Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM |
2022-01-27 13:25 |
Online |
Online |
Access Control Using Feature Map Transformation With Secret Key for Object Detection Models Teru Nagamori, Hiroki Ito, MaungMaung AprilPyone, Hitoshi Kiya (Tokyo Metro. Univ.) EMM2021-85 |
In this paper, we propose an access control method for object detection models.
The use of transformed images or transf... [more] |
EMM2021-85 pp.7-12 |
NS, NWS (Joint) |
2022-01-28 09:50 |
Online |
Online |
A Study on Optimization of UAV Positioning and C-OFDMA for High Speed and Large Capacity UAV Network Miho Ishigami, Yuichi Kawamoto, Nei Kato (Tohoku Univ.) NS2021-114 |
The use of unmanned aerial vehicle (UAV) networks at backhaul networks for ground-based communications is being consider... [more] |
NS2021-114 pp.25-29 |
SR |
2022-01-25 14:40 |
Online |
Online |
Performance Evaluation of Access Control and Transmission Datarate Adaptation using Redundant Check Information for IEEE 802.11ax Wireless LAN Kazuto Yano, Kenta Suzuki, Babatunde Ojetunde (ATR), Koji Yamamoto (Kyoto Univ.) SR2021-81 |
In order to meet increasing traffic load on wireless communication, the authors have conducted research and development ... [more] |
SR2021-81 pp.103-110 |
OFT |
2022-01-20 16:10 |
Online |
Online |
Remote Operated Optical Fiber Switching Node and Optical Cross-Connect Function on Concatenated Loop Topology Hiroshi Watanabe, Tomohiro Kawano, Chisato Fukai, Ryo Koyama, Kazuhide Nakae, (NTT), Tatsuya Fujimoto (NTT East), Yoshiteru Abe, Kazunori Katayama (NTT) OFT2021-62 |
Due the popularization of future 5G and Beyond 5G, the concatenated loop topology is being studied as way of realizing h... [more] |
OFT2021-62 pp.36-41 |
SeMI |
2022-01-21 14:50 |
Nagano |
(Primary: On-site, Secondary: Online) |
MAC Protocol Design and Analysis of MCST Scheme in Full-duplex Wireless Networks Khun Aung Thura Phyo, Lim Yuto, Tan Yasuo (JAIST) SeMI2021-78 |
Full-duplex (FD) transmission is one of the key drivers for improving spectrum utilization and network capacity.
Many ... [more] |
SeMI2021-78 pp.103-108 |
IN, IA (Joint) |
2021-12-16 17:05 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Primary: On-site, Secondary: Online) |
Evaluation of Processing Delay of Authentication and Authorization Infrastructure for IoT Data Distribution System Using Ticket-based Access Control Masaki Yoshii, Ryohei Banno, Osamu Mizuno (Kogakuin Univ.) IA2021-39 |
We have proposed a new service model based on IoT data distribution using fog computing. It is expected that fog nodes i... [more] |
IA2021-39 pp.44-49 |
CQ, ICM, NS, NV (Joint) |
2021-11-25 17:10 |
Fukuoka |
JR Hakata Stn. Hakata EkiHigashi Rental Room (Primary: On-site, Secondary: Online) |
Access Control with Individual Key Delivery in ICN Yuma Fukagawa (Fukuoka Univ.), Noriaki Kamiyama (Ritsumeikan Univ.) CQ2021-71 |
Information-Centric Networking (ICN), which transfers Interest by the name of content without using DNS (Domain Name Sys... [more] |
CQ2021-71 pp.35-40 |
CQ, ICM, NS, NV (Joint) |
2021-11-26 16:15 |
Fukuoka |
JR Hakata Stn. Hakata EkiHigashi Rental Room (Primary: On-site, Secondary: Online) |
Design and prototyping of a Zero-Trust Access Control Mechanism to Verify User Authenticity Taisho Sasada, Yuto Masuda, Yuzo Taenaka, Youki Kadobayashi, Doudou Fall (NAIST) NS2021-95 |
As telework becomes more widespread, there will be more opportunities to remotely access data required for business from... [more] |
NS2021-95 pp.56-61 |
RCS |
2021-10-22 15:00 |
Online |
Online |
[Poster Presentation]
Investigation of NOMA-Based Highly-Efficient Low-Latency Random Access Kenichi Higuchi (Tokyo Univ. of Science) RCS2021-139 |
In this paper, we introduce some of our recent studies on highly-efficient low-latency random access that realize multi-... [more] |
RCS2021-139 pp.112-119 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-19 10:55 |
Online |
Online |
Rogue Access Point Detection by Using ARP Failure under the MAC Address Duplication Kosuke Igarashi, Hiroya Kato, Iwao Sasase (Keio Univ.) ISEC2021-14 SITE2021-8 BioX2021-15 HWS2021-14 ICSS2021-19 EMM2021-19 |
Detecting a Rogue Access Point (RAP) in Wi-Fi network is imperative. In this paper, we propose RAP detection by using Ad... [more] |
ISEC2021-14 SITE2021-8 BioX2021-15 HWS2021-14 ICSS2021-19 EMM2021-19 pp.28-34 |
RCS |
2021-06-23 13:40 |
Online |
Online |
Investigation of NOMA-based High-Efficient and Low-Latency HARQ Method for URLLC Ryota Kobayashi (Tokyo Univ. of Science), Yasuaki Yuda (Panasonic), Kenichi Higuchi (Tokyo Univ. of Science) RCS2021-40 |
Hybrid automatic repeat request (HARQ) is an essential technology to efficiently reduce the error rate. However, for ult... [more] |
RCS2021-40 pp.68-74 |
WBS, RCC, SAT, MICT (Joint) [detail] |
2021-05-20 10:45 |
Online |
Online (Zoom) |
Packet Success Rate Performance of 3modes Action Based On-demand WSN Masanori Suetake, Xun Liang, Hiromasa Habuchi (Ibaraki Univ.) WBS2021-4 RCC2021-4 SAT2021-4 MICT2021-4 |
For providing a battery having long service life and solving the problem of inter-channel interference on the wireless s... [more] |
WBS2021-4 RCC2021-4 SAT2021-4 MICT2021-4 pp.17-21 |
NS |
2021-04-16 10:50 |
Online |
Online |
The service identifier based network access control method for supporting system of people with disabilities. Masaaki Noro, Yosuke Takano, Naoki Oguchi (FUJITSU LABORATORIES), Shunji Abe (NII) NS2021-10 |
Research and development of a support system using camera images for people with disabilities who bring their smartphone... [more] |
NS2021-10 pp.53-58 |
IN, NS (Joint) |
2021-03-04 11:00 |
Online |
Online |
Power saving TCP for Sleep Control in Wireless LAN APs with STAs receiving Download Traffic Masahiro Fukahori, Kenji Kawahara (Kyutech) IN2020-63 |
In recent years, with the rapid increase in the number of public Wi-Fi hotspots, the total power consumption of wireless... [more] |
IN2020-63 pp.55-60 |
RCS, SR, SRW (Joint) |
2021-03-03 15:30 |
Online |
Online |
[Invited Lecture]
Prospects and NEC's Activities toward 6G Radio Area Network Ogami Tadashi (NEC) RCS2020-218 SR2020-65 SRW2020-56 |
Digital transformation is being accelerated to realize sustainable society with diversification of life and work style. ... [more] |
RCS2020-218 SR2020-65 SRW2020-56 p.76(RCS), p.17(SR), p.17(SRW) |
SITE, IA, IPSJ-IOT [detail] |
2021-03-02 09:30 |
Online |
Online |
Evaluation of Processing Delay Time in IoT Data Distribution Method Appling Table-based Access Control List Masaki Yoshii, Ryohei Banno, Osamu Mizuno (Kogakuin Univ.) SITE2020-46 IA2020-42 |
Fog Computing, in which a fog node that performs pre-processing such as machine learning and data cleansing is placed be... [more] |
SITE2020-46 IA2020-42 pp.46-51 |
SITE, IA, IPSJ-IOT [detail] |
2021-03-02 13:30 |
Online |
Online |
User-Centric Capability Based Authorization and Access Control in Home Network Naoki Matsumoto, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) SITE2020-52 IA2020-48 |
Multifunctional devices such as smart speakers are now connected to our home network. However, there is no way for users... [more] |
SITE2020-52 IA2020-48 pp.85-92 |
NS, NWS (Joint) |
2021-01-21 13:55 |
Online |
Online |
Prototyping Zero Trust Network for Enterprise Network with Considering the Security Policy Masataka Kawai, Yuzo Taenaka, Yuki Kadobayashi (NAIST) NS2020-111 |
The Zero Trust Network (ZTN) is a security model designed to deal with threats such as information theft by spies and cr... [more] |
NS2020-111 pp.9-15 |
ITS, WBS, RCC |
2020-12-14 09:55 |
Online |
Online |
Backoff Control for CSMA/CA based on the Number of Neighbor Agents Tomoya Nishino, Koji Ishii (Kagawa Univ.) WBS2020-9 ITS2020-5 RCC2020-12 |
For realizing an efficient consensus problem where individual agents are controlled in a distributed manner, we need to ... [more] |
WBS2020-9 ITS2020-5 RCC2020-12 pp.7-12 |
ITS, WBS, RCC |
2020-12-14 15:40 |
Online |
Online |
Synchronization and Multiple Access Method for Optical Camera Communication Using Phase Shift Keying Hiroaki Matsunaga, Tomohiro Yendo (Nagaoka Univ. of Tech.) WBS2020-20 ITS2020-16 RCC2020-23 |
In this paper, we propose a method to realize the function of time-division multiple connection on the visible light com... [more] |
WBS2020-20 ITS2020-16 RCC2020-23 pp.67-72 |