IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
... (for ESS/CS/ES/ISS)
Tech. Rep. Archives
... (for ES/CS)
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 18 of 18  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2019-03-08
10:00
Okinawa NICT Okinawa Electromagnetic Technology Center  [more] ICSS2018-78
pp.89-94
ICSS, IPSJ-SPT 2019-03-08
10:25
Okinawa NICT Okinawa Electromagnetic Technology Center  [more] ICSS2018-79
pp.95-100
ICSS, IPSJ-SPT 2019-03-08
10:50
Okinawa NICT Okinawa Electromagnetic Technology Center (To be available after the conference date) [more] ICSS2018-80
pp.101-104
ICSS, IPSJ-SPT 2019-03-08
11:15
Okinawa NICT Okinawa Electromagnetic Technology Center Threat Information Analysis Using Conditional Generative Adversarial Network
Keisuke Furumoto, Hideaki Kanehara, Takeshi Takahashi (NICT), Yoshiaki Shiraishi (Kobe Univ.), Daisuke Inoue (NICT)
 [more] ICSS2018-81
pp.105-110
ICSS 2018-11-21
15:15
Kagoshima   Malware Analysis Method Using Conditional Generative Adversarial Network
Keisuke Furumoto, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue (NICT)
Many schemes combining deep learning with methods for imaging malware have been proposed. These methods are considered t... [more] ICSS2018-57
pp.25-30
ICSS 2018-11-21
15:40
Kagoshima   (To be available after the conference date) [more] ICSS2018-58
pp.31-36
ICSS 2018-11-22
13:30
Kagoshima   (To be available after the conference date) [more] ICSS2018-64
pp.61-66
ICSS, IA 2018-06-26
11:40
Ehime Ehime University A Study on Extraction Method of Characteristics of Malware Using Generative Adversalial Networks
Keisuke Furumoto, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue (NICT)
To classify malware families including many subspecies, several methods have been proposed for acquiring malware feature... [more] IA2018-13 ICSS2018-13
pp.77-82
ICSS, IPSJ-SPT 2018-03-07
15:40
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center  [more] ICSS2017-64
pp.79-84
ICSS, IPSJ-SPT 2018-03-08
11:10
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center  [more] ICSS2017-75
pp.145-150
ICSS, IPSJ-SPT 2018-03-08
11:35
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center  [more] ICSS2017-76
pp.151-156
ICSS 2017-11-21
10:55
Oita Beppu International Convention Center Subspecies Classification for Malwares based on Visualization of Dynamic Analysis result
Taiki Gouda, Korehito Kashiki, Keisuke Furumoto, Masakatu Morii (Kobe Univ.)
Along with the activation of malware infection activity, the appearance frequency of new subspecies also tends to increa... [more] ICSS2017-45
pp.41-45
ICSS 2017-11-21
14:00
Oita Beppu International Convention Center  [more] ICSS2017-50
pp.71-76
IA, ICSS 2015-06-11
16:05
Fukuoka Kyushu Institute of Technology Univ. Traffic Data Analysis for Multiple Darknet and its Applications
Kensho Murai, Keisuke Furumoto (Kobe Univ.), Kosuke Murakami (KDDI), Koji Nakao (KDDI/NICT), Masakatu Morii (Kobe Univ.)
The Internet is transcending national boundaries to become an important and essential communication approach in the worl... [more] IA2015-7 ICSS2015-7
pp.33-38
IT 2014-07-18
09:30
Hyogo Kobe University Recognition Accuracy Improvement of QR Code by Using GMD Decoding
Keisuke Furumoto, Yoshihiro Kusanagi, Masakatu Morii (Kobe Univ)
In recent years, two-dimensional codes typified by QR code is used in various scenes such as in medical prescription and... [more] IT2014-27
pp.89-94
ICSS, IPSJ-SPT 2014-03-27
13:05
Okinawa Meio Univiersity Practical Password Management System against password-list-attacks -- Proposal of protection of Master Password --
Hironao Teruya, Wataru Nakamura (Meio Univ.), Keisuke Furumoto (Kobe Univ.), Takeshi Tengan, Katsuyoshi Tanabe (Meio Univ.), Masakatu Morii (Kobe Univ.)
With the increased use of the internet, the number of passwords which a user has to manage is also increasing. One of ma... [more] ICSS2013-70
pp.49-52
LOIS, IPSJ-GN, IPSJ-SPT 2013-05-17
11:00
Tokyo UEC A Support System for Visually Impaired Persons Using QR codes without wireless network
Keisuke Furumoto, Masakatu Morii (Kobe Univ.)
QR code has better recognition properties and error correction capabilityis.
QR code widely used, with the widespread u... [more]
LOIS2013-3
pp.91-96
ICSS 2012-11-22
11:10
Hiroshima Miyajima Mori-no-Yado Gray scale two-dimensional code and its applications
Keisuke Furumoto, Yuhei Watanabe (Kobe Univ.), Masakatu Morii (kobe Univ.)
With the widespread use of mobile phones equipped with a decoder, two-dimensional code represented by QR code is widely ... [more] ICSS2012-46
pp.7-12
 Results 1 - 18 of 18  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan