Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SS |
2022-03-07 14:30 |
Online |
Online |
Learning Assumptions for Compositional Verification of Timed Systems with Tree Queries Kotaro Niimi, Shoji Yuen (Nagoya Univ) SS2021-49 |
This paper presents an automatic assumption-learning for compositional verification of timed systems. We focus on Assume... [more] |
SS2021-49 pp.43-48 |
IA, SITE, IPSJ-IOT [detail] |
2022-03-07 09:20 |
Kyoto |
Kyoto University, Yoshida Campus (Primary: On-site, Secondary: Online) |
Data Plane Anomaly Detection by Traffic Monitoring Per-process in Each Host on SDN Naoki Moriyama (TUMSAT), Tomoki Amano (NYK), Takahiro Shimizu (LINE), Kohta Ohshima (TUMSAT), Naoya Kitagawa (NII) SITE2021-46 IA2021-59 |
(To be available after the conference date) [more] |
SITE2021-46 IA2021-59 pp.1-6 |
CNR, BioX |
2022-03-04 14:20 |
Online |
Online |
Synthesizing Deep Master Voices for Wolf Attacking on Speaker Recognition Systems Jun Tsuchiya, Masakatsu Nishigaki, Tetsushi Ohki (Shizuoka Univ.) BioX2021-53 CNR2021-34 |
In this paper, we propose an attack on speaker verification systems by Deep Master Voice using GAN-based wolf voice.GAN-... [more] |
BioX2021-53 CNR2021-34 pp.33-38 |
QIT (2nd) |
2021-11-30 09:50 |
Online |
Online |
Study on quantum algorithms for gradient estimation of integer polynomials Shinichi Mizuhara (Univ. of Tokyo), Yutaro Iiyama (ICEPP), Shoji Asai (Univ. of Tokyo) |
Although efficient quantum algorithms for computing gradients of real functions already exist, they tend to be applicabl... [more] |
|
QIT (2nd) |
2021-12-01 14:00 |
Online |
Online |
Divide-and-conquer verification method for noisy intermediate-scale quantum computation Yuki Takeuchi, Yasuhiro Takahashi (NTT), Tomoyuki Morimae (Kyoto Univ.), Seiichiro Tani (NTT) |
Several noisy intermediate-scale quantum computations can be regarded as logarithmic-depth quantum circuits on a sparse ... [more] |
|
ICSS |
2021-11-29 13:00 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Current status, issues, and research trends of user authentication in mobile networks Toshiaki Saisho (Advanced IT Corp.), Shigeo Tsujii (Chuo Univ.), Kouichi Sakurai (Kyushu Univ./ATR) ICSS2021-46 |
We will report on the current status of 5G, issues to be examined for Beyond 5G / 6G, research trends, etc. regarding se... [more] |
ICSS2021-46 pp.1-6 |
SANE |
2021-11-11 13:20 |
Online |
Online |
TDOA and AOA Measurement System for Investigating Aircraft Position Verification Junichi Naganawa, Hiromi Miyazaki, Hirohisa Tajima, Tadashi Koga, Jun Kitaori (ENRI) SANE2021-44 |
ADS-B (Automatic Dependent Surveillance—Broadcast) is an emerging means of aeronautical surveillance for air traffic con... [more] |
SANE2021-44 pp.65-70 |
SANE |
2021-06-25 14:20 |
Online |
Online |
System Design Consideration for Aircraft Position Verification Method using TDOA and AOA Junichi Naganawa, Hiromi Miyazaki, Tadashi Koga, Hirohisa tajima, Yasuyuki Kakubari (ENRI) SANE2021-14 |
ADS-B (Automatic Dependent Surveillance-Broadcast) is one of the next generation aeronautical surveillance systems, wher... [more] |
SANE2021-14 pp.29-34 |
IE, SIP, BioX, ITE-IST, ITE-ME [detail] |
2021-06-04 10:30 |
Online |
Online |
Handwriting Verification Combining Minutiae Matching and DP Matching Nobuyuki Nishiuchi, Yuichi Yoshida (TMU), Piotr Szymkowski, Khalid Saeed (BUT) SIP2021-8 BioX2021-8 IE2021-8 |
In recent years, the use of pen tablets to sign has been increasing, and it is thought that the need for handwriting ver... [more] |
SIP2021-8 BioX2021-8 IE2021-8 pp.36-40 |
ITS, IEE-ITS |
2021-03-15 15:05 |
Online |
Online |
Model Checking-Based Verification of Token-Based Traffic Control for Roundabouts Tatsuhiro Tsuchiya (Osaka Univ.), Satoshi Otsuka (Hitachi) ITS2020-43 |
This paper reports the results of model checking-based verification of a traffic control mechanism for roundabouts. This... [more] |
ITS2020-43 pp.41-44 |
SIS |
2021-03-04 15:50 |
Online |
Online |
[Invited Talk]
A Proposal in Order to use AI Safely for Control Nobuyasu Kanekawa (Hitachi) SIS2020-50 |
The research of the deep learning which developed the "neural Network" proposed by the second AI (artificial intelligenc... [more] |
SIS2020-50 pp.83-87 |
IN, NS (Joint) |
2021-03-05 14:00 |
Online |
Online |
SDN Data-Plane Verification Method using End-to-End Traffic Statistics Tomoki Amano (TUMSAT), Takahiro Shimizu (LINE), Naoya Kitagawa (NII), Kohta Ohshima (TUMSAT) NS2020-163 |
(To be available after the conference date) [more] |
NS2020-163 pp.238-243 |
SS |
2021-03-04 13:00 |
Online |
Online |
SS2020-40 |
This paper describes an attempt to test distributed fault-tolerant algorithms. The core idea of the attempt is to test ... [more] |
SS2020-40 pp.73-77 |
HCGSYMPO (2nd) |
2020-12-15 - 2020-12-17 |
Online |
Online |
Speaker verification system using singing voice Yui Moriyama, Yasuo Horiuchi, Shingo Kuroiwa (Chiba Univ.) |
We propose to use a singing voice of one or two phrases in a speaker verification system. The system consists of a tradi... [more] |
|
NS, ICM, CQ, NV (Joint) |
2020-11-27 11:45 |
Online |
Online |
A Proposal of Framework for Authentication Systems and Verification Method Motoshi Horii, Toshihiro Shimizu (Fujitsu Lab.), Satoshi Imai (Fujitsu) CQ2020-58 |
With the digitization of various procedures, various security incidents have been occurring frequently. To prevent the o... [more] |
CQ2020-58 pp.62-65 |
VLD, DC, RECONF, ICD, IPSJ-SLDM (Joint) [detail] |
2020-11-18 13:00 |
Online |
Online |
[Keynote Address]
Quality Assurances of the Fugaku Supercomputer: Function, Performance and Power Takahide Yoshikawa (FLAB) VLD2020-36 ICD2020-56 DC2020-56 RECONF2020-55 |
The Fugaku Supercomputer has about 160,000 CPUs, and once a problem occurs after assembling, it is challenging to fix. I... [more] |
VLD2020-36 ICD2020-56 DC2020-56 RECONF2020-55 p.138 |
NS, IN (Joint) |
2020-03-06 11:40 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
Traffic Flow Statistics Estimation Method by Flow De-Aggregation for SDN Data-Plane Verification Takahiro Shimizu, Naoya Kitagawa, Nariyoshi Yamai (TUAT) IN2019-127 |
Software Designed Network (SDN) is vulnerable to attacks by compromised switches because software switches commonly used... [more] |
IN2019-127 pp.291-296 |
SS |
2020-03-04 15:10 |
Okinawa |
(Cancelled but technical report was issued) |
Transforming Programs with Exclusive Control into Logically Constrained Term Rewrite Systems Misaki Kojima, Naoki Nishida, Yutaka Matsubara, Masahiko Sakai (Nagoya Univ.) SS2019-46 |
To apply Logically Constrained Term Rewrite Systems (LCTRSs, for short) to program verification, a previous work targets... [more] |
SS2019-46 pp.31-36 |
HWS, VLD [detail] |
2020-03-04 10:30 |
Okinawa |
Okinawa Ken Seinen Kaikan (Cancelled but technical report was issued) |
An EVBDD-based Design Verification for Elementary Function Generators Hiroto Fukuhara, Shinobu Nagayama, Masato Inagi, Shin'ichi Wakabayashi (HCU) VLD2019-96 HWS2019-69 |
This paper proposes a design verification based on edge-valued binary decision
diagrams (EVBDDs) for elementary functio... [more] |
VLD2019-96 HWS2019-69 pp.13-18 |
BioX, CNR |
2020-03-05 14:40 |
Tokyo |
(Cancelled but technical report was issued) |
A Proposal of Signature Verification Using Minutia Yuichi Yoshida, Nobuyuki Nishiuchi (TMU), Piotr Szymkowski, Khalid Saeed (BTU) BioX2019-74 CNR2019-57 |
Currently, the handwriting verification has been attracting attention in Japan with the progress of internationalization... [more] |
BioX2019-74 CNR2019-57 pp.71-74 |