Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NLP, CCS |
2024-06-06 10:20 |
Fukuoka |
West Japan General Exhibition Center AIM |
The Relationship between Power Laws in Neural Representation and Image Recognition Riku Matsumoto, Yasuhiro Tsuno (Ritsumeikan Univ.) NLP2024-16 CCS2024-3 |
Recent neuroscience research has found that when examining the dimensionality of the neural state space in the primary v... [more] |
NLP2024-16 CCS2024-3 pp.8-13 |
ITE-ME, ITE-IST, BioX, SIP, MI, IE [detail] |
2024-06-06 13:20 |
Niigata |
Nigata University (Ekinan-Campus "TOKIMATE") |
Enhanced Security with Random Binary Weights for Privacy-Preserving Federated Learning Hiroto Sawada, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (TMU) SIP2024-1 BioX2024-1 IE2024-1 MI2024-1 |
In this paper, we propose a novel method for enhancing security in privacy-preserving federated learning under the use o... [more] |
SIP2024-1 BioX2024-1 IE2024-1 MI2024-1 pp.1-6 |
ICSS, IPSJ-SPT |
2024-03-22 10:55 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Improved signature-embedding techniques against backdoor attacks on DNN models Akira Fujimoto, Yuntao Wang, Atsuko Miyaji (OU) ICSS2023-87 |
In recent years, machine learning, particularly deep learning, has made remarkable strides, and has great impact on our ... [more] |
ICSS2023-87 pp.129-136 |
ICSS, IPSJ-SPT |
2024-03-22 12:10 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Study of the Label-Flipping Poisoning Attack on Machine-Learning Based Malicious URL Query Detection. Akira Matsunami (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2023-90 |
In recent years, there have been a large increase of cyber attacks with increasing use of web applications. A method to... [more] |
ICSS2023-90 pp.153-159 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Integral Attack with Bit-Based Division Property on Block Cipher LBC Naoki Shibayama, Yasutaka Igarashi (Tokyo Univ. of Science) IT2023-131 ISEC2023-130 WBS2023-119 RCC2023-113 |
LBC is a block cipher proposed by Kapalova et al. in 2023. The block size is 64-bit, the secret key size is 80-bit, and ... [more] |
IT2023-131 ISEC2023-130 WBS2023-119 RCC2023-113 pp.350-357 |
PRMU, IBISML, IPSJ-CVIM |
2024-03-04 10:40 |
Hiroshima |
Hiroshima Univ. Higashi-Hiroshima campus (Primary: On-site, Secondary: Online) |
Poisoning Attack on Fairness of Fair Classification Algorithm through Threshold Control Dai Shengtian, Akimoto Youhei (Univ. of Tsukuba/RIKEN), Jun Sakuma (Tokyo Tech./RIKEN), Fukuchi Kazuto (Univ. of Tsukuba/RIKEN) IBISML2023-47 |
The ethical issues of artificial intelligence have become more severe as machine learning is widely used in several fiel... [more] |
IBISML2023-47 pp.49-56 |
SIP, SP, EA, IPSJ-SLP [detail] |
2024-03-01 09:30 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Black-Box Adversarial Attack for Math Formula Recognition Model Haruto Namura, Masatomo Yoshida (Doshisha Univ.), Nicola Adami (UNIBS), Masahiro Okuda (Doshisha Univ.) EA2023-110 SIP2023-157 SP2023-92 |
Remarkable advances in deep learning have greatly improved the accuracy of image analysis. The progress of deep learning... [more] |
EA2023-110 SIP2023-157 SP2023-92 pp.289-293 |
NS, IN (Joint) |
2024-02-29 10:45 |
Okinawa |
Okinawa Convention Center |
Proposal of a Data Leakage Attack against a Vertical Federated Learning System based on Knowledge Distillation Takumi Suimon, Yuki Koizumi, Junji Takemasa, Toru Hasegawa (Osaka Univ.) NS2023-187 |
Vertical federated learning is a method for participants who have data with the same samples but different features to c... [more] |
NS2023-187 pp.90-95 |
VLD, HWS, ICD |
2024-02-29 15:55 |
Okinawa |
(Primary: On-site, Secondary: Online) |
[Memorial Lecture]
Modeling of Tamper Resistance to Electromagnetic Side-channel Attacks on Voltage-scaled Circuits Kazuki Minamiguchi, Yoshihiro Midoh, Noriyuki Miura, Jun Shiomi (Osaka Univ.) VLD2023-117 HWS2023-77 ICD2023-106 |
The threat of information leakage by Side-Channel Attacks (SCAs) using ElectroMagnetic (EM) leakage is becoming more and... [more] |
VLD2023-117 HWS2023-77 ICD2023-106 p.99 |
SIP, IT, RCS |
2024-01-19 13:30 |
Miyagi |
(Primary: On-site, Secondary: Online) |
[Invited Talk]
Problem of Adversarial Attacks on CNN-based Image Classifiers and Countermeasures Minoru Kuribayashi (Tohoku Univ.) IT2023-67 SIP2023-100 RCS2023-242 |
It is well-known that discriminative models based on deep learning techniques may cause misclassification if adversarial... [more] |
IT2023-67 SIP2023-100 RCS2023-242 p.204 |
ICSS |
2023-11-16 15:20 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Attack Verification and Evaluation of Incremental Fault Analysis against AES Encryption Processing Device Miran Tamagawa, Yuichi Futa (TUT), Takehiko Mieno (AVASYS), Hiroyuki Okazaki (Shinshu University) ICSS2023-56 |
In recent years,there has been a growing concern about the impact of fault analysis attack,which use hardware failures a... [more] |
ICSS2023-56 pp.35-41 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2023-11-16 13:20 |
Kumamoto |
Civic Auditorium Sears Home Yume Hall (Primary: On-site, Secondary: Online) |
Tamper Resistance Evaluation on FPGA for Low-Latency Cipher Sonic Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52 |
Industry 5.0 promotes smart factories for system optimization by utilizing IoT and AI in the industrial field. The smart... [more] |
VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52 pp.101-105 |
MIKA (3rd) |
2023-10-11 14:30 |
Okinawa |
Okinawa Jichikaikan (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Detecting Poisoning Attacks Using Adversarial Examples in Deep Phishing Detection Koko Nishiura, Tomotaka Kimura, Jun Cheng (Doshisha Univ.) |
In recent years, the convenience of online services has greatly improved, but the number of phishing scams has skyrocket... [more] |
|
HWS |
2023-04-14 14:10 |
Oita |
(Primary: On-site, Secondary: Online) |
Modeling of Electromagnetic Leakage from Voltage-scaled Cryptographic Circuits Kazuki Minamiguchi, Yoshihiro Midoh, Noriyuki Miura, Jun Shiomi (Osaka Univ.) HWS2023-3 |
This paper evaluates an electromagnetic leakage model which predicts the supply voltage dependency by using practical cr... [more] |
HWS2023-3 pp.9-10 |
HWS |
2023-04-14 15:35 |
Oita |
(Primary: On-site, Secondary: Online) |
Object Generation - Backdoor Attack against Object-Detection DNN Triggered by Fault Injection into MIPI Takumi Takubo, Tatsuya Oyama, Kota Yoshida, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ.) HWS2023-6 |
Backdoor attacks that induce misclassification by poisoning training data and adding specific patterns (trigger marks) t... [more] |
HWS2023-6 pp.20-25 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 14:15 |
Online |
Online |
A Study for Predicting Correlation Power Analysis Results by Using High-SNR Plaintexts Selected Based on Linear Leakage Model Masaki Himuro, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) ISEC2022-10 SITE2022-14 BioX2022-35 HWS2022-10 ICSS2022-18 EMM2022-18 |
To reduce the number of traces for evaluating side-channel attack (SCA) resistance, some methods for performing correlat... [more] |
ISEC2022-10 SITE2022-14 BioX2022-35 HWS2022-10 ICSS2022-18 EMM2022-18 pp.18-22 |
R |
2022-06-16 14:50 |
Online |
Online |
A Note on Interval Reliability Analysis of Intrusion Tolerant Systems Subject to DoS Attacks Junjun Zheng (Ritsumeikan Univ.), Hiroyuki Okamura, Tadashi Dohi (Hiroshima Univ.) R2022-8 |
This paper focuses on the transient behavior of intrusion tolerant systems with preventive maintenance subject to DoS (D... [more] |
R2022-8 pp.13-18 |
SeMI, IPSJ-DPS, IPSJ-MBL, IPSJ-ITS |
2022-05-26 10:03 |
Okinawa |
(Primary: On-site, Secondary: Online) |
An Initial Study on Display-to-Camera Communication Systems Using Adversarial Attack on CNN Depth Estimation Model Lee Changseok, Hiraku Okada (Nagoya Univ.), Tadahiro Wada (Shizuoka Univ.), Chedlia Ben Naila, Masaaki Katayama (Nagoya Univ.) SeMI2022-2 |
Hidden screen-camera communication requires visual quality and robust communication performance. In this study, we demon... [more] |
SeMI2022-2 pp.5-10 |
VLD, HWS [detail] |
2022-03-08 14:55 |
Online |
Online |
Evaluation of Side-channel Leaks Specific to Unrolled AES Hardware Ayano Nakashima, Rei Ueno, Naofumi Homma (Tohoku Univ.) VLD2021-100 HWS2021-77 |
This paper presents the evaluation of a unique side-channel leakage occurred from the middle rounds
of (pipelined) unro... [more] |
VLD2021-100 HWS2021-77 pp.135-140 |
ICSS, IPSJ-SPT |
2022-03-08 10:00 |
Online |
Online |
Input predictive attack by keyboard acoustic emanations using BERT and its countermeasures Masahiro Iida (Teikyo Univ.), Mitsuaki Akiyama (NTT), Masaki Kamizono (DTCY), Takahiro Kasama (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Kyoto Sangyo Univ.), Atsuo Inomata (Osaka Univ.) ICSS2021-67 |
The Keyboard Acoustic Emanations has been proposed to estimate the input key from keystroke sounds as a kind of side-cha... [more] |
ICSS2021-67 pp.49-54 |