Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SIP, CAS, VLD, MSS |
2021-07-06 12:05 |
Online |
Online |
Sensor Scheduling-Based Detection of False Data Injection Attacks in Power System State Estimation Sho Obata, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.) CAS2021-14 VLD2021-14 SIP2021-24 MSS2021-14 |
In state estimation of steady-state power networks, a cyber attack that cannot be detected from the residual (i.e., the ... [more] |
CAS2021-14 VLD2021-14 SIP2021-24 MSS2021-14 pp.70-74 |
IA, ICSS |
2021-06-21 16:25 |
Online |
Online |
[Invited Talk]
An Authentication Scheme for WLAN Physical Layer Miyuki Hirose (KIT) IA2021-8 ICSS2021-8 |
Security has traditionally been implemented at the higher, logical layers of communication networks, rather than at the ... [more] |
IA2021-8 ICSS2021-8 p.43 |
WBS, IT, ISEC |
2021-03-05 14:20 |
Online |
Online |
Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts Nami Ashizawa, Naoto Yanai, Jason Paul Cruz (Osaka Univ.), Singo Okamura (NITNC) IT2020-156 ISEC2020-86 WBS2020-75 |
Ethereum smart contracts are programs that run on the Ethereum blockchain, and many smart contract vulnerabilities have ... [more] |
IT2020-156 ISEC2020-86 WBS2020-75 pp.273-280 |
IN, NS (Joint) |
2021-03-05 10:10 |
Online |
Online |
A Convolutional Autoencoder Based Method for Cyber Intrusion Detection Xinyi She, Yuji Sekiya (Tokyo Univ.) IN2020-77 |
Cyber intrusion detection systems are increasingly crucial due to the monumental growth of internet applications. Howeve... [more] |
IN2020-77 pp.138-143 |
IN, NS (Joint) |
2021-03-05 13:40 |
Online |
Online |
Computational Complexity Reduction by Dynamic Clustering in Network Scan Scheduling Takuya Kurihara, Kazuto Yano, Yoshinori Suzuki (ATR) NS2020-157 |
In recent years, some users have required network scans for security or business.
On the other hand, since the number o... [more] |
NS2020-157 pp.203-207 |
ICSS, IPSJ-SPT |
2021-03-02 16:25 |
Online |
Online |
Security Evaluation of PUF utilizing Unrolled Architecture Yusuke Nozaki, Kensaku Asahi, Masaya Yoshikawa (Meijo Univ.) ICSS2020-53 |
To improve the security of LSI circuit, physically unclonable functions (PUF) have been attracted attention. The glitch ... [more] |
ICSS2020-53 pp.160-165 |
MSS, SS |
2021-01-27 13:25 |
Online |
Online |
Distributed State Estimation for Linear Singular Systems and Its Application to Sensor Networks Kei Isono, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.) MSS2020-37 SS2020-22 |
The sensor attack detection problem is one of the important problems in cybersecurity and control theory. An attack to a... [more] |
MSS2020-37 SS2020-22 pp.49-53 |
CQ (2nd) |
2021-01-21 11:05 |
Online |
Online |
[Invited Lecture]
Hot Topics in Forwarding and Privacy in Information-Centric Networking Yuki Koizumi, Toru Hasegawa (Osaka Univ.) |
Information-Centric Networking (ICN), where communication is based on named content objects instead of named hosts, is ... [more] |
|
NS, NWS (Joint) |
2021-01-21 13:55 |
Online |
Online |
Prototyping Zero Trust Network for Enterprise Network with Considering the Security Policy Masataka Kawai, Yuzo Taenaka, Yuki Kadobayashi (NAIST) NS2020-111 |
The Zero Trust Network (ZTN) is a security model designed to deal with threats such as information theft by spies and cr... [more] |
NS2020-111 pp.9-15 |
IA, IN (Joint) |
2020-12-15 10:50 |
Online |
Online |
Development of an Intrusion Detection System Utilizing Social Network Analysis Principles James Lu, Yuji Sekiya (Univ. of Tokyo) IA2020-29 |
As computer networks grow increasingly complex and cyberattacks become more sophisticated, better methods are needed to ... [more] |
IA2020-29 pp.18-21 |
AI |
2020-12-11 10:20 |
Shizuoka |
Online and HAMAMATSU ACT CITY (Primary: On-site, Secondary: Online) |
A Preliminary Multi-Agent Reinforcement Learning Approach for Responding Dynamic Traffic in Communication Destination Anonymization Keita Sugiyama, Naoki Fukuta (Shizuoka Univ.) AI2020-10 |
In this paper, we describe our prototype mechanism using the simulation-based multi-agent reinforcement learning for aut... [more] |
AI2020-10 pp.46-51 |
NS, ICM, CQ, NV (Joint) |
2020-11-27 13:35 |
Online |
Online |
Design and Discussion of NFC Mechanism Considering Security and Optimal Arrangement of Functions in Multi-Tenant Environment Daisuke Settai, Takao Kondo, Fumio Teraoka (Keio Univ.) NS2020-83 |
As the performance of networks and commodity hardware improves, We will apply Network Function Chaining (NFC) to multipl... [more] |
NS2020-83 pp.43-48 |
BioX |
2020-11-25 11:10 |
Online |
Online |
GAN based feature-level supportive method for improved adversarial attacks on face recognition Zhengwei Yin (USTC/Hosei Univ.), Kaoru Uchida (Hosei Univ.) BioX2020-35 |
With the rapid development of deep neural networks (DNN), DNN-based face recognition technologies are also achieving gre... [more] |
BioX2020-35 pp.1-6 |
IA |
2020-11-09 14:57 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
Development and evaluation of efficient vulnerability scanning system for IoT networks Kazusyoshi Watanabe, Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ) IA2020-19 |
In recent years, a security incident called DRDoS attack, which is a kind of DoS attack using reflections and amplificat... [more] |
IA2020-19 pp.7-12 |
ICD, HWS [detail] |
2020-10-26 13:50 |
Online |
Online |
Security Threats and Preventions for Photonics Computing Model Junko Takahashi, Koji Chida, Takeshi Sakamoto (NTT) HWS2020-33 ICD2020-22 |
This paper presents security analysis on photonic computing models in All-Photonics Network (APN). New computing archite... [more] |
HWS2020-33 ICD2020-22 pp.48-53 |
NS |
2020-10-07 09:30 |
Online |
Online |
[Encouragement Talk]
KBP: Kernel Enhancements for Low Latency Networking without Application Customization in Virtual Server Kei Fujimoto, Masashi Kaneko (NTT), Kenichi Matsui (NTT WEST) NS2020-54 |
Packet processing on commodity hardware is a cost-efficient and flexible alternative to specialized networking hardware.... [more] |
NS2020-54 pp.1-6 |
SR, NS, SeMI, RCC, RCS (Joint) |
2020-07-10 15:20 |
Online |
Online |
An examination of a predictive control method for lighting using wireless sensor networks Yuki Takayama, Yusuke Yokota (Japan Women's Univ.) SeMI2020-14 |
Light management for buildings or streets is important for safety, security and comfort. However, it is not economical t... [more] |
SeMI2020-14 pp.63-68 |
NS |
2020-04-16 16:40 |
Online |
Online |
[Invited Talk]
Data Life-Cycle Protection for Ubiquitous Data Sharing Ruidong Li (NICT) NS2020-4 |
Huge amount of data raise a strong demand for a network infrastructure with the capability to support data sharing and r... [more] |
NS2020-4 pp.19-41 |
PN |
2020-03-03 09:50 |
Kagoshima |
(Cancelled but technical report was issued) |
DDoS defense method by logically isolating attackers Yutaka Nasu, Naoto Sumita, Masaki Murakami, Satoru Okamoto, Naoaki Yamanaka (Keio Univ.) PN2019-63 |
In recent years, the number of DDoS occurrences and the traffic volume have increased, and attacks have resulted in the ... [more] |
PN2019-63 pp.65-71 |
ICSS, IPSJ-SPT |
2020-03-03 11:00 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Model checking RNNs with modal μ-calculus Tatsuhiro Aoshima, Toshinori Usui (NTT) ICSS2019-88 |
Machine learning models have been applied to many cyber-physical systems such as self-driving cars, robotics, and factor... [more] |
ICSS2019-88 pp.119-124 |