Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
CCS |
2024-03-27 16:50 |
Hokkaido |
RUSUTSU RESORT |
JPEG Compression Quality Setting Considering Image Quality and Information Loss for Correlated Steganography Mariiko Aikawa, Sumiko Miyata (SIT), Kaito Hosono, Hirotsugu Kinoshita (KU) CCS2023-50 |
As more and more confidential information, including personal information, is transmitted and received over the Internet... [more] |
CCS2023-50 pp.64-69 |
IA, SITE, IPSJ-IOT [detail] |
2024-03-13 13:40 |
Okinawa |
Miyakojima City Future Creation Center (Primary: On-site, Secondary: Online) |
A Steganalysis of Image Steganography using Real Image Denoising Shinnosuke Toguchi, Takamichi Miyata (CIT) SITE2023-100 IA2023-106 |
Image steganography is a technique for embedding secret messages in images. SteganoGAN, one of the previous methods, use... [more] |
SITE2023-100 IA2023-106 pp.195-202 |
ICSS |
2023-11-16 16:00 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Security Analysis of MP-LWE using Weighted Lattice Reduction Yudai Tagawa, Shinya Okumura, Atsuko Miyaji (Osaka Univ.) ICSS2023-57 |
In 2017, Roşca et al. proposed the Middle-Product LWE (MP-LWE) problem, a new LWE problem variant. The MP-LWE problem mi... [more] |
ICSS2023-57 pp.42-48 |
IMQ, IE, MVE, CQ (Joint) [detail] |
2023-03-15 10:10 |
Okinawa |
Okinawaken Seinenkaikan (Naha-shi) (Primary: On-site, Secondary: Online) |
A Preliminary Investigation on the Effectiveness of Graph Exploration Methods for Finding Target Nodes in Unknown Graphs Sho Tsugawa (Univ. of Tsukuba), Hiroyuki Ohsaki (Kwansei Gakuin Univ.) CQ2022-81 |
In this paper, we tackle a problem of finding target nodes with a specific attribute in an unknown graph. We examine th... [more] |
CQ2022-81 pp.7-12 |
RCC, ISEC, IT, WBS |
2023-03-15 11:50 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Steganography for Graphs using Graph Spectrum Kazuhisa Kawaguchi, Kenji Toyonaga (TUT), Chako Takahashi (Yamagata Univ), Takeshi Nakai, Koutarou Suzuki (TUT) IT2022-116 ISEC2022-95 WBS2022-113 RCC2022-113 |
Steganography aims to hide the fact that a message is being communicated by embedding it in another information medium.T... [more] |
IT2022-116 ISEC2022-95 WBS2022-113 RCC2022-113 pp.305-312 |
IBISML |
2022-12-23 13:00 |
Kyoto |
Kyoto University (Primary: On-site, Secondary: Online) |
Initial evaluation of node embedding using quantum walk Rei Sato, Shuichiro Haruta, Kazuhiro Saito, Mori Kurokawa (KDDI Research, Inc.) IBISML2022-57 |
DeepWalk is one of the node-embedding methods which represents node features using sequences obtained from a random walk... [more] |
IBISML2022-57 pp.101-105 |
NLC, IPSJ-NL, SP, IPSJ-SLP [detail] |
2022-11-29 10:00 |
Tokyo |
(Primary: On-site, Secondary: Online) |
Link Prediction from Text Content by NLP Graph Embedding
-- A Study on Chinese Journal Articles -- Tzu-Ying Yang, Hsuan Lei Shao, Chih-Chuan Fan, Wei-Hsin Wang (NTNU) NLC2022-9 SP2022-29 |
Abstract This paper is an extended research of the project “The Knowledge Database/ Graph of China-studies”. The main re... [more] |
NLC2022-9 SP2022-29 pp.1-4 |
NS, NWS (Joint) |
2022-01-28 10:50 |
Online |
Online |
[Encouragement Talk]
Degree Based Vertex Replication Method for Random Walk in Autonomous Distributed Graphs Ozaki Yoichi, Kaneko Kunitake (Keio Univ.) NS2021-116 |
In autonomously distributed graphs, the vertex set placed on a server does not always follow the community structure of ... [more] |
NS2021-116 pp.36-41 |
AI |
2021-12-13 11:15 |
Fukuoka |
Aimattain Hakata station (Primary: On-site, Secondary: Online) |
Embedding Models for Logical Inference on Individuals and Subsumption Relations Yukihiro Shiraishi, Ken Kaneiwa (UEC) AI2021-4 |
Knowledge graph embeddings are limited to predicting missing links. The embedding model EmEL++ can infer logical relatio... [more] |
AI2021-4 pp.18-23 |
KBSE, SC |
2021-11-06 10:15 |
Online |
Online + Morioka City (KBSE) (Primary: Online, Secondary: On-site) |
[Poster Presentation]
Service Clustering with Graph Embedding Koki Okubo, Yohei Murakami (Ritsumeikan Univ.) KBSE2021-34 SC2021-33 |
Traditional service clustering methods classified services according to their functionalities based on Web service descr... [more] |
KBSE2021-34 SC2021-33 pp.53-55 |
IE, ITS, ITE-MMS, ITE-ME, ITE-AIT [detail] |
2021-02-18 16:15 |
Online |
Online |
A Note on Cross-domain Recommendation Based on Multilayer Graph Analysis with Visual Features Taisei Hirakawa, Keisuke Maeda, Takahiro Ogawa (Hokkaido Univ.), Satoshi Asamizu (NIT, Kushiro College), Miki Haseyama (Hokkaido Univ.) |
In this paper, we improve the accuracy of cross-domain recommendation methods, which have been recently studied as a sol... [more] |
|
CS, IN, NS, NV (Joint) |
2020-09-11 15:10 |
Online |
Online |
A study of steganography based on error correction code and secret sharing scheme Kaito Onuma, Sumiko Miyata (SIT) CS2020-44 |
In recent years, the opportunity to handle information on the Internet has increased and interest in security has increa... [more] |
CS2020-44 pp.47-52 |
ICD, SDM, ITE-IST [detail] |
2020-08-06 13:50 |
Online |
Online |
Over-the-top Si Interposer Embedding Backside Buried Metal to Reduce Power Supply Impedance Takuji Miki, Makoto Nagata, Akihiro Tsukioka (Kobe Univ.), Noriyuki Miura (Osaka Univ.), Takaaki Okidono (ECSEC), Yuuki Araga, Naoya Watanabe, Haruo Shimamoto, Katsuya Kikuchi (AIST) SDM2020-5 ICD2020-5 |
A 2.5D structure with a Si interposer stacked on a CMOS chip is developed to reduce power supply impedance. A backside b... [more] |
SDM2020-5 ICD2020-5 pp.19-24 |
ISEC, IT, WBS |
2020-03-10 11:55 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
Consideration on Kleptographic Attack on Cryptocurrency Monero Sho Minami, Takashi Nishide (Tsukuba Univ.) IT2019-91 ISEC2019-87 WBS2019-40 |
Kleptographic attacks involves embedding the attacker's public key in the attack target encryption/signature system, and... [more] |
IT2019-91 ISEC2019-87 WBS2019-40 pp.7-14 |
IBISML |
2020-03-11 09:20 |
Kyoto |
Kyoto University (Cancelled but technical report was issued) |
Subspace Representation for Graphs Junki Ishikawa, Hiroaki Shiokawa, Kazuhiro Fukui (Tsukuba Univ.) IBISML2019-40 |
In this research, we discuss a representation learning for graph analysis, where a graph is represented by a low dimensi... [more] |
IBISML2019-40 pp.51-57 |
IBISML |
2020-03-11 09:45 |
Kyoto |
Kyoto University (Cancelled but technical report was issued) |
Knowledge Graph Completion by Separating Transition and Score Functions Kenta Hama, Takashi Matsubara, Kuniaki Uehara (Kobe Univ.) IBISML2019-41 |
A knowledge graph is represented by a set of two entities and the relations, and used for various tasks such as informat... [more] |
IBISML2019-41 pp.59-62 |
IE, IMQ, MVE, CQ (Joint) [detail] |
2020-03-05 10:10 |
Fukuoka |
Kyushu Institute of Technology (Cancelled but technical report was issued) |
Predicting Follow Behavior on Social Media via User-Hashtag Interaction Yiwei Zhang, Xueting Wang, Toshihiko Yamasaki (The Univ. of Tokyo) IMQ2019-42 IE2019-124 MVE2019-63 |
Following behavior prediction is an important task on social media since it represents users' preferences and could help... [more] |
IMQ2019-42 IE2019-124 MVE2019-63 pp.137-142 |
SC |
2019-06-01 11:30 |
Ibaraki |
National Institute for Materials Science |
Jointly Embedding Knowledge Graph and Feature in Vector Space Tomu Kadoki, Runhe Huang, Satoru Fujita (Hosei Univ.) SC2019-10 |
Knowledge Graph, utilized in search engine, can be embed in a low dimensional vector space with knowledge graph embeddin... [more] |
SC2019-10 pp.55-60 |
IT, ISEC, WBS |
2019-03-08 14:20 |
Tokyo |
University of Electro-Communications |
On Wireless Steganography based on OFDM and DFT-Precoding for IoT Networks Ryohei Yamaguchi, Hideki Ochiai, Junji Shikata (Yokohama Natl. Univ.) IT2018-124 ISEC2018-130 WBS2018-125 |
A method for improving security of IoT networks
by hiding secret
message against the risk of eavesdropping over wire... [more] |
IT2018-124 ISEC2018-130 WBS2018-125 pp.297-302 |
ICD, CPSY, CAS |
2018-12-23 09:30 |
Okinawa |
|
[Poster Presentation]
A problem of finding the service function chain with minimum network resource usage and high fault tolerance Daiki Yamada, Norihiko Shinomiya (Soka Univ) CAS2018-88 ICD2018-72 CPSY2018-54 |
Service Function Chain (SFC) has been an essential element in the development of virtualization technologies. SFC is uti... [more] |
CAS2018-88 ICD2018-72 CPSY2018-54 pp.51-54 |