Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
OFT |
2023-10-12 10:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Application of distributed fiber-optic strain sensing to detection rock fracture Tianjun Zhang, Makito Kobayashi (UTokyo), Takumi Nakashima, Kotaro Fujiwara, Michio Imai, Hideki Nagatani, Yasuyuki Miyajima, Junichi Kawabata (KAJIMA), Hideaki Murayama (UTokyo) OFT2023-17 |
When excavating large underground cavities such as tunnels and underground power stations, there is a risk of rockfall d... [more] |
OFT2023-17 pp.7-10 |
NS |
2023-10-04 17:55 |
Hokkaido |
Hokkaidou University + Online (Primary: On-site, Secondary: Online) |
Access Control Method to Prevent ID Token Abuse on OpenID Connect Junki Yuasa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2023-81 |
In recent years, there has been a rapid increase in web services that require authentication, leading to the widespread ... [more] |
NS2023-81 pp.53-58 |
IA |
2023-09-21 13:50 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
A consideration about a discovering method of privacy-enhanced authoritative DNS servers Satoru Sunahara (CIST), Yong Jin (Tokyo Tech), Katsuyoshi Iida (HU) IA2023-11 |
Plain-text communication of DNS queries poses a risk of privacy leakage. Therefore, it is imperative to achieve protecti... [more] |
IA2023-11 pp.1-5 |
AI |
2023-09-12 14:15 |
Hokkaido |
|
Examination and Evaluation of Robot-Guided Evacuation Method Considering Congestion at Stairs Masafumi Hombe, Takahiro Uchiya (Nitech) AI2023-1 |
Evacuation guidance is one response that is taken when a disaster occurs. Currently, humans are in charge of evacuation ... [more] |
AI2023-1 pp.1-6 |
NLC |
2023-09-07 16:20 |
Osaka |
Osaka Metropolitan University. Nakamozu Campus. (Primary: On-site, Secondary: Online) |
Estimation of sentence boundaries in texts on business performance Kaito Takano, Kei Nakagawa (NAM), Hiroyuki Sakai (Seikei Univ.) NLC2023-13 |
In order to maintain a healthy market for financial instruments, listed companies are required to disclose corporate inf... [more] |
NLC2023-13 pp.69-74 |
SITE, IPSJ-EIP |
2023-06-13 17:05 |
Tokyo |
Rissho Univ. Shinagawa Campus |
How to regulate digital platforms for a healthier information space?
-- Case study : different approaches between the US and EU in regulating TikTok -- Junko Nakano, Takeo Tatsumi (OUJ) SITE2023-7 |
As Digital Platforms (DPF) have become dominant actors in controlling the digital information space, there is a growing ... [more] |
SITE2023-7 pp.40-45 |
SWIM, KBSE |
2023-05-19 15:10 |
Shizuoka |
(Primary: On-site, Secondary: Online) |
DARPA-Like Organization and Role of Univeristy
-- A Global Perspective Regarding AI R&D -- Haruki Ueno (NII) KBSE2023-3 SWIM2023-3 |
Dual-use technology (DUT) refers to technology that can be used for both peaceful and military purposes, and has its roo... [more] |
KBSE2023-3 SWIM2023-3 pp.13-20 |
PRMU, IPSJ-CVIM |
2023-05-18 14:30 |
Aichi |
(Primary: On-site, Secondary: Online) |
Discriminating between fake and real gestures in automatic gesture generation Geng Mu, Nosh Kaneko, Kazuhiko Sumi (AGU) PRMU2023-5 |
In recent years, gestures play a crucial role in communication with anthropomorphized agents and robots. The use of gest... [more] |
PRMU2023-5 pp.22-26 |
SeMI, IPSJ-ITS, IPSJ-MBL, IPSJ-DPS |
2023-05-19 09:45 |
Okinawa |
Okinawa Institute of Science and Technology (OIST) (Primary: On-site, Secondary: Online) |
Experimental evaluation of Split computing using actual device Kojin Yorita, Shoki Ohta, Kota Maejima, Kanare Kodera, Yutaro Horikawa, Takayuki Nishio (Tokyo Tech), Kozo Fukui (AceCode) SeMI2023-12 |
Machine learning (ML) inference using Deep Neural Network (DNN) with a technique called Split Computing (SC) has attract... [more] |
SeMI2023-12 pp.50-52 |
DC, CPSY, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2023-03-24 09:00 |
Kagoshima |
Amagi Town Disaster Prevention Center (Tokunoshima) (Primary: On-site, Secondary: Online) |
A preliminary study on time-dependency of cyber security vulnerability assessment Takashi Minohara, Naohiro Kubota (Takushoku Univ.) CPSY2022-42 DC2022-101 |
Information system administrators must pay attention to system vulnerability information and take appropriate measures a... [more] |
CPSY2022-42 DC2022-101 pp.49-54 |
KBSE |
2023-03-17 15:25 |
Hiroshima |
JMS ASTERPLAZA (Primary: On-site, Secondary: Online) |
Study of the Impact of Activity Status on OSS Project Continuation/Interruption Yuga Kikuchi, Yoshikazu Ueda (Ibaraki Univ.) KBSE2022-69 |
Open source software (OSS) has been used by companies in recent years. However, the development of OSS can be subject to... [more] |
KBSE2022-69 pp.91-96 |
NLP, MSS |
2023-03-17 10:40 |
Nagasaki |
(Primary: On-site, Secondary: Online) |
Machine Learning-Based Risk Evaluation of Reconstruction Attack on Query System for Handling Privacy Data Mohd Anuaruddin Bin Ahmadon (山口大) MSS2022-96 NLP2022-141 |
In this paper, we proposed a method to evaluate the strength of a data privacy protection mechanism by separating the me... [more] |
MSS2022-96 NLP2022-141 pp.160-163 |
RCC, ISEC, IT, WBS |
2023-03-14 10:30 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
[Invited Talk]
Information-Theoretic Analyses for Two Problems Taking Security into Consideration
-- Parameter Estimation Problem under Local Differential Privacy, and Privacy-Utility Tradeoff Problem -- Shota Saito (Gunma Univ.) IT2022-71 ISEC2022-50 WBS2022-68 RCC2022-68 |
This lecture surveys the following two problems: 1) parameter estimation problem under $(epsilon, delta)$-local differen... [more] |
IT2022-71 ISEC2022-50 WBS2022-68 RCC2022-68 pp.19-24 |
RCS, SR, SRW (Joint) |
2023-03-01 13:05 |
Tokyo |
Tokyo Institute of Technology, and Online (Primary: On-site, Secondary: Online) |
[Invited Lecture]
Technology vision towards Beyond 5G and Probabilistic Digital-Twin Shimonishi Hideyuki (Osaka University) SR2022-81 |
In the Beyond 5G/6G era, digital transformation will further accelerate, and everything in the real world will be digiti... [more] |
SR2022-81 p.1 |
CQ, CBE (Joint) |
2023-01-27 13:40 |
Ibaraki |
Epochal Tsukuba International Congress Center (Primary: On-site, Secondary: Online) |
[Invited Talk]
Development of a cognitive training system based on an EEG-BMI and its application to the competition "bSports" Ryohei P. Hasegawa (AIST) CQ2022-77 |
In recent years, there has been a growing movement to put the Brain-Machine Interface (BMI), which directly connects the... [more] |
CQ2022-77 p.91 |
KBSE |
2023-01-19 14:40 |
Ishikawa |
(Primary: On-site, Secondary: Online) |
Fairness-aware human resource allocation for runtime business process Nayuta Egashira, Hiroki Horita (Ibaraki Univ.) KBSE2022-46 |
Predictive business process monitoring improves the work efficiency of a running business process based on the analysis ... [more] |
KBSE2022-46 pp.19-24 |
MSS, SS |
2023-01-10 15:20 |
Osaka |
(Primary: On-site, Secondary: Online) |
Extensions of Air Conditioning Optimization Guidance System for Improved Ventilation Instructions Masaki Sakagami, Kazushi Hamazaki, Sho Ito, Tomoya Nagayama, Nobuo Funabiki, Minoru Kuribayashi (Okayama Univ.) MSS2022-48 SS2022-33 |
Currently, we are developing the air conditioning optimization guidance system called AC-Guide. For saving energy and im... [more] |
MSS2022-48 SS2022-33 pp.19-24 |
MSS, SS |
2023-01-11 15:25 |
Osaka |
(Primary: On-site, Secondary: Online) |
On Botnet Disinfection by Rebooting by Area Yuji Katsura, Shingo Yamaguchi (Yamaguchi Univ.) MSS2022-60 SS2022-45 |
This paper proposes a method of rebooting on a per-area basis rather than on a per-device basis to get rid of IoT botnet... [more] |
MSS2022-60 SS2022-45 pp.90-95 |
R |
2022-12-15 14:30 |
Online |
Online |
Metric for Dependability/Risk and Functional Safety Ko Kawashima (ORIENTAL MOTOR), Yoshinobu Sato (Institute of Healthcare Quality Improvement, Tokyo Healthcare Fo) R2022-44 |
The risk due to malfunctioning of safety functions performed by electrical/electronic/programmable electronic safety-rel... [more] |
R2022-44 pp.1-6 |
R |
2022-12-15 15:20 |
Online |
Online |
Modeling and Formulation for Estimation of Hazardous Event Rate Yoshinobu Sato (Institute of Healthcare Quality Improvemen) R2022-46 |
Safety-related risk is defined by use of two characteristics of “severity of harm potentially brought about by a hazardo... [more] |
R2022-46 pp.13-18 |