IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 43  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
VLD, HWS, ICD 2024-03-02
09:45
Okinawa
(Primary: On-site, Secondary: Online)
Demonstrating a Real Car Covered with Infra-red-cut Films to Hide itself from LiDAR
Yuki Fukatsu, Akira Iwahashi, Naoki Yoshida, Tsutomu Matsumoto (YNU) VLD2023-135 HWS2023-95 ICD2023-124
In recent years, various technologies have been developed toward the practical application of fully automated driving. A... [more] VLD2023-135 HWS2023-95 ICD2023-124
pp.190-195
ICSS 2023-11-16
13:00
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Implementation of Dynamic Secure Network for Traffic and Logistics with Supermassive and Supervarious Mobilities, and A Study on Its Large-scale Demonstration
Masaru Takeuchi, Toshiaki Saisho, Junji Shikata (JDC), Toshio Sato, Kazue Sako, Jiro Katto, Takuro Sato (WU) ICSS2023-51
In the era of Beyond 5G/6G, effective use of space-time is expected by cooperative operation of a large number and varie... [more] ICSS2023-51
pp.1-6
HWS, VLD 2023-03-04
10:25
Okinawa
(Primary: On-site, Secondary: Online)
Fundamental study of distance spoofing attack against dToF lidar with interference mitigation function
Midori Tomijima, Daisuke Fujimoto, Yuichi Hayashi (NAIST) VLD2022-116 HWS2022-87
In order to avoid interference with the spread of LiDAR, a simple mitigation method that changes the irradiation interva... [more] VLD2022-116 HWS2022-87
pp.239-244
NS, NWS
(Joint)
2023-01-26
13:00
Yamaguchi Hybrid Meeting (Yamaguchi Prefecture)
(Primary: On-site, Secondary: Online)
[Encouragement Talk] A User Authenticity Verification Method Using Behavioral and Cognitive Biometrics for Zero Trust Access Control Mechanisms
Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-153
In recent years, remote access to confidential data necessary for work has been rapidly increasing due to the spread of ... [more] NS2022-153
pp.19-24
HWS, ICD 2022-10-25
10:25
Shiga
(Primary: On-site, Secondary: Online)
A Study on Profiled Side-channel Analysis against AES-CTR
Katsumi Ebina, Rei Ueno, Naohumi Homma (Tohoku Univ) HWS2022-31 ICD2022-23
This paper describes profiling Side-Channel Analysis for AES counter mode.
AES-CTR is a mode in which an internally sto... [more]
HWS2022-31 ICD2022-23
pp.6-11
HWS, ICD 2022-10-25
14:15
Shiga
(Primary: On-site, Secondary: Online)
An Estimation Method of the Irradiation Timing of an Attack Pulse for Distance Spoofing Attack Against Direct ToF LiDAR
Midori Tomijima, Daisuke Fujimoto, Yuichi Hayashi (NAIST) HWS2022-37 ICD2022-29
Autonomous vehicles are equipped with numerous sensors, and the vehicle runs according to their measurements. Therefore,... [more] HWS2022-37 ICD2022-29
pp.41-45
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-19
16:40
Online Online Distance Spoofing Detection by LiDAR and Stereo Camera
Ataru Kubo, Yuki Fukatsu, Naoki Yoshida, Tsutomu Matsumoto (YNU) ISEC2022-15 SITE2022-19 BioX2022-40 HWS2022-15 ICSS2022-23 EMM2022-23
Automatic driving vehicles use information obtained from onboard ranging sensors to recognize objects such as surroundin... [more] ISEC2022-15 SITE2022-19 BioX2022-40 HWS2022-15 ICSS2022-23 EMM2022-23
pp.46-51
VLD, HWS [detail] 2022-03-08
16:50
Online Online Physical Spoofing Attack on LiDAR-based Object Detection and Its Demonstration
Yuki Fukatsu, Ryuuya Ichinose, Shinsei Ueda, Ataru Kubo, Naoki Yoshida, Tsutomu Matsumoto (Yokohama National Univ.) VLD2021-104 HWS2021-81
A variety of technologies are being developed for the practical application of fully autonomous driving. Automated drivi... [more] VLD2021-104 HWS2021-81
pp.158-163
VLD, HWS [detail] 2022-03-08
17:15
Online Online Development of a Test Environment for Attack-Resistance Evaluation of Matrix Direct ToF Lidar
Masato Suzuki, Daisuke Fujimoto, Yuichi Hayashi (NAIST) VLD2021-105 HWS2021-82
Matrix-type Direct Time of flight (dToF) Lidar, which enables high-resolution and high-speed acquisition of distance inf... [more] VLD2021-105 HWS2021-82
pp.164-169
SR 2021-05-21
14:00
Online Online [Technology Exhibit] Invisible Sensing -- Walk-through Security Screening System --
Kazumine Ogura, Tatsuya Sumiya, Nagma S Khan, Shingo Yamanouchi, Toshiyuki Nomura, Masayuki Ariyoshi (NEC) SR2021-13
Many facilities, e.g., office buildings, schools and railway stations are potential terrorism targets but security scree... [more] SR2021-13
pp.86-90
ICD, HWS [detail] 2020-10-26
10:30
Online Online Laser-based Attacks on Ultrasonic Sensors
Tatsuya Suehiro, Taku Toyama, Junichi Sakamoto, Tsutomu Matsumoto (Yokohama National Univ.) HWS2020-28 ICD2020-17
We examine the instrumentation security threat of irradiating laser for a piezoelectric MEMS transducer in a MEMS ultras... [more] HWS2020-28 ICD2020-17
pp.18-23
HCS, HIP, HI-SIGCOASTER [detail] 2019-05-16
13:10
Okinawa Okinawa Industry Support Center The Message to Effectively Promote Information Security Measurements
Toshihide Saito, Asuka Ono, Asuka Miyake, Ai Nakane (NTT), Yutaro Kiyomura, Kazuhiro Matsuzaki, Tatsuya Ishihara (NTT WEST) HCS2019-8 HIP2019-8
The risk of security incidents is increasing year by year, and it is becoming more important for individual users to tak... [more] HCS2019-8 HIP2019-8
pp.39-44
ICSS 2018-11-21
13:25
Kagoshima   Investigation of Security-Related Factors of Satisfactions in Internet Services
Yukiko Sawaya, Akira Yamada, Ayumu Kubota (KDDI Research) ICSS2018-54
The number of services on the Internet and devices connected to the Internet has been increased. Under such circumstance... [more] ICSS2018-54
pp.7-12
RCS, AP
(Joint)
2018-11-20
11:15
Okinawa Okinawa Industry Support Center A Study on Space Selective Modulation in Land Mobile Communication
Daiki Fukushima, Hideiti Sasaoka, Hisato Iwai (Doshisha Univ.) RCS2018-181
As a physical layer security technique, Directional Modulation with multiple antennas which forms desired modulated sign... [more] RCS2018-181
pp.19-24
ISEC 2018-09-07
09:30
Tokyo Kikai-Shinko-Kaikan Bldg. Development of Portable Automotive Security Testbed with Adaptability: PASTA
Tsuyoshi Toyama, Hisashi Oguma (TOYOTA-ITC), Tsutomu Matsumoto (YNU) ISEC2018-51
For accelerating the development of sophisticated driving-assist technologies such as automated driving, securing vehicl... [more] ISEC2018-51
pp.7-14
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
13:10
Hokkaido Sapporo Convention Center A Study on Amplitude Controlling Using Modulated Wave toward Countermeasure against Spoofing Attack on Ultrasonic Rangefinder
Daisuke Fujimoto, Yu-ichi Hayashi (NAIST) ISEC2018-17 SITE2018-9 HWS2018-14 ICSS2018-20 EMM2018-16
Various sensors are increasing with spread of applications such as automatic operation. Ultrasonic rangefinders have bec... [more] ISEC2018-17 SITE2018-9 HWS2018-14 ICSS2018-20 EMM2018-16
pp.55-59
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
13:35
Hokkaido Sapporo Convention Center A System for Evaluating Instrumentation Security of ToF Depth-Image Cameras against Pulse-light Spoofing
Satoru Sakurazawa, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) ISEC2018-18 SITE2018-10 HWS2018-15 ICSS2018-21 EMM2018-17
The ToF depth-image camera is a device capable of simultaneously measuring distances within a certain range and it is be... [more] ISEC2018-18 SITE2018-10 HWS2018-15 ICSS2018-21 EMM2018-17
pp.61-68
QIT
(2nd)
2018-06-04
13:20
Hiroshima ICCH Ran [Poster Presentation] Certifying Quantum Randomness by Probability Estimation
Yanbao Zhang (NTT-BRL), Emanuel Knill, Peter Bierhorst (NIST)
We introduce probability estimation, a broadly applicable framework to certify
randomness in a finite sequence of mea... [more]

HWS 2018-04-13
15:50
Fukuoka   An analog security technique on a physical-cyber boundary
Takuji Miki, Kento Mizuta, Noriyuki Miura, Makoto Nagata (Kobe Univ.) HWS2018-9
This paper presents an analog measurement security technique for sensor systems. A sensor analog circuit is indispensabl... [more] HWS2018-9
pp.45-48
EMM 2017-11-07
13:25
Kagoshima Kagoshima Univ. (Inamori Academy) A study of obfuscation for the security enhancement of watermarking schemes
Koichiro Yamashita, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) EMM2017-65
In general, watermark information is embedded into the host signals selected from digital content according to a secret ... [more] EMM2017-65
pp.53-58
 Results 1 - 20 of 43  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan