Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICD, HWS [detail] |
2020-10-26 13:50 |
Online |
Online |
Security Threats and Preventions for Photonics Computing Model Junko Takahashi, Koji Chida, Takeshi Sakamoto (NTT) HWS2020-33 ICD2020-22 |
This paper presents security analysis on photonic computing models in All-Photonics Network (APN). New computing archite... [more] |
HWS2020-33 ICD2020-22 pp.48-53 |
CPSY, DC, IPSJ-ARC [detail] |
2020-07-31 17:30 |
Online |
Online |
An Area Reduction Oriented Controller Augmentation Method Based on Functionally Equivalent Finite State Machine Generation Atsuya Tsujikawa, Toshinori Hosokawa (Nihon Univ.), Masayoshi Yoshimura (Kyoto Sangyo Univ.) CPSY2020-15 DC2020-15 |
In recent year, controller augmentation has been used for design-for-testability and design-for-security at register tra... [more] |
CPSY2020-15 DC2020-15 pp.93-98 |
NS |
2020-04-16 16:40 |
Online |
Online |
[Invited Talk]
Data Life-Cycle Protection for Ubiquitous Data Sharing Ruidong Li (NICT) NS2020-4 |
Huge amount of data raise a strong demand for a network infrastructure with the capability to support data sharing and r... [more] |
NS2020-4 pp.19-41 |
ISEC, IT, WBS |
2020-03-11 11:20 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
Applying Machine Learning to Malware Detection in Mobile Applications Yoshiki Kusama, Keiji Takeda, Kazuma Kobayashi, Osamu Nakamura (Keio Univ.), Lee Myoungje (LINE corp.) IT2019-112 ISEC2019-108 WBS2019-61 |
In this paper, we proposed and implemented a detection method that focuses on a binary file stored in an APK(Android app... [more] |
IT2019-112 ISEC2019-108 WBS2019-61 pp.151-157 |
NS, IN (Joint) |
2020-03-06 10:00 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
[Technology Exhibit]
Machine learning pipeline for analyzing Large-scale traffic Morikawa Akira, Bo Hu (NTT) NS2019-212 IN2019-103 |
Recently, machine learning becomes promising to automatically extract intelligence from network traffic for cybersecurit... [more] |
NS2019-212 IN2019-103 p.191(NS), p.151(IN) |
NS, IN (Joint) |
2020-03-06 10:10 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
Anomaly Detection in Smart Home Networks using Situation Estimation in-Home Activities Masahiro Tanaka, Masaaki Yamauchi, Yuichi Ohsita, Masayuki Murata (Osaka Univ.), Kensuke Ueda, Yoshiaki Kato (mitsubishi) IN2019-115 |
In this paper, we propose a method to detect the anomalous operation of home IoT devices focusing on the condition.
Our... [more] |
IN2019-115 pp.219-224 |
ICSS, IPSJ-SPT |
2020-03-02 10:20 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Estimation method of information asset security attributes using design mode Takeshi Ueda, Koichi Shimizu, Shun Hinatsu, Fumio Omatsu (Mitsubishi Electric Corp.) ICSS2019-69 |
In security evaluation such as risk analysis, analysis is performed based on the value of information assets in the syst... [more] |
ICSS2019-69 pp.7-12 |
SITE |
2019-12-06 13:25 |
Kanagawa |
|
Interpretation of Multi-Label Learning by combining two probability models
-- An approach that interprets evaluate texts by regarding labels as teacher data -- Kurebayashi Kosuke, Morizumi Tetsuya, Kinoshita Hirotsugu (Kanagawa Univ.) SITE2019-81 |
We have already proposed a security model with a three-layer structure of AI architecture. However, there is a certain l... [more] |
SITE2019-81 pp.7-12 |
SITE |
2019-12-06 15:40 |
Kanagawa |
|
"To be there" as an existence in logical space and an existence in probability measure space
-- "Shared logos (partage) on language games" as a necessary condition of physicality -- Tetsuya Morizumi (KU) SITE2019-86 |
How should the AI relate to the information security? The AI performs Bayesian estimation of a probability distribution ... [more] |
SITE2019-86 pp.41-46 |
SR |
2019-12-05 13:50 |
Okinawa |
Ishigaki City Hall (Ishigaki Island) |
[Poster Presentation]
Performance Evaluation of Secure Wireless Communications for PLNC with Untrusted Relay by Double-objective Optimization Problem Go Ikeuchi, Osamu Takyu (Shinshu Univ), Takeo Fujii (UEC), Tomoaki Ohtsuki (Keio Univ), Fumihito Sasamori, Shiro Handa (Shinshu Univ) SR2019-88 |
In this study, we have focused on wireless communication networks which can easily construct a network by using the rela... [more] |
SR2019-88 pp.15-22 |
VLD, DC, CPSY, RECONF, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC (Joint) [detail] |
2019-11-15 09:40 |
Ehime |
Ehime Prefecture Gender Equality Center |
Modeling attacks against device authentication using CMOS image sensor PUF Hiroshi Yamada, Shunsuke Okura, Mitsuru Shiozaki, Masayoshi Shirahata, Takeshi Fujino (Ritsumeikan Univ.) ICD2019-34 IE2019-40 |
A CMOS image sensor physically unclonable function (CIS-PUF) for device authentication by the unique responses extracted... [more] |
ICD2019-34 IE2019-40 pp.31-36 |
AP (2nd) |
|
Overseas |
Hotel Istana, Kuala Lumpur |
Energy Efficiency of Cooperative Jammer in a Spectrum Sharing Network Yee-Loo Foo (MMU, Malaysia) |
Underutilizing spectrum results in wastage. Eavesdropping compromises the secrecy of data. How to overcome the two probl... [more] |
|
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 09:30 |
Kochi |
Kochi University of Technology |
Generation of Family Resemblance Inference Rules by Boid Annotation and Labeled-LDA
-- A Machine Learning Approach to Integrate Inference Attack Analysis and Covert Channel Attack Analysis -- Kosuke Kurebayashi, Tetsuya Morizumi, Hirotsugu Kinoshita (KU) ISEC2019-42 SITE2019-36 BioX2019-34 HWS2019-37 ICSS2019-40 EMM2019-45 |
In this paper we propose a method for machine learning similar chains of words (word chains) similar to "rules for infer... [more] |
ISEC2019-42 SITE2019-36 BioX2019-34 HWS2019-37 ICSS2019-40 EMM2019-45 pp.243-249 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 10:55 |
Kochi |
Kochi University of Technology |
Stochastic Existence Connecting Logos that are not necessarily completely divided and Language Games
-- Limitations of Security Models and the Possibility of Artificial Intelligence -- Tetsuya Morizumi (KU) ISEC2019-49 SITE2019-43 BioX2019-41 HWS2019-44 ICSS2019-47 EMM2019-52 |
In this paper we describe that AI architecture including input data in artificial intelligence system for Bayesian estim... [more] |
ISEC2019-49 SITE2019-43 BioX2019-41 HWS2019-44 ICSS2019-47 EMM2019-52 pp.317-324 |
AI |
2019-07-22 16:30 |
Hokkaido |
|
Modeling of Cyber Attack Based on POMDP Kazuma Igami, Hirofumi Yamaki (Tokyo Denki Univ.) AI2019-15 |
APTs(Advanced Persistent Threats), which are a type of cyber-attack, are a major threat to information systems because t... [more] |
AI2019-15 pp.77-82 |
IT, ISEC, WBS |
2019-03-08 14:20 |
Tokyo |
University of Electro-Communications |
On Wireless Steganography based on OFDM and DFT-Precoding for IoT Networks Ryohei Yamaguchi, Hideki Ochiai, Junji Shikata (Yokohama Natl. Univ.) IT2018-124 ISEC2018-130 WBS2018-125 |
A method for improving security of IoT networks
by hiding secret
message against the risk of eavesdropping over wire... [more] |
IT2018-124 ISEC2018-130 WBS2018-125 pp.297-302 |
HWS, VLD |
2019-03-01 14:55 |
Okinawa |
Okinawa Ken Seinen Kaikan |
Performance and Security Evaluation of Ring Oscillator PUF Implemented on ASIC Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-131 HWS2018-94 |
This study evaluates the performance and the security of ring oscillator physical unclonable function (RO PUF) implement... [more] |
VLD2018-131 HWS2018-94 pp.225-230 |
HWS, VLD |
2019-03-01 15:20 |
Okinawa |
Okinawa Ken Seinen Kaikan |
An Attack with Linear Model Against Improved Arbiter PUF Susumu Matsumi, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-132 HWS2018-95 |
Imitations of electronic parts are distributed to the market, which is a serious problem. PUFs have attracted attention ... [more] |
VLD2018-132 HWS2018-95 pp.231-236 |
HWS, VLD |
2019-03-01 15:45 |
Okinawa |
Okinawa Ken Seinen Kaikan |
On Machine Learning Attack Tolerance for PUF-based Device Authentication System Tomoki Iizuka (UTokyo), Yasuhiro Ogasahara, Toshihiro Katashita, Yohei Hori (AIST), Hiromitsu Awano (Osaka Univ.), Makoto Ikeda (UTokyo) VLD2018-133 HWS2018-96 |
Double-Arbiter PUF (DAPUF) and PL-PUF are known to be highly resistant to machine learning attacks.
In this paper, we p... [more] |
VLD2018-133 HWS2018-96 pp.237-242 |
HWS, VLD |
2019-03-01 17:10 |
Okinawa |
Okinawa Ken Seinen Kaikan |
An Extended of Secure Remote Management Architecture for IoT-device Masahiro Shiraishi, Hiroki Ito, Keiichi Okabe (NTT) VLD2018-136 HWS2018-99 |
This paper provides a feasibility study of secure remote management architecture for IoT-device. IoT services exist in v... [more] |
VLD2018-136 HWS2018-99 pp.255-260 |