IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 64  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
CCS 2024-03-27
16:50
Hokkaido RUSUTSU RESORT JPEG Compression Quality Setting Considering Image Quality and Information Loss for Correlated Steganography
Mariiko Aikawa, Sumiko Miyata (SIT), Kaito Hosono, Hirotsugu Kinoshita (KU) CCS2023-50
As more and more confidential information, including personal information, is transmitted and received over the Internet... [more] CCS2023-50
pp.64-69
IA, SITE, IPSJ-IOT [detail] 2024-03-13
13:40
Okinawa Miyakojima City Future Creation Center
(Primary: On-site, Secondary: Online)
A Steganalysis of Image Steganography using Real Image Denoising
Shinnosuke Toguchi, Takamichi Miyata (CIT) SITE2023-100 IA2023-106
Image steganography is a technique for embedding secret messages in images. SteganoGAN, one of the previous methods, use... [more] SITE2023-100 IA2023-106
pp.195-202
ICSS 2023-11-16
16:00
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Security Analysis of MP-LWE using Weighted Lattice Reduction
Yudai Tagawa, Shinya Okumura, Atsuko Miyaji (Osaka Univ.) ICSS2023-57
In 2017, Roşca et al. proposed the Middle-Product LWE (MP-LWE) problem, a new LWE problem variant. The MP-LWE problem mi... [more] ICSS2023-57
pp.42-48
IMQ, IE, MVE, CQ
(Joint) [detail]
2023-03-15
10:10
Okinawa Okinawaken Seinenkaikan (Naha-shi)
(Primary: On-site, Secondary: Online)
A Preliminary Investigation on the Effectiveness of Graph Exploration Methods for Finding Target Nodes in Unknown Graphs
Sho Tsugawa (Univ. of Tsukuba), Hiroyuki Ohsaki (Kwansei Gakuin Univ.) CQ2022-81
In this paper, we tackle a problem of finding target nodes with a specific attribute in an unknown graph. We examine th... [more] CQ2022-81
pp.7-12
RCC, ISEC, IT, WBS 2023-03-15
11:50
Yamaguchi
(Primary: On-site, Secondary: Online)
Steganography for Graphs using Graph Spectrum
Kazuhisa Kawaguchi, Kenji Toyonaga (TUT), Chako Takahashi (Yamagata Univ), Takeshi Nakai, Koutarou Suzuki (TUT) IT2022-116 ISEC2022-95 WBS2022-113 RCC2022-113
Steganography aims to hide the fact that a message is being communicated by embedding it in another information medium.T... [more] IT2022-116 ISEC2022-95 WBS2022-113 RCC2022-113
pp.305-312
IBISML 2022-12-23
13:00
Kyoto Kyoto University
(Primary: On-site, Secondary: Online)
Initial evaluation of node embedding using quantum walk
Rei Sato, Shuichiro Haruta, Kazuhiro Saito, Mori Kurokawa (KDDI Research, Inc.) IBISML2022-57
DeepWalk is one of the node-embedding methods which represents node features using sequences obtained from a random walk... [more] IBISML2022-57
pp.101-105
NLC, IPSJ-NL, SP, IPSJ-SLP [detail] 2022-11-29
10:00
Tokyo
(Primary: On-site, Secondary: Online)
Link Prediction from Text Content by NLP Graph Embedding -- A Study on Chinese Journal Articles --
Tzu-Ying Yang, Hsuan Lei Shao, Chih-Chuan Fan, Wei-Hsin Wang (NTNU) NLC2022-9 SP2022-29
Abstract This paper is an extended research of the project “The Knowledge Database/ Graph of China-studies”. The main re... [more] NLC2022-9 SP2022-29
pp.1-4
NS, NWS
(Joint)
2022-01-28
10:50
Online Online [Encouragement Talk] Degree Based Vertex Replication Method for Random Walk in Autonomous Distributed Graphs
Ozaki Yoichi, Kaneko Kunitake (Keio Univ.) NS2021-116
In autonomously distributed graphs, the vertex set placed on a server does not always follow the community structure of ... [more] NS2021-116
pp.36-41
AI 2021-12-13
11:15
Fukuoka Aimattain Hakata station
(Primary: On-site, Secondary: Online)
Embedding Models for Logical Inference on Individuals and Subsumption Relations
Yukihiro Shiraishi, Ken Kaneiwa (UEC) AI2021-4
Knowledge graph embeddings are limited to predicting missing links. The embedding model EmEL++ can infer logical relatio... [more] AI2021-4
pp.18-23
KBSE, SC 2021-11-06
10:15
Online Online + Morioka City (KBSE)
(Primary: Online, Secondary: On-site)
[Poster Presentation] Service Clustering with Graph Embedding
Koki Okubo, Yohei Murakami (Ritsumeikan Univ.) KBSE2021-34 SC2021-33
Traditional service clustering methods classified services according to their functionalities based on Web service descr... [more] KBSE2021-34 SC2021-33
pp.53-55
IE, ITS, ITE-MMS, ITE-ME, ITE-AIT [detail] 2021-02-18
16:15
Online Online A Note on Cross-domain Recommendation Based on Multilayer Graph Analysis with Visual Features
Taisei Hirakawa, Keisuke Maeda, Takahiro Ogawa (Hokkaido Univ.), Satoshi Asamizu (NIT, Kushiro College), Miki Haseyama (Hokkaido Univ.)
In this paper, we improve the accuracy of cross-domain recommendation methods, which have been recently studied as a sol... [more]
CS, IN, NS, NV
(Joint)
2020-09-11
15:10
Online Online A study of steganography based on error correction code and secret sharing scheme
Kaito Onuma, Sumiko Miyata (SIT) CS2020-44
In recent years, the opportunity to handle information on the Internet has increased and interest in security has increa... [more] CS2020-44
pp.47-52
ICD, SDM, ITE-IST [detail] 2020-08-06
13:50
Online Online Over-the-top Si Interposer Embedding Backside Buried Metal to Reduce Power Supply Impedance
Takuji Miki, Makoto Nagata, Akihiro Tsukioka (Kobe Univ.), Noriyuki Miura (Osaka Univ.), Takaaki Okidono (ECSEC), Yuuki Araga, Naoya Watanabe, Haruo Shimamoto, Katsuya Kikuchi (AIST) SDM2020-5 ICD2020-5
A 2.5D structure with a Si interposer stacked on a CMOS chip is developed to reduce power supply impedance. A backside b... [more] SDM2020-5 ICD2020-5
pp.19-24
ISEC, IT, WBS 2020-03-10
11:55
Hyogo University of Hyogo
(Cancelled but technical report was issued)
Consideration on Kleptographic Attack on Cryptocurrency Monero
Sho Minami, Takashi Nishide (Tsukuba Univ.) IT2019-91 ISEC2019-87 WBS2019-40
Kleptographic attacks involves embedding the attacker's public key in the attack target encryption/signature system, and... [more] IT2019-91 ISEC2019-87 WBS2019-40
pp.7-14
IBISML 2020-03-11
09:20
Kyoto Kyoto University
(Cancelled but technical report was issued)
Subspace Representation for Graphs
Junki Ishikawa, Hiroaki Shiokawa, Kazuhiro Fukui (Tsukuba Univ.) IBISML2019-40
In this research, we discuss a representation learning for graph analysis, where a graph is represented by a low dimensi... [more] IBISML2019-40
pp.51-57
IBISML 2020-03-11
09:45
Kyoto Kyoto University
(Cancelled but technical report was issued)
Knowledge Graph Completion by Separating Transition and Score Functions
Kenta Hama, Takashi Matsubara, Kuniaki Uehara (Kobe Univ.) IBISML2019-41
A knowledge graph is represented by a set of two entities and the relations, and used for various tasks such as informat... [more] IBISML2019-41
pp.59-62
IE, IMQ, MVE, CQ
(Joint) [detail]
2020-03-05
10:10
Fukuoka Kyushu Institute of Technology
(Cancelled but technical report was issued)
Predicting Follow Behavior on Social Media via User-Hashtag Interaction
Yiwei Zhang, Xueting Wang, Toshihiko Yamasaki (The Univ. of Tokyo) IMQ2019-42 IE2019-124 MVE2019-63
Following behavior prediction is an important task on social media since it represents users' preferences and could help... [more] IMQ2019-42 IE2019-124 MVE2019-63
pp.137-142
SC 2019-06-01
11:30
Ibaraki National Institute for Materials Science Jointly Embedding Knowledge Graph and Feature in Vector Space
Tomu Kadoki, Runhe Huang, Satoru Fujita (Hosei Univ.) SC2019-10
Knowledge Graph, utilized in search engine, can be embed in a low dimensional vector space with knowledge graph embeddin... [more] SC2019-10
pp.55-60
IT, ISEC, WBS 2019-03-08
14:20
Tokyo University of Electro-Communications On Wireless Steganography based on OFDM and DFT-Precoding for IoT Networks
Ryohei Yamaguchi, Hideki Ochiai, Junji Shikata (Yokohama Natl. Univ.) IT2018-124 ISEC2018-130 WBS2018-125
A method for improving security of IoT networks
by hiding secret
message against the risk of eavesdropping over wire... [more]
IT2018-124 ISEC2018-130 WBS2018-125
pp.297-302
ICD, CPSY, CAS 2018-12-23
09:30
Okinawa   [Poster Presentation] A problem of finding the service function chain with minimum network resource usage and high fault tolerance
Daiki Yamada, Norihiko Shinomiya (Soka Univ) CAS2018-88 ICD2018-72 CPSY2018-54
Service Function Chain (SFC) has been an essential element in the development of virtualization technologies. SFC is uti... [more] CAS2018-88 ICD2018-72 CPSY2018-54
pp.51-54
 Results 1 - 20 of 64  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan