Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS |
2024-04-12 11:25 |
Okayama |
Okayama Prefectural Library + Online (Primary: On-site, Secondary: Online) |
Implementation and Preliminary Evaluation of an FPGA-based Network Switch Supporting Credit-based Shaper for Time Sensitive Networks Akram Ben Ahmed, Takahiro Hirofuchi, Takaaki Fukai (AIST) |
(To be available after the conference date) [more] |
|
CCS |
2024-03-27 13:00 |
Hokkaido |
RUSUTSU RESORT |
Training of Encoder-Decoder models and its application towards edge computing Koki Nobori, Hiiro Yamazaki, Kota Ando, Tetsuya Asai (Hokkaido Univ.) CCS2023-42 |
This study investigates the use of the Encoder-Decoder architecture and its application to generative AI for learning on... [more] |
CCS2023-42 pp.18-23 |
ICM |
2024-03-22 15:25 |
Okinawa |
Okinawa Prefectural Museum and Art Museum (Primary: On-site, Secondary: Online) |
Study of AI Model Training Method Using Network Digital Twin in Scale-out 5GC Environment Daiki Koyama, Minato Sakuraba, Junichi Kawasaki, Takuya Miyasaka (KDDI Research) ICM2023-62 |
This technical report proposes a method for building AI models for network operations by utilizing the network digital t... [more] |
ICM2023-62 pp.89-94 |
ICM |
2024-03-22 16:30 |
Okinawa |
Okinawa Prefectural Museum and Art Museum (Primary: On-site, Secondary: Online) |
Demonstration of stable and flexible service provisioning mechanism based on extended autonomous operation technology cooperated with resource control function Eiji Muramatsu, Kotaro Inoue, Takayuki Kuroda, Yusuke Shinohara, Takanori Iwai (NEC) ICM2023-65 |
In recent years, autonomous network have been actively studied for the purpose of efficient operation of increasingly co... [more] |
ICM2023-65 pp.107-112 |
ICSS, IPSJ-SPT |
2024-03-22 10:55 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Improved signature-embedding techniques against backdoor attacks on DNN models Akira Fujimoto, Yuntao Wang, Atsuko Miyaji (OU) ICSS2023-87 |
In recent years, machine learning, particularly deep learning, has made remarkable strides, and has great impact on our ... [more] |
ICSS2023-87 pp.129-136 |
AP |
2024-03-15 10:25 |
Fukui |
UNIVERSITY OF FUKUI (Primary: On-site, Secondary: Online) |
A Study on Path loss characteristics estimation methods considering geographical conditions for designing narrowband DR-IoT communication system Takato Ikegame, Naoki Ikeda, Motonari Imai, Tetsushi Ikegami (Meiji Univ.), Mineo Takai (Osaka Univ.), Susumu Ishihara (Shizuoka Univ.), Arata Kato, Shugo Kajita (STE) AP2023-212 |
A versatile variable-range IoT communication system using the VHF-High band, Diversified-Range IoT (DR-IoT) is being con... [more] |
AP2023-212 pp.63-67 |
CAS, CS |
2024-03-15 14:45 |
Okinawa |
|
Exploring Uniform Convergence in Neural Networks and its Implication on Generalization Error Zong Xianzhe, Hiroshi Tamura (CHUO Univ.) CAS2023-135 CS2023-128 |
Uniform Convergence, a well-established framework for evaluating generalization in traditional Machine Learning, frequen... [more] |
CAS2023-135 CS2023-128 pp.134-139 |
NLP, MSS |
2024-03-14 10:00 |
Misc. |
Kikai-Shinko-Kaikan Bldg. |
Extraction of Traffic Accident High-Risk Areas Using Deep Learning of Map Images and Grad-CAM Kaito Arase, Tsuyoshi Migita, Norikazu Takahashi (Okayama Univ.) MSS2023-86 NLP2023-138 |
An attempt has been made to predict the traffic accident risk of each map tile image at zoom level 17 using a Convolutio... [more] |
MSS2023-86 NLP2023-138 pp.71-76 |
IE, MVE, CQ, IMQ (Joint) [detail] |
2024-03-13 14:50 |
Okinawa |
Okinawa Sangyo Shien Center (Primary: On-site, Secondary: Online) |
Evaluating the Ranking Performance of Transferable Influencer Identification Methods with a Focus on Follower Counts of Influencers Kota Tahara, Sho Tsugawa (UT) CQ2023-76 |
Identifying influencers on social media who can spread information to many other users is one of the important research ... [more] |
CQ2023-76 pp.32-37 |
NLP, MSS |
2024-03-14 15:15 |
Misc. |
Kikai-Shinko-Kaikan Bldg. |
Zero-shot class separation degree of the feature extractor Chisato Takahashi, Kenya Jin'no (Tokyo City Univ.) MSS2023-95 NLP2023-147 |
Network Architecture Search (NAS) is a method to automatically search for the optimal structure of a neural network. Sin... [more] |
MSS2023-95 NLP2023-147 pp.115-118 |
IE, MVE, CQ, IMQ (Joint) [detail] |
2024-03-15 16:10 |
Okinawa |
Okinawa Sangyo Shien Center (Primary: On-site, Secondary: Online) |
Study of Sperm Quality Assessment from Video Data Sigit Adinugroho, Atsushi Nakazawa (Okayama University) IMQ2023-91 IE2023-146 MVE2023-120 |
Human sperm quality assessment is necessary for a successful assisted reproduction program. Current assessment still rel... [more] |
IMQ2023-91 IE2023-146 MVE2023-120 pp.420-424 |
NC, MBE (Joint) |
2024-03-12 14:45 |
Tokyo |
The Univ. of Tokyo (Primary: On-site, Secondary: Online) |
Visualization of the learning process of ResNet revealing its learning dynamics Ryodo Yuge, Takashi Shinozaki (Kindai Univ.) NC2023-59 |
We visualize the impact of skip connections, a key element in residual networks (ResNet), and visualize its impact on th... [more] |
NC2023-59 p.94 |
EMM |
2024-03-02 16:20 |
Overseas |
Day1:JEJU TECHNOPARK, Day2:JEJU Business Agency |
[Fellow Memorial Lecture]
Application of associative memory models to watermarking models Masaki Kawamura (Yamaguchi Univ.) EMM2023-93 |
We proposed a new method called the associative watermarking method, which is an extension of the zero-watermarking meth... [more] |
EMM2023-93 pp.23-27 |
HCS |
2024-03-02 12:05 |
Shizuoka |
Tokoha University(Shizuoka-Kusanagi Campus) |
Estimation of willingness to participate in other's conversation by using deep learning of facial expression measurements Kohei Yamamoto, Jiro Okuda (Kyoto Sangyo Univ.) HCS2023-92 |
In recent years, there has been much interest in developing agents that can join conversations among multiple people and... [more] |
HCS2023-92 pp.25-30 |
AI |
2024-03-01 14:40 |
Aichi |
Room0221, Bldg.2-C, Nagoya Institute of Technology |
Request span extraction from dialog with Heterogeneous Graph Attention Networks Naoki Mizumoto, Katsuhide Fujita (TUAT) AI2023-41 |
In this study, we formulate the problem of extracting user requests from the dialogue history as a ``span extraction pro... [more] |
AI2023-41 pp.25-30 |
R |
2024-02-29 16:20 |
Shimane |
|
Algorithm of evaluating network performance for resilience analysis Kotaro Fujikura, Natsumi Takahashi, Tetsushi Yuge (NDA) R2023-61 |
Resilience in engineering is the ability of a system to maintain its functionality and to recover quickly and effectivel... [more] |
R2023-61 pp.36-41 |
NS, IN (Joint) |
2024-02-29 10:10 |
Okinawa |
Okinawa Convention Center |
Analysis of Wireless Link for Mobile Communication Devices Using a Machine Learning Model Yuki Kanto, Kohei Watabe (Nagaoka Univ. of Tech.) IN2023-67 |
In recent years, mobile communication devices have been providing various services via high-speed and high-capacity wire... [more] |
IN2023-67 pp.13-18 |
NS, IN (Joint) |
2024-02-29 11:35 |
Okinawa |
Okinawa Convention Center |
AP Cooperative Mobility Control for Individual Terminal Traffic Intensity in Infrastructural Ad Hoc Network Jingcheng Huang, Tutomu Murase (Nagoya Univ..) IN2023-70 |
In this paper, we propose an AP movement control method to maximize throughput in ad hoc networks with minimal movement ... [more] |
IN2023-70 pp.31-36 |
NS, IN (Joint) |
2024-02-29 11:35 |
Okinawa |
Okinawa Convention Center |
Identification Method of Vulnerable Target Areas for Crossfire Attacks Tianyu Wang, Noriaki Kamiyama (Ritsumeikan Univ.) NS2023-195 |
CFA(Crossfire Attack)is distinguished from other DDoS(Distributed Denial of Service)attacks by its characteristic of tar... [more] |
NS2023-195 pp.137-142 |
NS, IN (Joint) |
2024-03-01 09:20 |
Okinawa |
Okinawa Convention Center |
Power Consumption Optimization Method Adaptable to Network Bandwidth Fluctuation for Distributed Video Analysis System based on Gene Regulatory Network Seishiro Inoue, Masaaki Yamauchi, Daichi Kominami, Hideyuki Shimonishi, Masayuki Murata (Osaka Univ.) IN2023-94 |
To construct a digital twin, we have to analyze a large amount of video data in real-time to recognize real-world situat... [more] |
IN2023-94 pp.171-176 |