Committee 
Date Time 
Place 
Paper Title / Authors 
Abstract 
Paper # 
CS 
20201105 14:35 
Online 
Online + Central Community Center, Nonoichi Community Center (Primary: Online, Secondary: Onsite) 
[Invited Talk]
Adversarial Attacks on Monocular Depth Estimation Koichiro Yamanaka (Nagoya Univ.), Ryutaroh Matsumoto (Tokyo Tech), Keita Takahashi, Toshiaki Fujii (Nagoya Univ.) CS202049 
[more] 
CS202049 pp.1217 
IE, CS, IPSJAVM, ITEBCT [detail] 
20191206 10:10 
Iwate 
Aiina Center 
Adversarial Examples for Monocular Depth Estimation Koichiro Yamanaka, Ryutaroh Matsumoto, Keita Takahashi, Toshiaki Fujii (Nagoya Univ.) CS201983 IE201963 
Adversarial examples for classification and object recognition problems using convolutional neural net works (CNN) have... [more] 
CS201983 IE201963 pp.9195 
CS, IE, IPSJAVM, ITEBCT [detail] 
20181130 10:20 
Tokushima 
Tokushima University (Memorial Hall of Almuni(Engineering)) 
Introducing the PerceptionDistortion Tradeoff into the RateDistortion Theory of General Information Sources Ryutaroh Matsumoto (Nagoya Univ.) CS201879 IE201858 
Blau and Michaeli recently introduced a novel concept
for inverse problems of signal processing, that is,
the perc... [more] 
CS201879 IE201858 pp.6769 
WBS, IT, ISEC 
20180308 13:00 
Tokyo 
Katsusika Campas, Tokyo University of Science 
Outage Capacity of a TwoUser MIMO Interference Channel for Simultaneous Information and Energy Transfer Kengo Ikebata, Tomohiko Uyematsu (Tokyo Tech), Ryutaroh Matsumoto (Nagoya Univ), Tetsunao Matsuta (Tokyo Tech) IT2017110 ISEC201798 WBS201791 
In a twouser interference channel for simultaneous information and energy transfer, there are an ID (Information Decodi... [more] 
IT2017110 ISEC201798 WBS201791 pp.4348 
ISEC, WBS, IT 
20170310 14:10 
Tokyo 
TOKAI University 
Spectrum Sensing in Cooperative with Some Secondary Users Yuki Muranaka, Ryutaroh Matsumoto, Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech) IT2016131 ISEC2016121 WBS2016107 
The cognitive radio has attracted attention as a measure to utilize the radio spectrum more efficiently in order to cope... [more] 
IT2016131 ISEC2016121 WBS2016107 pp.209214 
ISEC, WBS, IT 
20170310 14:35 
Tokyo 
TOKAI University 
Quantum Stabilizer Codes Can Realize Access Structures Impossible by Classical Secret Sharing Ryutaroh Matsumoto (Tokyo Tech.) IT2016132 ISEC2016122 WBS2016108 
We show a simple example of a secret sharing scheme
encoding classical secret to quantum shares
that can realize an ac... [more] 
IT2016132 ISEC2016122 WBS2016108 pp.215216 
IT, ISEC, WBS 
20160310 11:05 
Tokyo 
The University of ElectroCommunications 
Bayesian Estimation of the Virus Source of an Infection in a Network Using Any Prior Distribution Ryousuke Kido, Tetsunao Matsuta, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Tech.) IT2015104 ISEC201563 WBS201587 
We model a phenomenon that a computer virus is spreading in a network as infection of the virus in a graph constructed o... [more] 
IT2015104 ISEC201563 WBS201587 pp.1924 
IT, ISEC, WBS 
20160310 14:05 
Tokyo 
The University of ElectroCommunications 
The Minimum Codelength of MultipleUniprior Index Coding Masaru Takahashi, Tetsunao Matsuta, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Tech) IT2015110 ISEC201569 WBS201593 
Index coding for sharing information via satellite communication is considered. Each receiver knows some of the messages... [more] 
IT2015110 ISEC201569 WBS201593 pp.5560 
IT, ISEC, WBS 
20160310 15:30 
Tokyo 
The University of ElectroCommunications 
Secrecy Rates for the Gaussian Wiretap Channel with an Energy Transfer Cooperative Jammer Tomoya Komiyama, Ryutaroh Matsumoto, Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech) IT2015122 ISEC201581 WBS2015105 
Wireless secure communications based on the informationtheoretic security are attracting much attention.
In this pape... [more] 
IT2015122 ISEC201581 WBS2015105 pp.131136 
RCS, IT, SIP 
20160118 15:40 
Osaka 
Kwansei Gakuin Univ. Osaka Umeda Campus 
[Invited Lecture]
Secrecy Capacity of Wiretap Channels with the Bit Error Rate Criterion Ryutaroh Matsumoto (Tokyo Tech.) IT201575 SIP201589 RCS2015307 
[more] 
IT201575 SIP201589 RCS2015307 pp.161162 
ISEC, IT, WBS 
20150302 16:00 
Fukuoka 
The University of Kitakyushu 
Outage Capacity of a TwoUser Interference Channel for Simultaneous Information and Energy Transfer Yutaka Osawa, Ryutaroh Matsumoto, Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech) IT201480 ISEC201493 WBS201472 
Wireless energy transfer is attracting more attention. A twouser interference channel for simultaneous information and ... [more] 
IT201480 ISEC201493 WBS201472 pp.117122 
ISEC, IT, WBS 
20150303 14:10 
Fukuoka 
The University of Kitakyushu 
[Invited Talk]
Security of secret sharing schemes expressed in terms of the relative parameters of linear codes Jun Kurihara (KDDI R&D Labs), Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Tech.) IT2014100 ISEC2014113 WBS201492 
[more] 
IT2014100 ISEC2014113 WBS201492 pp.239246 
IT 
20150130 13:50 
Chiba 

Finite Key Rate of B92 Quantum Key Distriburion Protocol Hiroaki Sasaki, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Tech) IT201456 
The B92 quantum key distribution protocol is known as a secret key sharing method with the informationtheoretic securit... [more] 
IT201456 pp.1318 
QIT (2nd) 
20141117 13:30 
Miyagi 
Tohoku Univ. 
[Poster Presentation]
Continuos Variable Quantum Key Distribution system for highspeed operation Yusuke Oguri, Vanou Ishii, Takuto Matsubara, Tsubasa Ichikawa, Takuya Hirano (Gakushuin Univ.), Kenta Kasai, Ryutaroh Matsumoto (Tokyo Tech.), Toyohiro Tsurumaru (Mitsubishi Electric) 
We report an experimental implementation of a continuous variable quantum key distribution (CVQKD) protocol with discre... [more] 

IT 
20140717 13:25 
Hyogo 
Kobe University 
Coding Theoretic Construction of Quantum Ramp Secret Sharing Ryutaroh Matsumoto (Tokyo Inst. of Tech.) IT201417 
We show a construction of a quantum ramp secret sharing scheme from a nested pair of linear codes. Sufficient conditions... [more] 
IT201417 pp.3135 
IT 
20140717 14:00 
Hyogo 
Kobe University 
Maximum Multicast Throughput by Network Coding on Undirected Hypernetworks Hokuto Takahashi, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.) IT201418 
It is known that the problem of the maximum multicast rate by network coding on an undirected network can be formulated ... [more] 
IT201418 pp.3742 
QIT (2nd) 
20140512 15:30 
Aichi 
Nagoya Univ. 
Improved Asymptotic Key Rate of the B92 Protocol Ryutaroh Matsumoto (Tokyo Tech.) 
[more] 

ISEC, IT, WBS 
20140311 13:20 
Aichi 
Nagoya Univ., Higashiyama Campus 
On the Outage Energy Efficiency of Wireless Duocast Relay Multiple Access Channels in the Low Power Regime Bai Ro, Tomohiko Uyematsu, Ryutaroh Matsumoto, Tetsunao Matsuta (Tokyo Inst. of Tech.) IT201381 ISEC2013110 WBS201370 
This paper deals with the energy effiency of energyconstrained terminals in the wireless duocast relay multiple access ... [more] 
IT201381 ISEC2013110 WBS201370 pp.169174 
ISEC, IT, WBS 
20140311 15:15 
Aichi 
Nagoya Univ., Higashiyama Campus 
Identification Capacity of a Biometrical Identification System Using List Decording Marika Mori, Tetsunao Matsuta, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.) IT201393 ISEC2013122 WBS201382 
The biometrical identification system using list decorder is a system which outputs candidates from the observed biometr... [more] 
IT201393 ISEC2013122 WBS201382 pp.249254 
IT 
20130725 16:20 
Tokyo 
NishiWaseda campus, Waseda University 
GilbertVarshamovtype Bound for Relative Dimension Length Profile Ryutaroh Matsumoto (Tokyo Inst. of Tech.) IT201318 
We propose a GilbertVarshamovtype existential bound for
the relative dimension length profile and
the relative gener... [more] 
IT201318 pp.3940 