Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2024-01-25 16:40 |
Tokyo |
Kwansei Gakuin Univiversity, Marunouchi Campus (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Strengthening Cybersecurity with Data Analytics
-- A Web Tool for Secure Exploration of CVE Data -- Chidchanok Choksuchat, Sorawit Khamnaewnak, Chanin Maiprom, Suwimon Bureekarn, Touchai Angchuan, Sinchai Kamonphiwong, Thossaporn Kamolphiwong (PSU) IA2023-68 |
In the realm of Higher Education, the sophistication of cyberattacks necessitates a departure from traditional security ... [more] |
IA2023-68 pp.48-51 |
BioX |
2023-10-12 14:45 |
Okinawa |
Nobumoto Ohama Memorial Hall |
A Study on Federated Learning System for Highly Accurate Biometric Authentication Yusei Suzuki, Yosuke Kaga (Hitachi) BioX2023-58 |
With the development of machine learning on large-scale datasets, the accuracy of biometric authentication has significa... [more] |
BioX2023-58 pp.2-7 |
ICSS, IPSJ-SPT |
2023-03-13 16:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Evaluation and countermeasures of notification destination restoration attacks using password recovery functions of multiple web services Ryusei Ishikawa, Soramichi Akiyama (Ritsumeikan Univ.), Atsuo Inomata (Ritsumeikan Univ., Osaka Univ.), Tetsutaro Uehara (Ritsumeikan Univ.) ICSS2022-62 |
Many web services with a login function using pair of ID and password have the password recovery function in case the us... [more] |
ICSS2022-62 pp.85-90 |
EA, EMM, ASJ-H |
2022-11-22 13:00 |
Online |
Online |
[Fellow Memorial Lecture]
Security and Privacy Preservation for Speech Signal
-- Approach from speech information hiding technology -- Masashi Unoki (JAIST) EA2022-60 EMM2022-60 |
Non-authentic but skillfully fabricated artificial replicas of authentic media in the real world are known as “media clo... [more] |
EA2022-60 EMM2022-60 pp.99-104 |
CQ, CS (Joint) |
2022-05-12 14:20 |
Fukui |
Fukui (Fuku Pref.) (Primary: On-site, Secondary: Online) |
Distributed Network Intrusion Detection System Using Federated Learning Yuya Tsuru, Tomoya Kawakami, Tatsuhito Hasegawa (Univ. of Fukui) CQ2022-5 |
A network-based intrusion detection system (NIDS) monitors a network and detects unauthorized traffic. Currently, a vari... [more] |
CQ2022-5 pp.20-25 |
VLD, HWS [detail] |
2022-03-08 11:00 |
Online |
Online |
Evaluation of a Lightweight Cryptographic Finalist on SROS2 Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2021-94 HWS2021-71 |
In cyber-physical systems, small devices are connected to the network to enable the analysis of sensor values. Also, sin... [more] |
VLD2021-94 HWS2021-71 pp.99-104 |
CQ, ICM, NS, NV (Joint) |
2021-11-26 14:50 |
Fukuoka |
JR Hakata Stn. Hakata EkiHigashi Rental Room (Primary: On-site, Secondary: Online) |
Data privacy protection method for blockchain by using secret sharing Jun Nakajima (Hitachi) ICM2021-27 |
As a form of blockchain(BC), permission-type BC that forms a BC network between specific organizations is attracting att... [more] |
ICM2021-27 pp.21-26 |
BioX, CNR |
2021-03-02 15:30 |
Online |
Online |
Visual place recognition from eye reflection Yuki Ohshima, Kyosuke Maeda, Yusuke Edamoto, Atsushi Nakazawa (Kyoto Univ.) BioX2020-48 CNR2020-21 |
The cornea in the human eye reflects incoming environmental light, which means we can obtain information about the surro... [more] |
BioX2020-48 CNR2020-21 pp.44-49 |
IN, ICTSSL, NWS |
2020-10-22 15:25 |
Online |
Online |
[Invited Talk]
Secure Data Utilization using Multi-Party Computation Takao Takenouchi (Digital Garage) IN2020-32 |
It is becoming more and more important to distribute and utilize data between organizations to provide better services a... [more] |
IN2020-32 pp.12-17 |
IA |
2020-10-01 11:40 |
Online |
Online |
Ethical Education on Information Security Mind for Practical Security Learning Yoshinari Kanaya (Tohoku Univ.), Daisuke Kotani (Kyoto Univ.), Katsuyoshi Iida (Hokkaido Univ.), Hideaki Sone (Tohoku Univ.) IA2020-2 |
Practical education on information security may cause trouble if any student in the course tries the new education again... [more] |
IA2020-2 pp.6-9 |
NS, IN (Joint) |
2020-03-06 09:50 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
Framework to Utilize Others' Behavior without Sharing Privacy Information Masaaki Yamauchi, Yuichi Ohsita, Masayuki Murata (Osaka Univ.) IN2019-114 |
A cyberattack to operate home IoT devices by attackers is a serious problem, which may damage the users. We have propose... [more] |
IN2019-114 pp.213-218 |
ICSS, IPSJ-SPT |
2020-03-02 11:30 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
An Evaluation of Contact Points for Security Notifications Miori Saito, Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2019-94 |
With the evolving threat of cyber attacks, the importance of security notifications is increasing. In general, informati... [more] |
ICSS2019-94 pp.195-200 |
NS, ICM, CQ, NV (Joint) |
2019-11-22 13:30 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
[Invited Talk]
Security and Privacy for Personal Data Katsumi Takahashi (NTT) ICM2019-25 |
Technologies for security and privacy of personal data are described. Many technologies are proposed for data security a... [more] |
ICM2019-25 pp.25-26 |
IA |
2019-11-15 13:40 |
Tokyo |
Kwansei Gakuin University, Tokyo Marunouchi Campus (Sapia Tower) |
Towards creating a defense mechanism of IP camera: Recognizing potential risks through firmware backdooring Yves-Roland Douha, Shun Yonamine, Yuzo Taenaka, Youki Kadobayashi (NAIST) IA2019-42 |
Internet of Things (IoT) is an emerging and promising technology allowing users to interact with physical items through ... [more] |
IA2019-42 pp.85-90 |
SIS, IPSJ-AVM, ITE-3DMT [detail] |
2019-06-13 13:35 |
Nagasaki |
Fukue Culture Center |
Privacy Preserving Sparse Representation for Face Recognition in Edge and Cloud Networks Yitu Wang, Takayuki Nakachi (NTT) SIS2019-4 |
The interaction between edge and cloud servers plays an important role in fulfilling the extensive computation requireme... [more] |
SIS2019-4 pp.17-22 |
NS |
2019-04-19 14:15 |
Kagoshima |
Tenmonkan Vision Hall |
A Study on Identity Exchange System in Consideration of User's Privacy Motoshi Horii, Dai Suzuki, Kenji Taka, Takeshi Kawasaki, Satoshi Imai (Fujitsu Labs.) NS2019-18 |
Service provider requires service users’ personal data such as their name and address to identify each of the service us... [more] |
NS2019-18 pp.103-106 |
IA |
2017-11-15 16:30 |
Overseas |
KMITL, Bangkok, Thailand |
[Poster Presentation]
Basic SecCap, Practical Education for Information Security by University Cooperation Hideaki Sone, Satoru Izumi (Tohoku Univ.) IA2017-36 |
Introduction and activity report on “Basic SecCap.”
The Graduate School of Information Science of Tohoku University is... [more] |
IA2017-36 pp.33-34 |
IBISML |
2017-11-10 13:00 |
Tokyo |
Univ. of Tokyo |
Estimation of Training Data Distribution from Probabilistic Classifier using Generative Adversarial Networks Kosuke Kusano, Jun Sakuma (Univ. Tsukuba) IBISML2017-76 |
Suppose we have a deep classification model $f$ that is trained with private samples that should not be released, but we... [more] |
IBISML2017-76 pp.301-308 |
DC |
2016-12-16 15:05 |
Yamagata |
Sakata Sogo-Bunka Center(Sakata-City) |
An Evaluation Measures for Contact Avoidance in Delay Tolerant Networks Tomoya Osuki, Kazuya Sakai, Satoshi Fukumoto (Tokyo Metropolitan Univ.) DC2016-69 |
We address a secure routing in delay tolerant networks (DTNs) that lack continuous network connec-tivity. The idea of co... [more] |
DC2016-69 pp.27-30 |
ISEC, LOIS, SITE |
2016-11-08 11:30 |
Fukui |
Community Hall & AOSSA Mall, Fukui |
[Invited Talk]
Threat of Electromagnetic Information Leakage and Countermeasures Yu-ichi Hayashi (Tohoku Gakuin Univ.) ISEC2016-63 SITE2016-53 LOIS2016-41 |
As our information society has further developed, the widespread use of personal electronic devices like smartphones and... [more] |
ISEC2016-63 SITE2016-53 LOIS2016-41 p.75 |