IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 164 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
NS, ICM, CQ, NV
(Joint)
2022-11-24
11:35
Fukuoka Humanities and Social Sciences Center, Fukuoka Univ. + Online
(Primary: On-site, Secondary: Online)
Design and Trial of Cyber Security Exercise for Basic CISO Skillset
Tatsumi Seko, Touri Nakagawa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-104
Conventional security officers lack the authority and responsibility to make decisions related to management and are not... [more] NS2022-104
pp.23-28
NS, ICM, CQ, NV
(Joint)
2022-11-25
16:20
Fukuoka Humanities and Social Sciences Center, Fukuoka Univ. + Online
(Primary: On-site, Secondary: Online)
[Invited Talk] Operation and Management of Microservices-based Distributed System using Service Mesh
Takaya Ide, Hitoshi Yabusaki (Hitachi) NS2022-127 CQ2022-60 ICM2022-30
Distributed systems such as microservice architectures are complex and change rapidly. A network model called a service ... [more] NS2022-127 CQ2022-60 ICM2022-30
pp.137-141(NS), pp.58-62(CQ), pp.31-35(ICM)
R 2022-10-07
14:50
Fukuoka
(Primary: On-site, Secondary: Online)
A Note on A Transformer Encoder-Based Malware Classification Using API Calls
Chen Li (Kyutech), Junjun Zheng (Osaka Univ.) R2022-36
Malware is a major security threat to computer systems and significantly impacts system reliability. Recurrent neural ne... [more] R2022-36
pp.25-30
AP, SANE, SAT
(Joint)
2022-07-29
11:15
Hokkaido Asahikawa Taisetsu Crystal Hall
(Primary: On-site, Secondary: Online)
Evaluation of Secure Transmission Performance of Spatially-Selective Modulation in an Indoor Environment
Hitoro Yonawa, Yuka Morishima, Hisato Iwai, Shinsuke Ibi (Doshisha Univ.) AP2022-57
As a physical layer security technique, we have proposed spatially-selective modulation (SSM) which consists of multiple... [more] AP2022-57
pp.129-134
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-20
16:40
Online Online Efficient Constructions of Adaptively and CCA-secure Identity-based Encryption with Equality Test from LWE Assumption in the Standard Model
Kyoichi Asano (UEC/NICT), Keita Emura (NICT), Atsushi Takayasu (Univ. Tokyo) ISEC2022-29 SITE2022-33 BioX2022-54 HWS2022-29 ICSS2022-37 EMM2022-37
Identity-based Encryption with Equality Test (IBEET) is an extension of identity-based Encryption (IBE) that can check t... [more] ISEC2022-29 SITE2022-33 BioX2022-54 HWS2022-29 ICSS2022-37 EMM2022-37
pp.131-138
CQ, CS
(Joint)
2022-05-12
14:20
Fukui Fukui (Fuku Pref.)
(Primary: On-site, Secondary: Online)
Distributed Network Intrusion Detection System Using Federated Learning
Yuya Tsuru, Tomoya Kawakami, Tatsuhito Hasegawa (Univ. of Fukui) CQ2022-5
A network-based intrusion detection system (NIDS) monitors a network and detects unauthorized traffic. Currently, a vari... [more] CQ2022-5
pp.20-25
HWS 2022-04-26
10:55
Tokyo AIST Tokyo Waterfront (Annex)
(Primary: On-site, Secondary: Online)
Deep Learning Side-Channel Attacks against Hardware-Implemented Lightweight Cipher Midori64
Madoka Sako, Kunihiro Kuroda, Yuta Fukuda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) HWS2022-2
Midori is a lightweight cipher and it is developed to achieve superior circuit size, low latency, and low power consumpt... [more] HWS2022-2
pp.7-12
IT, ISEC, RCC, WBS 2022-03-11
11:10
Online Online Corruption-Correctable Message Authentication Code
Isamu Furuya, Akiko Inoue, Kazuhiko Minematsu (NEC) IT2021-114 ISEC2021-79 WBS2021-82 RCC2021-89
We propose correction correctable MAC, which enables to verify data integrity and to correct corruptions of the data.
A... [more]
IT2021-114 ISEC2021-79 WBS2021-82 RCC2021-89
pp.180-187
VLD, HWS [detail] 2022-03-08
13:00
Online Online Implementation Evaluation of Glitch PUF Using a Low-Latency Cryptography MANTIS
Kosuke Hamaguchi, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2021-96 HWS2021-73
This paper proposes a low-latency cipher MANTIS based PUF which uses signal glitch during encryption. The security level... [more] VLD2021-96 HWS2021-73
pp.111-116
CAS, CS 2022-03-04
13:45
Online Online Evaluation of Trojan Detector for AI Hardware
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2021-94 CS2021-96
In recent years, AI edge computing has been expanding to realize real-time inference by implementing AI models on edge d... [more] CAS2021-94 CS2021-96
pp.106-111
MBE, NC
(Joint)
2022-03-02
10:20
Online Online A Glass Breaking Sound Detection Method for Security Systems using SVM
Yuhei Mazaki, Susumu Kuroyanagi (NIT) NC2021-48
In this study, a sound-based security system which detect glass breaking sound made by burglars are proposed. In the pre... [more] NC2021-48
pp.11-16
SR 2021-05-21
14:00
Online Online [Technology Exhibit] Invisible Sensing -- Walk-through Security Screening System --
Kazumine Ogura, Tatsuya Sumiya, Nagma S Khan, Shingo Yamanouchi, Toshiyuki Nomura, Masayuki Ariyoshi (NEC) SR2021-13
Many facilities, e.g., office buildings, schools and railway stations are potential terrorism targets but security scree... [more] SR2021-13
pp.86-90
IN, NS
(Joint)
2021-03-05
10:10
Online Online A Convolutional Autoencoder Based Method for Cyber Intrusion Detection
Xinyi She, Yuji Sekiya (Tokyo Univ.) IN2020-77
Cyber intrusion detection systems are increasingly crucial due to the monumental growth of internet applications. Howeve... [more] IN2020-77
pp.138-143
ICSS, IPSJ-SPT 2021-03-02
16:25
Online Online Security Evaluation of PUF utilizing Unrolled Architecture
Yusuke Nozaki, Kensaku Asahi, Masaya Yoshikawa (Meijo Univ.) ICSS2020-53
To improve the security of LSI circuit, physically unclonable functions (PUF) have been attracted attention. The glitch ... [more] ICSS2020-53
pp.160-165
IE, ITS, ITE-MMS, ITE-ME, ITE-AIT [detail] 2021-02-19
15:20
Online Online [Special Talk] A Note on Customer's Interest Estimation Method Using Security Camera Video Data from the Real Store -- Validation of the accuracy of an anomaly detection model using features obtained from a posture estimation model --
Yuki Honma, Ren Togo, Maiku Abe, Takahiro Ogawa, Miki Haseyama (Hokkaido Univ.)
In this paper, we propose a method for estimating customers’ interests using videos recorded by a security camera in a r... [more]
AI 2021-02-12
16:30
Online Online A Defense Method for Machine Learning Poisoning Attacks in IoT Environments Considering the Removal Priority of Poisonous Data
Tomoki Chiba, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga (UEC) AI2020-36
In recent years, machine learning has been attracting attention for its potential to further enrich people's lives. Howe... [more] AI2020-36
pp.73-78
MSS, SS 2021-01-27
13:25
Online Online Distributed State Estimation for Linear Singular Systems and Its Application to Sensor Networks
Kei Isono, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.) MSS2020-37 SS2020-22
The sensor attack detection problem is one of the important problems in cybersecurity and control theory. An attack to a... [more] MSS2020-37 SS2020-22
pp.49-53
NS, NWS
(Joint)
2021-01-21
13:55
Online Online Prototyping Zero Trust Network for Enterprise Network with Considering the Security Policy
Masataka Kawai, Yuzo Taenaka, Yuki Kadobayashi (NAIST) NS2020-111
The Zero Trust Network (ZTN) is a security model designed to deal with threats such as information theft by spies and cr... [more] NS2020-111
pp.9-15
IA, IN
(Joint)
2020-12-15
10:50
Online Online Development of an Intrusion Detection System Utilizing Social Network Analysis Principles
James Lu, Yuji Sekiya (Univ. of Tokyo) IA2020-29
As computer networks grow increasingly complex and cyberattacks become more sophisticated, better methods are needed to ... [more] IA2020-29
pp.18-21
VLD, DC, RECONF, ICD, IPSJ-SLDM
(Joint) [detail]
2020-11-18
14:00
Online Online Physically Unclonable Functions(PUF) curcuit using Non-Volatile Flip-Flop and security evaluation against modeling attacks
Hiroki Ishihara, Kimiyoshi Usami (Shibaura IT) VLD2020-37 ICD2020-57 DC2020-57 RECONF2020-56
In recent years, imitative LSIs have become a serious problem and security technology PUF to use manufacturing variabili... [more] VLD2020-37 ICD2020-57 DC2020-57 RECONF2020-56
pp.139-144
 Results 21 - 40 of 164 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan