Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-14 09:30 |
Osaka |
Osaka Univ. (Suita Campus) |
Security Analysis of Backdoored Classic McEliece in a Multi-User Setting Dai Miura, Hyungrok Jo, Shingo Sato, Junji Shikata (Yokohama National Univ.) IT2023-105 ISEC2023-104 WBS2023-93 RCC2023-87 |
Several attacks have been proposed for the Classic McEliece cryptosystem, which is one of the 4th round candidates of th... [more] |
IT2023-105 ISEC2023-104 WBS2023-93 RCC2023-87 pp.197-204 |
ICSS |
2023-11-17 15:25 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Secure Iris Recognition with Linear Hashing Mitsuhide Tenryaku (Chiba Univ.) ICSS2023-68 |
Biometrics represents one of the most robust methods for securing individual information. Due to its high accuracy, the ... [more] |
ICSS2023-68 pp.120-125 |
ET |
2023-10-21 15:30 |
Nagano |
Shinshu University Faculty of Engineering |
"Listening" Performance of Generative AI and Elementary Foreign Language Learners in Code-Switching Discourse Sunaoka Kazuko (Waseda Univ.), Qin Xu (Kyoto Univ.) ET2023-23 |
We used the Whisper model to automatically recognize and process teachers' Japanese and Chinese code-switching (CS) in a... [more] |
ET2023-23 pp.33-37 |
IT |
2023-08-03 13:25 |
Kanagawa |
Shonan Institute of Technology (Primary: On-site, Secondary: Online) |
Polarization Analysis for Joint Source-Channel Coding with Side Information Yuki Nagai, Hideki Yagi (UEC) IT2023-15 |
The polar codes, introduced by Arıkan, use a technique called channel polarization and can achieve the capacity of a giv... [more] |
IT2023-15 pp.7-12 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 14:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Non-profiled Side-channel Attacks by using Clustering Scores in Deep Learning model (1)
-- Attacks by using Auto Encoder against hardware-implemented AES -- Mizuki Nagahisa, Fukuda Yuta, Yoshida Kota, Fujino Takeshi (Ristumei Univ) ISEC2023-14 SITE2023-8 BioX2023-17 HWS2023-14 ICSS2023-11 EMM2023-14 |
In 2019, Differential Deep Learning Analysis (DDLA) was proposed as a deep-learning based side-channel attack in non-pro... [more] |
ISEC2023-14 SITE2023-8 BioX2023-17 HWS2023-14 ICSS2023-11 EMM2023-14 pp.1-6 |
SP, IPSJ-MUS, IPSJ-SLP [detail] |
2023-06-24 13:50 |
Tokyo |
(Primary: On-site, Secondary: Online) |
Fast Neural Waveform Generation Model With Fully Connected Upsampling Haruki Yamashita (Kobe cniv/NICT), Takuma Okamoto (NICT), Ryoichi Takashima (Kobe Univ), Yamato Ohtani (NICT), Tetsuya Takiguchi (Kobe Univ), Tomoki Toda (Nagoya Univ/NICT), Hisashi Kawai (NICT) SP2023-15 |
In recent years, in text-to-speech synthesis, it is required to improve the inference speed while keeping the quality.
... [more] |
SP2023-15 pp.73-78 |
RCS |
2023-06-16 10:00 |
Hokkaido |
Hokkaido University, and online (Primary: On-site, Secondary: Online) |
A Study on Autoencoder for ICA-Aided MIMO Blind Signal Separation Arata Kameda, Shinsuke Ibi (Doshisha Univ.), Takumi Takahashi (Osaka Univ.), Hisato Iwai (Doshisha Univ.) RCS2023-68 |
[more] |
RCS2023-68 pp.235-240 |
CCS, NLP |
2023-06-09 13:55 |
Tokyo |
Tokyo City Univ. |
Analysis of Vocal and Ventricular Folds Data Using Machine Learning Takumi Inoue, Kota Shiozawa, Isao Tokuda (Rits Univ) NLP2023-24 CCS2023-12 |
Vocal fold vibration is a nonlinear phenomenon in the real world. In humans, vocal folds can produce complex sounds by i... [more] |
NLP2023-24 CCS2023-12 pp.49-52 |
QIT (2nd) |
2023-05-30 09:15 |
Kyoto |
Katsura Campus, Kyoto University |
Quantum dynamic simulations of permutation invariant systems Le Bin Ho (FRIS) |
We explore the quantum dynamics of permutation invariant systems using the tqix computational package. We focus on the L... [more] |
|
SS |
2023-03-14 18:25 |
Okinawa |
(Primary: On-site, Secondary: Online) |
A feature analysis of merged change requests on a version Mizuki Uenaka, Akinori Ihara (Wakayama Univ.), Yutaro Kashiwa (NAIST) SS2022-60 |
Large software development projects have a large number of the source code change requests on a daily basis. Developers ... [more] |
SS2022-60 pp.79-84 |
RCC, ISEC, IT, WBS |
2023-03-14 11:45 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Analysis of (U,U+V)-code Problems with Gramians over Binary and Ternary Fields Ichiro Iwata, Yusuke Yoshida, Keisuke Tanaka (Tokyo Tech) IT2022-78 ISEC2022-57 WBS2022-75 RCC2022-75 |
Debris-Alazard, Sendrier, and Tillich proposed SURF in 2017, which is an efficient code-based signature scheme. However,... [more] |
IT2022-78 ISEC2022-57 WBS2022-75 RCC2022-75 pp.68-73 |
SP, IPSJ-SLP, EA, SIP [detail] |
2023-02-28 09:30 |
Okinawa |
(Primary: On-site, Secondary: Online) |
MS-FC-HiFiGAN : Fast Neural Waveform Generation Model With Learnable Lightweight Upsampling Haruki Yamashita (Kobe Univ/NICT), Takuma Okamoto (NICT), Ryoichi Takashima, Tetsuya Takiguchi (Kobe Univ), Tomoki Toda (Nagoya Univ/NICT), Hisashi Kawai (NICT) EA2022-76 SIP2022-120 SP2022-40 |
In recent years, in text-to-speech synthesis, it is required to improve the inference speed while keeping the quality.
... [more] |
EA2022-76 SIP2022-120 SP2022-40 pp.7-12 |
IT, RCS, SIP |
2023-01-24 10:50 |
Gunma |
Maebashi Terrsa (Primary: On-site, Secondary: Online) |
Lower Bound on Maximum Redundancy of Predictive Source Coding for Context Tree Source Shota Saito (Gunma Univ.) IT2022-37 SIP2022-88 RCS2022-216 |
In [Krichevskiy, IEEE Trans. Inf. Theory, vol.44, no.1, pp.296--303, 1998], a lower bound of the maximum redundancy of a... [more] |
IT2022-37 SIP2022-88 RCS2022-216 pp.48-50 |
HCS |
2023-01-22 16:00 |
Kyoto |
Kyoto Institute of Technology (Primary: On-site, Secondary: Online) |
Decoding of average ERPs during silent Japanese words by attention-based RNN with encoder-decoder Toshimasa Yamazaki, Yuko Tokunaga, Chieko Ito (KIT) HCS2022-74 |
This study attempted to decode average event-related potentials (ERPs) during silent Japanese words by attention-based r... [more] |
HCS2022-74 pp.108-111 |
NLP |
2022-11-24 10:20 |
Shiga |
(Primary: On-site, Secondary: Online) |
Reconstructing of Vocal Fold Vibration Video by Echo State Network and Dimensionality Reduction Tomu Noguchi, Kota Shiozawa, Isao Tokuda (Ritsumeikan Univ.) NLP2022-56 |
Video data provides an effective means for capturing the dynamics of experimental object. The dimensionality that actual... [more] |
NLP2022-56 pp.1-4 |
NS, ICM, CQ, NV (Joint) |
2022-11-24 14:15 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
Research on Anomaly Detection through Analysis of Observed Traffic Using Self-Attention Yuhang Zhou, Akihiro Nakao (UTokyo) NS2022-108 |
Nowadays, threat activities have become an integral part of our network lives. The sophistication and variety of differe... [more] |
NS2022-108 pp.47-52 |
SS, IPSJ-SE, KBSE [detail] |
2022-07-30 10:30 |
Hokkaido |
Hokkaido-Jichiro-Kaikan (Sapporo) (Primary: On-site, Secondary: Online) |
The Use of Review Effort Objective for Search-based Refactoring Recommendation Lei Chen, Shinpei Hayashi (Tokyo Tech) SS2022-18 KBSE2022-28 |
Search-based refactoring is to search for a sequence of refactorings that achieves a specific objective. Although a typi... [more] |
SS2022-18 KBSE2022-28 pp.103-108 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 15:15 |
Online |
Online |
Revealing PUF Responses by Differential Power Analysis against Reed-Muller-Code-based Fuzzy Extractor Soma Watanabe, Yuta Fukuda, Tatsuya Oyama, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ) ISEC2022-12 SITE2022-16 BioX2022-37 HWS2022-12 ICSS2022-20 EMM2022-20 |
IoT devices that use the Physically Unclonable Function (PUF) response to generate a secret key has been proposed. Since... [more] |
ISEC2022-12 SITE2022-16 BioX2022-37 HWS2022-12 ICSS2022-20 EMM2022-20 pp.29-34 |
KBSE, SWIM |
2022-05-21 13:45 |
Tokyo |
(Primary: On-site, Secondary: Online) |
System Thinking on the Digital Governance Code Shuichiro Yamamoto (IPUT in Nagoya) KBSE2022-8 SWIM2022-8 |
The digital transformation efforts are delayed in Japanese companies. The Ministry of Economy, Trade and Industry (METI)... [more] |
KBSE2022-8 SWIM2022-8 pp.47-52 |
IT, ISEC, RCC, WBS |
2022-03-10 10:30 |
Online |
Online |
Performance Evaluation of Random Codes and Polar Codes in Channels with Constraints on Time and Energy of One Codeword Issei Yokosawa, Tomohiko Uyematsu (Tokyo Tech) IT2021-85 ISEC2021-50 WBS2021-53 RCC2021-60 |
The channel model used by Shannon and Gallager to derive channel coding theorem
had the unreality that the transmissio... [more] |
IT2021-85 ISEC2021-50 WBS2021-53 RCC2021-60 pp.13-18 |