IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 126 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SS, IPSJ-SE, KBSE [detail] 2022-07-28
16:30
Hokkaido Hokkaido-Jichiro-Kaikan (Sapporo)
(Primary: On-site, Secondary: Online)
Deep Learning Power Analysis Against Protected PRINCE
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) SS2022-4 KBSE2022-14
In recent years, with the development of deep learning, AI has been incorporated in the field of cyber security. On the ... [more] SS2022-4 KBSE2022-14
pp.19-24
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-19
16:15
Online Online Security Assessment and Countermeasures for Magnetic Malfunction of Electromagnetic Relays
Takumi Owada, Kazuki Tachibana, Tsutomu Matsumoto (YNU) ISEC2022-14 SITE2022-18 BioX2022-39 HWS2022-14 ICSS2022-22 EMM2022-22
Relays are used in many electrical and electronic devices, including switches and sensors. Some relays are electromagnet... [more] ISEC2022-14 SITE2022-18 BioX2022-39 HWS2022-14 ICSS2022-22 EMM2022-22
pp.40-45
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-19
16:40
Online Online Distance Spoofing Detection by LiDAR and Stereo Camera
Ataru Kubo, Yuki Fukatsu, Naoki Yoshida, Tsutomu Matsumoto (YNU) ISEC2022-15 SITE2022-19 BioX2022-40 HWS2022-15 ICSS2022-23 EMM2022-23
Automatic driving vehicles use information obtained from onboard ranging sensors to recognize objects such as surroundin... [more] ISEC2022-15 SITE2022-19 BioX2022-40 HWS2022-15 ICSS2022-23 EMM2022-23
pp.46-51
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-19
17:05
Online Online Security Evaluation of Cryptographic Circuits with Laser Sensors by Double-Spot Laser Irradiation
Masaki Chikano, Naoki Yoshida, Junichi Sakamoto, Syungo Hayashi, Tsutomu Matsumoto (YNU) ISEC2022-16 SITE2022-20 BioX2022-41 HWS2022-16 ICSS2022-24 EMM2022-24
A fault injection attack is an attack method that intentionally injects faults into a device to cause it to malfunction,... [more] ISEC2022-16 SITE2022-20 BioX2022-41 HWS2022-16 ICSS2022-24 EMM2022-24
pp.52-57
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-20
13:50
Online Online An overview of the secrecy of patent applications in the Japanese Law
Makoto Koike (MK Microwave) ISEC2022-23 SITE2022-27 BioX2022-48 HWS2022-23 ICSS2022-31 EMM2022-31
Economic security promotion law enacted on May 11, 2022 includes the provisions to keep patent application secret in Jap... [more] ISEC2022-23 SITE2022-27 BioX2022-48 HWS2022-23 ICSS2022-31 EMM2022-31
pp.88-97
SANE 2022-05-24
09:30
Kanagawa Information Technology R & D Center, MITSUBISHI Electric Corp.
(Primary: On-site, Secondary: Online)
An Overview of Specific Emitter Identification (SEI) Technology and its Latest R&D Trends
Masaaki Kobayashi (AOCJ) SANE2022-2
Specific Emitter Identification (SEI) technology for electronic warfare, also known as radio fingerprinting, has been ac... [more] SANE2022-2
pp.7-11
ICSS, IPSJ-SPT 2022-03-07
12:50
Online Online am I infected? A New Web Service to Inspect End Users' IoT Devices for Malware Infection and Vulnerabilities
Songwei He, Takaya Noma, Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2021-58
IoT devices have become prevalent in recent years, but unfortunately, many devices are infected by malware due to their ... [more] ICSS2021-58
pp.1-6
ICSS, IPSJ-SPT 2022-03-07
13:30
Online Online Time Efficient Risk Assessment Tool for IoT Systems
Rajulapati Shourya, Takashi Kawauchi (Hitachi) ICSS2021-60
We have developed an integrated security design platform that provides security analysis independent of the consultant's... [more] ICSS2021-60
p.13
IA, SITE, IPSJ-IOT [detail] 2022-03-07
14:45
Kyoto Kyoto University, Yoshida Campus
(Primary: On-site, Secondary: Online)
A Research of U.K Telecommunications (Security) Act 2021 -- Toward a Study of How to Change Information Security into Mandatory --
Yusuke Tachibana (FIT) SITE2021-53 IA2021-66
In December 2021, the UK passed the Telecommunications (Security) Act 2021. This act requires telecom operators to take ... [more] SITE2021-53 IA2021-66
pp.45-51
VLD, HWS [detail] 2022-03-08
17:15
Online Online Development of a Test Environment for Attack-Resistance Evaluation of Matrix Direct ToF Lidar
Masato Suzuki, Daisuke Fujimoto, Yuichi Hayashi (NAIST) VLD2021-105 HWS2021-82
Matrix-type Direct Time of flight (dToF) Lidar, which enables high-resolution and high-speed acquisition of distance inf... [more] VLD2021-105 HWS2021-82
pp.164-169
CAS, CS 2022-03-04
14:10
Online Online Secure In-vehicle System using Authenticated Encryption Midori-OTR and its Implementation Evaluation
Daichi Hirose, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2021-95 CS2021-97
In recent years, many electronic control units called ECUs have been installed in automobiles to perform various functio... [more] CAS2021-95 CS2021-97
pp.112-117
ICSS 2021-11-30
10:20
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
Monitoring IPv6 packets by dynamic routing in a LAN configured with IPv4
Yuki Yagi, Hideya Ochiai, Hiroshi Esaki (the Univ. of Tokyo) ICSS2021-56
With IPv4 address exhaustion, the transition to IPv6 has been progressing in recent years, but the security measures for... [more] ICSS2021-56
pp.61-66
CS 2021-10-15
10:15
Online Online A study on traffic monitoring method for control networks
Ginga Katsurai, Hiroaki Mukai, Tetsuya Yokotani (KIT) CS2021-56
In recent years, cyber attacks targeting control systems such as buildings and factories have become apparent. There is ... [more] CS2021-56
pp.20-25
IN, NS, CS, NV
(Joint)
2021-09-09
14:05
Online Online A Machine Learning Based Network Intrusion Detection System with Appling Different Algorithms in Multiple Stages
Seiichi Sasa, Hiroyuki Suzuki, Akio Koyama (Yamagata Univ.) NS2021-63
In recent years, the rapid development of Information and Communication Technology (ICT) has led to the provision of a w... [more] NS2021-63
pp.36-41
SANE 2021-05-13
10:25
Online Online New Developments in Electronic Warfare Technology Viewed as a Military-civilian Dual-use Technology
Masaaki Kobayashi () SANE2021-2
In the military field, various types of electromagnetic waves are used for surveillance, target acquisition, fire contro... [more] SANE2021-2
pp.5-10
IN 2021-01-18
15:50
Online Online [Invited Talk] Risk Analysis Methods and Actual Conditions in Cyber Security
Kentaro Sonoda, Haruka Nakashima (NEC) IN2020-49
Risks in corporations mean business risks, and a cyber security (cyber attack) is positioned as one of the important bus... [more] IN2020-49
p.37
ICD, HWS [detail] 2020-10-26
10:30
Online Online Laser-based Attacks on Ultrasonic Sensors
Tatsuya Suehiro, Taku Toyama, Junichi Sakamoto, Tsutomu Matsumoto (Yokohama National Univ.) HWS2020-28 ICD2020-17
We examine the instrumentation security threat of irradiating laser for a piezoelectric MEMS transducer in a MEMS ultras... [more] HWS2020-28 ICD2020-17
pp.18-23
ICD, HWS [detail] 2020-10-26
13:50
Online Online Security Threats and Preventions for Photonics Computing Model
Junko Takahashi, Koji Chida, Takeshi Sakamoto (NTT) HWS2020-33 ICD2020-22
This paper presents security analysis on photonic computing models in All-Photonics Network (APN). New computing archite... [more] HWS2020-33 ICD2020-22
pp.48-53
ET 2020-03-07
13:50
Kagawa National Institute of Technology, Kagawa Collage
(Cancelled but technical report was issued)
Redefining Risk Assessment Based on Interpretation of Viewpoints and Researching Validity by Visualization System
Kazuya Nitta, Naka Gotoda, Yusuke Kometani, Shigemi Ono, Rihito Yaegashi, Toshihiro Hayashi, Giro Imai, Koji Kida, Keizo Saisho (Kagawa Univ) ET2019-92
While information security threats become more sophisticated and complicated, an increasing number of organizations have... [more] ET2019-92
pp.93-98
HWS, VLD [detail] 2020-03-07
11:20
Okinawa Okinawa Ken Seinen Kaikan
(Cancelled but technical report was issued)
Color Alteration Attacks on Lane Detection Function
Fumiki Miyazono, Naoki Yoshida, Tsutomu Matsumoto (Yokohama National Univ.) VLD2019-140 HWS2019-113
Various functions have been incorporated into automobiles to realize fully automatic driving. In particular, the functio... [more] VLD2019-140 HWS2019-113
pp.269-274
 Results 21 - 40 of 126 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan