Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IBISML |
2023-09-08 13:50 |
Osaka |
Osaka Metropolitan University (Nakamozu Campus) (Primary: On-site, Secondary: Online) |
Active Testing for Machine Learning Model Using Level Set Estimation Takuma Ochiai, Keiichiro Seno, Kota Matsui (Nagoya Univ.), Satoshi Hara (Osaka Univ.) IBISML2023-29 |
In this study, we propose a method for estimating the test loss in binary classification model with minimal labeling of ... [more] |
IBISML2023-29 pp.22-26 |
BioX |
2021-10-14 13:35 |
Online |
Online |
[Invited Talk]
"Explanation" in Machine Learning Satoshi Hara (Osaka Univ.) BioX2021-43 |
(To be available after the conference date) [more] |
BioX2021-43 pp.3-6 |
IE, SIP, BioX, ITE-IST, ITE-ME [detail] |
2021-06-03 15:15 |
Online |
Online |
A Study of Anomaly Detection for Renal Tubules by U-Net Emi Haneda, Yuya Honda, Hiroka Furuya, Satoshi Hara, Shigehiro Karashima, Hidetaka Nambo (Kanazawa Univ.) SIP2021-2 BioX2021-2 IE2021-2 |
In this study, we applied deep learning segmentation to renal biopsy pathology specimen images and attempted to classify... [more] |
SIP2021-2 BioX2021-2 IE2021-2 pp.6-9 |
ICSS, IPSJ-SPT |
2021-03-01 14:55 |
Online |
Online |
Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox Takahiro Inoue (YNU), Satoshi Hara (YNU/FUJISOFT), Hironobu Sakaki, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-41 |
Malware that infects vulnerable IoT devices is becoming more sophisticated. Unlike legacy IoT malware, cases of persiste... [more] |
ICSS2020-41 pp.90-95 |
ICSS, IPSJ-SPT |
2020-03-02 16:00 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
An analysis of IoT malware infection pattern based on Internet-wide scan and darknet observation Shun Morishita, Kota Ogawa (YNU), Satoshi Hara (YNU/FSI), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2019-81 |
While IoT malware such as Mirai have been targeting Telnet services, there are still many devices that are still running... [more] |
ICSS2019-81 pp.79-84 |
ICSS, IPSJ-SPT |
2019-03-07 14:20 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
How to build malware sandbox using real IoT devices Jia Xiong, Tatsuya Tamai, Kazuki Tamiya (Yokohama National Univ.), Satoshi Hara (Yokohama National Univ./Fujisoft), Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2018-69 |
In spite of their increasing importance in the battle against evolving IoT threats, construction of IoT malware sandboxe... [more] |
ICSS2018-69 pp.7-12 |
NC, IBISML, IPSJ-BIO, IPSJ-MPS [detail] |
2018-06-13 16:15 |
Okinawa |
Okinawa Institute of Science and Technology |
Enumeration of Distinct Support Vectors for Model Selection Kentaro Kanamori (Hokaido Univ.), Satoshi Hara (Osaka Univ.), Masakazu Ishihata (NTT), Hiroki Arimura (Hokaido Univ.) IBISML2018-12 |
In ordinary machine learning problems, the learning algorithm outputs a single model that optimizes its learning objecti... [more] |
IBISML2018-12 pp.81-88 |
SS |
2017-03-09 11:50 |
Okinawa |
|
Equivalence Checking for Methods in Java and Its Applications Kozo Okano (Shinshu Univ.), Satoshi Harauchi (Mitsubishi Electric Corp.), Shinpei Ogata (Shinshu Univ.), Toshifusa Sekizawa (Nihon Univ.), Takeshi Obara (Shinshu Univ.) SS2016-65 |
A programmer sometimes implements both of equals method and hashCode method in a class of Java. The programmer should ob... [more] |
SS2016-65 pp.31-36 |
KBSE, SS, IPSJ-SE [detail] |
2016-07-13 10:20 |
Hokkaido |
|
A Method to Revise Message Ordering in Sequence Diagram Kozo Okano (Shinshu Univ.), Satoshi Harauchi (Mitsubishi Electric Corp.), Yosuke Tajima, Shinpei Ogata (Shinshu Univ.) SS2016-2 KBSE2016-8 |
For software specification, a lot of methods have been proposed in order to localize defects and to fix
defects automat... [more] |
SS2016-2 KBSE2016-8 pp.7-12 |
IPSJ-SLDM, CPSY, RECONF, VLD [detail] |
2014-01-29 08:55 |
Kanagawa |
Hiyoshi Campus, Keio University |
Evaluation of parallelization for multiple-precision Cyclic Vector Multiplication Algorithm using CUDA Satoshi Haramura, Hiroto Kagotani, Yasuyuki Nogami, Yuji Sugiyama (Okayama Univ.) VLD2013-120 CPSY2013-91 RECONF2013-74 |
[more] |
VLD2013-120 CPSY2013-91 RECONF2013-74 pp.109-112 |
QIT (2nd) |
2013-11-18 - 2013-11-19 |
Tokyo |
Waseda Univ. |
[Poster Presentation]
Quantum state data mining Takafumi Ono, Ryo Okamoto, Shigeki Takeuchi (Hokkaido Univ.), Satoshi Hara, Takashi Washio (Osaka Univ.) |
[more] |
|
LOIS |
2013-03-07 16:00 |
Okinawa |
|
Investigation of Information Sharing System which tweets Behavior of Information Security Satoshi Hara, Hiroki Miura (Univ. of Electro-Comm), Yoshiaki Seki (NTT), Hirohiko Suwa (Univ. of Electro-Comm) LOIS2012-85 |
[more] |
LOIS2012-85 pp.95-100 |
LOIS |
2013-03-07 16:20 |
Okinawa |
|
Implementation of Information Sharing System which tweets Behavior of Information Security Hiroki Miura, Satoshi Hara (Univ. of Electro-Comm.), Yoshiaki Seki (NTT), Hirohiko Suwa (Univ. of Electro-Comm.) LOIS2012-86 |
In this paper We implement Securitter that the information-sharing system
using Twitter which improves information sec... [more] |
LOIS2012-86 pp.101-106 |
IBISML |
2012-11-07 15:30 |
Tokyo |
Bunkyo School Building, Tokyo Campus, Tsukuba Univ. |
Structure Learning for Anomaly Localization Satoshi Hara, Takashi Washio (Osaka Univ.) IBISML2012-36 |
In this paper, we propose a graphical model learning algorithm for an anomaly localization. We introduce a new regulariz... [more] |
IBISML2012-36 pp.17-22 |
OPE, OME |
2011-11-18 14:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Fabrication of Microdisk Lasers by using n-type Thiophene/Phenylene Co-oligomers AC5-CF3 and Organic Electroluminescence Spectra of multi-layers Fumio Sasaki, Yoshizo Kawaguchi, Hiroyuki Mochizuki, Masahiko Mori, Satoshi Haraichi (AIST), Takeshi Yamao, Shu Hotta (Kyoto Inst. of Tech.) OME2011-61 OPE2011-136 |
[more] |
OME2011-61 OPE2011-136 pp.19-24 |
ISEC, LOIS |
2011-11-15 10:55 |
Osaka |
Osaka Electro-Communication University |
A Method to Find Vulnerable Cryptographic Algorithms in SSH Protocol Satoshi Hara (UEC), Kenichiro Muto, Sakae Chikara, Yoshiaki Seki (NTT) ISEC2011-52 LOIS2011-46 |
Secure Shell (SSH), a network protocol for secure data communication between two networked computers that connects via a... [more] |
ISEC2011-52 LOIS2011-46 pp.123-128 |
IBISML |
2011-11-09 15:45 |
Nara |
Nara Womens Univ. |
Learning a Graphical Structure with Clusters Satoshi Hara, Takashi Washio (Osaka Univ.) IBISML2011-45 |
In this paper, we propose an estimation technique of a graphical model with some unknown clusters. We introduce a new re... [more] |
IBISML2011-45 pp.19-24 |
TL |
2011-06-24 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Quantifying Document Quality of Development-related Documents by Using Text Analysis Technologies Satoshi Haraguchi (ISC-J), Yoshifumi Sakamoto, Takeo Nakada, Hironori Takeuchi, Shiho Ogino (IBM Japan) TL2011-5 |
Development-related documents, such as requirement specifications, design specifications, or test specifications, are of... [more] |
TL2011-5 pp.25-30 |
IBISML |
2011-03-29 12:00 |
Osaka |
Nakanoshima Center, Osaka Univ. |
Learning an Invariant Substructure of Multiple Graphical Gaussian Models Satoshi Hara, Takashi Washio (Osaka Univ.) IBISML2010-129 |
Dependency structure among variables is closely tied to an underlying data generating process. Therefore, learning a dep... [more] |
IBISML2010-129 pp.177-181 |
SANE, SAT (Joint) |
2008-02-28 14:30 |
Ibaraki |
Kashima Space Research Center (NICT) |
Verification of design method by trial model for an ultra-lightweight large deployable antenna reflector composed of a tendon reinforced support structure. Satoshi Harada, Kiyoshi Kobayashi, Kohei Ohata (NTT), Hiroyuki Ohmine, Takahiko Noda (Mitsubishi Electric) SAT2007-61 |
NTT has been investigating an ultra-lightweight and large onboard antenna reflector, which is 20m in diameter and less t... [more] |
SAT2007-61 pp.1-6 |