IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 318  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA, IN
(Joint)
2020-12-15
10:50
Online Online Development of an Intrusion Detection System Utilizing Social Network Analysis Principles
James Lu, Yuji Sekiya (Univ. of Tokyo)
(To be available after the conference date) [more]
AI 2020-12-11
10:20
Shizuoka Online and HAMAMATSU ACT CITY
(Primary: On-site, Secondary: Online)
A Preliminary Multi-Agent Reinforcement Learning Approach for Responding Dynamic Traffic in Communication Destination Anonymization
Keita Sugiyama, Naoki Fukuta (Shizuoka Univ.)
(To be available after the conference date) [more]
NS, ICM, CQ, NV
(Joint)
2020-11-27
13:35
Online Virtual Conference Design and Discussion of NFC Mechanism Considering Security and Optimal Arrangement of Functions in Multi-Tenant Environment
Daisuke Settai, Takao Kondo, Fumio Teraoka (Keio Univ.) NS2020-83
As the performance of networks and commodity hardware improves, We will apply Network Function Chaining (NFC) to multipl... [more] NS2020-83
pp.43-48
BioX 2020-11-25
11:10
Online Online GAN based feature-level supportive method for improved adversarial attacks on face recognition
Zhengwei Yin (USTC/Hosei Univ.), Kaoru Uchida (Hosei Univ.) BioX2020-35
With the rapid development of deep neural networks (DNN), DNN-based face recognition technologies are also achieving gre... [more] BioX2020-35
pp.1-6
IA 2020-11-09
14:57
Hokkaido
(Primary: On-site, Secondary: Online)
Development and evaluation of efficient vulnerability scanning system for IoT networks
Kazusyoshi Watanabe, Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ) IA2020-19
In recent years, a security incident called DRDoS attack, which is a kind of DoS attack using reflections and amplificat... [more] IA2020-19
pp.7-12
ICD, HWS [detail] 2020-10-26
13:50
Online Online Security Threats and Preventions for Photonics Computing Model
Junko Takahashi, Koji Chida, Takeshi Sakamoto (NTT) HWS2020-33 ICD2020-22
This paper presents security analysis on photonic computing models in All-Photonics Network (APN). New computing archite... [more] HWS2020-33 ICD2020-22
pp.48-53
NS 2020-10-07
09:30
Online online [Encouragement Talk] KBP: Kernel Enhancements for Low Latency Networking without Application Customization in Virtual Server
Kei Fujimoto, Masashi Kaneko (NTT), Kenichi Matsui (NTT WEST) NS2020-54
Packet processing on commodity hardware is a cost-efficient and flexible alternative to specialized networking hardware.... [more] NS2020-54
pp.1-6
SR, NS, SeMI, RCC, RCS
(Joint)
2020-07-10
15:20
Online Online An examination of a predictive control method for lighting using wireless sensor networks
Yuki Takayama, Yusuke Yokota (Japan Women's Univ.) SeMI2020-14
Light management for buildings or streets is important for safety, security and comfort. However, it is not economical t... [more] SeMI2020-14
pp.63-68
NS 2020-04-16
16:40
Online Online [Invited Talk] Data Life-Cycle Protection for Ubiquitous Data Sharing
Ruidong Li (NICT) NS2020-4
Huge amount of data raise a strong demand for a network infrastructure with the capability to support data sharing and r... [more] NS2020-4
pp.19-41
PN 2020-03-03
09:50
Kagoshima
(Cancelled but technical report was issued)
DDoS defense method by logically isolating attackers
Yutaka Nasu, Naoto Sumita, Masaki Murakami, Satoru Okamoto, Naoaki Yamanaka (Keio Univ.) PN2019-63
In recent years, the number of DDoS occurrences and the traffic volume have increased, and attacks have resulted in the ... [more] PN2019-63
pp.65-71
ICSS, IPSJ-SPT 2020-03-03
11:00
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Model checking RNNs with modal μ-calculus
Tatsuhiro Aoshima, Toshinori Usui (NTT) ICSS2019-88
Machine learning models have been applied to many cyber-physical systems such as self-driving cars, robotics, and factor... [more] ICSS2019-88
pp.119-124
IN, IA
(Joint)
2019-12-19
15:15
Hiroshima Satellite Campus Hiroshima Design of Honeynet to avoid IPv6 alias detection
Hyuga Kobayashi, Yudai Aratsu (Tokyo Univ.), Satoru Kobayashi, Kensuke Fukuda (NII), Hiroshi Esaki (Tokyo Univ.) IA2019-50
In IPv6, full scan is infeasible due to its enourmous address space, thought it is easy in IPv4.
Hitlist, which is the ... [more]
IA2019-50
pp.13-18
SR 2019-12-05
13:50
Okinawa Ishigaki City Hall (Ishigaki Island) [Poster Presentation] Performance Evaluation of Secure Wireless Communications for PLNC with Untrusted Relay by Double-objective Optimization Problem
Go Ikeuchi, Osamu Takyu (Shinshu Univ), Takeo Fujii (UEC), Tomoaki Ohtsuki (Keio Univ), Fumihito Sasamori, Shiro Handa (Shinshu Univ) SR2019-88
In this study, we have focused on wireless communication networks which can easily construct a network by using the rela... [more] SR2019-88
pp.15-22
NS, ICM, CQ, NV
(Joint)
2019-11-21
10:20
Hyogo Rokkodai 2nd Campus, Kobe Univ. Visual Analytics for Anomaly Classification in LAN Based on Deep Convolutional Neural Network
Yuwei Sun, Hideya Ochiai, Hiroshi Esaki (UTokyo) NS2019-121
Recently, the attack monitored in Local Area Network (LAN) is surging. There are some methods being used to analyze the ... [more] NS2019-121
pp.7-12
NS, ICM, CQ, NV
(Joint)
2019-11-21
11:20
Hyogo Rokkodai 2nd Campus, Kobe Univ. Experiment of DDoS Attack Detection with UTM Log Analysis Using Decision Tree
Aoshi Fujioka, Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) NS2019-123
In recent years, AI technology such as machine learning has been developed and the number of application examples are in... [more] NS2019-123
pp.19-25
NS, ICM, CQ, NV
(Joint)
2019-11-21
16:00
Hyogo Rokkodai 2nd Campus, Kobe Univ. [Invited Talk] Trends and Countermeasures of Cyber Attacks -- Introduction to Cyber Security for Network Engineers --
Yukiko Yano (NEC) CQ2019-93
In recent years, cyber attacks have spreading, information leaks such as confidential information of public institutions... [more] CQ2019-93
p.27
PN 2019-11-14
17:20
Kanagawa   Network-based DDoS prevention with newly developed Reconfigurable Communication Processors
Naoto Sumita, Masaki Murakami, Yu Nishio, Satoru Okamoto, Naoaki Yamanaka (Keio Univ.) PN2019-26
In order to cope with traffic growth and service diversity the Photonic Network Processor (PNP) has been proposed. As a ... [more] PN2019-26
pp.15-22
ICSS 2019-11-13
15:45
Miyazaki MRT Terrace(Miyazaki) Attack Behavior Analysis System that Diverts Internal Attacks to Virtual Environment
Shuji Ohashi, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2019-65
It is difficult to completely prevent targeted attackers intrusion, so countermeasures after the intrusion is necessary.... [more] ICSS2019-65
pp.31-36
SRW, SeMI, CNR
(Joint)
2019-11-06
17:05
Tokyo Kozo Keisaku Engineering Inc. A predictive light control system using wireless sensor networks
Yuki Takayama, Yusuke Yokota (Japan Women's Univ.) SeMI2019-97
Light management for buildings or streets is important for safety, security and comfort. However, it is not economical t... [more] SeMI2019-97
pp.139-144
ISEC, SITE, LOIS 2019-11-02
14:20
Osaka Osaka Univ. Proposal of a Password Storage Method for Network Login -- Using an External Storage Device for Screenshots --
Jun Tsuchiya, Yoshiaki Seki (Tokyo City Univ.) ISEC2019-82 SITE2019-76 LOIS2019-41
Password authentication is a typical memory authentication method. In order to maintain the strength of the password, us... [more] ISEC2019-82 SITE2019-76 LOIS2019-41
pp.127-132
 Results 1 - 20 of 318  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan