IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 1015  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2021-03-01
Online Online Design and implementation of a cyber security exercise rewinding mechanism
Yuma Kodera, Chinen Kenichi (JAIST)
AI 2021-02-12
Online Online A Defense Method for Machine Learning Poisoning Attacks in IoT Environments Considering the Removal Priority of Poisonous Data
Tomoki Chiba, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga (UEC)
(To be available after the conference date) [more]
MSS, SS 2021-01-27
Online Online Distributed State Estimation for Linear Singular Systems and Its Application to Sensor Networks
Kei Isono, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.) MSS2020-37 SS2020-22
(To be available after the conference date) [more] MSS2020-37 SS2020-22
SIP, IT, RCS 2021-01-21
Online Online conference A Study on Secret Key Agreement Scheme by Vector Quantization of Correlated MIMO Channel Matrix
Tomoyuki Higashide, Shinsuke Ibi (Doushisha Univ.), Takumi Takahashi (Osaka Univ.), Hisato Iwai (Doushisha Univ.) IT2020-69 SIP2020-47 RCS2020-160
In the wireless communication, secret key agreement schemes on physical layer attracts attentions for protecting communi... [more] IT2020-69 SIP2020-47 RCS2020-160
Online Online Prototyping Zero Trust Network for Enterprise Network with Considering the Security Policy
Masataka Kawai, Yuzo Taenaka, Yuki Kadobayashi (NAIST) NS2020-111
The Zero Trust Network (ZTN) is a security model designed to deal with threats such as information theft by spies and cr... [more] NS2020-111
SIP, IT, RCS 2021-01-21
Online Online conference Improvement of Encoding Gain in Radio-Wave Encrypted Modulation Using Logistic Map
Mamoru Okumura, Tomoki Kaga, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) IT2020-72 SIP2020-50 RCS2020-163
In recent years, fifth-generation mobile communications system (5G) has been promoted around the world, and the markets ... [more] IT2020-72 SIP2020-50 RCS2020-163
SIP, IT, RCS 2021-01-22
Online Online conference Revisiting the IND-CPA Security of LWE Encryption Scheme
Takahiro Arai, Bagus Santoso, Kaoru Takemure (UEC) IT2020-111 SIP2020-89 RCS2020-202
In this paper, we propose a new simpler security notion which is
equivalence to the standard IND-CPA notion,
and base... [more]
IT2020-111 SIP2020-89 RCS2020-202
IN 2021-01-18
Online Online [Invited Talk] Risk Analysis Methods and Actual Conditions in Cyber Security
Kentaro Sonoda, Haruka Nakashima (NEC) IN2020-49
Risks in corporations mean business risks, and a cyber security (cyber attack) is positioned as one of the important bus... [more] IN2020-49
Online Online Development of an Intrusion Detection System Utilizing Social Network Analysis Principles
James Lu, Yuji Sekiya (Univ. of Tokyo) IA2020-29
As computer networks grow increasingly complex and cyberattacks become more sophisticated, better methods are needed to ... [more] IA2020-29
AI 2020-12-11
Shizuoka Online and HAMAMATSU ACT CITY
(Primary: On-site, Secondary: Online)
A Preliminary Multi-Agent Reinforcement Learning Approach for Responding Dynamic Traffic in Communication Destination Anonymization
Keita Sugiyama, Naoki Fukuta (Shizuoka Univ.) AI2020-10
In this paper, we describe our prototype mechanism using the simulation-based multi-agent reinforcement learning for aut... [more] AI2020-10
IT 2020-12-03
Online Online Implementation and security evaluation of wiretap channel coding in noisy channels
Koutaro Takasaki, Tomohiro Ogawa (UEC) IT2020-62
In wiretap channel coding by Wyner,one can transmit messages to a legitimate receiver reliably without giving any inform... [more] IT2020-62
ICSS 2020-11-26
Online Online Initial Study of Incident Response Support System for Multi-Located Network
Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Naoya Univ.), Hiroki Takakura (NII) ICSS2020-22
In the organization network which are consisted multi-sites, there are differences in security strength between the head... [more] ICSS2020-22
OPE, LQE 2020-11-20
Online Online Feasibility confirmation of high-security wireless communication using high-directivity THz Waves -- Realization of AND operation by homodyne detection and heterodyne detection --
Yusuke Kawai, Kenta Yamauchi, Kazutoshi Kato (Kyushu Univ.) OPE2020-55 LQE2020-35
We have been inventing a new encrypted methods to improve physical-layer security of wireless communication. As one of c... [more] OPE2020-55 LQE2020-35
(Joint) [detail]
Online Online Physically Unclonable Functions(PUF) curcuit using Non-Volatile Flip-Flop and security evaluation against modeling attacks
Hiroki Ishihara, Kimiyoshi Usami (Shibaura IT) VLD2020-37 ICD2020-57 DC2020-57 RECONF2020-56
In recent years, imitative LSIs have become a serious problem and security technology PUF to use manufacturing variabili... [more] VLD2020-37 ICD2020-57 DC2020-57 RECONF2020-56
OFT, ITE-BCT, OCS, IEE-CMN [detail] 2020-11-12
Online Online Multi-Channel Simultaneous Encryption in WDM Systems of PSK Y-00 Quantum Stream Cipher
Ken Tanizawa, Fumio Futami (Tamagawa Univ.) OCS2020-26
Tapping from an optical fiber link is a potential security risk in optical communication systems. Physical layer encrypt... [more] OCS2020-26
ICD, HWS [detail] 2020-10-26
Online Online Power Analysis Attack Using Pipeline Scheduling on Pairing Hardware
Mitsufumi Yamazaki, Junichi Sakamoto, Tsutomu Matsumoto (YNU) HWS2020-26 ICD2020-15
To reduce the latency of pairing calculation for advanced cryptography, hardware implementations with pipelined modular ... [more] HWS2020-26 ICD2020-15
ICD, HWS [detail] 2020-10-26
Online Online Laser-based Attacks on Ultrasonic Sensors
Tatsuya Suehiro, Taku Toyama, Junichi Sakamoto, Tsutomu Matsumoto (Yokohama National Univ.) HWS2020-28 ICD2020-17
We examine the instrumentation security threat of irradiating laser for a piezoelectric MEMS transducer in a MEMS ultras... [more] HWS2020-28 ICD2020-17
ICD, HWS [detail] 2020-10-26
Online Online Security Threats and Preventions for Photonics Computing Model
Junko Takahashi, Koji Chida, Takeshi Sakamoto (NTT) HWS2020-33 ICD2020-22
This paper presents security analysis on photonic computing models in All-Photonics Network (APN). New computing archite... [more] HWS2020-33 ICD2020-22
ICD, HWS [detail] 2020-10-26
Online Online Hardware Trojan using LUT Structure of AI Inference Devices
Yusuke Nozaki, Shu Takemoto, Yoshiya Ikezaki, Masaya Yoshikawa (Meijo Univ.) HWS2020-36 ICD2020-25
The artificial intelligence (AI) technology has been attracted attention in several fields. On the other hand, security ... [more] HWS2020-36 ICD2020-25
ICD, HWS [detail] 2020-10-26
Online Online Low-Latency Countermeasure Circuit Oriented Hardware Trojan and its Evaluation
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) HWS2020-37 ICD2020-26
Outsourcing and the use of IP are the mainstream in the design and manufacturing of system LSIs. On the other hand, the ... [more] HWS2020-37 ICD2020-26
 Results 1 - 20 of 1015  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)

[Return to Top Page]

[Return to IEICE Web Page]

The Institute of Electronics, Information and Communication Engineers (IEICE), Japan