Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SP, EA, SIP |
2020-03-02 13:00 |
Okinawa |
Okinawa Industry Support Center (Cancelled but technical report was issued) |
Vulnerability investigation of speaker verification against black-box adversarial attacks Hiroto Kai, Sayaka Shiota, Hitoshi Kiya (TMU) EA2019-106 SIP2019-108 SP2019-55 |
Recently,vulnerability against adversarial attacks is being feared for machine learning-based systems.Adversarial attack... [more] |
EA2019-106 SIP2019-108 SP2019-55 pp.29-33 |
SANE |
2019-11-28 16:15 |
Osaka |
OIT UMEDA Campus |
Experimental Evaluation of Aircraft Position Verification Method using TDOA Junichi Naganawa, Hiromi Miyazaki (ENRI) SANE2019-75 |
ADS-B (Automatic Dependent Surveillance - Broadcast) is one of the next generation aeronautical surveillance systems.
... [more] |
SANE2019-75 pp.29-34 |
KBSE, SC |
2019-11-08 15:40 |
Nagano |
Shinshu University |
A Case-study for Developpment and Verification of an Embedded System Kozo Okano, Shinpei Ogata, Miki Natsume (Shinshu Univ.) KBSE2019-30 SC2019-27 |
Through a development of an embedded system and design verification, we report on the issues and workload when novice en... [more] |
KBSE2019-30 SC2019-27 pp.41-46 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 13:10 |
Kochi |
Kochi University of Technology |
A Formal Approach to Verifying Trojan-freeness of Cryptographic Circuits Based on Galois-Field Arithmetic Akira Ito, Rei Ueno, Naofumi Homma (Tohoku Univ.) ISEC2019-26 SITE2019-20 BioX2019-18 HWS2019-21 ICSS2019-24 EMM2019-29 |
This paper proposes a formal method for verifying whether Hardware Trojan (HT) exists or not (i.e., HT-freeness) in cryp... [more] |
ISEC2019-26 SITE2019-20 BioX2019-18 HWS2019-21 ICSS2019-24 EMM2019-29 pp.133-138 |
ICM |
2019-07-11 13:25 |
Hokkaido |
|
Scalable method for impact range detection against additional network rules Yutaka Takita, Masatake Miyabe, Hiroshi Tomonaga, Naoki Oguchi (Fujitsu Labs) ICM2019-7 |
We propose the scalable and strict impact-range detection method for network verification, utilizing the concept of “Pac... [more] |
ICM2019-7 pp.7-12 |
CS |
2019-07-04 09:00 |
Kagoshima |
Amami City Social Welfare Center |
Trust-based Verification Attack Prevention Scheme using Tendency of Contents Request on NDN Hironori Nakano, Hiroya Kato, Shuichiro Haruta, Masashi Yoshida, Iwao Sasase (Keio Univ.) CS2019-13 |
In this paper, we propose a trust-based verification attack prevention scheme using tendency of contents request on NDN.... [more] |
CS2019-13 pp.1-6 |
QIT (2nd) |
2019-05-21 15:10 |
Fukuoka |
Kyushu University, Chikushi Campus |
Resource-efficient verification of quantum computing using Serfling's bound Yuki Takeuchi (NTT), Atul Mantri (Univ. of Edinburgh), Tomoyuki Morimae (Kyoto Univ.), Akihiro Mizutani (Mitsubishi Electric), Joseph F. Fitzsimons (Horizon Quantum Computing) |
Verifying quantum states is central to certifying the correct operation of various quantum information processing tasks.... [more] |
|
ASN, MoNA, IPSJ-MBL, IPSJ-UBI [detail] |
2019-03-04 11:15 |
Tokyo |
The University of Tokyo, Komaba Campus |
Abstraction of Emulation for Sensor IoT Devices Futoshi Hirose (JAIST), Tsubasa Yumura (NICT), Yoichi Shinoda (JAIST) ASN2018-104 |
IoT (Internet of Things) makes it easy to measure and collect a wide range of environmental information. IoT devices eq... [more] |
ASN2018-104 pp.49-54 |
SS |
2019-03-04 17:10 |
Okinawa |
|
Formal STAMP Modelling toward Safety Verification of Hybrid Systems Mitsuaki Tsuji, Toshinori Takai (NAIST), Masafumi Katahira, Naoki Ishihama (JAXA), Kazuki Kakimoto, Hajimu Iida (NAIST) SS2018-67 |
Safety-critical systems, for example, autonomous vehicles and space systems, are required to be safe and reliable. Recen... [more] |
SS2018-67 pp.91-96 |
SANE |
2019-01-25 16:05 |
Nagasaki |
Nagasaki Prefectural Art Museum |
Construction of Development Environment for High Reliability and Development Efficiency of Nano Satellite Orbit Control Software Yota Uehara, Shinichi Kimura (TUS) SANE2018-109 |
In recent years, requirement for micro satellites have diversified with the activation of micro satellite development, a... [more] |
SANE2018-109 pp.109-113 |
DC |
2018-12-14 17:15 |
Okinawa |
Miyako Seisyonen-No-Ie |
[Invited Talk]
Implementation of Security Function Utilizing Safety Verification Function for Collaboration of Security and Safety Nobuyasu Kanekawa (Hitachi) DC2018-70 |
This presentation discusses what is artificial intelligence (AI), why safety is the problems for the artificial intellig... [more] |
DC2018-70 pp.59-64 |
QIT (2nd) |
2018-11-27 16:10 |
Tokyo |
The University of Tokyo |
Quantum computational universality of hypergraph states with Pauli-X and Z basis measurements Yuki Takeuchi (NTT), Tomoyuki Morimae (Kyoto Univ./JST), Masahito Hayashi (Nagoya Univ./SUSTech/NUS) |
In this talk, we construct a universal hypergraph state that only requires $X$ and $Z$-basis measurements for universal ... [more] |
|
SANE |
2018-10-12 09:30 |
Tokyo |
The University of Electro-Communications |
Considering Latency in TDOA-based ADS-B Position Verification Junichi Naganawa, Hiromi Miyazaki (ENRI) SANE2018-44 |
ADS-B (Automatic Dependent Surveillance - Broadcast) is one of the next generation aeronautical surveillance systems.
... [more] |
SANE2018-44 pp.1-6 |
MBE, BioX |
2018-07-27 13:30 |
Tottori |
|
Person Authentication Using Evoked EEGs by Inaudible Auditory Stimulation
-- Approaches for Improvement of Verification Performance -- Kenta Kanbe, Takehiro Maruoka, Isao Nakanishi (Tottori Univ.) BioX2018-17 MBE2018-25 |
A brain wave (EEG) is a suitable biometrics for realizing continuous authentication in user management. The authors are ... [more] |
BioX2018-17 MBE2018-25 pp.57-62 |
BioX, ITE-ME, ITE-IST |
2018-05-24 15:45 |
Ishikawa |
Kanazawa Univ. Nishimachi Satelite Plaza |
A probabilistic verification method using multi-feature for environment-robust biometrics Hidetsugu Uchida, Narishige Abe, Shigefumi Yamada (FUJITSU LAB.) BioX2018-3 |
This paper reports a probabilistic verification method using multi-feature for environment-robust biometrics. In biometri... [more] |
BioX2018-3 pp.21-26 |
SIP, EA, SP, MI (Joint) [detail] |
2018-03-19 13:00 |
Okinawa |
|
[Poster Presentation]
Speaker verification based on non-linear bandwidth extension considering aliasing artifacts for super-wideband applications Haruna Miyamoto, Sayaka Shiota, Hitoshi Kiya (Tokyo Metropolitan Univ.) EA2017-110 SIP2017-119 SP2017-93 |
This paper has two aims that are to propose a novel bandwidth extension (BWE) method considering aliasing artifacts, and... [more] |
EA2017-110 SIP2017-119 SP2017-93 pp.51-55 |
SIP, EA, SP, MI (Joint) [detail] |
2018-03-19 13:00 |
Okinawa |
|
[Poster Presentation]
Text-dependent voice liveness detection based on pop-noise detector considering speaker-dependent phoneme information for speaker verification Shihono Mochizuki, Sayaka Shiota, Hitoshi Kiya (Tokyo Metropolitan Univ.) EA2017-111 SIP2017-120 SP2017-94 |
This paper proposes a pop-noise (PN) detection method considering speaker-dependent phoneme information for text-depende... [more] |
EA2017-111 SIP2017-120 SP2017-94 pp.57-62 |
PRMU, BioX |
2018-03-18 10:15 |
Tokyo |
|
[Invited Talk]
Why signature now Takashi Matsumoto (Cool Design/Waseda University) |
Even with a good idea, technology does not see the light of day unless there is a request from society. As of 2018, requ... [more] |
|
PRMU, BioX |
2018-03-18 13:30 |
Tokyo |
|
Investigation of Speaker Verification Performance Using Air and Ear Microphones in Various Acoustic Conditions Qiongqiong Wang, Koji Okabe, Shivangi Mahto, Takafumi Koshinaka (NEC) BioX2017-43 PRMU2017-179 |
This paper presents an experimental study on speaker verification performances using air and ear microphones in various ... [more] |
BioX2017-43 PRMU2017-179 pp.43-48 |
MSS, NLP (Joint) |
2018-03-13 14:55 |
Osaka |
|
Deductive Verification of real-time safety properties for embedded assembly program using theorem prover Princess Naoki Odajima (Kanazawa Univ.), Gakuhi Fukuda (Kanazawa Nishikigaoka), Satoshi Yamane (Kanazawa Univ.) MSS2017-84 |
It is important to verify both the correctness and real-time properties for embedded systems.
In this paper, we propos... [more] |
MSS2017-84 pp.35-40 |