Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SR |
2023-11-10 11:10 |
Miyagi |
(Primary: On-site, Secondary: Online) |
[Short Paper]
Model Sharing and Learning for Visually Secure Deep Joint Source Channel Coding Yuyang Fu, Katsuya Suto (UEC) SR2023-59 |
Research and development of Deep Joint Source Channel Coding (DeepJSCC) technology, which is a data-driven design of inf... [more] |
SR2023-59 pp.64-66 |
IN, ICTSSL, IEE-SMF |
2023-10-20 14:40 |
Fukuoka |
Fukuoka University |
A Study on Applying Digital Twin-Assisted Security Platform for Cyber-Physical Systems to Supply Chain Keizo Sugiyama (KDDI Research) ICTSSL2023-32 |
The convergence of cyberspace and physical space is becoming more significant towards Beyond 5G. The impact of attacks, ... [more] |
ICTSSL2023-32 pp.42-46 |
BioX |
2023-10-12 14:45 |
Okinawa |
Nobumoto Ohama Memorial Hall |
A Study on Federated Learning System for Highly Accurate Biometric Authentication Yusei Suzuki, Yosuke Kaga (Hitachi) BioX2023-58 |
With the development of machine learning on large-scale datasets, the accuracy of biometric authentication has significa... [more] |
BioX2023-58 pp.2-7 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 11:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Is Copying for Information Security Research ‘Fair Use’?
-- Apple Inc. v. Corellium, Inc., No. 21-12835 (11th Cir. 2023) -- Yusuke Tachibana (FIT) ISEC2023-49 SITE2023-43 BioX2023-52 HWS2023-49 ICSS2023-46 EMM2023-49 |
The replication of third-party software in the realm of information security research has the potential to encroach upon... [more] |
ISEC2023-49 SITE2023-43 BioX2023-52 HWS2023-49 ICSS2023-46 EMM2023-49 pp.229-231 |
SeMI, RCS, RCC, NS, SR (Joint) |
2023-07-13 09:25 |
Osaka |
Osaka University Nakanoshima Center + Online (Primary: On-site, Secondary: Online) |
A Study on Complexity Reduction of Bit Assignment and Performance Improvement by Channel Code Concatenation in Chaos Modulation Ryo Tozawa, Yuuki Mori, Seiya Yamashita, Eiji Okamoto (NITech), Tetsuya Yamamoto (Panasonic) RCS2023-86 |
In recent years, with the rapid increase of Internet of Things (IoT) devices in industries, healthcare, and other fields... [more] |
RCS2023-86 pp.33-38 |
IA, ICSS |
2023-06-20 16:00 |
Saga |
Saga Univ. (Primary: On-site, Secondary: Online) |
[Invited Talk]
Cybersecurity education and the role of universities Hiroshi Koide (Kyushu Univ.) IA2023-6 ICSS2023-6 |
In this presentation, the speaker will first discuss his experiences in the cybersecurity human resource development pro... [more] |
IA2023-6 ICSS2023-6 p.31 |
HWS |
2023-04-15 09:15 |
Oita |
(Primary: On-site, Secondary: Online) |
An AES Cryptographic Processor with Partial Re-Keying Scheme Utilizing Physical Attack Sensor Ryuki Ikemoto, Soichiro Fujii (Osaka Univ.), Yuki Yamashita, Makoto Nagata (Kobe Univ.), Jun Shiomi, Yoshihiro Midoh, Noriyuki Miura (Osaka Univ.) HWS2023-9 |
We propose a partial secret key update method for AES cryptography using sensors that can detect physical attacks on cry... [more] |
HWS2023-9 pp.34-36 |
DC, CPSY, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2023-03-24 09:00 |
Kagoshima |
Amagi Town Disaster Prevention Center (Tokunoshima) (Primary: On-site, Secondary: Online) |
A preliminary study on time-dependency of cyber security vulnerability assessment Takashi Minohara, Naohiro Kubota (Takushoku Univ.) CPSY2022-42 DC2022-101 |
Information system administrators must pay attention to system vulnerability information and take appropriate measures a... [more] |
CPSY2022-42 DC2022-101 pp.49-54 |
RCC, ISEC, IT, WBS |
2023-03-14 13:50 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Secure communication based on high precision space-time synchronization Kouki Yonaga, Nobuyasu Shiga, Satoshi Yasuda, Kenichi Takizawa, Maki Yoshida (NICT) IT2022-83 ISEC2022-62 WBS2022-80 RCC2022-80 |
This research aims to establish a new technology to realize secure communication based on space-time synchro- nization c... [more] |
IT2022-83 ISEC2022-62 WBS2022-80 RCC2022-80 pp.97-102 |
RCC, ISEC, IT, WBS |
2023-03-15 13:25 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Generalized Unicity Distance and its Application to Y-00 Quantum Stream Cipher Masaki Sohma (Tamagawa Univ.), Osamu Hirota (Chuo Univ.) IT2022-128 ISEC2022-107 WBS2022-125 RCC2022-125 |
Shannon proposed a theory to evaluate cryptographic functions based on the entropy theory he had developed in order to a... [more] |
IT2022-128 ISEC2022-107 WBS2022-125 RCC2022-125 pp.378-385 |
ICSS, IPSJ-SPT |
2023-03-13 14:40 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Consideration of a Packet Level Anomaly Communication Classification Model Using Word Embedding and LSTM Yoshikatsu Kashiwabara, Kohei Miyamoto, Iida Masazumi, Shota Kawanaka (Kyushu Univ), Han Chansu, Ban Tao, Kenshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ) ICSS2022-53 |
In recent years, network-based intrusion detection systems (NIDS), which are systems for detecting unauthorized access o... [more] |
ICSS2022-53 pp.31-36 |
ICSS, IPSJ-SPT |
2023-03-13 16:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
A Study on Dynamic Secure Network for Traffic and Logistics with Supermassive and Supervarious Mobilities Masaru Takeuchi, Toshiaki Saisho, Junji Shikata (JDC), Toshio Sato, Kazue Sako, Jiro Katto, Takuro Sato (WU) ICSS2022-68 |
In the era of Beyond 5G/6G, effective use of space-time is expected by cooperative operation of a large number and varie... [more] |
ICSS2022-68 pp.121-126 |
HWS, VLD |
2023-03-04 13:30 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Threat of EM Information Leakage from Speakerphones Due to IEMI and Suppression Indexes for EMC Countermeasures Seiya Takano, Yuichi Hayashi (NAIST) VLD2022-120 HWS2022-91 |
Threats of causing forced electromagnetic information leakage by irradiating devices with electromagnetic waves have bee... [more] |
VLD2022-120 HWS2022-91 pp.261-266 |
HWS, VLD |
2023-03-04 13:55 |
Okinawa |
(Primary: On-site, Secondary: Online) |
* Masaru Mashiba, Kazuki Monta (Kobe Univ.), Takaaki Okidono (SCU), Takuzi Miki, Nagata Makoto (Kobe Univ.) VLD2022-121 HWS2022-92 |
With the development of IoT, security is becoming increasingly important. Confidential information and other information... [more] |
VLD2022-121 HWS2022-92 pp.267-272 |
IE, ITS, ITE-MMS, ITE-ME, ITE-AIT [detail] |
2023-02-22 10:15 |
Hokkaido |
Hokkaido Univ. |
Generation Method of Targeted Adversarial Examples using Gradient Information for the Target Class of the Image Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ITS2022-61 IE2022-78 |
With the advancement of AI technology, the vulnerability of AI system is pointed out. The adversarial examples (AE), whi... [more] |
ITS2022-61 IE2022-78 pp.107-111 |
IT, RCS, SIP |
2023-01-24 10:25 |
Gunma |
Maebashi Terrsa (Primary: On-site, Secondary: Online) |
A Study on Bit Error Rate Improvement of Chaos Modulation By Bit Assignment Using Nonlinear Optimization Algorithm Ryo Tozawa, Keisuke Asano, Takumi Abe, Kenta Kato, Eiji Okamoto (NIT) IT2022-30 SIP2022-81 RCS2022-209 |
In recent years, the number of Internet of things (IoT) devices has increased and they are used in industrial and medica... [more] |
IT2022-30 SIP2022-81 RCS2022-209 pp.7-12 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2022-11-29 15:05 |
Kumamoto |
(Primary: On-site, Secondary: Online) |
Evaluation of power delivery networks in secure semiconductor systems Masaru Mashiba, Kazuki Monta (Kobe Univ.), Takaaki Okidono (SCU), Takuzi Miki, Makoto Nagata (Kobe Univ.) VLD2022-33 ICD2022-50 DC2022-49 RECONF2022-56 |
With the development of the IoT, hardware security is becoming increasingly important. Physical attacks on cryptoprocess... [more] |
VLD2022-33 ICD2022-50 DC2022-49 RECONF2022-56 pp.82-86 |
NS, ICM, CQ, NV (Joint) |
2022-11-24 11:10 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
Deep Learning Side-Channel Attack in Noise Based Countermeasure Simon Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NS2022-103 |
The IoT requires the implementation of cryptographic techniques to ensure the confidentiality, integrity, and availabili... [more] |
NS2022-103 pp.19-22 |
NS, ICM, CQ, NV (Joint) |
2022-11-24 11:35 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
Design and Trial of Cyber Security Exercise for Basic CISO Skillset Tatsumi Seko, Touri Nakagawa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-104 |
Conventional security officers lack the authority and responsibility to make decisions related to management and are not... [more] |
NS2022-104 pp.23-28 |
EA, EMM, ASJ-H |
2022-11-22 13:00 |
Online |
Online |
[Fellow Memorial Lecture]
Security and Privacy Preservation for Speech Signal
-- Approach from speech information hiding technology -- Masashi Unoki (JAIST) EA2022-60 EMM2022-60 |
Non-authentic but skillfully fabricated artificial replicas of authentic media in the real world are known as “media clo... [more] |
EA2022-60 EMM2022-60 pp.99-104 |