IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 41 - 60 of 164 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICD, HWS [detail] 2020-10-26
13:50
Online Online Security Threats and Preventions for Photonics Computing Model
Junko Takahashi, Koji Chida, Takeshi Sakamoto (NTT) HWS2020-33 ICD2020-22
This paper presents security analysis on photonic computing models in All-Photonics Network (APN). New computing archite... [more] HWS2020-33 ICD2020-22
pp.48-53
CPSY, DC, IPSJ-ARC [detail] 2020-07-31
17:30
Online Online An Area Reduction Oriented Controller Augmentation Method Based on Functionally Equivalent Finite State Machine Generation
Atsuya Tsujikawa, Toshinori Hosokawa (Nihon Univ.), Masayoshi Yoshimura (Kyoto Sangyo Univ.) CPSY2020-15 DC2020-15
In recent year, controller augmentation has been used for design-for-testability and design-for-security at register tra... [more] CPSY2020-15 DC2020-15
pp.93-98
NS 2020-04-16
16:40
Online Online [Invited Talk] Data Life-Cycle Protection for Ubiquitous Data Sharing
Ruidong Li (NICT) NS2020-4
Huge amount of data raise a strong demand for a network infrastructure with the capability to support data sharing and r... [more] NS2020-4
pp.19-41
ISEC, IT, WBS 2020-03-11
11:20
Hyogo University of Hyogo
(Cancelled but technical report was issued)
Applying Machine Learning to Malware Detection in Mobile Applications
Yoshiki Kusama, Keiji Takeda, Kazuma Kobayashi, Osamu Nakamura (Keio Univ.), Lee Myoungje (LINE corp.) IT2019-112 ISEC2019-108 WBS2019-61
In this paper, we proposed and implemented a detection method that focuses on a binary file stored in an APK(Android app... [more] IT2019-112 ISEC2019-108 WBS2019-61
pp.151-157
NS, IN
(Joint)
2020-03-06
10:00
Okinawa Royal Hotel Okinawa Zanpa-Misaki
(Cancelled but technical report was issued)
[Technology Exhibit] Machine learning pipeline for analyzing Large-scale traffic
Morikawa Akira, Bo Hu (NTT) NS2019-212 IN2019-103
Recently, machine learning becomes promising to automatically extract intelligence from network traffic for cybersecurit... [more] NS2019-212 IN2019-103
p.191(NS), p.151(IN)
NS, IN
(Joint)
2020-03-06
10:10
Okinawa Royal Hotel Okinawa Zanpa-Misaki
(Cancelled but technical report was issued)
Anomaly Detection in Smart Home Networks using Situation Estimation in-Home Activities
Masahiro Tanaka, Masaaki Yamauchi, Yuichi Ohsita, Masayuki Murata (Osaka Univ.), Kensuke Ueda, Yoshiaki Kato (mitsubishi) IN2019-115
In this paper, we propose a method to detect the anomalous operation of home IoT devices focusing on the condition.
Our... [more]
IN2019-115
pp.219-224
ICSS, IPSJ-SPT 2020-03-02
10:20
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Estimation method of information asset security attributes using design mode
Takeshi Ueda, Koichi Shimizu, Shun Hinatsu, Fumio Omatsu (Mitsubishi Electric Corp.) ICSS2019-69
In security evaluation such as risk analysis, analysis is performed based on the value of information assets in the syst... [more] ICSS2019-69
pp.7-12
SITE 2019-12-06
13:25
Kanagawa   Interpretation of Multi-Label Learning by combining two probability models -- An approach that interprets evaluate texts by regarding labels as teacher data --
Kurebayashi Kosuke, Morizumi Tetsuya, Kinoshita Hirotsugu (Kanagawa Univ.) SITE2019-81
We have already proposed a security model with a three-layer structure of AI architecture. However, there is a certain l... [more] SITE2019-81
pp.7-12
SITE 2019-12-06
15:40
Kanagawa   "To be there" as an existence in logical space and an existence in probability measure space -- "Shared logos (partage) on language games" as a necessary condition of physicality --
Tetsuya Morizumi (KU) SITE2019-86
How should the AI relate to the information security? The AI performs Bayesian estimation of a probability distribution ... [more] SITE2019-86
pp.41-46
SR 2019-12-05
13:50
Okinawa Ishigaki City Hall (Ishigaki Island) [Poster Presentation] Performance Evaluation of Secure Wireless Communications for PLNC with Untrusted Relay by Double-objective Optimization Problem
Go Ikeuchi, Osamu Takyu (Shinshu Univ), Takeo Fujii (UEC), Tomoaki Ohtsuki (Keio Univ), Fumihito Sasamori, Shiro Handa (Shinshu Univ) SR2019-88
In this study, we have focused on wireless communication networks which can easily construct a network by using the rela... [more] SR2019-88
pp.15-22
VLD, DC, CPSY, RECONF, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC
(Joint) [detail]
2019-11-15
09:40
Ehime Ehime Prefecture Gender Equality Center Modeling attacks against device authentication using CMOS image sensor PUF
Hiroshi Yamada, Shunsuke Okura, Mitsuru Shiozaki, Masayoshi Shirahata, Takeshi Fujino (Ritsumeikan Univ.) ICD2019-34 IE2019-40
A CMOS image sensor physically unclonable function (CIS-PUF) for device authentication by the unique responses extracted... [more] ICD2019-34 IE2019-40
pp.31-36
AP
(2nd)

Overseas Hotel Istana, Kuala Lumpur Energy Efficiency of Cooperative Jammer in a Spectrum Sharing Network
Yee-Loo Foo (MMU, Malaysia)
Underutilizing spectrum results in wastage. Eavesdropping compromises the secrecy of data. How to overcome the two probl... [more]
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
09:30
Kochi Kochi University of Technology Generation of Family Resemblance Inference Rules by Boid Annotation and Labeled-LDA -- A Machine Learning Approach to Integrate Inference Attack Analysis and Covert Channel Attack Analysis --
Kosuke Kurebayashi, Tetsuya Morizumi, Hirotsugu Kinoshita (KU) ISEC2019-42 SITE2019-36 BioX2019-34 HWS2019-37 ICSS2019-40 EMM2019-45
In this paper we propose a method for machine learning similar chains of words (word chains) similar to "rules for infer... [more] ISEC2019-42 SITE2019-36 BioX2019-34 HWS2019-37 ICSS2019-40 EMM2019-45
pp.243-249
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
10:55
Kochi Kochi University of Technology Stochastic Existence Connecting Logos that are not necessarily completely divided and Language Games -- Limitations of Security Models and the Possibility of Artificial Intelligence --
Tetsuya Morizumi (KU) ISEC2019-49 SITE2019-43 BioX2019-41 HWS2019-44 ICSS2019-47 EMM2019-52
In this paper we describe that AI architecture including input data in artificial intelligence system for Bayesian estim... [more] ISEC2019-49 SITE2019-43 BioX2019-41 HWS2019-44 ICSS2019-47 EMM2019-52
pp.317-324
AI 2019-07-22
16:30
Hokkaido   Modeling of Cyber Attack Based on POMDP
Kazuma Igami, Hirofumi Yamaki (Tokyo Denki Univ.) AI2019-15
APTs(Advanced Persistent Threats), which are a type of cyber-attack, are a major threat to information systems because t... [more] AI2019-15
pp.77-82
IT, ISEC, WBS 2019-03-08
14:20
Tokyo University of Electro-Communications On Wireless Steganography based on OFDM and DFT-Precoding for IoT Networks
Ryohei Yamaguchi, Hideki Ochiai, Junji Shikata (Yokohama Natl. Univ.) IT2018-124 ISEC2018-130 WBS2018-125
A method for improving security of IoT networks
by hiding secret
message against the risk of eavesdropping over wire... [more]
IT2018-124 ISEC2018-130 WBS2018-125
pp.297-302
HWS, VLD 2019-03-01
14:55
Okinawa Okinawa Ken Seinen Kaikan Performance and Security Evaluation of Ring Oscillator PUF Implemented on ASIC
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-131 HWS2018-94
This study evaluates the performance and the security of ring oscillator physical unclonable function (RO PUF) implement... [more] VLD2018-131 HWS2018-94
pp.225-230
HWS, VLD 2019-03-01
15:20
Okinawa Okinawa Ken Seinen Kaikan An Attack with Linear Model Against Improved Arbiter PUF
Susumu Matsumi, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-132 HWS2018-95
Imitations of electronic parts are distributed to the market, which is a serious problem. PUFs have attracted attention ... [more] VLD2018-132 HWS2018-95
pp.231-236
HWS, VLD 2019-03-01
15:45
Okinawa Okinawa Ken Seinen Kaikan On Machine Learning Attack Tolerance for PUF-based Device Authentication System
Tomoki Iizuka (UTokyo), Yasuhiro Ogasahara, Toshihiro Katashita, Yohei Hori (AIST), Hiromitsu Awano (Osaka Univ.), Makoto Ikeda (UTokyo) VLD2018-133 HWS2018-96
Double-Arbiter PUF (DAPUF) and PL-PUF are known to be highly resistant to machine learning attacks.
In this paper, we p... [more]
VLD2018-133 HWS2018-96
pp.237-242
HWS, VLD 2019-03-01
17:10
Okinawa Okinawa Ken Seinen Kaikan An Extended of Secure Remote Management Architecture for IoT-device
Masahiro Shiraishi, Hiroki Ito, Keiichi Okabe (NTT) VLD2018-136 HWS2018-99
This paper provides a feasibility study of secure remote management architecture for IoT-device. IoT services exist in v... [more] VLD2018-136 HWS2018-99
pp.255-260
 Results 41 - 60 of 164 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan