IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 41 - 60 of 367 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SIP, CAS, VLD, MSS 2021-07-06
12:05
Online Online Sensor Scheduling-Based Detection of False Data Injection Attacks in Power System State Estimation
Sho Obata, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.) CAS2021-14 VLD2021-14 SIP2021-24 MSS2021-14
In state estimation of steady-state power networks, a cyber attack that cannot be detected from the residual (i.e., the ... [more] CAS2021-14 VLD2021-14 SIP2021-24 MSS2021-14
pp.70-74
IA, ICSS 2021-06-21
16:25
Online Online [Invited Talk] An Authentication Scheme for WLAN Physical Layer
Miyuki Hirose (KIT) IA2021-8 ICSS2021-8
Security has traditionally been implemented at the higher, logical layers of communication networks, rather than at the ... [more] IA2021-8 ICSS2021-8
p.43
WBS, IT, ISEC 2021-03-05
14:20
Online Online Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts
Nami Ashizawa, Naoto Yanai, Jason Paul Cruz (Osaka Univ.), Singo Okamura (NITNC) IT2020-156 ISEC2020-86 WBS2020-75
Ethereum smart contracts are programs that run on the Ethereum blockchain, and many smart contract vulnerabilities have ... [more] IT2020-156 ISEC2020-86 WBS2020-75
pp.273-280
IN, NS
(Joint)
2021-03-05
10:10
Online Online A Convolutional Autoencoder Based Method for Cyber Intrusion Detection
Xinyi She, Yuji Sekiya (Tokyo Univ.) IN2020-77
Cyber intrusion detection systems are increasingly crucial due to the monumental growth of internet applications. Howeve... [more] IN2020-77
pp.138-143
IN, NS
(Joint)
2021-03-05
13:40
Online Online Computational Complexity Reduction by Dynamic Clustering in Network Scan Scheduling
Takuya Kurihara, Kazuto Yano, Yoshinori Suzuki (ATR) NS2020-157
In recent years, some users have required network scans for security or business.
On the other hand, since the number o... [more]
NS2020-157
pp.203-207
ICSS, IPSJ-SPT 2021-03-02
16:25
Online Online Security Evaluation of PUF utilizing Unrolled Architecture
Yusuke Nozaki, Kensaku Asahi, Masaya Yoshikawa (Meijo Univ.) ICSS2020-53
To improve the security of LSI circuit, physically unclonable functions (PUF) have been attracted attention. The glitch ... [more] ICSS2020-53
pp.160-165
MSS, SS 2021-01-27
13:25
Online Online Distributed State Estimation for Linear Singular Systems and Its Application to Sensor Networks
Kei Isono, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.) MSS2020-37 SS2020-22
The sensor attack detection problem is one of the important problems in cybersecurity and control theory. An attack to a... [more] MSS2020-37 SS2020-22
pp.49-53
CQ
(2nd)
2021-01-21
11:05
Online Online [Invited Lecture] Hot Topics in Forwarding and Privacy in Information-Centric Networking
Yuki Koizumi, Toru Hasegawa (Osaka Univ.)
Information-Centric Networking (ICN), where communication is based on named content objects instead of named hosts, is ... [more]
NS, NWS
(Joint)
2021-01-21
13:55
Online Online Prototyping Zero Trust Network for Enterprise Network with Considering the Security Policy
Masataka Kawai, Yuzo Taenaka, Yuki Kadobayashi (NAIST) NS2020-111
The Zero Trust Network (ZTN) is a security model designed to deal with threats such as information theft by spies and cr... [more] NS2020-111
pp.9-15
IA, IN
(Joint)
2020-12-15
10:50
Online Online Development of an Intrusion Detection System Utilizing Social Network Analysis Principles
James Lu, Yuji Sekiya (Univ. of Tokyo) IA2020-29
As computer networks grow increasingly complex and cyberattacks become more sophisticated, better methods are needed to ... [more] IA2020-29
pp.18-21
AI 2020-12-11
10:20
Shizuoka Online and HAMAMATSU ACT CITY
(Primary: On-site, Secondary: Online)
A Preliminary Multi-Agent Reinforcement Learning Approach for Responding Dynamic Traffic in Communication Destination Anonymization
Keita Sugiyama, Naoki Fukuta (Shizuoka Univ.) AI2020-10
In this paper, we describe our prototype mechanism using the simulation-based multi-agent reinforcement learning for aut... [more] AI2020-10
pp.46-51
NS, ICM, CQ, NV
(Joint)
2020-11-27
13:35
Online Online Design and Discussion of NFC Mechanism Considering Security and Optimal Arrangement of Functions in Multi-Tenant Environment
Daisuke Settai, Takao Kondo, Fumio Teraoka (Keio Univ.) NS2020-83
As the performance of networks and commodity hardware improves, We will apply Network Function Chaining (NFC) to multipl... [more] NS2020-83
pp.43-48
BioX 2020-11-25
11:10
Online Online GAN based feature-level supportive method for improved adversarial attacks on face recognition
Zhengwei Yin (USTC/Hosei Univ.), Kaoru Uchida (Hosei Univ.) BioX2020-35
With the rapid development of deep neural networks (DNN), DNN-based face recognition technologies are also achieving gre... [more] BioX2020-35
pp.1-6
IA 2020-11-09
14:57
Hokkaido
(Primary: On-site, Secondary: Online)
Development and evaluation of efficient vulnerability scanning system for IoT networks
Kazusyoshi Watanabe, Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ) IA2020-19
In recent years, a security incident called DRDoS attack, which is a kind of DoS attack using reflections and amplificat... [more] IA2020-19
pp.7-12
ICD, HWS [detail] 2020-10-26
13:50
Online Online Security Threats and Preventions for Photonics Computing Model
Junko Takahashi, Koji Chida, Takeshi Sakamoto (NTT) HWS2020-33 ICD2020-22
This paper presents security analysis on photonic computing models in All-Photonics Network (APN). New computing archite... [more] HWS2020-33 ICD2020-22
pp.48-53
NS 2020-10-07
09:30
Online Online [Encouragement Talk] KBP: Kernel Enhancements for Low Latency Networking without Application Customization in Virtual Server
Kei Fujimoto, Masashi Kaneko (NTT), Kenichi Matsui (NTT WEST) NS2020-54
Packet processing on commodity hardware is a cost-efficient and flexible alternative to specialized networking hardware.... [more] NS2020-54
pp.1-6
SR, NS, SeMI, RCC, RCS
(Joint)
2020-07-10
15:20
Online Online An examination of a predictive control method for lighting using wireless sensor networks
Yuki Takayama, Yusuke Yokota (Japan Women's Univ.) SeMI2020-14
Light management for buildings or streets is important for safety, security and comfort. However, it is not economical t... [more] SeMI2020-14
pp.63-68
NS 2020-04-16
16:40
Online Online [Invited Talk] Data Life-Cycle Protection for Ubiquitous Data Sharing
Ruidong Li (NICT) NS2020-4
Huge amount of data raise a strong demand for a network infrastructure with the capability to support data sharing and r... [more] NS2020-4
pp.19-41
PN 2020-03-03
09:50
Kagoshima
(Cancelled but technical report was issued)
DDoS defense method by logically isolating attackers
Yutaka Nasu, Naoto Sumita, Masaki Murakami, Satoru Okamoto, Naoaki Yamanaka (Keio Univ.) PN2019-63
In recent years, the number of DDoS occurrences and the traffic volume have increased, and attacks have resulted in the ... [more] PN2019-63
pp.65-71
ICSS, IPSJ-SPT 2020-03-03
11:00
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Model checking RNNs with modal μ-calculus
Tatsuhiro Aoshima, Toshinori Usui (NTT) ICSS2019-88
Machine learning models have been applied to many cyber-physical systems such as self-driving cars, robotics, and factor... [more] ICSS2019-88
pp.119-124
 Results 41 - 60 of 367 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan