Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
LOIS, SITE, ISEC |
2023-11-09 13:55 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
ISEC2023-58 SITE2023-52 LOIS2023-16 |
With the spread of work style reforms such as remote work, communication about information security risks tends to be in... [more] |
ISEC2023-58 SITE2023-52 LOIS2023-16 pp.26-32 |
ICSS |
2019-11-13 14:55 |
Miyazaki |
MRT Terrace(Miyazaki) |
ICSS2019-63 |
E-mail has been one of the most widely used tools for computer-based communication since the early days of the Internet.... [more] |
ICSS2019-63 pp.19-23 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 13:35 |
Kochi |
Kochi University of Technology |
Proposal of Spam Filter by Applying Neural Network for Mitigating Catastrophic Forgetting Shuiti Kawahara, Lu Chen, Hiroyuki Inaba (KIT) ISEC2019-32 SITE2019-26 BioX2019-24 HWS2019-27 ICSS2019-30 EMM2019-35 |
The trend of spam mails is changing. Since, in recent years, spam mails sent from overseas mail serversare increasing, s... [more] |
ISEC2019-32 SITE2019-26 BioX2019-24 HWS2019-27 ICSS2019-30 EMM2019-35 pp.171-178 |
LOIS |
2019-03-08 11:15 |
Okinawa |
Miyakojima-shi Central Community Center |
A Spam Review Detection Method with Verifying Consistency among Multiple Review Sites and Performance Evaluation Chuhao Yao, Jiahong Wang, Eiichiro Kodama (Iwate pu) LOIS2018-71 |
In recent years, internet sites such as Amazon, Rakuten and TABElog that have the user review information are widely use... [more] |
LOIS2018-71 pp.91-96 |
KBSE |
2019-01-26 16:05 |
Tokyo |
NII |
A Spam Review Detection Method with Verifying Consistency among Multiple Review Sites Chuhao Yao, Jiahong Wang, Eiichiro Kodama (Iwate pu) KBSE2018-51 |
In recent years, internet sites such as Amazon, Rakuten and TABElog that have the user review information are widely use... [more] |
KBSE2018-51 pp.49-54 |
QIT (2nd) |
2018-06-04 12:00 |
Hiroshima |
ICCH Ran |
Self-consisntent quantum tomography for evaluating highly accurate quantum operations Takanori Sugiyama (Univ. Tokyo), Shinpei Imori (Hiroshima Univ.), Fuyuhiko Tanaka (Osaka Univ.) |
Improving accuracy of quantum operations are indispensable tasks for realizing a practical quantum computer. A reliable ... [more] |
|
KBSE |
2018-03-01 10:00 |
Okinawa |
|
Spam Review Detection Based on Sentiment Analysis Yao Cuhao, Wang Jiahong, Kodama Eiichiro (iwate pu) KBSE2017-39 |
In recent years, the review sites like Rakuten and TABElog are widely used. As an important factor affecting purchasing ... [more] |
KBSE2017-39 pp.1-6 |
IA, ICSS |
2017-06-08 14:50 |
Kochi |
Kochi University of Technolo, Eikokuji Campus |
Study on Email address harvesting by free service Keisuke Hashida, Masaru Kawakita, Shigeyoshi Shima (NEC) IA2017-5 ICSS2017-5 |
The cyberattack for which an e-mail was used in recent years is a big problem socially. An indefinite point keeps also h... [more] |
IA2017-5 ICSS2017-5 pp.25-29 |
IA |
2016-11-04 13:10 |
Overseas |
Taipei (Taiwan) |
Countermeasure of Spoofed Emails by Checking the Reliability of DKIM Signature Benjaporn Rienthong (King Mongkut's Univ. of Tech. Thonburi), Naoya Kitagawa, Nariyoshi Yamai (Tokyo Univ. of Agri. and Tech) IA2016-49 |
Although e-mail communication has been widely used for many years, the spoofed e-mails becoming a serious concern nowada... [more] |
IA2016-49 pp.103-107 |
ICSS, IPSJ-SPT |
2016-03-03 12:40 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Malicious-Spam-Mail Detection System with Autonomous Learning Ability Shogo Osaka, Jun Kitazono, Seiichi Ozawa (Kobe Univ.), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit) ICSS2015-50 |
Recently, damages caused by spam mails that guide receivers to malicious
web pages become more and more serious. In thi... [more] |
ICSS2015-50 pp.19-24 |
NC, MBE |
2015-03-16 14:00 |
Tokyo |
Tamagawa University |
Spam E-Mail Filtering Using Gray SOM Naoki Miyamoto, Jun Rokui (Shimane Univ.) MBE2014-165 NC2014-116 |
It has become an important issue that filtering of Ham-Mail or Spam-Mail as the Spam-Mail increase.
The vague Mail call... [more] |
MBE2014-165 NC2014-116 pp.271-276 |
ICSS, IPSJ-SPT |
2014-03-28 09:25 |
Okinawa |
Meio Univiersity |
Spam Analysis based on Mail Relay Routing Junji Nakazato, Tao Ban (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-75 |
The characteristic analysis using contents of spam mail is changed by the purpose of spam campaign. In this paper, we pr... [more] |
ICSS2013-75 pp.101-106 |
CS |
2013-11-15 10:35 |
Hokkaido |
Noboribetsu-onsen Dai-ichi Takimotokan (Hokkaido) |
Preventing Voice-based SPAM by Hijacked Account Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2013-56 |
As the growing trend of integrating VoIP (Voice over IP) into SNS (Social Networking Service), we can easily guess the e... [more] |
CS2013-56 pp.93-98 |
IA, ICSS |
2013-06-20 16:50 |
Niigata |
Ao-re Nagaoka |
Operation and Issues of E-Mail System in Okayama University Nariyoshi Yamai, Kiyohiko Okayama, Takaoki Fujiwara, Yoshihiro Ohsumi (Okayama Univ.) IA2013-8 ICSS2013-8 |
Okayama University has been operating student e-mail systems using Gmail since April 2009. As for teachers, we have sta... [more] |
IA2013-8 ICSS2013-8 pp.43-48 |
IA |
2012-10-18 16:30 |
Overseas |
Phuket |
A lightweight method to discriminate spamming hosts by periodically changing DNS response Naoya Kitagawa, Hiroki Takakura (Nagoya Univ.), Tsunehiko Suzuki (Chukyo Univ.) IA2012-39 |
With widespread of IPv6 usage, current anti-spam techniques which depend on reputations of IP address are losing their a... [more] |
IA2012-39 pp.31-35 |
IN, NS (Joint) |
2011-03-04 09:10 |
Okinawa |
Okinawa Convention Center |
An in-network spam filtering method using nearest neighbor search of edit distance Yosuke Tsukajima, Akihiro Nakao (Univ. of Tokyo) NS2010-244 |
Email has become an indispensable means for the communication in social life. However, a huge amount of spam has become ... [more] |
NS2010-244 pp.449-454 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-01 15:05 |
Aomori |
Hirosaki University |
On the use and misuse of E-mail sender authentication mechanisms Tatsuya Mori (NTT) ISEC2010-22 SITE2010-18 ICSS2010-28 |
E-mail sender authentication is a promising way of verifying the sources of e-mail messages. Since to- day’s primary e-m... [more] |
ISEC2010-22 SITE2010-18 ICSS2010-28 pp.101-106 |
NLC |
2010-01-25 14:20 |
Hiroshima |
Machizukuri Shimin Kouryu Plaza, Hiroshima City |
Towards the Personalized Splog Filtering System
-- Its Implementation and Evaluation Using Individual Splog Judgement Dataset -- Takayuki Yoshinaka (Tokyo Denki Univ.), Tomohiro Fukuhara (Univ. of Tokyo), Hidetaka Masuda (Tokyo Denki Univ.), Hiroshi Nakagawa (Univ. of Tokyo) NLC2009-38 |
The wide spread of spam blog (Splog) causes a big problem on today’s Web. The value of blog sites
is different by each ... [more] |
NLC2009-38 pp.31-36 |
IN |
2009-07-09 16:15 |
Hokkaido |
HOKKAIDO UNIVERSITY |
[Invited Talk]
High-performance, High-efficient Security Processing Satoshi Kamiya (NEC) IN2009-29 |
With the Internet growth and progress of Cloud Computing, circumstances using computer resources via network is getting ... [more] |
IN2009-29 pp.25-30 |
NS, OCS, PN (Joint) |
2009-06-26 13:25 |
Nagasaki |
Nagasaki Museum of History and Culture (Nagasaki) |
[Encouragement Talk]
A Study of Spam Mail Detection before Receiving DATA Command at SMTP Server and its Evaluation using Large-scale Mail Log Data Yukiko Sawaya, Yutaka Miyake (KDDI R&D Labs, Inc.) NS2009-41 |
As the number of spam mail has been increasing and it occupies 85% of all email traffic, SMTP servers are frustrated wit... [more] |
NS2009-41 pp.61-66 |