IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 21  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ITE-ME, ITE-IST, BioX, SIP, MI, IE [detail] 2024-06-07
13:15
Niigata Nigata University (Ekinan-Campus "TOKIMATE") Lightweight Object Detection Model for a Feature Extractable CMOS Image Sensor
Keiichiro Kuroda, Yudai Morikaku, Yu Osuka (Ritumeikan Univ), Ryuichi Ujiie, Daisuke Morikawa, Hideki Shima, Okura Syunsuke, Kota Yoshida (Ritumeikan Univ)
 [more]
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
14:20
Hokkaido Hokkaido Jichiro Kaikan Non-profiled Side-Channel Attacks by using Clustering Scores in Deep Learning model (2) -- Attacks by using Models to Predict Ciphertext against Hardware-implemented AES with Countermeasures --
Yuta Fukuda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) ISEC2023-15 SITE2023-9 BioX2023-18 HWS2023-15 ICSS2023-12 EMM2023-15
 [more] ISEC2023-15 SITE2023-9 BioX2023-18 HWS2023-15 ICSS2023-12 EMM2023-15
pp.7-12
BioX, SIP, IE, ITE-IST, ITE-ME [detail] 2023-05-19
15:15
Mie Sansui Hall, Mie University
(Primary: On-site, Secondary: Online)
Object Detection with Split Images Based on Signal Range for Single Exposure High Dynamic Range Image Sensors
Yuta Nakahigashi, Shunsuke Okura, Kota Yoshida, Yu Osuka (Ritsumeikan Univ.)
 [more]
BioX, SIP, IE, ITE-IST, ITE-ME [detail] 2023-05-19
15:45
Mie Sansui Hall, Mie University
(Primary: On-site, Secondary: Online)
On-Chip Data Reduction and Object Detection for a Feature Extractable CMOS Image Sensor
Yudai Morikaku (Ritsumeikan Univ.), Ryuichi Ujiie, Daisuke Morikawa, Hideki Shima, Kota Yoshida, Shunsuke Okura (Ritsumeikan Univ.)
 [more]
HWS 2023-04-14
15:35
Oita
(Primary: On-site, Secondary: Online)
Object Generation - Backdoor Attack against Object-Detection DNN Triggered by Fault Injection into MIPI
Takumi Takubo, Tatsuya Oyama, Kota Yoshida, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ.) HWS2023-6
Backdoor attacks that induce misclassification by poisoning training data and adding specific patterns (trigger marks) t... [more] HWS2023-6
pp.20-25
HWS, VLD 2023-03-03
15:45
Okinawa
(Primary: On-site, Secondary: Online)
Study of Intrinsic ID extracted from RG-DTM Arbiter PUF implemented on FPGA
Mika Sakai, Tatsuya Oyama, Kota Yoshida (Ritsumeikan Univ.), Yohei Hori, Toshihiro Katashita (AIST), Masayoshi Shirahata, Takeshi Fujino (Ritsumeikan Univ.) VLD2022-111 HWS2022-82
We studied the implementation method of PUF for generating a unique ID on FPGA. We adopted a method of controlling the p... [more] VLD2022-111 HWS2022-82
pp.209-214
CPSY, IPSJ-ARC 2023-01-11
11:40
Online Online Reliability Enhancement Techniques for On-Device Learning on Wireless Sensor Nodes
Kazuki Sunaga (Keio Univ.), Kota Yoshida (Ritsumeikan Univ.), Hiroki Matsutani (Keio Univ.) CPSY2022-33
(To be available after the conference date) [more] CPSY2022-33
pp.29-34
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2022-11-30
16:40
Kumamoto  
(Primary: On-site, Secondary: Online)
Evaluation of Model Quantization Method on Vitis-AI for Mitigating Adversarial Examples
Yuta Fukuda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) VLD2022-51 ICD2022-68 DC2022-67 RECONF2022-74
Adversarial examples (AEs) are security threats in deep neural networks (DNNs). One of the countermeasures is adversaria... [more] VLD2022-51 ICD2022-68 DC2022-67 RECONF2022-74
pp.182-187
HWS, ICD 2022-10-25
13:50
Shiga
(Primary: On-site, Secondary: Online)
Fundamental Study of Adversarial Examples Created by Fault Injection Attack on Image Sensor Interface
Tatsuya Oyama, Kota Yoshida, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ.) HWS2022-36 ICD2022-28
Adversarial examples (AEs), which cause misclassification by adding subtle perturbations to input images, have been prop... [more] HWS2022-36 ICD2022-28
pp.35-40
HWS, ICD 2022-10-25
16:40
Shiga
(Primary: On-site, Secondary: Online)
A Study on Small Area HMAC-SHA256 Circuit suitable for CMOS Image Sensor
Yu Sekioka, Tatsuya Oyama, Hayato Tatsuno, Kota Yoshida, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ) HWS2022-42 ICD2022-34
In order to realize data integrity and authentication for the edge imaging devices and to prevent the image information ... [more] HWS2022-42 ICD2022-34
pp.70-75
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-19
15:15
Online Online Revealing PUF Responses by Differential Power Analysis against Reed-Muller-Code-based Fuzzy Extractor
Soma Watanabe, Yuta Fukuda, Tatsuya Oyama, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ) ISEC2022-12 SITE2022-16 BioX2022-37 HWS2022-12 ICSS2022-20 EMM2022-20
IoT devices that use the Physically Unclonable Function (PUF) response to generate a secret key has been proposed. Since... [more] ISEC2022-12 SITE2022-16 BioX2022-37 HWS2022-12 ICSS2022-20 EMM2022-20
pp.29-34
HWS 2022-04-26
10:55
Tokyo AIST Tokyo Waterfront (Annex)
(Primary: On-site, Secondary: Online)
Deep Learning Side-Channel Attacks against Hardware-Implemented Lightweight Cipher Midori64
Madoka Sako, Kunihiro Kuroda, Yuta Fukuda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) HWS2022-2
Midori is a lightweight cipher and it is developed to achieve superior circuit size, low latency, and low power consumpt... [more] HWS2022-2
pp.7-12
SDM, ICD, ITE-IST [detail] 2021-08-17
13:55
Online Online Study of an Event-Driven CMOS Image Sensor Using Deep Learning (1) -- Verification of Image Classification Using Low Bit-Resolution Feature Images --
Kohei Yamamoto, Kota Yoshida, Shunsuke Okura (Ritsumeikan Univ.)
 [more]
SDM, ICD, ITE-IST [detail] 2021-08-17
14:45
Online Online Image Recognition of HDR Images with Dual Gain CMOS Image Sensor
Takuya Kitamura, Kota Yoshida, Tetsushi Ikeda (Ritsumeikan Univ.), Shinichi Ikenaga, Isao Takayanagi (Brillnics), Shunsuke Okura (Ritsumeikan Univ.)
 [more]
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2021-07-20
14:50
Online Online Deep Learning Side-Channel Attacks against Unprotected AES and RSM-AES Implemented in ASIC
Yuta Fukuda, Kota Yoshida, Hisashi Hashimoto, Takeshi Fujino (Ritsumeikan Univ.) ISEC2021-24 SITE2021-18 BioX2021-25 HWS2021-24 ICSS2021-29 EMM2021-29
The cryptographic key can be revealed by exploiting side-channel information such as power traces under operation.
Rec... [more]
ISEC2021-24 SITE2021-18 BioX2021-25 HWS2021-24 ICSS2021-29 EMM2021-29
pp.86-91
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2021-07-20
15:30
Online Online Implimentation of RISC-V TEE using PUF as Root of Trust
Kota Yoshida (Ritsumeikan Univ.), Kuniyasu Suzaki (AIST), Takeshi Fujino (Ritsumeikan Univ.) ISEC2021-25 SITE2021-19 BioX2021-26 HWS2021-25 ICSS2021-30 EMM2021-30
In society 5.0, acquiring trustworthy data from a huge amount of IoT devices in physical spaces, it is important to veri... [more] ISEC2021-25 SITE2021-19 BioX2021-26 HWS2021-25 ICSS2021-30 EMM2021-30
pp.92-97
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] 2020-07-21
10:50
Online Online Adversarial scan attack against ICP algorithm for pose estimation on LiDAR-based SLAM
Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) ISEC2020-26 SITE2020-23 BioX2020-29 HWS2020-19 ICSS2020-13 EMM2020-23
An autonomous robot is controlled on physical information acquired by various sensors. Some physical attacks are propose... [more] ISEC2020-26 SITE2020-23 BioX2020-29 HWS2020-19 ICSS2020-13 EMM2020-23
pp.81-86
HWS
(2nd)
2019-12-06
16:00
Tokyo Asakusabashi Hulic Conference [Poster Presentation] Model Reverse-Engineering Attack using Correlation Power Analysis against Systolic Array Based Neural Network Accelerator
Kota Yoshida, Shunsuke Okura, Mitsuru Shiozaki, Takaya Kubota, Takeshi Fujino (Ritsumeikan Univ.)
 [more]
HCS, HIP, HI-SIGCOASTER [detail] 2019-05-17
15:35
Okinawa Okinawa Industry Support Center Behavioral analysis at interactive appreciation of photographs -- Making a decision based on preference and influence from partner --
Kota Yoshida, Daisuke Tanaka (Tottori Univ.) HCS2019-28 HIP2019-28
 [more] HCS2019-28 HIP2019-28
pp.221-226
HWS, VLD 2019-03-02
13:05
Okinawa Okinawa Ken Seinen Kaikan A study of interference method using flicker noise for a pedestrian detection system
Hirotaka Sakakibara, Kota Yoshida, Masayoshi Shirahata, Takeshi Kumaki, Takeshi Fujino (Ritsumeikan Univ) VLD2018-140 HWS2018-103
 [more] VLD2018-140 HWS2018-103
pp.277-282
 Results 1 - 20 of 21  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan