Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2020-03-03 11:00 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Model checking RNNs with modal μ-calculus Tatsuhiro Aoshima, Toshinori Usui (NTT) ICSS2019-88 |
Machine learning models have been applied to many cyber-physical systems such as self-driving cars, robotics, and factor... [more] |
ICSS2019-88 pp.119-124 |
ICSS, IPSJ-SPT |
2020-03-03 11:20 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Adversarial Attack against Neural Machine Translation Systems Takeshi Sakamoto, Tatsuya Mori (Waseda Univ.) ICSS2019-89 |
It has been widely known that systems empowered by neural network algorithms are vulnerable against an intrinsic attack ... [more] |
ICSS2019-89 pp.125-130 |
ICSS, IPSJ-SPT |
2020-03-03 11:40 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Adversarial Attacks against Electrocardiograms Taiga Ono (Waseda Univ.), Takeshi Sugawara (UEC), Tatsuya Mori (Waseda Univ.) ICSS2019-90 |
Recent advancements in clinical services powered by deep learning have been met with the threat of Adversarial Examples.... [more] |
ICSS2019-90 pp.131-136 |
ICSS, IPSJ-SPT |
2020-03-03 15:40 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Effective single-sided RAMBleed Hiroki Nagahama (Kobe Univ), Makoto Takita (Univ of Hyogo), Masanori Hirotomo (Saga Univ), Masakatsu Morii (Kobe Univ) ICSS2019-91 |
There is a phenomenon called Rowhammer in which bit flip occurs in the neighboring row by repeatedly accessing the row o... [more] |
ICSS2019-91 pp.145-150 |
ICSS, IPSJ-SPT |
2020-03-03 16:00 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
ICSS2019-92 |
(To be available after the conference date) [more] |
ICSS2019-92 pp.151-155 |
ICSS, IPSJ-SPT |
2020-03-02 11:10 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
A Technique for Issuing Security Alerts and Filtering Traffic based on Vulnerability Information Monitoring Takeshi Takahashi, Ryutaro Ushigome, Mio Suzuki, Daisuke Inoue (NICT) ICSS2019-93 |
[more] |
ICSS2019-93 pp.189-194 |
ICSS, IPSJ-SPT |
2020-03-02 11:30 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
An Evaluation of Contact Points for Security Notifications Miori Saito, Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2019-94 |
With the evolving threat of cyber attacks, the importance of security notifications is increasing. In general, informati... [more] |
ICSS2019-94 pp.195-200 |
ICSS, IPSJ-SPT |
2020-03-02 11:50 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Generating Adversarial Videos that Bypass Content Filtering Norihito Omori, Tatsuya Mori (Waseda Univ.) ICSS2019-95 |
A huge number of user-generated contents (UGC) are being uploaded on prominent internet video sharing sites such as YouT... [more] |
ICSS2019-95 pp.201-206 |
ICSS, IPSJ-SPT |
2020-03-02 13:30 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Implementation of aggregate message authentication and its evaluation Atsuhiro Yamagishi, Yoshio Takeuchi (JDC), Tatsuya Takehisa, Hidekazu Nishiura, Zoa Jiafa (NISSIN), Yu Imamura (JDC), Junji Sikata (YNU), Shoichi Hirose (JDC), Koji Nakao (YNU), Yuko Ishida, Hideki Imai, Yasuo Hirata (JDC) ICSS2019-96 |
[more] |
ICSS2019-96 pp.207-212 |
ICSS, IPSJ-SPT |
2020-03-02 13:50 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Extension of authentication method using hash chain aggregation Hirai Shinta, Soshi Masakazu (Hiroshima City Univ.) ICSS2019-97 |
(To be available after the conference date) [more] |
ICSS2019-97 pp.213-218 |
ICSS, IPSJ-SPT |
2020-03-02 14:10 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Securty Analysis of Salsa20 and ChaCha Using Inverse Function's Properties Yusuke Matsuoka, Atsuko Miyaji (Osaka Univ.) ICSS2019-98 |
[more] |
ICSS2019-98 pp.219-224 |
ICSS, IPSJ-SPT |
2020-03-02 14:30 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
The efficient and high level of commitment scheme with low output locality Hideaki Miyaji, Atsuko Miyaji (OU) ICSS2019-99 |
Applebaum et al. construct expand function which can achieve constant output locality. Author's constructed a commitment... [more] |
ICSS2019-99 pp.225-230 |
ICSS, IPSJ-SPT |
2020-03-03 10:10 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
ICSS2019-100 |
(To be available after the conference date) [more] |
ICSS2019-100 pp.283-288 |
ICSS, IPSJ-SPT |
2020-03-03 10:40 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
A Secure Second-price Sealed-Bid Auction using smart contract Yuki Sugitani, Atsuko Miyaji (Osaka Univ.) ICSS2019-101 |
[more] |
ICSS2019-101 pp.289-294 |
ICSS, IPSJ-SPT |
2020-03-03 11:00 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Performance Evaluation of an Access Control Mechanism with Session Types Tomoya Nishiguchi, Yuuki Takano, Atsuko Miyaji (Osaka Univ.) ICSS2019-102 |
Access control system is easy to happen to bug, because implementing an access control mechanism in business logic compl... [more] |
ICSS2019-102 pp.295-300 |
ICSS, IPSJ-SPT |
2020-03-03 11:20 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Realization of Privacy Policy with Attribute-Based Encryption and Its Applications Motoi Hayashi, Atsuko Miyaji (Osaka Univ.) ICSS2019-103 |
In recent years, online shopping is getting more and more popular and has been used by many users all over the world. On... [more] |
ICSS2019-103 pp.301-306 |
ICSS, IPSJ-SPT |
2020-03-03 11:40 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
ICSS2019-104 |
[more] |
ICSS2019-104 pp.307-312 |
ICSS, IPSJ-SPT |
2020-03-03 15:40 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Secure and Compact Elliptic Curve Scalar Multiplication based on Affine Jin Yaoan, Atsuko Miyaji (Osaka Univ.) ICSS2019-105 |
[more] |
ICSS2019-105 pp.321-333 |
ICSS, IPSJ-SPT |
2020-03-03 16:00 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
ICSS2019-106 |
[more] |
ICSS2019-106 pp.335-340 |
ICSS, IPSJ-SPT |
2020-03-03 16:20 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Study on Implementation of Anonymous Public-Key Certificates based on Elliptic Curve Kazuomi Oishi (SIST) ICSS2019-107 |
[more] |
ICSS2019-107 pp.341-344 |