IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 59  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
QIT
(2nd)
2022-12-09
17:30
Kanagawa Keio Univ.
(Primary: On-site, Secondary: Online)
Advance Sharing of Quantum Shares for Classical Secrets
Rina Miyajima, Ryutaroh Matsumoto (Tokyo Tech)
Secret sharing schemes for classical secrets can be classified into classical secret sharing schemes and quantum secret ... [more]
QIT
(2nd)
2021-05-25
13:40
Online Online Constructions of $ell$-Adic $t$-Deletion-Correcting Quantum Codes
Ryutaroh Matsumoto (Tokyo Tech.), Manabu Hagiwara (Chiba Univ.)
We propose two systematic constructions of deletion-correcting
codes for protecting quantum information.
The first one... [more]

CS 2020-11-05
14:35
Online Online + Central Community Center, Nonoichi Community Center
(Primary: Online, Secondary: On-site)
[Invited Talk] Adversarial Attacks on Monocular Depth Estimation
Koichiro Yamanaka (Nagoya Univ.), Ryutaroh Matsumoto (Tokyo Tech), Keita Takahashi, Toshiaki Fujii (Nagoya Univ.) CS2020-49
 [more] CS2020-49
pp.12-17
IE, CS, IPSJ-AVM, ITE-BCT [detail] 2019-12-06
10:10
Iwate Aiina Center Adversarial Examples for Monocular Depth Estimation
Koichiro Yamanaka, Ryutaroh Matsumoto, Keita Takahashi, Toshiaki Fujii (Nagoya Univ.) CS2019-83 IE2019-63
Adversarial examples for classification and object recognition problems using convolutional neural net- works (CNN) have... [more] CS2019-83 IE2019-63
pp.91-95
CS, IE, IPSJ-AVM, ITE-BCT [detail] 2018-11-30
10:20
Tokushima Tokushima University (Memorial Hall of Almuni(Engineering)) Introducing the Perception-Distortion Tradeoff into the Rate-Distortion Theory of General Information Sources
Ryutaroh Matsumoto (Nagoya Univ.) CS2018-79 IE2018-58
Blau and Michaeli recently introduced a novel concept
for inverse problems of signal processing, that is,
the perc... [more]
CS2018-79 IE2018-58
pp.67-69
WBS, IT, ISEC 2018-03-08
13:00
Tokyo Katsusika Campas, Tokyo University of Science Outage Capacity of a Two-User MIMO Interference Channel for Simultaneous Information and Energy Transfer
Kengo Ikebata, Tomohiko Uyematsu (Tokyo Tech), Ryutaroh Matsumoto (Nagoya Univ), Tetsunao Matsuta (Tokyo Tech) IT2017-110 ISEC2017-98 WBS2017-91
In a two-user interference channel for simultaneous information and energy transfer, there are an ID (Information Decodi... [more] IT2017-110 ISEC2017-98 WBS2017-91
pp.43-48
ISEC, WBS, IT 2017-03-10
14:10
Tokyo TOKAI University Spectrum Sensing in Cooperative with Some Secondary Users
Yuki Muranaka, Ryutaroh Matsumoto, Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech) IT2016-131 ISEC2016-121 WBS2016-107
The cognitive radio has attracted attention as a measure to utilize the radio spectrum more efficiently in order to cope... [more] IT2016-131 ISEC2016-121 WBS2016-107
pp.209-214
ISEC, WBS, IT 2017-03-10
14:35
Tokyo TOKAI University Quantum Stabilizer Codes Can Realize Access Structures Impossible by Classical Secret Sharing
Ryutaroh Matsumoto (Tokyo Tech.) IT2016-132 ISEC2016-122 WBS2016-108
We show a simple example of a secret sharing scheme
encoding classical secret to quantum shares
that can realize an ac... [more]
IT2016-132 ISEC2016-122 WBS2016-108
pp.215-216
IT, ISEC, WBS 2016-03-10
11:05
Tokyo The University of Electro-Communications Bayesian Estimation of the Virus Source of an Infection in a Network Using Any Prior Distribution
Ryousuke Kido, Tetsunao Matsuta, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Tech.) IT2015-104 ISEC2015-63 WBS2015-87
We model a phenomenon that a computer virus is spreading in a network as infection of the virus in a graph constructed o... [more] IT2015-104 ISEC2015-63 WBS2015-87
pp.19-24
IT, ISEC, WBS 2016-03-10
14:05
Tokyo The University of Electro-Communications The Minimum Codelength of Multiple-Uniprior Index Coding
Masaru Takahashi, Tetsunao Matsuta, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Tech) IT2015-110 ISEC2015-69 WBS2015-93
Index coding for sharing information via satellite communication is considered. Each receiver knows some of the messages... [more] IT2015-110 ISEC2015-69 WBS2015-93
pp.55-60
IT, ISEC, WBS 2016-03-10
15:30
Tokyo The University of Electro-Communications Secrecy Rates for the Gaussian Wiretap Channel with an Energy Transfer Cooperative Jammer
Tomoya Komiyama, Ryutaroh Matsumoto, Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech) IT2015-122 ISEC2015-81 WBS2015-105
Wireless secure communications based on the information-theoretic security are attracting much attention.
In this pape... [more]
IT2015-122 ISEC2015-81 WBS2015-105
pp.131-136
RCS, IT, SIP 2016-01-18
15:40
Osaka Kwansei Gakuin Univ. Osaka Umeda Campus [Invited Lecture] Secrecy Capacity of Wiretap Channels with the Bit Error Rate Criterion
Ryutaroh Matsumoto (Tokyo Tech.) IT2015-75 SIP2015-89 RCS2015-307
 [more] IT2015-75 SIP2015-89 RCS2015-307
pp.161-162
ISEC, IT, WBS 2015-03-02
16:00
Fukuoka The University of Kitakyushu Outage Capacity of a Two-User Interference Channel for Simultaneous Information and Energy Transfer
Yutaka Osawa, Ryutaroh Matsumoto, Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech) IT2014-80 ISEC2014-93 WBS2014-72
Wireless energy transfer is attracting more attention. A two-user interference channel for simultaneous information and ... [more] IT2014-80 ISEC2014-93 WBS2014-72
pp.117-122
ISEC, IT, WBS 2015-03-03
14:10
Fukuoka The University of Kitakyushu [Invited Talk] Security of secret sharing schemes expressed in terms of the relative parameters of linear codes
Jun Kurihara (KDDI R&D Labs), Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Tech.) IT2014-100 ISEC2014-113 WBS2014-92
 [more] IT2014-100 ISEC2014-113 WBS2014-92
pp.239-246
IT 2015-01-30
13:50
Chiba   Finite Key Rate of B92 Quantum Key Distriburion Protocol
Hiroaki Sasaki, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Tech) IT2014-56
The B92 quantum key distribution protocol is known as a secret key sharing method with the information-theoretic securit... [more] IT2014-56
pp.13-18
QIT
(2nd)
2014-11-17
13:30
Miyagi Tohoku Univ. [Poster Presentation] Continuos Variable Quantum Key Distribution system for high-speed operation
Yusuke Oguri, Vanou Ishii, Takuto Matsubara, Tsubasa Ichikawa, Takuya Hirano (Gakushuin Univ.), Kenta Kasai, Ryutaroh Matsumoto (Tokyo Tech.), Toyohiro Tsurumaru (Mitsubishi Electric)
We report an experimental implementation of a continuous variable quantum key distribution (CV-QKD) protocol with discre... [more]
IT 2014-07-17
13:25
Hyogo Kobe University Coding Theoretic Construction of Quantum Ramp Secret Sharing
Ryutaroh Matsumoto (Tokyo Inst. of Tech.) IT2014-17
We show a construction of a quantum ramp secret sharing scheme from a nested pair of linear codes. Sufficient conditions... [more] IT2014-17
pp.31-35
IT 2014-07-17
14:00
Hyogo Kobe University Maximum Multicast Throughput by Network Coding on Undirected Hypernetworks
Hokuto Takahashi, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.) IT2014-18
It is known that the problem of the maximum multicast rate by network coding on an undirected network can be formulated ... [more] IT2014-18
pp.37-42
QIT
(2nd)
2014-05-12
15:30
Aichi Nagoya Univ. Improved Asymptotic Key Rate of the B92 Protocol
Ryutaroh Matsumoto (Tokyo Tech.)
 [more]
ISEC, IT, WBS 2014-03-11
13:20
Aichi Nagoya Univ., Higashiyama Campus On the Outage Energy Efficiency of Wireless Duocast Relay Multiple Access Channels in the Low Power Regime
Bai Ro, Tomohiko Uyematsu, Ryutaroh Matsumoto, Tetsunao Matsuta (Tokyo Inst. of Tech.) IT2013-81 ISEC2013-110 WBS2013-70
This paper deals with the energy effiency of energy-constrained terminals in the wireless duocast relay multiple access ... [more] IT2013-81 ISEC2013-110 WBS2013-70
pp.169-174
 Results 1 - 20 of 59  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan