IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 72  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA 2024-01-25
16:40
Tokyo Kwansei Gakuin Univiversity, Marunouchi Campus
(Primary: On-site, Secondary: Online)
[Poster Presentation] Strengthening Cybersecurity with Data Analytics -- A Web Tool for Secure Exploration of CVE Data --
Chidchanok Choksuchat, Sorawit Khamnaewnak, Chanin Maiprom, Suwimon Bureekarn, Touchai Angchuan, Sinchai Kamonphiwong, Thossaporn Kamolphiwong (PSU) IA2023-68
In the realm of Higher Education, the sophistication of cyberattacks necessitates a departure from traditional security ... [more] IA2023-68
pp.48-51
BioX 2023-10-12
14:45
Okinawa Nobumoto Ohama Memorial Hall A Study on Federated Learning System for Highly Accurate Biometric Authentication
Yusei Suzuki, Yosuke Kaga (Hitachi) BioX2023-58
With the development of machine learning on large-scale datasets, the accuracy of biometric authentication has significa... [more] BioX2023-58
pp.2-7
ICSS, IPSJ-SPT 2023-03-13
16:30
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Evaluation and countermeasures of notification destination restoration attacks using password recovery functions of multiple web services
Ryusei Ishikawa, Soramichi Akiyama (Ritsumeikan Univ.), Atsuo Inomata (Ritsumeikan Univ., Osaka Univ.), Tetsutaro Uehara (Ritsumeikan Univ.) ICSS2022-62
Many web services with a login function using pair of ID and password have the password recovery function in case the us... [more] ICSS2022-62
pp.85-90
EA, EMM, ASJ-H 2022-11-22
13:00
Online Online [Fellow Memorial Lecture] Security and Privacy Preservation for Speech Signal -- Approach from speech information hiding technology --
Masashi Unoki (JAIST) EA2022-60 EMM2022-60
Non-authentic but skillfully fabricated artificial replicas of authentic media in the real world are known as “media clo... [more] EA2022-60 EMM2022-60
pp.99-104
CQ, CS
(Joint)
2022-05-12
14:20
Fukui Fukui (Fuku Pref.)
(Primary: On-site, Secondary: Online)
Distributed Network Intrusion Detection System Using Federated Learning
Yuya Tsuru, Tomoya Kawakami, Tatsuhito Hasegawa (Univ. of Fukui) CQ2022-5
A network-based intrusion detection system (NIDS) monitors a network and detects unauthorized traffic. Currently, a vari... [more] CQ2022-5
pp.20-25
VLD, HWS [detail] 2022-03-08
11:00
Online Online Evaluation of a Lightweight Cryptographic Finalist on SROS2
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2021-94 HWS2021-71
In cyber-physical systems, small devices are connected to the network to enable the analysis of sensor values. Also, sin... [more] VLD2021-94 HWS2021-71
pp.99-104
CQ, ICM, NS, NV
(Joint)
2021-11-26
14:50
Fukuoka JR Hakata Stn. Hakata EkiHigashi Rental Room
(Primary: On-site, Secondary: Online)
Data privacy protection method for blockchain by using secret sharing
Jun Nakajima (Hitachi) ICM2021-27
As a form of blockchain(BC), permission-type BC that forms a BC network between specific organizations is attracting att... [more] ICM2021-27
pp.21-26
BioX, CNR 2021-03-02
15:30
Online Online Visual place recognition from eye reflection
Yuki Ohshima, Kyosuke Maeda, Yusuke Edamoto, Atsushi Nakazawa (Kyoto Univ.) BioX2020-48 CNR2020-21
The cornea in the human eye reflects incoming environmental light, which means we can obtain information about the surro... [more] BioX2020-48 CNR2020-21
pp.44-49
IN, ICTSSL, NWS 2020-10-22
15:25
Online Online [Invited Talk] Secure Data Utilization using Multi-Party Computation
Takao Takenouchi (Digital Garage) IN2020-32
It is becoming more and more important to distribute and utilize data between organizations to provide better services a... [more] IN2020-32
pp.12-17
IA 2020-10-01
11:40
Online Online Ethical Education on Information Security Mind for Practical Security Learning
Yoshinari Kanaya (Tohoku Univ.), Daisuke Kotani (Kyoto Univ.), Katsuyoshi Iida (Hokkaido Univ.), Hideaki Sone (Tohoku Univ.) IA2020-2
Practical education on information security may cause trouble if any student in the course tries the new education again... [more] IA2020-2
pp.6-9
NS, IN
(Joint)
2020-03-06
09:50
Okinawa Royal Hotel Okinawa Zanpa-Misaki
(Cancelled but technical report was issued)
Framework to Utilize Others' Behavior without Sharing Privacy Information
Masaaki Yamauchi, Yuichi Ohsita, Masayuki Murata (Osaka Univ.) IN2019-114
A cyberattack to operate home IoT devices by attackers is a serious problem, which may damage the users. We have propose... [more] IN2019-114
pp.213-218
ICSS, IPSJ-SPT 2020-03-02
11:30
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
An Evaluation of Contact Points for Security Notifications
Miori Saito, Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2019-94
With the evolving threat of cyber attacks, the importance of security notifications is increasing. In general, informati... [more] ICSS2019-94
pp.195-200
NS, ICM, CQ, NV
(Joint)
2019-11-22
13:30
Hyogo Rokkodai 2nd Campus, Kobe Univ. [Invited Talk] Security and Privacy for Personal Data
Katsumi Takahashi (NTT) ICM2019-25
Technologies for security and privacy of personal data are described. Many technologies are proposed for data security a... [more] ICM2019-25
pp.25-26
IA 2019-11-15
13:40
Tokyo Kwansei Gakuin University, Tokyo Marunouchi Campus (Sapia Tower) Towards creating a defense mechanism of IP camera: Recognizing potential risks through firmware backdooring
Yves-Roland Douha, Shun Yonamine, Yuzo Taenaka, Youki Kadobayashi (NAIST) IA2019-42
Internet of Things (IoT) is an emerging and promising technology allowing users to interact with physical items through ... [more] IA2019-42
pp.85-90
SIS, IPSJ-AVM, ITE-3DMT [detail] 2019-06-13
13:35
Nagasaki Fukue Culture Center Privacy Preserving Sparse Representation for Face Recognition in Edge and Cloud Networks
Yitu Wang, Takayuki Nakachi (NTT) SIS2019-4
The interaction between edge and cloud servers plays an important role in fulfilling the extensive computation requireme... [more] SIS2019-4
pp.17-22
NS 2019-04-19
14:15
Kagoshima Tenmonkan Vision Hall A Study on Identity Exchange System in Consideration of User's Privacy
Motoshi Horii, Dai Suzuki, Kenji Taka, Takeshi Kawasaki, Satoshi Imai (Fujitsu Labs.) NS2019-18
Service provider requires service users’ personal data such as their name and address to identify each of the service us... [more] NS2019-18
pp.103-106
IA 2017-11-15
16:30
Overseas KMITL, Bangkok, Thailand [Poster Presentation] Basic SecCap, Practical Education for Information Security by University Cooperation
Hideaki Sone, Satoru Izumi (Tohoku Univ.) IA2017-36
Introduction and activity report on “Basic SecCap.”
The Graduate School of Information Science of Tohoku University is... [more]
IA2017-36
pp.33-34
IBISML 2017-11-10
13:00
Tokyo Univ. of Tokyo Estimation of Training Data Distribution from Probabilistic Classifier using Generative Adversarial Networks
Kosuke Kusano, Jun Sakuma (Univ. Tsukuba) IBISML2017-76
Suppose we have a deep classification model $f$ that is trained with private samples that should not be released, but we... [more] IBISML2017-76
pp.301-308
DC 2016-12-16
15:05
Yamagata Sakata Sogo-Bunka Center(Sakata-City) An Evaluation Measures for Contact Avoidance in Delay Tolerant Networks
Tomoya Osuki, Kazuya Sakai, Satoshi Fukumoto (Tokyo Metropolitan Univ.) DC2016-69
We address a secure routing in delay tolerant networks (DTNs) that lack continuous network connec-tivity. The idea of co... [more] DC2016-69
pp.27-30
ISEC, LOIS, SITE 2016-11-08
11:30
Fukui Community Hall & AOSSA Mall, Fukui [Invited Talk] Threat of Electromagnetic Information Leakage and Countermeasures
Yu-ichi Hayashi (Tohoku Gakuin Univ.) ISEC2016-63 SITE2016-53 LOIS2016-41
As our information society has further developed, the widespread use of personal electronic devices like smartphones and... [more] ISEC2016-63 SITE2016-53 LOIS2016-41
p.75
 Results 1 - 20 of 72  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan