Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
VLD, HWS [detail] |
2022-03-08 13:25 |
Online |
Online |
A Study on Small Area Circuits for CMOS Image Sensors with Message Authentication Codes (1)
-- Drive Circuit and Pixel Array Configuration -- Yoshihiro Akamatsu, Hiroaki Ogawa, Tatsuya Oyama, Hayato Tatsuno, Yu Sekioka, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ) VLD2021-97 HWS2021-74 |
In edge AI, the information acquired by sensors is classified or recognized at the edge, and therefore, guaranteeing the... [more] |
VLD2021-97 HWS2021-74 pp.117-122 |
ICSS, IPSJ-SPT |
2022-03-08 13:00 |
Online |
Online |
Remote-Control System for Securing IoT Devices Masaru Takeuchi (JDC), Yohei Watanabe (UEC/ジャパンデータコム), Naoto Yanai (OU/ジャパンデータコム), Tatsuya Takehisa (Nisshin), Junji Shikata (YNU), Koji Nakao (NICT) ICSS2021-73 |
The number of malwares targeting IoT devices increases, and security issues in many systems such as critical infrastruct... [more] |
ICSS2021-73 pp.87-92 |
CAS, CS |
2022-03-04 14:35 |
Online |
Online |
Unrolled Architecture oriented Countermeasure Circuit for Low-power Cryptography Midori128 and its Evaluation Shunsuke Miwa, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2021-96 CS2021-98 |
The number of IoT devices is growing rapidly, ensuring security in those devices is an important issue. Lightweight bloc... [more] |
CAS2021-96 CS2021-98 pp.118-123 |
IA |
2022-01-28 13:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. (Primary: On-site, Secondary: Online) |
A Feature Data Distribution Method for Human Tracking on Multiple Cameras Systems Satoru Matsumoto, Tomoki Yoshihisa (Osaka Univ.) IA2021-53 |
Due to the recent prevalence of security cameras, cameras are deployed at many locations. One of the applications using ... [more] |
IA2021-53 pp.1-4 |
RCS, SIP, IT |
2022-01-20 09:55 |
Online |
Online |
A study on Complexity Reduction and Performance Improvement of Polar Coded Chaos Modulation Utilizing Multi-purpose Frozen Bits Keisuke Asano, Mamoru Okumura, Takumi Abe, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) IT2021-29 SIP2021-37 RCS2021-197 |
In recent years, fifth-generation mobile communications system (5G) has been deployed, and the communications of confide... [more] |
IT2021-29 SIP2021-37 RCS2021-197 pp.7-12 |
RCS |
2021-10-21 10:50 |
Online |
Online |
Beamforming Design and Secrecy capacity analysis for Cell-Free massive MIMO Kengo Ando (UEC), Hiroki Iimori, Giuseppe Abreu (JUB), Koji Ishibashi (UEC) RCS2021-120 |
In this paper, we investigate a secure beamforming (BF) design for cell-free massive multiple input mul tiple output (CF... [more] |
RCS2021-120 pp.13-18 |
ICTSSL, IEE-SMF, IN |
2021-10-21 09:25 |
Online |
Online |
A Phone Adaptor for Repulsing Telephone Scams Haruki Ishikawa, Hiroaki Hata (Fukui KOSEN) ICTSSL2021-19 |
The number of victims of telephone scams remains high, and the total amount of damage in 2020 is said to be over 28 bill... [more] |
ICTSSL2021-19 pp.7-11 |
IA |
2021-10-15 16:50 |
Online |
Online |
Malware Traffic Detection at Certain Time Using IP Flow Information Seiya Komatsu, Yusei Katsura, Masatoshi Kakiuchi, Ismail Arai, Kazutoshi Fujikawa (NAIST) IA2021-27 |
The damage caused by the activities of malware such as botnets and ransomware has become a social problem. In order to d... [more] |
IA2021-27 pp.6-11 |
PRMU |
2021-10-09 11:15 |
Online |
Online |
Path dependence of latent personal characteristic features in swiping behavior Kazuki Sakai, Josuke Kuroiwa, Tomohiro Odaka, Haruhiko Sirai (Fukui Univ.), Izumi Suwa (Jin-ai Women's College) PRMU2021-23 |
The purpose of this paper is to investigate the path dependency of personal authentication using latent personal charact... [more] |
PRMU2021-23 pp.40-45 |
IN, NS, CS, NV (Joint) |
2021-09-09 14:05 |
Online |
Online |
A Machine Learning Based Network Intrusion Detection System with Appling Different Algorithms in Multiple Stages Seiichi Sasa, Hiroyuki Suzuki, Akio Koyama (Yamagata Univ.) NS2021-63 |
In recent years, the rapid development of Information and Communication Technology (ICT) has led to the provision of a w... [more] |
NS2021-63 pp.36-41 |
RCS |
2021-06-23 10:20 |
Online |
Online |
A Study on Performance Improvement of Polar Coded-Radio Wave Encrypted Modulation by CRC Code Concatenation Keisuke Asano, Mamoru Okumura, Takumi Abe, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) RCS2021-34 |
In recent years, fifth-generation mobile communications system (5G) has been deployed, and the number of Internet of thi... [more] |
RCS2021-34 pp.31-36 |
RCS |
2021-06-23 10:30 |
Online |
Online |
A Study on Secret Key Sharing Using Time-Division Duplex Channel Information in Radio-Wave Encrypted Modulation Takumi Abe, Mamoru Okumura, Keisuke Asano, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) RCS2021-35 |
In recent years, cyber-attacks targeting Internet of things (IoT) terminals have been increasing. As a countermeasure, e... [more] |
RCS2021-35 pp.37-42 |
ISEC |
2021-05-19 11:35 |
Online |
Online |
[Invited Talk]
Efficient blockchain-based IoT firmware update considering distribution incentives (from IDC 2021) Tatsuhiro Fukuda (Tsukuba Univ.), Kazumasa Omote (Tsukuba Univ./NICT) ISEC2021-4 |
This paper proposes a firmware distribution method that provides incentives for distributors to help with distribu- tion... [more] |
ISEC2021-4 p.18 |
HWS, VLD [detail] |
2021-03-04 13:25 |
Online |
Online |
A Low-Latency Memory Encryption Scheme with Tweakable Block Cipher and Its Hardware Design Maya Oda, Rei Ueno, Naofumi Homma (Tohoku Univ.), Akiko Inoue, Kazuhiko Minematsu (NEC) VLD2020-83 HWS2020-58 |
In this paper, we propose a highly efficient memory protection method based on the Tweakable block cipher (TBC). The lat... [more] |
VLD2020-83 HWS2020-58 pp.85-90 |
ICSS, IPSJ-SPT |
2021-03-01 10:25 |
Online |
Online |
Construction of Vulnerability Evaluation System with Machine Learning Methods Ryu Watanabe, Takashi Matsunaka, Ayumu Kubota (KDDIR), Junpei Urakawa (KDS/KDDIR) ICSS2020-29 |
Recently, the cyberattacks aimed at software vulnerabilities are more popular and powerful. Therefore, various incidents... [more] |
ICSS2020-29 pp.19-24 |
ICSS, IPSJ-SPT |
2021-03-01 14:30 |
Online |
Online |
A path authentication framework based on One-way cross networks Kosuke Ishibashi, Masakazu Soshi (Hiroshima City Univ.) ICSS2020-33 |
Since MANETs can transmit information between mobile devices, it is critically important to guarantee that the transmitt... [more] |
ICSS2020-33 pp.43-48 |
AI |
2021-02-12 16:30 |
Online |
Online |
A Defense Method for Machine Learning Poisoning Attacks in IoT Environments Considering the Removal Priority of Poisonous Data Tomoki Chiba, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga (UEC) AI2020-36 |
In recent years, machine learning has been attracting attention for its potential to further enrich people's lives. Howe... [more] |
AI2020-36 pp.73-78 |
IN |
2021-01-18 15:50 |
Online |
Online |
[Invited Talk]
Risk Analysis Methods and Actual Conditions in Cyber Security Kentaro Sonoda, Haruka Nakashima (NEC) IN2020-49 |
Risks in corporations mean business risks, and a cyber security (cyber attack) is positioned as one of the important bus... [more] |
IN2020-49 p.37 |
IT |
2020-12-03 16:40 |
Online |
Online |
Implementation and security evaluation of wiretap channel coding in noisy channels Koutaro Takasaki, Tomohiro Ogawa (UEC) IT2020-62 |
In wiretap channel coding by Wyner,one can transmit messages to a legitimate receiver reliably without giving any inform... [more] |
IT2020-62 pp.206-211 |
CPSY, DC, IPSJ-ARC [detail] |
2020-07-31 17:30 |
Online |
Online |
An Area Reduction Oriented Controller Augmentation Method Based on Functionally Equivalent Finite State Machine Generation Atsuya Tsujikawa, Toshinori Hosokawa (Nihon Univ.), Masayoshi Yoshimura (Kyoto Sangyo Univ.) CPSY2020-15 DC2020-15 |
In recent year, controller augmentation has been used for design-for-testability and design-for-security at register tra... [more] |
CPSY2020-15 DC2020-15 pp.93-98 |