more] |
SSS2017-23 pp.17-20 |
IA, ICSS |
2017-06-08 14:50 |
Kochi |
Kochi University of Technolo, Eikokuji Campus |
Study on Email address harvesting by free service Keisuke Hashida, Masaru Kawakita, Shigeyoshi Shima (NEC) IA2017-5 ICSS2017-5 |
The cyberattack for which an e-mail was used in recent years is a big problem socially. An indefinite point keeps also h... [more] |
IA2017-5 ICSS2017-5 pp.25-29 |
MSS |
2017-03-16 16:50 |
Shimane |
Shimane Univ. |
Finding the Candidates of Attributes in Mail Words Filtered by Bayesian Method Nozomi Fujii, Manabu Sugii, Hiroshi Matsuno (Yamacguchi Univ.) MSS2016-89 |
The interest of a research about mail-filtering system is in a method based on Bayesian theory.The existing systems for ... [more] |
MSS2016-89 pp.43-48 |
IA, SITE, IPSJ-IOT [detail] |
2017-03-03 15:40 |
Okinawa |
Culture Resort Festone (Okinawa) |
Struggling against New-Born Malwares Attached to Mails Motoyuki Ohmori, Naoki Miyata, Kiyoyuki Nakashima, Kenichi Takahashi (Tottori Univ.) SITE2016-70 IA2016-100 |
We, Tottori University, have been experiencing targeted attacks using malicious mails especially since fiscal year 2016.... [more] |
SITE2016-70 IA2016-100 pp.51-56 |
TL |
2016-12-17 10:15 |
Tokyo |
Room 303/304/305, Building #8, Waseda University |
Recipients interpretation of Japanese business email communication
-- the situation conjecture expression -- Yuki Hiramatsu (Waseda Univ.) TL2016-42 |
The purpose of this study is to clarify what kind of interpretations are available in Japanese business email communicat... [more] |
TL2016-42 pp.31-36 |
ET |
2016-11-18 15:45 |
Shizuoka |
Plaza Verde |
Semi-Automated Attendance Checking System Using GPS, E-mailing, and Click Operation Kentaro Kato, Kazuma Obiya, Soma Sato (NIT) ET2016-64 |
This paper proposes the semi-automated attendance checking system using GPS, E-mailing, and click operation. This system... [more] |
ET2016-64 pp.53-56 |
ICSS, IPSJ-SPT |
2016-03-03 12:40 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Malicious-Spam-Mail Detection System with Autonomous Learning Ability Shogo Osaka, Jun Kitazono, Seiichi Ozawa (Kobe Univ.), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit) ICSS2015-50 |
Recently, damages caused by spam mails that guide receivers to malicious
web pages become more and more serious. In thi... [more] |
ICSS2015-50 pp.19-24 |