IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 11 of 11  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2023-03-14
17:40
Yamaguchi
(Primary: On-site, Secondary: Online)
Diversification of Personal Records using GAN
Chengxi Jiang, Tiancheng Wang, Hikaru Morita (Kanagawa Univ.) IT2022-99 ISEC2022-78 WBS2022-96 RCC2022-96
In this paper, we deal with data anonymization as a privacy protection technology.Even in an anonymized database, it is ... [more] IT2022-99 ISEC2022-78 WBS2022-96 RCC2022-96
pp.203-208
SR 2018-10-31
10:25
Overseas Mandarin Hotel, Bangkok, Thailand [Poster Presentation] Spatial Spectrum Sharing among Micro Operators considering Distribution on Measurement-based Spectrum Database
Hirofumi Nakajo, Yuya Aoki, Keita Katagiri, Takeo Fujii (UEC) SR2018-78
This paper proposes probabilistic protection of micro cells using measurement-based spectrum database. In the 5th genera... [more] SR2018-78
pp.45-46
AI 2018-02-17
14:40
Tokyo   Commercial Transaction of Digital Data and Intellectual Property -- The Protection of Digital Data by Copyright law and its Limitation --
Makoto Koike (MK Microwave) AI2017-28
The progress in the internet of things, big data and artificial intelligence are the engines of the ongoing fourth indus... [more] AI2017-28
pp.61-65
CS, NS, IN
(Joint)
2014-09-12
13:25
Miyagi Tohoku Univ. Research Institute of Electrical Communication 2gokan Detection of Malicious Database Queries based on Matching with HTTP Requests
Yuichi Sudo, Takahiro Hamada, Yuichi Murata, Hideo Kitazume (NTT) IN2014-65
If an attacker takes over a Web server by vulnerability attack or fraud login and so on, the attacker can control the se... [more] IN2014-65
pp.99-104
RCC, ASN, NS, RCS, SR
(Joint)
2014-07-31
10:50
Kyoto Kyoto Terrsa [Poster Presentation] An Interference Constraint Method Using Measurement-based Radio Environment Database
Koya Sato, Takeo Fujii (Univ. of Electro-Communications) RCC2014-35 NS2014-55 RCS2014-107 SR2014-36 ASN2014-54
In spectrum sharing, radio environment cognition techniques have been discussed because secondary users are allowed acce... [more] RCC2014-35 NS2014-55 RCS2014-107 SR2014-36 ASN2014-54
pp.69-74(RCC), pp.47-52(NS), pp.101-106(RCS), pp.89-94(SR), pp.77-82(ASN)
SR 2014-01-23
10:00
Miyagi Tohoku Univ. Development of the Advanced Radio Propagation Database based on Measurement for Cognitive Radio
Masayuki Kitamura, Yuya Ohue, Kei Inage, Takeo Fujii (UEC) SR2013-75
In order to realize a frequency sharing by cognitive radio, Secondary User (SU) needs to cooperate with the database as ... [more] SR2013-75
pp.1-6
SR 2012-01-27
11:15
Kagoshima Kagoshima Spatial Measurement Based Radio Environment Database Using Spectrum Sensing in Cognitive Radio
Hasan Rajib Imam, Kei Inage, Mai Ohta, Takeo Fujii (UEC) SR2011-95
In this paper, the authors propose a radio environment database (RED: radio environment database) to provide the estimat... [more] SR2011-95
pp.107-112
SSS 2011-12-22
17:10
Tokyo   Study of characteristics of information for safety and the development of accident information database
Toshikazu Taniguchi (Meiji Univ), Shigeo Umezaki (JNIOSH), Masao Mukaidono (Meiji Univ) SSS2011-24
Currently, Japan's industrial accident databases are central to the measures to the attention of workers. However, if th... [more] SSS2011-24
pp.25-28
ITE-ME, EMM, IE, LOIS, IEE-CMN [detail] 2011-09-20
15:40
Ehime   Quantization of Facial Feature for producing Cryptographic Key for Privacy Protection on Facial Image Retrieval System
Tomohiko Fujita, Takuya Funatomi, Yoshitaka Morimura, Michihiko Minoh (Kyoto Univ.) LOIS2011-21 IE2011-54 EMM2011-32
For achieving the privacy protection on the facial image retrieval system, we consider the method that produces cryptogr... [more] LOIS2011-21 IE2011-54 EMM2011-32
pp.35-40
SR 2011-04-22
10:45
Shimane Matsue Terrsa An Adaptive Secondary MAC Protocol over 802.11 Wireless LAN with Database
Takayuki Suzuki, Takeo Fujii (UEC), Osamu Takyu, Yohtaro Umeda (TUS) SR2011-11
In this paper, we have proposed a MAC protocol for secondary system overlaying to the primary wireless LAN (PU: Primary ... [more] SR2011-11
pp.65-70
MSS 2009-01-29
17:25
Kanagawa Kanagawa Industrial Promotion Center Design and Implementation of Secret Sharing Distributed Database System
Shota Minakami, Toshiyuki Miyamoto (Osaka Univ.) CST2008-50
In recent years, database security has attracted attention due to
frequent occurrence of individual information leak.
... [more]
CST2008-50
pp.51-56
 Results 1 - 11 of 11  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan