IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 50  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
CAS, SIP, VLD, MSS 2022-06-16
14:40
Aomori Hachinohe Institute of Technology
(Primary: On-site, Secondary: Online)
Adversarial Robustness of Secret Key-Based Defenses against AutoAttack
Miki Tanaka, April Pyone MaungMaung (Tokyo Metro Univ.), Isao Echizen (NII), Hitoshi Kiya (Tokyo Metro Univ.) CAS2022-7 VLD2022-7 SIP2022-38 MSS2022-7
Deep neural network (DNN) models are well-known to easily misclassify prediction results by using input images with smal... [more] CAS2022-7 VLD2022-7 SIP2022-38 MSS2022-7
pp.34-39
IT, EMM 2022-05-17
15:30
Gifu Gifu University
(Primary: On-site, Secondary: Online)
A study of adversarial example detection using the correlation between adversarial noise and JPEG compression-derived distortion
Kenta Tsunomori, Yuma Yamasaki, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.), Isao Echizen (NII) IT2022-6 EMM2022-6
Adversarial examples cause misclassification of image classifiers. Higashi et al. proposed a method to detect adversari... [more] IT2022-6 EMM2022-6
pp.29-34
IT, EMM 2022-05-17
15:55
Gifu Gifu University
(Primary: On-site, Secondary: Online)
Examination of round color 2D symbol for B2C with display area and secret data area
Nobuyuki Teraura (Terrara Code), Isao Echizen (NII), Keiichi Iwamura (TUS) IT2022-7 EMM2022-7
We examined 2D symbols for B2C applications. QR code is a matrix-type 2D symbol announced in 1994. Since QR code was dev... [more] IT2022-7 EMM2022-7
pp.35-40
EMM, IT 2021-05-21
13:10
Online Online A Study of Detecting Adversarial Examples Using Sensitivities to Multiple Auto Encoders
Yuma Yamasaki, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.), Huy Hong Nguyen, Isao Echizen (NII) IT2021-11 EMM2021-11
By removing the small perturbations involved in adversarial examples, the image classification result returns to the cor... [more] IT2021-11 EMM2021-11
pp.60-65
EMM 2021-03-04
14:15
Online Online [Poster Presentation] Detection of Adversarial Examples in CNN Image Classifiers Using Features Extracted with Multiple Strengths of Filter
Akinori Higashi, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.), Huy Hong Nguyen, Isao Echizen (NII) EMM2020-70
Deep learning has been used as a new method for machine learning, and its performance has been significantly improved. A... [more] EMM2020-70
pp.19-24
EMM 2020-03-05
16:45
Okinawa
(Cancelled but technical report was issued)
[Poster Presentation] Detecting Adversarial Examples Based on Sensitivities to Lossy Compression Algorithms
Akinori Higashi, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.), Huy Hong Nguyen, Isao Echizen (NII) EMM2019-123
The adversarial examples are created by adding small perturbations to an input image for misleading an CNN-based image c... [more] EMM2019-123
pp.113-116
EMM 2019-03-14
10:40
Okinawa TBD Implementation of Digital Signature to QR Symbol with Compatible using Subcell Division and Double Encoding
Nobuyuki Teraura (Terrara Code), Isao Echizen (NII), Keiichi Iwamura (TUS) EMM2018-113
(To be available after the conference date) [more] EMM2018-113
pp.117-122
IEE-CMN, EMM, LOIS, IE, ITE-ME [detail] 2018-09-28
13:15
Oita Beppu Int'l Convention Ctr. aka B-CON Plaza Dynamic Estimation of Collusion Strategy for the Detection of Colluders in Fingerprinting Codes
Tatsuya Yasui, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.), Isao Echizen (NII) LOIS2018-19 IE2018-39 EMM2018-58
An optimal detector known as MAP detector has been proposed for the probabilistic fingerprinting
code. It needs two kin... [more]
LOIS2018-19 IE2018-39 EMM2018-58
pp.65-70
IT, EMM 2018-05-18
14:20
Tokyo Ookayama Campus, Tokyo Institute of Technology Efficient schemes for encoding and decoding of non-adaptive group testing
Thach V. BUI (SOKENDAI), Minoru Kuribayashi (Okayama Univ.), Tetsuya Kojima (TOKYO KOSEN), Roghayyeh Haghvirdinezhad (NJIT), Isao Echizen (NII) IT2018-10 EMM2018-10
 [more] IT2018-10 EMM2018-10
pp.53-58
EMM 2018-01-30
11:30
Miyagi Tohoku Univ. (Aobayama Campus) Study of a new information extraction method using a single dot method with machine learning technique
Yuki Matsue, Kitahiro Kaneda, Keiichi Iwamura (TUS), Isao Echizen (NII) EMM2017-75
 [more] EMM2017-75
pp.49-54
EMM, IE, LOIS, IEE-CMN, ITE-ME [detail] 2017-09-05
11:00
Kyoto Kyoto Univ. (Clock Tower Centennial Hall) [Fellow Memorial Lecture] Controlling the information at border between cyber and physical worlds -- Future outlook on security and privacy research for multimedia --
Isao Echizen (NII) LOIS2017-21 IE2017-42 EMM2017-50
Due to developments of the Internet of Things, computers, sensors and their networks are located in all places, and usef... [more] LOIS2017-21 IE2017-42 EMM2017-50
pp.63-64
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2017-07-15
13:50
Tokyo   Study of template matching application of steganography ANGO
Hirokazu Ishizuka (Mitsubishi Electric), Isao Echizen (NII), Keiichi Iwamura (TUS), Koichi Sakurai (Kyushu Univ.) ISEC2017-33 SITE2017-25 ICSS2017-32 EMM2017-36
We propose a method ANGO(=Asymmetric Nondestractive steGanOgraphy) to extract different third information by two(o... [more] ISEC2017-33 SITE2017-25 ICSS2017-32 EMM2017-36
pp.247-252
EMM, IT 2017-05-23
11:55
Yamagata Yamagata University(Yonezawa Campus) Investigation on the Effect of Error Correction by RS Code on Pattern Masking of Double Encoded Two-dimensional Code
Nobuyuki Teraura (TCRI), Keiichi Iwamura (TUS), Isao Echizen (NII), Kouichi Sakurai (kyushu Univ.) IT2017-12 EMM2017-12
The black cell of a two dimensional code is coded in normal black ink (infrared absorption) and special black ink (infra... [more] IT2017-12 EMM2017-12
pp.67-72
PRMU 2016-10-21
16:20
Miyazaki   Study of template matching application of a steganography (ANGO) -- Interdisciplinary cryptography and image processing --
Hirokazu Ishizuka (Kyudai), Isao Echizen (NII), Keiichi Iwamura (TUS), Koichi Sakurai (Kyudai) PRMU2016-108
We propose a steganographic method called ANGO using Ango Sakaguchi's
novel ``ANGOU'' as a hint. Go through the study ... [more]
PRMU2016-108
pp.97-102
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-14
13:50
Yamaguchi   Study of an information extraction method using artificial fiber pattern with a clear ink
Yuki Matsue (TUS), Kitahiro Kaneda (OPU), Keiichi Iwamura (TUS), Isao Echizen (NII) ISEC2016-15 SITE2016-9 ICSS2016-15 EMM2016-23
Our laboratory has developed “single dot method”, which is one of a nearly invisible pattern as new information embeddin... [more] ISEC2016-15 SITE2016-9 ICSS2016-15 EMM2016-23
pp.13-18
IT, EMM 2016-05-19
14:45
Hokkaido Otaru Economic Center Simulation of error-correcting code using LDPC code with Sum-Product method for a single-dot pattern method
Kitahiro Kaneda (Osaka Prefecture Univ.), Yasuyuki Anezaki, Keiichi Iwamura (TUS), Isao Echizen (NII) IT2016-7 EMM2016-7
We have proposed a single dot information hiding method for printed matter. In this paper, we try to apply LDPC error co... [more] IT2016-7 EMM2016-7
pp.37-42
EA, SP, SIP 2016-03-29
11:10
Oita Beppu International Convention Center B-ConPlaza Voice liveness detection using phoneme information for speaker verification
Sayaka Shiota (Tokyo Metropolitan Univ.), Fernando Villavicencio, Junichi Yamagishi, Nobutaka Ono, Isao Echizen (NII), Tomoko Matsui (ISM), Hitoshi Kiya (Tokyo Metropolitan Univ.) EA2015-128 SIP2015-177 SP2015-156
 [more] EA2015-128 SIP2015-177 SP2015-156
pp.347-351
SP, IPSJ-SLP
(Joint)
2015-07-17
13:40
Nagano Katakura Suwako Hotel Voice liveness detection based on frequency characteristics for speaker verification
Sayaka Shiota (Tokyo Metro. Univ.), Fernando Villaviencio, Junichi Yamagishi, Nobutaka Ono, Isao Echizen (NII), Tomoko Matsui (ISM) SP2015-48
 [more] SP2015-48
pp.73-78
SP, IPSJ-SLP
(Joint)
2015-07-17
14:10
Nagano Katakura Suwako Hotel Investigation of privacy-preserving sounds to degrade automatic speaker verification performance
Kei Hashimoto (NITECH), Junichi Yamagishi, Isao Echizen (NII) SP2015-49
Sharing speech without permission and identifying the individual from the speech by speaker recognition lead to problems... [more] SP2015-49
pp.79-84
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
14:15
Hokkaido San-Refure Hakodate Evaluation of a Classification Table for Invasion of Privacy in SNSs Using Normalized Rank Method
Shimon Machida (SOKENDAI), Tomoko Kajiyama (Aoyama Gakuin Univ.), Shigeru Shimada (AIIT), Isao Echizen (NII) ISEC2014-23 SITE2014-18 ICSS2014-27 EMM2014-23
By posting a message to Social Networking Service(SNS) unintentionally, the message, including personal information, is ... [more] ISEC2014-23 SITE2014-18 ICSS2014-27 EMM2014-23
pp.145-148
 Results 1 - 20 of 50  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan