Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICM, NS, CQ, NV (Joint) |
2023-11-21 09:30 |
Ehime |
Ehime Prefecture Gender Equality Center (Primary: On-site, Secondary: Online) |
Fallback control based false injection attack defense mechanism for managed potential-based routing Tasuku Nagata, Naomi Kuze (Osaka Univ.) NS2023-109 |
Due to the rapid growth of information networks, self-organization is a promising approach for controlling network
syst... [more] |
NS2023-109 pp.1-6 |
TL |
2022-11-26 15:45 |
Yamagata |
Yamagata University |
Theory of Mind and Acquisition of Japanese Particles Hisaka Watanabe, Yuki Hirose (Univ. of Tokyo) TL2022-21 |
The present study examined whether acquisition of Japanese particles wa and ga is related to Japanese-speaking children’... [more] |
TL2022-21 pp.17-22 |
SR |
2021-11-05 14:15 |
Online |
Online |
Initialization of forward method in CFAR outlier detection Yau Hong Leow, Kenta Umebayashi (TUAT), Janne Lehtomaki (UoO) SR2021-57 |
To solve the spectrum scarcity problem, energy detection (ED) is an effective technique to find the vacant spectrum for ... [more] |
SR2021-57 pp.98-103 |
NLC |
2021-09-16 15:50 |
Online |
Online |
Early detection of false information on Twitter by deep learning with sequential data of user and text Kohei Suto, Jianwei Zhang (Iwate Univ.) NLC2021-14 |
The spread of false information has become a problem in the development of SNS in recent years. False information may ha... [more] |
NLC2021-14 pp.34-39 |
IN |
2021-01-18 11:20 |
Online |
Online |
Research on a Method for Discriminating Disinformation on SNS Using Machine Learning Kanta Mori, Kenichi Nagaoka (NIT, Ishikawa Col.) IN2020-43 |
There are situations in which users have to select reliable information from a huge amount of information with the sprea... [more] |
IN2020-43 pp.13-17 |
IBISML |
2019-03-05 17:00 |
Tokyo |
RIKEN AIP |
A Study on Automatic Generation of False Data Injection Attack against Connected Car Service Based on Reinforcement Learning Yuichiro Dan, Keita Hasegawa, Takafumi Harada, Tomoaki Washio, Yoshihito Oshima (NTT) IBISML2018-109 |
While the connected car is predicted to prevail by 2025, the appearance of novel cyber attacks is concerned. In this pap... [more] |
IBISML2018-109 pp.31-38 |
CS |
2018-11-02 10:30 |
Ehime |
The Shiki Museum |
False Density Information Attack Detection Scheme Using Overlap of Communication Range in VANET Masashi Yoshida, Hiromu Asahina, Shuichiro Haruta, Iwao Sasase (Keio Univ) CS2018-66 |
In Vehicular Ad Hoc Network (VANET), it is important to detect false information. The previously published scheme detect... [more] |
CS2018-66 pp.63-66 |
SR, RCS (Joint) (2nd) |
2018-10-30 10:30 |
Overseas |
Mandarin Hotel, Bangkok, Thailand |
[Poster Presentation]
Probability of False Alarm based Interference Suppression Methods in IoT Environment Natthanan Promsuk, Attaphongse Taparugssanagorn (AIT), Johanna Vartiainen (CWC, University of Oulu) |
Interference suppression methods are studied for Internet of Things (IoT) networks. The performances on each interferenc... [more] |
|
SANE |
2011-01-27 16:25 |
Nagasaki |
Nagasaki Prefectural Art Museum |
A Study on Simulation for Clutter Suppression for UWB Vehicle Radar at 24GHz Isamu Matsunami, Masatoshi Ogata, Masami Kawazoe, Yoshio Kosuge (Nagasaki Univ.), Akihiro Kajiwara (Kitakyushu Univ.) SANE2010-145 |
Recent year, 24/26GHz UWB radar is attracting the attention as short-range and wide-angle radar, which achieve surround ... [more] |
SANE2010-145 pp.43-47 |
ET |
2009-03-07 11:30 |
Kagawa |
|
Discrimination for true-false task using eye-movements features Yuko Hayashi, Minoru Nakayama (Tokyo Inst. of Tech.) ET2008-111 |
Eye movements is associated with understanding to the object, a psychological factor such as the certainly of the inform... [more] |
ET2008-111 pp.105-110 |
SANE |
2008-08-29 13:55 |
Niigata |
Niigata University |
Mitigation of Sidelobe Target Detection by Using Mainbeam Subspace Ryuhei Takahashi, Kazufumi Hirata, Hisakazu Maniwa (Mitsubishi Electric) SANE2008-48 |
False alarm caused by sidelobe moving targets or clutter residue is serious problem for ground-based or shipboard radar.... [more] |
SANE2008-48 pp.7-12 |
VLD, ICD |
2008-03-06 15:05 |
Okinawa |
TiRuRu |
Performance Estimation considering False-paths for System-level Design Daisuke Ando, Takeshi Matsumoto, Tasuku Nishihara, Masahiro Fujita (Univ. of Tokyo) VLD2007-152 ICD2007-175 |
In designing today's highly complicated system-LSIs, it is essential to estimate timing information such as worst-case o... [more] |
VLD2007-152 ICD2007-175 pp.49-54 |
DC |
2008-02-08 14:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
RTL False Path Identification Using High Level Synthesis Information Naotsugu Ikeda, Satoshi Ohtake, Michiko Inoue, Hideo Fujiwara (NAIST) DC2007-77 |
This paper proposes a method of RTL false path identification using high level synthesis information. By using the false... [more] |
DC2007-77 pp.63-68 |
NC |
2007-10-18 14:10 |
Miyagi |
Tohoku University |
Neural Substrates for Inference of Other's Mind based on Perspective Taking and Information Suppression Takashi Yokoi, Naohiro Takemura (Kyoto Univ.), Kenji Ogawa (JST), Toshio Inui (Kyoto Univ.) NC2007-41 |
Humans have an ability to infer other’s mind called Theory of Mind (ToM), which is generally tested by a false belief ta... [more] |
NC2007-41 pp.45-50 |
SANE |
2005-11-25 13:50 |
Kanagawa |
The institute of Space and Astronautical Science (JAXA) |
Detection Probability Analysis of Doppler Radar Tomotsugu Sekine, Kenichi Tajima, Ryoji Hayashi (Mitsubishi Electric Corp.) |
Undetected error probability and false alarm probability are analyzed in a pulse Doppler radar system in Additive White ... [more] |
SANE2005-78 pp.13-18 |
PN, IN (Joint) |
2005-10-14 17:00 |
Kanagawa |
Keio Univ. (Yagami) |
Comparison of the Efficiency of IP Traceback Schemes Based on Probabilistic Packet Marking Keisei Oh, Shigeo Shioda (Chiba Univ.) |
Probabilistic packet marking (PPM) is an IP traceback technique that lets routers probabilistically mark packets with pa... [more] |
IN2005-99 pp.67-72 |