IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 80  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ITE-ME, ITE-IST, BioX, SIP, MI, IE [detail] 2024-06-06
13:20
Niigata Nigata University (Ekinan-Campus "TOKIMATE") Enhanced Security with Random Binary Weights for Privacy-Preserving Federated Learning
Hiroto Sawada, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (TMU)
(To be available after the conference date) [more]
ICSS, IPSJ-SPT 2024-03-22
10:55
Okinawa OIST
(Primary: On-site, Secondary: Online)
Improved signature-embedding techniques against backdoor attacks on DNN models
Akira Fujimoto, Yuntao Wang, Atsuko Miyaji (OU) ICSS2023-87
In recent years, machine learning, particularly deep learning, has made remarkable strides, and has great impact on our ... [more] ICSS2023-87
pp.129-136
ICSS, IPSJ-SPT 2024-03-22
12:10
Okinawa OIST
(Primary: On-site, Secondary: Online)
Study of the Label-Flipping Poisoning Attack on Machine-Learning Based Malicious URL Query Detection.
Akira Matsunami (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2023-90
In recent years, there have been a large increase of cyber attacks with increasing use of web applications. A method to... [more] ICSS2023-90
pp.153-159
RCC, ISEC, IT, WBS 2024-03-14
16:35
Osaka Osaka Univ. (Suita Campus) Integral Attack with Bit-Based Division Property on Block Cipher LBC
Naoki Shibayama, Yasutaka Igarashi (Tokyo Univ. of Science) IT2023-131 ISEC2023-130 WBS2023-119 RCC2023-113
LBC is a block cipher proposed by Kapalova et al. in 2023. The block size is 64-bit, the secret key size is 80-bit, and ... [more] IT2023-131 ISEC2023-130 WBS2023-119 RCC2023-113
pp.350-357
PRMU, IBISML, IPSJ-CVIM 2024-03-04
10:40
Hiroshima Hiroshima Univ. Higashi-Hiroshima campus
(Primary: On-site, Secondary: Online)
Poisoning Attack on Fairness of Fair Classification Algorithm through Threshold Control
Dai Shengtian, Akimoto Youhei (Univ. of Tsukuba/RIKEN), Jun Sakuma (Tokyo Tech./RIKEN), Fukuchi Kazuto (Univ. of Tsukuba/RIKEN) IBISML2023-47
The ethical issues of artificial intelligence have become more severe as machine learning is widely used in several fiel... [more] IBISML2023-47
pp.49-56
SIP, SP, EA, IPSJ-SLP [detail] 2024-03-01
09:30
Okinawa
(Primary: On-site, Secondary: Online)
Black-Box Adversarial Attack for Math Formula Recognition Model
Haruto Namura, Masatomo Yoshida (Doshisha Univ.), Nicola Adami (UNIBS), Masahiro Okuda (Doshisha Univ.) EA2023-110 SIP2023-157 SP2023-92
Remarkable advances in deep learning have greatly improved the accuracy of image analysis. The progress of deep learning... [more] EA2023-110 SIP2023-157 SP2023-92
pp.289-293
NS, IN
(Joint)
2024-02-29
10:45
Okinawa Okinawa Convention Center Proposal of a Data Leakage Attack against a Vertical Federated Learning System based on Knowledge Distillation
Takumi Suimon, Yuki Koizumi, Junji Takemasa, Toru Hasegawa (Osaka Univ.) NS2023-187
Vertical federated learning is a method for participants who have data with the same samples but different features to c... [more] NS2023-187
pp.90-95
VLD, HWS, ICD 2024-02-29
15:55
Okinawa
(Primary: On-site, Secondary: Online)
[Memorial Lecture] Modeling of Tamper Resistance to Electromagnetic Side-channel Attacks on Voltage-scaled Circuits
Kazuki Minamiguchi, Yoshihiro Midoh, Noriyuki Miura, Jun Shiomi (Osaka Univ.) VLD2023-117 HWS2023-77 ICD2023-106
The threat of information leakage by Side-Channel Attacks (SCAs) using ElectroMagnetic (EM) leakage is becoming more and... [more] VLD2023-117 HWS2023-77 ICD2023-106
p.99
SIP, IT, RCS 2024-01-19
13:30
Miyagi
(Primary: On-site, Secondary: Online)
[Invited Talk] Problem of Adversarial Attacks on CNN-based Image Classifiers and Countermeasures
Minoru Kuribayashi (Tohoku Univ.) IT2023-67 SIP2023-100 RCS2023-242
It is well-known that discriminative models based on deep learning techniques may cause misclassification if adversarial... [more] IT2023-67 SIP2023-100 RCS2023-242
p.204
ICSS 2023-11-16
15:20
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Attack Verification and Evaluation of Incremental Fault Analysis against AES Encryption Processing Device
Miran Tamagawa, Yuichi Futa (TUT), Takehiko Mieno (AVASYS), Hiroyuki Okazaki (Shinshu University) ICSS2023-56
In recent years,there has been a growing concern about the impact of fault analysis attack,which use hardware failures a... [more] ICSS2023-56
pp.35-41
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2023-11-16
13:20
Kumamoto Civic Auditorium Sears Home Yume Hall
(Primary: On-site, Secondary: Online)
Tamper Resistance Evaluation on FPGA for Low-Latency Cipher Sonic
Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52
Industry 5.0 promotes smart factories for system optimization by utilizing IoT and AI in the industrial field. The smart... [more] VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52
pp.101-105
MIKA
(3rd)
2023-10-11
14:30
Okinawa Okinawa Jichikaikan
(Primary: On-site, Secondary: Online)
[Poster Presentation] Detecting Poisoning Attacks Using Adversarial Examples in Deep Phishing Detection
Koko Nishiura, Tomotaka Kimura, Jun Cheng (Doshisha Univ.)
In recent years, the convenience of online services has greatly improved, but the number of phishing scams has skyrocket... [more]
HWS 2023-04-14
14:10
Oita
(Primary: On-site, Secondary: Online)
Modeling of Electromagnetic Leakage from Voltage-scaled Cryptographic Circuits
Kazuki Minamiguchi, Yoshihiro Midoh, Noriyuki Miura, Jun Shiomi (Osaka Univ.) HWS2023-3
This paper evaluates an electromagnetic leakage model which predicts the supply voltage dependency by using practical cr... [more] HWS2023-3
pp.9-10
HWS 2023-04-14
15:35
Oita
(Primary: On-site, Secondary: Online)
Object Generation - Backdoor Attack against Object-Detection DNN Triggered by Fault Injection into MIPI
Takumi Takubo, Tatsuya Oyama, Kota Yoshida, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ.) HWS2023-6
Backdoor attacks that induce misclassification by poisoning training data and adding specific patterns (trigger marks) t... [more] HWS2023-6
pp.20-25
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-19
14:15
Online Online A Study for Predicting Correlation Power Analysis Results by Using High-SNR Plaintexts Selected Based on Linear Leakage Model
Masaki Himuro, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) ISEC2022-10 SITE2022-14 BioX2022-35 HWS2022-10 ICSS2022-18 EMM2022-18
To reduce the number of traces for evaluating side-channel attack (SCA) resistance, some methods for performing correlat... [more] ISEC2022-10 SITE2022-14 BioX2022-35 HWS2022-10 ICSS2022-18 EMM2022-18
pp.18-22
R 2022-06-16
14:50
Online Online A Note on Interval Reliability Analysis of Intrusion Tolerant Systems Subject to DoS Attacks
Junjun Zheng (Ritsumeikan Univ.), Hiroyuki Okamura, Tadashi Dohi (Hiroshima Univ.) R2022-8
This paper focuses on the transient behavior of intrusion tolerant systems with preventive maintenance subject to DoS (D... [more] R2022-8
pp.13-18
SeMI, IPSJ-DPS, IPSJ-MBL, IPSJ-ITS 2022-05-26
10:03
Okinawa
(Primary: On-site, Secondary: Online)
An Initial Study on Display-to-Camera Communication Systems Using Adversarial Attack on CNN Depth Estimation Model
Lee Changseok, Hiraku Okada (Nagoya Univ.), Tadahiro Wada (Shizuoka Univ.), Chedlia Ben Naila, Masaaki Katayama (Nagoya Univ.) SeMI2022-2
Hidden screen-camera communication requires visual quality and robust communication performance. In this study, we demon... [more] SeMI2022-2
pp.5-10
VLD, HWS [detail] 2022-03-08
14:55
Online Online Evaluation of Side-channel Leaks Specific to Unrolled AES Hardware
Ayano Nakashima, Rei Ueno, Naofumi Homma (Tohoku Univ.) VLD2021-100 HWS2021-77
This paper presents the evaluation of a unique side-channel leakage occurred from the middle rounds
of (pipelined) unro... [more]
VLD2021-100 HWS2021-77
pp.135-140
ICSS, IPSJ-SPT 2022-03-08
10:00
Online Online Input predictive attack by keyboard acoustic emanations using BERT and its countermeasures
Masahiro Iida (Teikyo Univ.), Mitsuaki Akiyama (NTT), Masaki Kamizono (DTCY), Takahiro Kasama (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Kyoto Sangyo Univ.), Atsuo Inomata (Osaka Univ.) ICSS2021-67
The Keyboard Acoustic Emanations has been proposed to estimate the input key from keystroke sounds as a kind of side-cha... [more] ICSS2021-67
pp.49-54
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2021-07-20
14:50
Online Online Deep Learning Side-Channel Attacks against Unprotected AES and RSM-AES Implemented in ASIC
Yuta Fukuda, Kota Yoshida, Hisashi Hashimoto, Takeshi Fujino (Ritsumeikan Univ.) ISEC2021-24 SITE2021-18 BioX2021-25 HWS2021-24 ICSS2021-29 EMM2021-29
The cryptographic key can be revealed by exploiting side-channel information such as power traces under operation.
Rec... [more]
ISEC2021-24 SITE2021-18 BioX2021-25 HWS2021-24 ICSS2021-29 EMM2021-29
pp.86-91
 Results 1 - 20 of 80  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan