IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 115  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
CS 2019-07-04
09:00
Kagoshima Amami City Social Welfare Center Trust-based Verification Attack Prevention Scheme using Tendency of Contents Request on NDN
Hironori Nakano, Hiroya Kato, Shuichiro Haruta, Masashi Yoshida, Iwao Sasase (Keio Univ.) CS2019-13
In this paper, we propose a trust-based verification attack prevention scheme using tendency of contents request on NDN.... [more] CS2019-13
pp.1-6
CS 2019-07-04
09:00
Kagoshima Amami City Social Welfare Center A Novel Visual Similarity-based Phishing Detection Methodology Using Hue Information with Auto Updating Database
Shuichiro Haruta, Fumitaka Yamazaki, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2019-14
In this paper, we propose a novel visual similarity-based phishing detection methodology using hue information with aut... [more] CS2019-14
pp.7-12
CS 2019-07-04
09:00
Kagoshima Amami City Social Welfare Center Android Malware Detection Scheme Based on Level of SSL Server Certificate
Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.) CS2019-15
In this paper, in order to detect Android malwares which encrypt packets, we propose an Android malware detection scheme... [more] CS2019-15
pp.13-18
CS 2019-07-04
09:00
Kagoshima Amami City Social Welfare Center An Approximation Scheme for Better Visualization of Trajectory Mapping with BLE Beacons in Libraries
Ryusei Goto, Hiromu Asahina, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2019-16
To find out the bottleneck in the college library, it is necessary to estimate users' trajectory when searching books an... [more] CS2019-16
pp.19-24
CS 2019-07-04
09:00
Kagoshima Amami City Social Welfare Center Analyzing MAC address randomization for Wi-Fi signal based mobile device tracking
Yuki Furuya, Hiromu Asahina, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2019-17
Analyzing facility usage through Wi-Fi signals of users’ mobile devices has become controversial but
common. Although W... [more]
CS2019-17
pp.25-29
CS 2019-07-04
09:00
Kagoshima Amami City Social Welfare Center Traffic Feature-based Botnet Detection Scheme Emphasizing the Importance of Long Patterns
Yichen An, Shuichiro Haruta, Sanghun Choi, Iwao Sasase (Keio Univ.) CS2019-18
The botnet detection is imperative. Among several detection schemes, the promising one uses the communication sequences.... [more] CS2019-18
pp.31-35
CS 2018-11-01
09:50
Ehime The Shiki Museum A User Study in College Library Through Experiments on Searching Behavior
Kentaroh Toyoda, Yumiko Igarashi, Hoshika Imai, Iwao Sasase (Keio Univ.) CS2018-58
 [more] CS2018-58
pp.13-18
CS 2018-11-01
10:10
Ehime The Shiki Museum Duration of Stay Estimation Scheme for Academic Libraries using Wi-Fi Frame Data
Hiromu Asahina, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2018-59
 [more] CS2018-59
pp.19-24
CS 2018-11-02
10:10
Ehime The Shiki Museum Feature Selection Scheme for Android ICC-related Features Based on the Gap of the Appearance Ratio
Kyohei Osuge, Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.) CS2018-65
Android malwares are rapidly becoming a potential threat to users. Among several Android malware detection schemes, the ... [more] CS2018-65
pp.57-62
CS 2018-11-02
10:30
Ehime The Shiki Museum False Density Information Attack Detection Scheme Using Overlap of Communication Range in VANET
Masashi Yoshida, Hiromu Asahina, Shuichiro Haruta, Iwao Sasase (Keio Univ) CS2018-66
In Vehicular Ad Hoc Network (VANET), it is important to detect false information. The previously published scheme detect... [more] CS2018-66
pp.63-66
CS 2018-07-12
10:44
Okinawa Eef Information Plaza (Kumejima Is.) Encounter Record Reduction Scheme based on Theoretical Contact Probability for Flooding Attack Mitigation in DTN
Keisuke Arai, Shuichirou Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2018-19
 [more] CS2018-19
pp.41-46
CS 2018-07-12
10:56
Okinawa Eef Information Plaza (Kumejima Is.) An Energy Efficient Target Specific Code Dissemination Scheme with RPL-based Forwarder Selection Algorithm
Hiromu Asahina, Kentaroh Toyoda, Iwao Sasase (Keio Univ.), P. Takis Mathiopoulos (UoA), Hisao Yamamoto (TCU) CS2018-23
In order to fix a bug or install a new application, disseminating a code to specific target sensors is an important mana... [more] CS2018-23
pp.61-66
CS 2017-11-16
10:00
Kumamoto Aso Plaza Hotel Reduce Complexity in Resource Allocation for Hyper MIMO System with Block Diagonalization Precoding Technique
Maung Sann Maw, Iwao Sasase (Keio Univ) CS2017-54
Hyper Multi-input Multi-output (hyper-MIMO) is considered as a promising technology for the fifth generation (5G) of wir... [more] CS2017-54
pp.1-4
CS 2017-11-16
10:25
Kumamoto Aso Plaza Hotel Reduced Complexity Transmit Antenna Selection Method for the Large Scale MIMO System with the Average Channel Gain
Aye Mon Htun, Maung Sann Maw, Iwao Sasase (Keio Univ) CS2017-55
 [more] CS2017-55
pp.5-8
CS 2017-11-16
10:50
Kumamoto Aso Plaza Hotel Traceroute-based Target Link Flooding Attack Detection Scheme by Analyzing Hop Count to the Destination
Kei Sakuma, Hiromu Asahina, Shuichiro Haruta, Iwao Sasase (Keio Univ.) CS2017-56
 [more] CS2017-56
pp.9-14
CS 2017-11-16
11:15
Kumamoto Aso Plaza Hotel Low Transmission Cost P2P Storage Scheme with Privacy Protection
Sanghun Choi, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2017-57
To safely store the user’s data without the central server, the P2P(Peer to Peer) storage methods have been studied. Eve... [more] CS2017-57
pp.15-20
CS 2017-07-27
09:36
Nagasaki Fukue Bunka Kaikan Low Cost Dummy Generation using Non-Trusted LBS
Sanghun Choi, Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2017-14
Although LBS(Location Based Service) is quite convenient and usually used these days, The location privacy of the user i... [more] CS2017-14
pp.7-12
CS 2017-07-27
09:39
Nagasaki Fukue Bunka Kaikan Obfuscated Malicious JavaScript Detection Scheme Using the Feature Based on Divided URL
Shoya Morishige, Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2017-15
Recently, obfuscated malicious JavaScript codes which divide URL into segments to evade the pattern matching of anti-vir... [more] CS2017-15
pp.13-18
CS 2017-07-27
09:42
Nagasaki Fukue Bunka Kaikan RFID-Based Deep Shopping Data Acquisition Scheme with Machine Learning using Read Count and Variance of Phase as Features
Shinichiro Aita, Hiromu Asahina, Kentaroh Toyada, Iwao Sasase (Keio Univ.) CS2017-16
 [more] CS2017-16
pp.19-24
CS 2017-07-27
09:48
Nagasaki Fukue Bunka Kaikan Code Dissemination based on RPL with Scope Selection and Code Acquisition in Wireless Sensor Networks
Hiromu Asahina, Iwao Sasase (Keio Univ.), Hisao Yamamoto (Tokyo City Univ.), P. Takis Mathiopoulos (UoA) CS2017-18
In this paper, we propose RPL based code dissemination with scope selection and code acquisition.
The scope selection ... [more]
CS2017-18
pp.29-34
 Results 1 - 20 of 115  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan