IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 177 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
VLD, HWS [detail] 2022-03-08
13:25
Online Online A Study on Small Area Circuits for CMOS Image Sensors with Message Authentication Codes (1) -- Drive Circuit and Pixel Array Configuration --
Yoshihiro Akamatsu, Hiroaki Ogawa, Tatsuya Oyama, Hayato Tatsuno, Yu Sekioka, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ) VLD2021-97 HWS2021-74
In edge AI, the information acquired by sensors is classified or recognized at the edge, and therefore, guaranteeing the... [more] VLD2021-97 HWS2021-74
pp.117-122
ICSS, IPSJ-SPT 2022-03-08
13:00
Online Online Remote-Control System for Securing IoT Devices
Masaru Takeuchi (JDC), Yohei Watanabe (UEC/ジャパンデータコム), Naoto Yanai (OU/ジャパンデータコム), Tatsuya Takehisa (Nisshin), Junji Shikata (YNU), Koji Nakao (NICT) ICSS2021-73
The number of malwares targeting IoT devices increases, and security issues in many systems such as critical infrastruct... [more] ICSS2021-73
pp.87-92
CAS, CS 2022-03-04
14:35
Online Online Unrolled Architecture oriented Countermeasure Circuit for Low-power Cryptography Midori128 and its Evaluation
Shunsuke Miwa, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2021-96 CS2021-98
The number of IoT devices is growing rapidly, ensuring security in those devices is an important issue. Lightweight bloc... [more] CAS2021-96 CS2021-98
pp.118-123
IA 2022-01-28
13:35
Tokyo Kikai-Shinko-Kaikan Bldg.
(Primary: On-site, Secondary: Online)
A Feature Data Distribution Method for Human Tracking on Multiple Cameras Systems
Satoru Matsumoto, Tomoki Yoshihisa (Osaka Univ.) IA2021-53
Due to the recent prevalence of security cameras, cameras are deployed at many locations. One of the applications using ... [more] IA2021-53
pp.1-4
RCS, SIP, IT 2022-01-20
09:55
Online Online A study on Complexity Reduction and Performance Improvement of Polar Coded Chaos Modulation Utilizing Multi-purpose Frozen Bits
Keisuke Asano, Mamoru Okumura, Takumi Abe, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) IT2021-29 SIP2021-37 RCS2021-197
In recent years, fifth-generation mobile communications system (5G) has been deployed, and the communications of confide... [more] IT2021-29 SIP2021-37 RCS2021-197
pp.7-12
RCS 2021-10-21
10:50
Online Online Beamforming Design and Secrecy capacity analysis for Cell-Free massive MIMO
Kengo Ando (UEC), Hiroki Iimori, Giuseppe Abreu (JUB), Koji Ishibashi (UEC) RCS2021-120
In this paper, we investigate a secure beamforming (BF) design for cell-free massive multiple input mul tiple output (CF... [more] RCS2021-120
pp.13-18
ICTSSL, IEE-SMF, IN 2021-10-21
09:25
Online Online A Phone Adaptor for Repulsing Telephone Scams
Haruki Ishikawa, Hiroaki Hata (Fukui KOSEN) ICTSSL2021-19
The number of victims of telephone scams remains high, and the total amount of damage in 2020 is said to be over 28 bill... [more] ICTSSL2021-19
pp.7-11
IA 2021-10-15
16:50
Online Online Malware Traffic Detection at Certain Time Using IP Flow Information
Seiya Komatsu, Yusei Katsura, Masatoshi Kakiuchi, Ismail Arai, Kazutoshi Fujikawa (NAIST) IA2021-27
The damage caused by the activities of malware such as botnets and ransomware has become a social problem. In order to d... [more] IA2021-27
pp.6-11
PRMU 2021-10-09
11:15
Online Online Path dependence of latent personal characteristic features in swiping behavior
Kazuki Sakai, Josuke Kuroiwa, Tomohiro Odaka, Haruhiko Sirai (Fukui Univ.), Izumi Suwa (Jin-ai Women's College) PRMU2021-23
The purpose of this paper is to investigate the path dependency of personal authentication using latent personal charact... [more] PRMU2021-23
pp.40-45
IN, NS, CS, NV
(Joint)
2021-09-09
14:05
Online Online A Machine Learning Based Network Intrusion Detection System with Appling Different Algorithms in Multiple Stages
Seiichi Sasa, Hiroyuki Suzuki, Akio Koyama (Yamagata Univ.) NS2021-63
In recent years, the rapid development of Information and Communication Technology (ICT) has led to the provision of a w... [more] NS2021-63
pp.36-41
RCS 2021-06-23
10:20
Online Online A Study on Performance Improvement of Polar Coded-Radio Wave Encrypted Modulation by CRC Code Concatenation
Keisuke Asano, Mamoru Okumura, Takumi Abe, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) RCS2021-34
In recent years, fifth-generation mobile communications system (5G) has been deployed, and the number of Internet of thi... [more] RCS2021-34
pp.31-36
RCS 2021-06-23
10:30
Online Online A Study on Secret Key Sharing Using Time-Division Duplex Channel Information in Radio-Wave Encrypted Modulation
Takumi Abe, Mamoru Okumura, Keisuke Asano, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) RCS2021-35
In recent years, cyber-attacks targeting Internet of things (IoT) terminals have been increasing. As a countermeasure, e... [more] RCS2021-35
pp.37-42
ISEC 2021-05-19
11:35
Online Online [Invited Talk] Efficient blockchain-based IoT firmware update considering distribution incentives (from IDC 2021)
Tatsuhiro Fukuda (Tsukuba Univ.), Kazumasa Omote (Tsukuba Univ./NICT) ISEC2021-4
This paper proposes a firmware distribution method that provides incentives for distributors to help with distribu- tion... [more] ISEC2021-4
p.18
HWS, VLD [detail] 2021-03-04
13:25
Online Online A Low-Latency Memory Encryption Scheme with Tweakable Block Cipher and Its Hardware Design
Maya Oda, Rei Ueno, Naofumi Homma (Tohoku Univ.), Akiko Inoue, Kazuhiko Minematsu (NEC) VLD2020-83 HWS2020-58
In this paper, we propose a highly efficient memory protection method based on the Tweakable block cipher (TBC). The lat... [more] VLD2020-83 HWS2020-58
pp.85-90
ICSS, IPSJ-SPT 2021-03-01
10:25
Online Online Construction of Vulnerability Evaluation System with Machine Learning Methods
Ryu Watanabe, Takashi Matsunaka, Ayumu Kubota (KDDIR), Junpei Urakawa (KDS/KDDIR) ICSS2020-29
Recently, the cyberattacks aimed at software vulnerabilities are more popular and powerful. Therefore, various incidents... [more] ICSS2020-29
pp.19-24
ICSS, IPSJ-SPT 2021-03-01
14:30
Online Online A path authentication framework based on One-way cross networks
Kosuke Ishibashi, Masakazu Soshi (Hiroshima City Univ.) ICSS2020-33
Since MANETs can transmit information between mobile devices, it is critically important to guarantee that the transmitt... [more] ICSS2020-33
pp.43-48
AI 2021-02-12
16:30
Online Online A Defense Method for Machine Learning Poisoning Attacks in IoT Environments Considering the Removal Priority of Poisonous Data
Tomoki Chiba, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga (UEC) AI2020-36
In recent years, machine learning has been attracting attention for its potential to further enrich people's lives. Howe... [more] AI2020-36
pp.73-78
IN 2021-01-18
15:50
Online Online [Invited Talk] Risk Analysis Methods and Actual Conditions in Cyber Security
Kentaro Sonoda, Haruka Nakashima (NEC) IN2020-49
Risks in corporations mean business risks, and a cyber security (cyber attack) is positioned as one of the important bus... [more] IN2020-49
p.37
IT 2020-12-03
16:40
Online Online Implementation and security evaluation of wiretap channel coding in noisy channels
Koutaro Takasaki, Tomohiro Ogawa (UEC) IT2020-62
In wiretap channel coding by Wyner,one can transmit messages to a legitimate receiver reliably without giving any inform... [more] IT2020-62
pp.206-211
CPSY, DC, IPSJ-ARC [detail] 2020-07-31
17:30
Online Online An Area Reduction Oriented Controller Augmentation Method Based on Functionally Equivalent Finite State Machine Generation
Atsuya Tsujikawa, Toshinori Hosokawa (Nihon Univ.), Masayoshi Yoshimura (Kyoto Sangyo Univ.) CPSY2020-15 DC2020-15
In recent year, controller augmentation has been used for design-for-testability and design-for-security at register tra... [more] CPSY2020-15 DC2020-15
pp.93-98
 Results 21 - 40 of 177 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan