IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
... (for ESS/CS/ES/ISS)
Tech. Rep. Archives
... (for ES/CS)
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 964件中 1~20件目  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IN 2020-01-23
16:40
Aichi WINC AICHI [Invited Talk] Protecting Security and Creating Security
Shinichi Hirata (NTT) IN2019-71
NTT Secure Platform Laboratories is engaged in research and development on digital security that will be required for th... [more] IN2019-71
pp.37-40
IT, SIP, RCS 2020-01-23
13:55
Hiroshima Hiroshima City Youth Center A Study on Noise Reduction in Physical Layer Secret Key Agreement using Multi-Antenna
Tomoyuki Higashide, Shinsuke Ibi, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) IT2019-54 SIP2019-67 RCS2019-284
With the spread of the wireless communications, secret key agreement schemes on physical layer attracts attentions for p... [more] IT2019-54 SIP2019-67 RCS2019-284
pp.111-116
IT, SIP, RCS 2020-01-24
10:45
Hiroshima Hiroshima City Youth Center Study on application of low complexity chaos NOMA-SIC decoding method in uplink
Yoshihiro Masuda, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) IT2019-63 SIP2019-76 RCS2019-293
Non-orthogonal multiple access (NOMA) scheme has been studied as one of the methods to perform larger capacity and high ... [more] IT2019-63 SIP2019-76 RCS2019-293
pp.155-160
SS, MSS 2020-01-14
15:25
Hiroshima   Sensor Attack Detection in Control Systems Using Moving Horizon Estimation
Kei Isono, Koichi Kobayashi (Hokkaido Univ.), Ryosuke Adachi (Yamaguchi Univ.), Yuh Yamashita (Hokkaido Univ.) MSS2019-46 SS2019-30
The sensor attack detection problem in control systems is important in cybersecurity. In this paper, we propose a method... [more] MSS2019-46 SS2019-30
pp.31-36
NS, RCS
(Joint)
2019-12-19
11:30
Tokushima Memorial Hall of Alumni(Engineering), Tokushima Univ. Study on correction method of key disagreement for group secret key agreement based on radio propagation characteristics in wireless networks
Hideichi Sasaoka, Hisato Iwai (Doshisha Univ.) RCS2019-242
Secret key agreement based on radio propagation characteristics attracts attention as physical layer security, but there... [more] RCS2019-242
pp.31-36
IN, IA
(Joint)
2019-12-19
15:15
Hiroshima Satellite Campus Hiroshima Design of Honeynet to avoid IPv6 alias detection
Hyuga Kobayashi, Yudai Aratsu (Tokyo Univ.), Satoru Kobayashi, Kensuke Fukuda (NII), Hiroshi Esaki (Tokyo Univ.) IA2019-50
In IPv6, full scan is infeasible due to its enourmous address space, thought it is easy in IPv4.
Hitlist, which is the ... [more]
IA2019-50
pp.13-18
SSS 2019-12-17
14:10
Tokyo   Proposal of a Risk Access Method of Steel Plant Control System using Remote Acccess
Shuji Tsuchida (Nippon Steel) SSS2019-24
In plant control system, there is an increasing need for online operation analysis and maintenance using a remote access... [more] SSS2019-24
pp.9-10
SITE 2019-12-06
13:25
Kanagawa   Interpretation of Multi-Label Learning by combining two probability models -- An approach that interprets evaluate texts by regarding labels as teacher data --
Kurebayashi Kosuke, Morizumi Tetsuya, Kinoshita Hirotsugu (Kanagawa Univ.) SITE2019-81
We have already proposed a security model with a three-layer structure of AI architecture. However, there is a certain l... [more] SITE2019-81
pp.7-12
SITE 2019-12-06
15:40
Kanagawa   "To be there" as an existence in logical space and an existence in probability measure space -- "Shared logos (partage) on language games" as a necessary condition of physicality --
Tetsuya Morizumi (KU) SITE2019-86
How should the AI relate to the information security? The AI performs Bayesian estimation of a probability distribution ... [more] SITE2019-86
pp.41-46
SR 2019-12-05
13:50
Okinawa Ishigaki City Hall (Ishigaki Island) [Poster Presentation] Performance Evaluation of Secure Wireless Communications for PLNC with Untrusted Relay by Double-objective Optimization Problem
Go Ikeuchi, Osamu Takyu (Shinshu Univ), Takeo Fujii (UEC), Tomoaki Ohtsuki (Keio Univ), Fumihito Sasamori, Shiro Handa (Shinshu Univ) SR2019-88
In this study, we have focused on wireless communication networks which can easily construct a network by using the rela... [more] SR2019-88
pp.15-22
NS, ICM, CQ, NV
(Joint)
2019-11-21
10:20
Hyogo Rokkodai 2nd Campus, Kobe Univ. Visual Analytics for Anomaly Classification in LAN Based on Deep Convolutional Neural Network
Yuwei Sun, Hideya Ochiai, Hiroshi Esaki (UTokyo) NS2019-121
Recently, the attack monitored in Local Area Network (LAN) is surging. There are some methods being used to analyze the ... [more] NS2019-121
pp.7-12
NS, ICM, CQ, NV
(Joint)
2019-11-21
11:20
Hyogo Rokkodai 2nd Campus, Kobe Univ. Experiment of DDoS Attack Detection with UTM Log Analysis Using Decision Tree
Aoshi Fujioka, Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) NS2019-123
In recent years, AI technology such as machine learning has been developed and the number of application examples are in... [more] NS2019-123
pp.19-25
NS, ICM, CQ, NV
(Joint)
2019-11-21
11:45
Hyogo Rokkodai 2nd Campus, Kobe Univ. Analysis of UTM traffic log using LLL algorithm
Takuya Morita, Hikofumi Suzuki, Hiroyuki Okazaki (Shinshu Univ.) NS2019-124
In recent years, with the spread of information communication equipment and the development of the Internet, various ser... [more] NS2019-124
pp.27-30
NS, ICM, CQ, NV
(Joint)
2019-11-21
16:00
Hyogo Rokkodai 2nd Campus, Kobe Univ. [Invited Talk] Trends and Countermeasures of Cyber Attacks -- Introduction to Cyber Security for Network Engineers --
Yukiko Yano (NEC) CQ2019-93
In recent years, cyber attacks have spreading, information leaks such as confidential information of public institutions... [more] CQ2019-93
p.27
NS, ICM, CQ, NV
(Joint)
2019-11-22
13:30
Hyogo Rokkodai 2nd Campus, Kobe Univ. [Invited Talk] Security and Privacy for Personal Data
Katsumi Takahashi (NTT) ICM2019-25
Technologies for security and privacy of personal data are described. Many technologies are proposed for data security a... [more] ICM2019-25
pp.25-26
QIT
(2nd)
2019-11-19
14:50
Tokyo Gakushuin University Capacity of Quantum Private Information Retrieval with Collusion of All But One of Servers
Seunghoan Song, Masahito Hayashi (Nagoya Univ.)
Quantum private information retrieval (QPIR) is the problem to retrieve one of f classical files by downloading quantum ... [more]
IA 2019-11-15
13:40
Tokyo Kwansei Gakuin University, Tokyo Marunouchi Campus (Sapia Tower) Towards creating a defense mechanism of IP camera: Recognizing potential risks through firmware backdooring
Yves-Roland Douha, Shun Yonamine, Yuzo Taenaka, Youki Kadobayashi (NAIST) IA2019-42
Internet of Things (IoT) is an emerging and promising technology allowing users to interact with physical items through ... [more] IA2019-42
pp.85-90
PN 2019-11-14
17:20
Kanagawa   Network-based DDoS prevention with newly developed Reconfigurable Communication Processors
Naoto Sumita, Masaki Murakami, Yu Nishio, Satoru Okamoto, Naoaki Yamanaka (Keio Univ.) PN2019-26
In order to cope with traffic growth and service diversity the Photonic Network Processor (PNP) has been proposed. As a ... [more] PN2019-26
pp.15-22
ICSS 2019-11-13
15:45
Miyazaki MRT Terrace(Miyazaki) Attack Behavior Analysis System that Diverts Internal Attacks to Virtual Environment
Shuji Ohashi, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2019-65
It is difficult to completely prevent targeted attackers intrusion, so countermeasures after the intrusion is necessary.... [more] ICSS2019-65
pp.31-36
VLD, DC, CPSY, RECONF, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC
(Joint) [detail]
2019-11-15
09:40
Ehime Ehime Prefecture Gender Equality Center Modeling attacks against device authentication using CMOS image sensor PUF
Hiroshi Yamada, Shunsuke Okura, Mitsuru Shiozaki, Masayoshi Shirahata, Takeshi Fujino (Ritsumeikan Univ.) ICD2019-34 IE2019-40
A CMOS image sensor physically unclonable function (CIS-PUF) for device authentication by the unique responses extracted... [more] ICD2019-34 IE2019-40
pp.31-36
 964件中 1~20件目  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (No. 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan