IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 41 - 60 of 239 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SP, EA, SIP 2020-03-02
13:00
Okinawa Okinawa Industry Support Center
(Cancelled but technical report was issued)
Vulnerability investigation of speaker verification against black-box adversarial attacks
Hiroto Kai, Sayaka Shiota, Hitoshi Kiya (TMU) EA2019-106 SIP2019-108 SP2019-55
Recently,vulnerability against adversarial attacks is being feared for machine learning-based systems.Adversarial attack... [more] EA2019-106 SIP2019-108 SP2019-55
pp.29-33
SANE 2019-11-28
16:15
Osaka OIT UMEDA Campus Experimental Evaluation of Aircraft Position Verification Method using TDOA
Junichi Naganawa, Hiromi Miyazaki (ENRI) SANE2019-75
ADS-B (Automatic Dependent Surveillance - Broadcast) is one of the next generation aeronautical surveillance systems.
... [more]
SANE2019-75
pp.29-34
KBSE, SC 2019-11-08
15:40
Nagano Shinshu University A Case-study for Developpment and Verification of an Embedded System
Kozo Okano, Shinpei Ogata, Miki Natsume (Shinshu Univ.) KBSE2019-30 SC2019-27
Through a development of an embedded system and design verification, we report on the issues and workload when novice en... [more] KBSE2019-30 SC2019-27
pp.41-46
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
13:10
Kochi Kochi University of Technology A Formal Approach to Verifying Trojan-freeness of Cryptographic Circuits Based on Galois-Field Arithmetic
Akira Ito, Rei Ueno, Naofumi Homma (Tohoku Univ.) ISEC2019-26 SITE2019-20 BioX2019-18 HWS2019-21 ICSS2019-24 EMM2019-29
This paper proposes a formal method for verifying whether Hardware Trojan (HT) exists or not (i.e., HT-freeness) in cryp... [more] ISEC2019-26 SITE2019-20 BioX2019-18 HWS2019-21 ICSS2019-24 EMM2019-29
pp.133-138
ICM 2019-07-11
13:25
Hokkaido   Scalable method for impact range detection against additional network rules
Yutaka Takita, Masatake Miyabe, Hiroshi Tomonaga, Naoki Oguchi (Fujitsu Labs) ICM2019-7
We propose the scalable and strict impact-range detection method for network verification, utilizing the concept of “Pac... [more] ICM2019-7
pp.7-12
CS 2019-07-04
09:00
Kagoshima Amami City Social Welfare Center Trust-based Verification Attack Prevention Scheme using Tendency of Contents Request on NDN
Hironori Nakano, Hiroya Kato, Shuichiro Haruta, Masashi Yoshida, Iwao Sasase (Keio Univ.) CS2019-13
In this paper, we propose a trust-based verification attack prevention scheme using tendency of contents request on NDN.... [more] CS2019-13
pp.1-6
QIT
(2nd)
2019-05-21
15:10
Fukuoka Kyushu University, Chikushi Campus Resource-efficient verification of quantum computing using Serfling's bound
Yuki Takeuchi (NTT), Atul Mantri (Univ. of Edinburgh), Tomoyuki Morimae (Kyoto Univ.), Akihiro Mizutani (Mitsubishi Electric), Joseph F. Fitzsimons (Horizon Quantum Computing)
Verifying quantum states is central to certifying the correct operation of various quantum information processing tasks.... [more]
ASN, MoNA, IPSJ-MBL, IPSJ-UBI [detail] 2019-03-04
11:15
Tokyo The University of Tokyo, Komaba Campus Abstraction of Emulation for Sensor IoT Devices
Futoshi Hirose (JAIST), Tsubasa Yumura (NICT), Yoichi Shinoda (JAIST) ASN2018-104
IoT (Internet of Things) makes it easy to measure and collect a wide range of environmental information. IoT devices eq... [more] ASN2018-104
pp.49-54
SS 2019-03-04
17:10
Okinawa   Formal STAMP Modelling toward Safety Verification of Hybrid Systems
Mitsuaki Tsuji, Toshinori Takai (NAIST), Masafumi Katahira, Naoki Ishihama (JAXA), Kazuki Kakimoto, Hajimu Iida (NAIST) SS2018-67
Safety-critical systems, for example, autonomous vehicles and space systems, are required to be safe and reliable. Recen... [more] SS2018-67
pp.91-96
SANE 2019-01-25
16:05
Nagasaki Nagasaki Prefectural Art Museum Construction of Development Environment for High Reliability and Development Efficiency of Nano Satellite Orbit Control Software
Yota Uehara, Shinichi Kimura (TUS) SANE2018-109
In recent years, requirement for micro satellites have diversified with the activation of micro satellite development, a... [more] SANE2018-109
pp.109-113
DC 2018-12-14
17:15
Okinawa Miyako Seisyonen-No-Ie [Invited Talk] Implementation of Security Function Utilizing Safety Verification Function for Collaboration of Security and Safety
Nobuyasu Kanekawa (Hitachi) DC2018-70
This presentation discusses what is artificial intelligence (AI), why safety is the problems for the artificial intellig... [more] DC2018-70
pp.59-64
QIT
(2nd)
2018-11-27
16:10
Tokyo The University of Tokyo Quantum computational universality of hypergraph states with Pauli-X and Z basis measurements
Yuki Takeuchi (NTT), Tomoyuki Morimae (Kyoto Univ./JST), Masahito Hayashi (Nagoya Univ./SUSTech/NUS)
In this talk, we construct a universal hypergraph state that only requires $X$ and $Z$-basis measurements for universal ... [more]
SANE 2018-10-12
09:30
Tokyo The University of Electro-Communications Considering Latency in TDOA-based ADS-B Position Verification
Junichi Naganawa, Hiromi Miyazaki (ENRI) SANE2018-44
ADS-B (Automatic Dependent Surveillance - Broadcast) is one of the next generation aeronautical surveillance systems.
... [more]
SANE2018-44
pp.1-6
MBE, BioX 2018-07-27
13:30
Tottori   Person Authentication Using Evoked EEGs by Inaudible Auditory Stimulation -- Approaches for Improvement of Verification Performance --
Kenta Kanbe, Takehiro Maruoka, Isao Nakanishi (Tottori Univ.) BioX2018-17 MBE2018-25
A brain wave (EEG) is a suitable biometrics for realizing continuous authentication in user management. The authors are ... [more] BioX2018-17 MBE2018-25
pp.57-62
BioX, ITE-ME, ITE-IST 2018-05-24
15:45
Ishikawa Kanazawa Univ. Nishimachi Satelite Plaza A probabilistic verification method using multi-feature for environment-robust biometrics
Hidetsugu Uchida, Narishige Abe, Shigefumi Yamada (FUJITSU LAB.) BioX2018-3
This paper reports a probabilistic verification method using multi-feature for environment-robust biometrics. In biometri... [more] BioX2018-3
pp.21-26
SIP, EA, SP, MI
(Joint) [detail]
2018-03-19
13:00
Okinawa   [Poster Presentation] Speaker verification based on non-linear bandwidth extension considering aliasing artifacts for super-wideband applications
Haruna Miyamoto, Sayaka Shiota, Hitoshi Kiya (Tokyo Metropolitan Univ.) EA2017-110 SIP2017-119 SP2017-93
This paper has two aims that are to propose a novel bandwidth extension (BWE) method considering aliasing artifacts, and... [more] EA2017-110 SIP2017-119 SP2017-93
pp.51-55
SIP, EA, SP, MI
(Joint) [detail]
2018-03-19
13:00
Okinawa   [Poster Presentation] Text-dependent voice liveness detection based on pop-noise detector considering speaker-dependent phoneme information for speaker verification
Shihono Mochizuki, Sayaka Shiota, Hitoshi Kiya (Tokyo Metropolitan Univ.) EA2017-111 SIP2017-120 SP2017-94
This paper proposes a pop-noise (PN) detection method considering speaker-dependent phoneme information for text-depende... [more] EA2017-111 SIP2017-120 SP2017-94
pp.57-62
PRMU, BioX 2018-03-18
10:15
Tokyo   [Invited Talk] Why signature now
Takashi Matsumoto (Cool Design/Waseda University)
Even with a good idea, technology does not see the light of day unless there is a request from society. As of 2018, requ... [more]
PRMU, BioX 2018-03-18
13:30
Tokyo   Investigation of Speaker Verification Performance Using Air and Ear Microphones in Various Acoustic Conditions
Qiongqiong Wang, Koji Okabe, Shivangi Mahto, Takafumi Koshinaka (NEC) BioX2017-43 PRMU2017-179
This paper presents an experimental study on speaker verification performances using air and ear microphones in various ... [more] BioX2017-43 PRMU2017-179
pp.43-48
MSS, NLP
(Joint)
2018-03-13
14:55
Osaka   Deductive Verification of real-time safety properties for embedded assembly program using theorem prover Princess
Naoki Odajima (Kanazawa Univ.), Gakuhi Fukuda (Kanazawa Nishikigaoka), Satoshi Yamane (Kanazawa Univ.) MSS2017-84
It is important to verify both the correctness and real-time properties for embedded systems.
In this paper, we propos... [more]
MSS2017-84
pp.35-40
 Results 41 - 60 of 239 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan