IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 547 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SR 2023-11-10
11:10
Miyagi
(Primary: On-site, Secondary: Online)
[Short Paper] Model Sharing and Learning for Visually Secure Deep Joint Source Channel Coding
Yuyang Fu, Katsuya Suto (UEC) SR2023-59
Research and development of Deep Joint Source Channel Coding (DeepJSCC) technology, which is a data-driven design of inf... [more] SR2023-59
pp.64-66
IN, ICTSSL, IEE-SMF 2023-10-20
14:40
Fukuoka Fukuoka University A Study on Applying Digital Twin-Assisted Security Platform for Cyber-Physical Systems to Supply Chain
Keizo Sugiyama (KDDI Research) ICTSSL2023-32
The convergence of cyberspace and physical space is becoming more significant towards Beyond 5G. The impact of attacks, ... [more] ICTSSL2023-32
pp.42-46
BioX 2023-10-12
14:45
Okinawa Nobumoto Ohama Memorial Hall A Study on Federated Learning System for Highly Accurate Biometric Authentication
Yusei Suzuki, Yosuke Kaga (Hitachi) BioX2023-58
With the development of machine learning on large-scale datasets, the accuracy of biometric authentication has significa... [more] BioX2023-58
pp.2-7
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
11:00
Hokkaido Hokkaido Jichiro Kaikan Is Copying for Information Security Research ‘Fair Use’? -- Apple Inc. v. Corellium, Inc., No. 21-12835 (11th Cir. 2023) --
Yusuke Tachibana (FIT) ISEC2023-49 SITE2023-43 BioX2023-52 HWS2023-49 ICSS2023-46 EMM2023-49
The replication of third-party software in the realm of information security research has the potential to encroach upon... [more] ISEC2023-49 SITE2023-43 BioX2023-52 HWS2023-49 ICSS2023-46 EMM2023-49
pp.229-231
SeMI, RCS, RCC, NS, SR
(Joint)
2023-07-13
09:25
Osaka Osaka University Nakanoshima Center + Online
(Primary: On-site, Secondary: Online)
A Study on Complexity Reduction of Bit Assignment and Performance Improvement by Channel Code Concatenation in Chaos Modulation
Ryo Tozawa, Yuuki Mori, Seiya Yamashita, Eiji Okamoto (NITech), Tetsuya Yamamoto (Panasonic) RCS2023-86
In recent years, with the rapid increase of Internet of Things (IoT) devices in industries, healthcare, and other fields... [more] RCS2023-86
pp.33-38
IA, ICSS 2023-06-20
16:00
Saga Saga Univ.
(Primary: On-site, Secondary: Online)
[Invited Talk] Cybersecurity education and the role of universities
Hiroshi Koide (Kyushu Univ.) IA2023-6 ICSS2023-6
In this presentation, the speaker will first discuss his experiences in the cybersecurity human resource development pro... [more] IA2023-6 ICSS2023-6
p.31
HWS 2023-04-15
09:15
Oita
(Primary: On-site, Secondary: Online)
An AES Cryptographic Processor with Partial Re-Keying Scheme Utilizing Physical Attack Sensor
Ryuki Ikemoto, Soichiro Fujii (Osaka Univ.), Yuki Yamashita, Makoto Nagata (Kobe Univ.), Jun Shiomi, Yoshihiro Midoh, Noriyuki Miura (Osaka Univ.) HWS2023-9
We propose a partial secret key update method for AES cryptography using sensors that can detect physical attacks on cry... [more] HWS2023-9
pp.34-36
DC, CPSY, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] 2023-03-24
09:00
Kagoshima Amagi Town Disaster Prevention Center (Tokunoshima)
(Primary: On-site, Secondary: Online)
A preliminary study on time-dependency of cyber security vulnerability assessment
Takashi Minohara, Naohiro Kubota (Takushoku Univ.) CPSY2022-42 DC2022-101
Information system administrators must pay attention to system vulnerability information and take appropriate measures a... [more] CPSY2022-42 DC2022-101
pp.49-54
RCC, ISEC, IT, WBS 2023-03-14
13:50
Yamaguchi
(Primary: On-site, Secondary: Online)
Secure communication based on high precision space-time synchronization
Kouki Yonaga, Nobuyasu Shiga, Satoshi Yasuda, Kenichi Takizawa, Maki Yoshida (NICT) IT2022-83 ISEC2022-62 WBS2022-80 RCC2022-80
This research aims to establish a new technology to realize secure communication based on space-time synchro- nization c... [more] IT2022-83 ISEC2022-62 WBS2022-80 RCC2022-80
pp.97-102
RCC, ISEC, IT, WBS 2023-03-15
13:25
Yamaguchi
(Primary: On-site, Secondary: Online)
Generalized Unicity Distance and its Application to Y-00 Quantum Stream Cipher
Masaki Sohma (Tamagawa Univ.), Osamu Hirota (Chuo Univ.) IT2022-128 ISEC2022-107 WBS2022-125 RCC2022-125
Shannon proposed a theory to evaluate cryptographic functions based on the entropy theory he had developed in order to a... [more] IT2022-128 ISEC2022-107 WBS2022-125 RCC2022-125
pp.378-385
ICSS, IPSJ-SPT 2023-03-13
14:40
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Consideration of a Packet Level Anomaly Communication Classification Model Using Word Embedding and LSTM
Yoshikatsu Kashiwabara, Kohei Miyamoto, Iida Masazumi, Shota Kawanaka (Kyushu Univ), Han Chansu, Ban Tao, Kenshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ) ICSS2022-53
In recent years, network-based intrusion detection systems (NIDS), which are systems for detecting unauthorized access o... [more] ICSS2022-53
pp.31-36
ICSS, IPSJ-SPT 2023-03-13
16:30
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
A Study on Dynamic Secure Network for Traffic and Logistics with Supermassive and Supervarious Mobilities
Masaru Takeuchi, Toshiaki Saisho, Junji Shikata (JDC), Toshio Sato, Kazue Sako, Jiro Katto, Takuro Sato (WU) ICSS2022-68
In the era of Beyond 5G/6G, effective use of space-time is expected by cooperative operation of a large number and varie... [more] ICSS2022-68
pp.121-126
HWS, VLD 2023-03-04
13:30
Okinawa
(Primary: On-site, Secondary: Online)
Threat of EM Information Leakage from Speakerphones Due to IEMI and Suppression Indexes for EMC Countermeasures
Seiya Takano, Yuichi Hayashi (NAIST) VLD2022-120 HWS2022-91
Threats of causing forced electromagnetic information leakage by irradiating devices with electromagnetic waves have bee... [more] VLD2022-120 HWS2022-91
pp.261-266
HWS, VLD 2023-03-04
13:55
Okinawa
(Primary: On-site, Secondary: Online)
*
Masaru Mashiba, Kazuki Monta (Kobe Univ.), Takaaki Okidono (SCU), Takuzi Miki, Nagata Makoto (Kobe Univ.) VLD2022-121 HWS2022-92
With the development of IoT, security is becoming increasingly important. Confidential information and other information... [more] VLD2022-121 HWS2022-92
pp.267-272
IE, ITS, ITE-MMS, ITE-ME, ITE-AIT [detail] 2023-02-22
10:15
Hokkaido Hokkaido Univ. Generation Method of Targeted Adversarial Examples using Gradient Information for the Target Class of the Image
Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ITS2022-61 IE2022-78
With the advancement of AI technology, the vulnerability of AI system is pointed out. The adversarial examples (AE), whi... [more] ITS2022-61 IE2022-78
pp.107-111
IT, RCS, SIP 2023-01-24
10:25
Gunma Maebashi Terrsa
(Primary: On-site, Secondary: Online)
A Study on Bit Error Rate Improvement of Chaos Modulation By Bit Assignment Using Nonlinear Optimization Algorithm
Ryo Tozawa, Keisuke Asano, Takumi Abe, Kenta Kato, Eiji Okamoto (NIT) IT2022-30 SIP2022-81 RCS2022-209
In recent years, the number of Internet of things (IoT) devices has increased and they are used in industrial and medica... [more] IT2022-30 SIP2022-81 RCS2022-209
pp.7-12
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2022-11-29
15:05
Kumamoto  
(Primary: On-site, Secondary: Online)
Evaluation of power delivery networks in secure semiconductor systems
Masaru Mashiba, Kazuki Monta (Kobe Univ.), Takaaki Okidono (SCU), Takuzi Miki, Makoto Nagata (Kobe Univ.) VLD2022-33 ICD2022-50 DC2022-49 RECONF2022-56
With the development of the IoT, hardware security is becoming increasingly important. Physical attacks on cryptoprocess... [more] VLD2022-33 ICD2022-50 DC2022-49 RECONF2022-56
pp.82-86
NS, ICM, CQ, NV
(Joint)
2022-11-24
11:10
Fukuoka Humanities and Social Sciences Center, Fukuoka Univ. + Online
(Primary: On-site, Secondary: Online)
Deep Learning Side-Channel Attack in Noise Based Countermeasure Simon
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NS2022-103
The IoT requires the implementation of cryptographic techniques to ensure the confidentiality, integrity, and availabili... [more] NS2022-103
pp.19-22
NS, ICM, CQ, NV
(Joint)
2022-11-24
11:35
Fukuoka Humanities and Social Sciences Center, Fukuoka Univ. + Online
(Primary: On-site, Secondary: Online)
Design and Trial of Cyber Security Exercise for Basic CISO Skillset
Tatsumi Seko, Touri Nakagawa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-104
Conventional security officers lack the authority and responsibility to make decisions related to management and are not... [more] NS2022-104
pp.23-28
EA, EMM, ASJ-H 2022-11-22
13:00
Online Online [Fellow Memorial Lecture] Security and Privacy Preservation for Speech Signal -- Approach from speech information hiding technology --
Masashi Unoki (JAIST) EA2022-60 EMM2022-60
Non-authentic but skillfully fabricated artificial replicas of authentic media in the real world are known as “media clo... [more] EA2022-60 EMM2022-60
pp.99-104
 Results 21 - 40 of 547 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan