Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2021-03-01 10:25 |
Online |
Online |
Design and implementation of a cyber security exercise rewinding mechanism Yuma Kodera, Chinen Kenichi (JAIST) |
[more] |
|
AI |
2021-02-12 16:30 |
Online |
Online |
A Defense Method for Machine Learning Poisoning Attacks in IoT Environments Considering the Removal Priority of Poisonous Data Tomoki Chiba, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga (UEC) |
(To be available after the conference date) [more] |
|
MSS, SS |
2021-01-27 13:25 |
Online |
Online |
Distributed State Estimation for Linear Singular Systems and Its Application to Sensor Networks Kei Isono, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.) MSS2020-37 SS2020-22 |
(To be available after the conference date) [more] |
MSS2020-37 SS2020-22 pp.49-53 |
SIP, IT, RCS |
2021-01-21 11:45 |
Online |
Online conference |
A Study on Secret Key Agreement Scheme by Vector Quantization of Correlated MIMO Channel Matrix Tomoyuki Higashide, Shinsuke Ibi (Doushisha Univ.), Takumi Takahashi (Osaka Univ.), Hisato Iwai (Doushisha Univ.) IT2020-69 SIP2020-47 RCS2020-160 |
In the wireless communication, secret key agreement schemes on physical layer attracts attentions for protecting communi... [more] |
IT2020-69 SIP2020-47 RCS2020-160 pp.34-39 |
NS, NWS (Joint) |
2021-01-21 13:55 |
Online |
Online |
Prototyping Zero Trust Network for Enterprise Network with Considering the Security Policy Masataka Kawai, Yuzo Taenaka, Yuki Kadobayashi (NAIST) NS2020-111 |
The Zero Trust Network (ZTN) is a security model designed to deal with threats such as information theft by spies and cr... [more] |
NS2020-111 pp.9-15 |
SIP, IT, RCS |
2021-01-21 10:15 |
Online |
Online conference |
Improvement of Encoding Gain in Radio-Wave Encrypted Modulation Using Logistic Map Mamoru Okumura, Tomoki Kaga, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) IT2020-72 SIP2020-50 RCS2020-163 |
In recent years, fifth-generation mobile communications system (5G) has been promoted around the world, and the markets ... [more] |
IT2020-72 SIP2020-50 RCS2020-163 pp.52-57 |
SIP, IT, RCS |
2021-01-22 16:45 |
Online |
Online conference |
Revisiting the IND-CPA Security of LWE Encryption Scheme Takahiro Arai, Bagus Santoso, Kaoru Takemure (UEC) IT2020-111 SIP2020-89 RCS2020-202 |
In this paper, we propose a new simpler security notion which is
equivalence to the standard IND-CPA notion,
and base... [more] |
IT2020-111 SIP2020-89 RCS2020-202 pp.271-276 |
IN |
2021-01-18 15:50 |
Online |
Online |
[Invited Talk]
Risk Analysis Methods and Actual Conditions in Cyber Security Kentaro Sonoda, Haruka Nakashima (NEC) IN2020-49 |
Risks in corporations mean business risks, and a cyber security (cyber attack) is positioned as one of the important bus... [more] |
IN2020-49 p.37 |
IA, IN (Joint) |
2020-12-15 10:50 |
Online |
Online |
Development of an Intrusion Detection System Utilizing Social Network Analysis Principles James Lu, Yuji Sekiya (Univ. of Tokyo) IA2020-29 |
As computer networks grow increasingly complex and cyberattacks become more sophisticated, better methods are needed to ... [more] |
IA2020-29 pp.18-21 |
AI |
2020-12-11 10:20 |
Shizuoka |
Online and HAMAMATSU ACT CITY (Primary: On-site, Secondary: Online) |
A Preliminary Multi-Agent Reinforcement Learning Approach for Responding Dynamic Traffic in Communication Destination Anonymization Keita Sugiyama, Naoki Fukuta (Shizuoka Univ.) AI2020-10 |
In this paper, we describe our prototype mechanism using the simulation-based multi-agent reinforcement learning for aut... [more] |
AI2020-10 pp.46-51 |
IT |
2020-12-03 16:40 |
Online |
Online |
Implementation and security evaluation of wiretap channel coding in noisy channels Koutaro Takasaki, Tomohiro Ogawa (UEC) IT2020-62 |
In wiretap channel coding by Wyner,one can transmit messages to a legitimate receiver reliably without giving any inform... [more] |
IT2020-62 pp.206-211 |
ICSS |
2020-11-26 15:00 |
Online |
Online |
Initial Study of Incident Response Support System for Multi-Located Network Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Naoya Univ.), Hiroki Takakura (NII) ICSS2020-22 |
In the organization network which are consisted multi-sites, there are differences in security strength between the head... [more] |
ICSS2020-22 pp.17-20 |
OPE, LQE |
2020-11-20 15:30 |
Online |
Online |
Feasibility confirmation of high-security wireless communication using high-directivity THz Waves
-- Realization of AND operation by homodyne detection and heterodyne detection -- Yusuke Kawai, Kenta Yamauchi, Kazutoshi Kato (Kyushu Univ.) OPE2020-55 LQE2020-35 |
We have been inventing a new encrypted methods to improve physical-layer security of wireless communication. As one of c... [more] |
OPE2020-55 LQE2020-35 pp.53-57 |
VLD, DC, RECONF, ICD, IPSJ-SLDM (Joint) [detail] |
2020-11-18 14:00 |
Online |
Online |
Physically Unclonable Functions(PUF) curcuit using Non-Volatile Flip-Flop and security evaluation against modeling attacks Hiroki Ishihara, Kimiyoshi Usami (Shibaura IT) VLD2020-37 ICD2020-57 DC2020-57 RECONF2020-56 |
In recent years, imitative LSIs have become a serious problem and security technology PUF to use manufacturing variabili... [more] |
VLD2020-37 ICD2020-57 DC2020-57 RECONF2020-56 pp.139-144 |
OFT, ITE-BCT, OCS, IEE-CMN [detail] |
2020-11-12 16:50 |
Online |
Online |
Multi-Channel Simultaneous Encryption in WDM Systems of PSK Y-00 Quantum Stream Cipher Ken Tanizawa, Fumio Futami (Tamagawa Univ.) OCS2020-26 |
Tapping from an optical fiber link is a potential security risk in optical communication systems. Physical layer encrypt... [more] |
OCS2020-26 pp.15-20 |
ICD, HWS [detail] |
2020-10-26 09:25 |
Online |
Online |
Power Analysis Attack Using Pipeline Scheduling on Pairing Hardware Mitsufumi Yamazaki, Junichi Sakamoto, Tsutomu Matsumoto (YNU) HWS2020-26 ICD2020-15 |
To reduce the latency of pairing calculation for advanced cryptography, hardware implementations with pipelined modular ... [more] |
HWS2020-26 ICD2020-15 pp.7-12 |
ICD, HWS [detail] |
2020-10-26 10:30 |
Online |
Online |
Laser-based Attacks on Ultrasonic Sensors Tatsuya Suehiro, Taku Toyama, Junichi Sakamoto, Tsutomu Matsumoto (Yokohama National Univ.) HWS2020-28 ICD2020-17 |
We examine the instrumentation security threat of irradiating laser for a piezoelectric MEMS transducer in a MEMS ultras... [more] |
HWS2020-28 ICD2020-17 pp.18-23 |
ICD, HWS [detail] |
2020-10-26 13:50 |
Online |
Online |
Security Threats and Preventions for Photonics Computing Model Junko Takahashi, Koji Chida, Takeshi Sakamoto (NTT) HWS2020-33 ICD2020-22 |
This paper presents security analysis on photonic computing models in All-Photonics Network (APN). New computing archite... [more] |
HWS2020-33 ICD2020-22 pp.48-53 |
ICD, HWS [detail] |
2020-10-26 15:20 |
Online |
Online |
Hardware Trojan using LUT Structure of AI Inference Devices Yusuke Nozaki, Shu Takemoto, Yoshiya Ikezaki, Masaya Yoshikawa (Meijo Univ.) HWS2020-36 ICD2020-25 |
The artificial intelligence (AI) technology has been attracted attention in several fields. On the other hand, security ... [more] |
HWS2020-36 ICD2020-25 pp.65-70 |
ICD, HWS [detail] |
2020-10-26 15:45 |
Online |
Online |
Low-Latency Countermeasure Circuit Oriented Hardware Trojan and its Evaluation Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) HWS2020-37 ICD2020-26 |
Outsourcing and the use of IP are the mainstream in the design and manufacturing of system LSIs. On the other hand, the ... [more] |
HWS2020-37 ICD2020-26 pp.71-76 |