|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, IN (Joint) |
2024-02-29 09:45 |
Okinawa |
Okinawa Convention Center |
Communication cost and performance evaluation of each learning method in Federated learning with LLM Takumi Fukami, Yusuke Yamasaki, Iifan Tyou (NTT) IN2023-66 |
In recent years, a large amount of diverse data have been generated by various devices and organisations, and there has ... [more] |
IN2023-66 pp.7-12 |
R |
2022-05-28 13:00 |
Online |
Online |
Correlation analysis of reviewer rating trends and trustworthiness on EC site Ryohei Suzuki, Iifan Tyou, Naoto Kiribuchi, Nami Ashizawa (NTT), Kazutoshi Sasahara (Tokyo Tech) R2022-1 |
E-commerce sites have a system to evaluate the reputation of products by the number of stars and reviews. When purchasin... [more] |
R2022-1 pp.1-6 |
ICSS, IPSJ-SPT |
2022-03-08 13:40 |
Online |
Online |
A study of a decentralized reputation-based trust evaluation system Iifan Tyou (NTT), Takahito Tanabe, Akinori Matsuo (msi) ICSS2021-78 |
In order to evaluate the reputation of an unknown party, such as a new purchase or new contact, it is common to collect ... [more] |
ICSS2021-78 pp.117-122 |
ICSS, IPSJ-SPT |
2019-03-08 14:25 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Traffic analysis to detect abnormal smartphone application behavior Iifan Tyou, Takahiro Nukushina, Yukio Nagafuchi, Masaki Tanikawa (NTT) ICSS2018-87 |
With the spread of smartphones, its security management has become important. For smartphones, it is also necessary to c... [more] |
ICSS2018-87 pp.167-172 |
ICSS, IPSJ-SPT |
2019-03-08 14:50 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Performance survey for IoT security function on smartphone Yukio Nagafuchi, Takahiro Nukushina, Iifan Tyou, Masaki Tanikawa (NTT) ICSS2018-68 |
Recently, IoT devices are wide spreading, and its security management has become more important. There are two kinds of ... [more] |
ICSS2018-68 pp.1-6 |
ICSS, IPSJ-SPT |
2018-03-07 14:50 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
A study of decentralized IoT Security Controller Iifan Tyou, Hiroki Nagayama, Takuya Saeki, Yukio Nagafuchi, Masaki Tanikawa (NTT) ICSS2017-58 |
With the spread of IoT devices, IoT security management has become important to network administrators. It is hard to im... [more] |
ICSS2017-58 pp.43-48 |
ICSS, IPSJ-SPT |
2018-03-08 13:25 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Response Signature Generation method for Detecting Malicious Destinations Kazuma Shinomiya, Iifan Tyou, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2017-77 |
Blacklist is frequently deployed for detecting malware-infected hosts. However, even when request traffic from one host ... [more] |
ICSS2017-77 pp.157-160 |
ICM, IPSJ-IOT, IPSJ-CSEC |
2012-05-10 17:40 |
Akita |
Akita University |
The Accountability of Cloud Services and Traceability Technology. Shinichi Nakahara, Iifan Tyou (NTT) ICM2012-8 |
The invisibility has been the main security concern of the Cloud services. The accountability of the Cloud is one of the... [more] |
ICM2012-8 pp.81-85 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|