IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 84 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SR 2019-12-05
13:50
Okinawa Ishigaki City Hall (Ishigaki Island) [Poster Presentation] Performance Evaluation of Secure Wireless Communications for PLNC with Untrusted Relay by Double-objective Optimization Problem
Go Ikeuchi, Osamu Takyu (Shinshu Univ), Takeo Fujii (UEC), Tomoaki Ohtsuki (Keio Univ), Fumihito Sasamori, Shiro Handa (Shinshu Univ) SR2019-88
In this study, we have focused on wireless communication networks which can easily construct a network by using the rela... [more] SR2019-88
pp.15-22
SeMI, IPSJ-ITS, IPSJ-MBL, IPSJ-DPS 2019-05-24
11:50
Kagoshima Amami-shi Syakai Fukushi Center Impact Detection for Polyethylene Net Animal Guard Fencing
Takuya Kato, Izuru Nogaito, Eiji Utsunomiya (KDDI Research, Inc.) SeMI2019-13
Animal guard fencing is a way of the effective prevention of harmful wild animals which cause nearly twenty billion yen ... [more] SeMI2019-13
pp.177-181
IT, ISEC, WBS 2019-03-07
10:20
Tokyo University of Electro-Communications Coherence-based Spoken Machine Translation Recognition: Towards an Efficient Gateway to Detect Untrusted Information
Nguyen Son Hoang Quoc, Tran Phuong Thao, Seira Hidano, Shinsaku Kiyomoto (KDDI Research) IT2018-77 ISEC2018-83 WBS2018-78
The machine-translated text is playing an important role in modern life which establishes wide communication among vario... [more] IT2018-77 ISEC2018-83 WBS2018-78
pp.13-19
RCS, SR, SRW
(Joint)
2019-03-08
13:45
Kanagawa YRP Consideration of security for PLNC with Untrusted Relay by double-objective optimization problem
Go Ikeuchi, Osamu Takyu (Shinshu Univ), Takeo Fujii (UEC), Tomoaki Ohtsuki (Keio Univ), Fumihito Sasamori, Shiro Handa (Shinshu Univ) RCS2018-335
In this study, we have focused on wireless communication networks which can easily construct a network by using the rela... [more] RCS2018-335
pp.279-284
IN, NS
(Joint)
2019-03-04
09:00
Okinawa Okinawa Convention Center Intrusion Detection System using semi-supervised learning with Adversarial Autoencoder
Kazuki Hara, Kohei Shiomoto (Tokyo City Univ.) NS2018-193
In recent years the importance of intrusion detection system(IDS) is increasing. In particular, a method using machine l... [more] NS2018-193
pp.1-6
IN, NS, CS, NV
(Joint)
2018-09-07
09:20
Miyagi Research Institute of Electrical Communication, Tohoku Univ. A Consideration of Evaluation Dataset for Malware Detection System
Hisashi Takahara (UNP) IN2018-33
Today, while internet cyber-attacks are increasing, protection against the cyber-attacks have become indispensable. Amon... [more] IN2018-33
pp.65-69
SITE, IPSJ-EIP 2018-06-01
14:45
Kanagawa   Implementation and Evaluation of Intrusion Detection System for Malicious PC by Sensor Hosts
Hiroaki Kuno, Satoshi Kimura, Hiroyuki Inaba (KIT) SITE2018-4
In recent years, Intrusion Detection System(IDS) is not able to catch the unknown attack
as malware and its variant ar... [more]
SITE2018-4
pp.95-99
VLD, HWS
(Joint)
2018-02-28
09:55
Okinawa Okinawa Seinen Kaikan On Memory Size Reduction of Programmable Hardware for Random Forest based Network Intrusion Detection
Binbin Xue, Shinobu Nagayama, Masato Inagi, Shin'ichi Wakabayashi (Hiroshima City Univ.) VLD2017-90
In our previous research, we proposed dedicated programmable hardware of random forest based NIDSs. In this research, we... [more] VLD2017-90
pp.7-12
SIP, CAS, MSS, VLD 2017-06-19
11:40
Niigata Niigata University, Ikarashi Campus An Implementation Method of Reconfigurable Network Intrusion Detection Systems Based on Random Forests
Binbin Xue, Shinobu Nagayama, Masato Inagi, Shin'ichi Wakabayashi (Hiroshima City Univ.) CAS2017-7 VLD2017-10 SIP2017-31 MSS2017-7
In this paper, we propose an implementation method of reconfigurable network intrusion detection system based on random ... [more] CAS2017-7 VLD2017-10 SIP2017-31 MSS2017-7
pp.37-42
NLP 2017-05-12
11:00
Okayama Okayama University of Science Investigation of Fast Construction for Intrusion Detection System using Multi-Layer Extreme Learning Machine.
Daichi Noguchi, Masaharu Adachi (Tokyo Denki Univ.) NLP2017-18
Recently, there are incremental threats of cyber security for holding the Olympic Games in Tokyo in 2020. The fast const... [more] NLP2017-18
pp.87-92
IA, SITE, IPSJ-IOT [detail] 2017-03-03
14:50
Okinawa Culture Resort Festone (Okinawa) Network based detection of Remote Access Trojan communication by using packet entropy on early instruction stage
Masumi Uno (NAIST), Masahiro Ishii (Tokyo Tech), Atsuo Inomata (TDU), Ismail Arai, Kazutoshi Fujikawa (NAIST) SITE2016-68 IA2016-98
Confidential information have been leaked accidentally by targetted attacks by targeted attacks.
Remote Access Trojan/t... [more]
SITE2016-68 IA2016-98
pp.41-46
VLD 2017-03-02
09:00
Okinawa Okinawa Seinen Kaikan Generation of Optimum Screening Patterns for a Screening Circuit to Detect Network Intrusion
Tomoaki Hashimoto, Shinobu Nagayama, Masato Inagi, Shin'ichi Wakabayashi (Hiroshima City Univ.) VLD2016-108
In our previous study, we proposed a dedicated circuit, called a screening circuit, that screens packes on a network at ... [more] VLD2016-108
pp.37-42
ICSS 2016-11-25
15:20
Kanagawa Institute of Information Security Discussion and Evaluation on Regeneration of New Kyoto 2006+ Data Set
Ryunosuke Tada, Ryotaro Kobayashi (Toyohashi Univ. of Tech.), Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) ICSS2016-42
Network-based Intrusion Detection Systems (NIDSs) are used to counteract cyber-attacks, and thus various studies have be... [more] ICSS2016-42
pp.21-26
ICSS, IPSJ-SPT 2016-03-03
15:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University Detection of Vulnerability Scanning Using Features of Collective Accesses Collected from Several Honeypots
Naomi Kuze, Shu Ishikura (Osaka Univ.), Takeshi Yagi, Daiki Chiba (NTT), Masayuki Murata (Osaka Univ.) ICSS2015-55
Attacks against websites are increasing rapidly with the expansion of web services. Diversifying web services make it di... [more] ICSS2015-55
pp.47-52
ISEC, IT, WBS 2015-03-02
10:55
Fukuoka The University of Kitakyushu A Consideration of NTRU Whose Modular Polynomial Is All One Polynomial
Koki Misumi, Yasuyuki Nogami (Okayama Univ) IT2014-63 ISEC2014-76 WBS2014-55
Quantum computer will break most of recent public key cryptosystems by Shor's algorithm.
Post-quantum cryptosystem whic... [more]
IT2014-63 ISEC2014-76 WBS2014-55
pp.5-10
SIP, RCS 2015-01-23
11:55
Okayama Okayama Univ. Secure Cooperation Scheme Using Fountain codes to Resist Untrustworthy Relay
Hao Niu, Tiantian Jiang, Masaki Ito, Kaoru Sezaki (Univ. of Tokyo) SIP2014-106 RCS2014-294
Physical layer security, which exploits wireless channel fading to realize secure transmission, has been an emerging res... [more] SIP2014-106 RCS2014-294
pp.147-150
IBISML 2014-11-17
17:00
Aichi Nagoya Univ. [Poster Presentation] Training Algorithm for Restricted Boltzmann Machines Using Auxiliary Function Approach
Norihiro Takamune (Univ. of Tokyo), Hirokazu Kameoka (Univ. of Tokyo/NTT) IBISML2014-56
Layerwise pre-training is one of important elements for deep learning, and Restricted Boltzmann Machines (RBMs) is popul... [more] IBISML2014-56
pp.161-168
CPSY 2014-11-13
14:25
Hiroshima Hiroshima University A Note on Survivability Analysis for VM-Based Intrusion Tolerant System
Junjun Zheng, Hiroyuki Okamura, Tadashi Dohi (Hiroshima Univ.) CPSY2014-58
Survivability is the capability of a system to perform intended functions at a given instant in time after a subset of c... [more] CPSY2014-58
pp.25-30
CS, NS, IN
(Joint)
2014-09-12
13:25
Miyagi Tohoku Univ. Research Institute of Electrical Communication 2gokan Detection of Malicious Database Queries based on Matching with HTTP Requests
Yuichi Sudo, Takahiro Hamada, Yuichi Murata, Hideo Kitazume (NTT) IN2014-65
If an attacker takes over a Web server by vulnerability attack or fraud login and so on, the attacker can control the se... [more] IN2014-65
pp.99-104
MICT, WBS 2014-07-29
15:05
Osaka Osaka City Univ. (Umeda Satellite) [Encouragement Talk] Indoor Intruder Detection Sensor System using Ultra-Wideband Stepped-FM Scheme
Ryohei Nakamura (National Defense Academy) WBS2014-25 MICT2014-39
Home security sensor becomes more and more practical today for the protection against intruder, and several types of wir... [more] WBS2014-25 MICT2014-39
pp.89-94
 Results 21 - 40 of 84 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan