IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 47  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM, IT 2021-05-21
Okayama 50th Anniv. Hall, Okayama Univ. A Study of Detecting Adversarial Examples Using Sensitivities to Multiple Auto Encoders
Yuma Yamasaki, Akinori Higashi, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.), Huy Hong Nguyen, Isao Echizen (NII)
EMM 2021-03-04
Online Online [Poster Presentation] Detection of Adversarial Examples in CNN Image Classifiers Using Features Extracted with Multiple Strengths of Filter
Akinori Higashi, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.), Huy Hong Nguyen, Isao Echizen (NII) EMM2020-70
Deep learning has been used as a new method for machine learning, and its performance has been significantly improved. A... [more] EMM2020-70
EMM 2020-03-05
(Cancelled but technical report was issued)
[Poster Presentation] Detecting Adversarial Examples Based on Sensitivities to Lossy Compression Algorithms
Akinori Higashi, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.), Huy Hong Nguyen, Isao Echizen (NII) EMM2019-123
The adversarial examples are created by adding small perturbations to an input image for misleading an CNN-based image c... [more] EMM2019-123
EMM 2019-03-14
Okinawa TBD Implementation of Digital Signature to QR Symbol with Compatible using Subcell Division and Double Encoding
Nobuyuki Teraura (Terrara Code), Isao Echizen (NII), Keiichi Iwamura (TUS) EMM2018-113
(To be available after the conference date) [more] EMM2018-113
IEE-CMN, EMM, LOIS, IE, ITE-ME [detail] 2018-09-28
Oita Beppu Int'l Convention Ctr. aka B-CON Plaza Dynamic Estimation of Collusion Strategy for the Detection of Colluders in Fingerprinting Codes
Tatsuya Yasui, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.), Isao Echizen (NII) LOIS2018-19 IE2018-39 EMM2018-58
An optimal detector known as MAP detector has been proposed for the probabilistic fingerprinting
code. It needs two kin... [more]
LOIS2018-19 IE2018-39 EMM2018-58
IT, EMM 2018-05-18
Tokyo Ookayama Campus, Tokyo Institute of Technology Efficient schemes for encoding and decoding of non-adaptive group testing
Thach V. BUI (SOKENDAI), Minoru Kuribayashi (Okayama Univ.), Tetsuya Kojima (TOKYO KOSEN), Roghayyeh Haghvirdinezhad (NJIT), Isao Echizen (NII) IT2018-10 EMM2018-10
 [more] IT2018-10 EMM2018-10
EMM 2018-01-30
Miyagi Tohoku Univ. (Aobayama Campus) Study of a new information extraction method using a single dot method with machine learning technique
Yuki Matsue, Kitahiro Kaneda, Keiichi Iwamura (TUS), Isao Echizen (NII) EMM2017-75
 [more] EMM2017-75
EMM, IE, LOIS, IEE-CMN, ITE-ME [detail] 2017-09-05
Kyoto Kyoto Univ. (Clock Tower Centennial Hall) [Fellow Memorial Lecture] Controlling the information at border between cyber and physical worlds -- Future outlook on security and privacy research for multimedia --
Isao Echizen (NII) LOIS2017-21 IE2017-42 EMM2017-50
Due to developments of the Internet of Things, computers, sensors and their networks are located in all places, and usef... [more] LOIS2017-21 IE2017-42 EMM2017-50
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2017-07-15
Tokyo   Study of template matching application of steganography ANGO
Hirokazu Ishizuka (Mitsubishi Electric), Isao Echizen (NII), Keiichi Iwamura (TUS), Koichi Sakurai (Kyushu Univ.) ISEC2017-33 SITE2017-25 ICSS2017-32 EMM2017-36
We propose a method ANGO(=Asymmetric Nondestractive steGanOgraphy) to extract different third information by two(o... [more] ISEC2017-33 SITE2017-25 ICSS2017-32 EMM2017-36
EMM, IT 2017-05-23
Yamagata Yamagata University(Yonezawa Campus) Investigation on the Effect of Error Correction by RS Code on Pattern Masking of Double Encoded Two-dimensional Code
Nobuyuki Teraura (TCRI), Keiichi Iwamura (TUS), Isao Echizen (NII), Kouichi Sakurai (kyushu Univ.) IT2017-12 EMM2017-12
The black cell of a two dimensional code is coded in normal black ink (infrared absorption) and special black ink (infra... [more] IT2017-12 EMM2017-12
PRMU 2016-10-21
Miyazaki   Study of template matching application of a steganography (ANGO) -- Interdisciplinary cryptography and image processing --
Hirokazu Ishizuka (Kyudai), Isao Echizen (NII), Keiichi Iwamura (TUS), Koichi Sakurai (Kyudai) PRMU2016-108
We propose a steganographic method called ANGO using Ango Sakaguchi's
novel ``ANGOU'' as a hint. Go through the study ... [more]
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-14
Yamaguchi   Study of an information extraction method using artificial fiber pattern with a clear ink
Yuki Matsue (TUS), Kitahiro Kaneda (OPU), Keiichi Iwamura (TUS), Isao Echizen (NII) ISEC2016-15 SITE2016-9 ICSS2016-15 EMM2016-23
Our laboratory has developed “single dot method”, which is one of a nearly invisible pattern as new information embeddin... [more] ISEC2016-15 SITE2016-9 ICSS2016-15 EMM2016-23
IT, EMM 2016-05-19
Hokkaido Otaru Economic Center Simulation of error-correcting code using LDPC code with Sum-Product method for a single-dot pattern method
Kitahiro Kaneda (Osaka Prefecture Univ.), Yasuyuki Anezaki, Keiichi Iwamura (TUS), Isao Echizen (NII) IT2016-7 EMM2016-7
We have proposed a single dot information hiding method for printed matter. In this paper, we try to apply LDPC error co... [more] IT2016-7 EMM2016-7
EA, SP, SIP 2016-03-29
Oita Beppu International Convention Center B-ConPlaza Voice liveness detection using phoneme information for speaker verification
Sayaka Shiota (Tokyo Metropolitan Univ.), Fernando Villavicencio, Junichi Yamagishi, Nobutaka Ono, Isao Echizen (NII), Tomoko Matsui (ISM), Hitoshi Kiya (Tokyo Metropolitan Univ.) EA2015-128 SIP2015-177 SP2015-156
 [more] EA2015-128 SIP2015-177 SP2015-156
Nagano Katakura Suwako Hotel Voice liveness detection based on frequency characteristics for speaker verification
Sayaka Shiota (Tokyo Metro. Univ.), Fernando Villaviencio, Junichi Yamagishi, Nobutaka Ono, Isao Echizen (NII), Tomoko Matsui (ISM) SP2015-48
 [more] SP2015-48
Nagano Katakura Suwako Hotel Investigation of privacy-preserving sounds to degrade automatic speaker verification performance
Kei Hashimoto (NITECH), Junichi Yamagishi, Isao Echizen (NII) SP2015-49
Sharing speech without permission and identifying the individual from the speech by speaker recognition lead to problems... [more] SP2015-49
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
Hokkaido San-Refure Hakodate Evaluation of a Classification Table for Invasion of Privacy in SNSs Using Normalized Rank Method
Shimon Machida (SOKENDAI), Tomoko Kajiyama (Aoyama Gakuin Univ.), Shigeru Shimada (AIIT), Isao Echizen (NII) ISEC2014-23 SITE2014-18 ICSS2014-27 EMM2014-23
By posting a message to Social Networking Service(SNS) unintentionally, the message, including personal information, is ... [more] ISEC2014-23 SITE2014-18 ICSS2014-27 EMM2014-23
HCS, HIP, HI-SIGCE [detail] 2014-05-29
Okinawa Okinawa Industry Support Center Color and Symbol Extraction for Creating a Book Cover Image that Reflects Reader Impressions
Mitsuhiro Makino, Tomoko Kajiyama, Noritomo Ouchi (Aoyama Gakuin Univ.), Isao Echizen (NII) HCS2014-10 HIP2014-10
Book cover images give users not only impressions of contents intuitively but also clues for search and browsing before ... [more] HCS2014-10 HIP2014-10
EMM 2014-03-07
Ishikawa JAIST [Poster Presentation] Surveillance camera system to achieve both crime prevention and privacy protection
Kento Kobayashi, Keiichi Iwamura (Tokyo Univ. of Science), Isao Echizen (NII) EMM2013-103
Recently, cases to be taken up for privacy and personal information has increased, but there is no rule for privacy on s... [more] EMM2013-103
EMM 2014-03-07
Ishikawa JAIST [Poster Presentation] Prototype Implementation of Adaptive Disclosure Controls by Detecting Sensitive Data Leaks
Shimon Machida (SOKENDAI), Tomoko Kajiyama (Aoyama Gakuin Univ.), Shigeru Shimada (AIIT), Isao Echizen (NII) EMM2013-108
By posting a message to Social Networking Service(SNS) unintentionally, the message, including personal information, is ... [more] EMM2013-108
 Results 1 - 20 of 47  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)

[Return to Top Page]

[Return to IEICE Web Page]

The Institute of Electronics, Information and Communication Engineers (IEICE), Japan