IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 106  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
NS 2024-04-11
15:30
Okayama Okayama Prefectural Library + Online
(Primary: On-site, Secondary: Online)
[Invited Talk] Trust in the Recommender System and its Prediction based on the Performance Beliefs
Yoshinori Hijikata (KGU) NS2024-4
This paper introduces our study on users’ perceived trust in the recommendation system. In recent years, as represented ... [more] NS2024-4
pp.17-22
ICSS, IPSJ-SPT 2024-03-21
12:35
Okinawa OIST
(Primary: On-site, Secondary: Online)
A certain classification of trust services
Yuji Suga (IIJ) ICSS2023-73
This paper describes the trust services that are currently under consideration for international interoperability, and o... [more] ICSS2023-73
pp.33-35
IE, MVE, CQ, IMQ
(Joint) [detail]
2024-03-14
16:00
Okinawa Okinawa Sangyo Shien Center
(Primary: On-site, Secondary: Online)
Effects of physical touch interactions on reduced moral trust during conversations with VR agents
Atsuya Matsumoto, Takashige Suzuki, Hideaki Kuzuoka (UTokyo) IMQ2023-50 IE2023-105 MVE2023-79
When developing conversational agents, the agents' speech which sometimes sounds immoral becomes a problem as it causes ... [more] IMQ2023-50 IE2023-105 MVE2023-79
pp.202-207
CQ, CBE
(Joint)
2024-01-25
16:10
Kumamoto Kurokawa-Onsen
(Primary: On-site, Secondary: Online)
[Invited Talk] Psychological Evaluation of Trust in the Recommender System
Yoshinori Hijikata (KGU) CQ2023-58
This paper describes the author's development and validation of a recommendation acceptance tendency scale that measures... [more] CQ2023-58
pp.37-42
ICM, NS, CQ, NV
(Joint)
2023-11-22
09:50
Ehime Ehime Prefecture Gender Equality Center
(Primary: On-site, Secondary: Online)
A survey on suitable hook points for outbound packet monitoring using eBPF
Masaya Okabe, Hiroshi Tsunoda (Tohtech) ICM2023-27
The use of VPNs and similar technologies has made it difficult to define network boundaries, and traditional boundary se... [more] ICM2023-27
pp.26-31
ICSS 2023-11-16
14:30
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Formal Verification of an Edge Computing Platform based on Modular Architecture using Intel SGX
Yuma Nishihira (Tokai Univ.), Hayato Kimura (Univ. of Hyogo), Toshihiro Ohigashi (Tokai Univ.) ICSS2023-54
The proliferation of IoT devices requires an edge computing infrastructure that can process large amounts of data in a f... [more] ICSS2023-54
pp.22-29
HCS, CNR 2023-11-05
11:15
Tokyo Kogakuin University
(Primary: On-site, Secondary: Online)
Proposal and Evaluation of Recommendation Acceptance Tendency Scale for Overtrust Awareness
Yoshinori Hijikata, Reika Miwa, Aika Tsuchida (KGU), Masahiro Hamasaki, Masataka Goto (AIST) CNR2023-10 HCS2023-72
As services providing recommendations or judgments of AI (artificial intelligence) become popular, the problem of "recom... [more] CNR2023-10 HCS2023-72
pp.15-20
IN, ICTSSL, IEE-SMF 2023-10-19
09:00
Fukuoka Fukuoka University Effects and Investigate Attack Messages on the IoT-ZTN System
Yudai Sakurai, Osamu Mizuno (Kogakuin Univ.) IN2023-32
There are many cyber-attacks targeting the IoT system. Cyber-attacks can occur not only from external networks in conven... [more] IN2023-32
pp.1-4
IA 2023-09-21
16:30
Hokkaido Hokkaido Univeristy
(Primary: On-site, Secondary: Online)
Performance Evaluation of Access Control Functions in IoT-ZTN System Gateway
Yudai Sakurai, Osamu Mizuno (Kogakuin Univ.) IA2023-17
With the increasing of IoT devices, the number of cyber-attacks targeting IoT systems is also increasing. Cyber-attacks ... [more] IA2023-17
pp.38-42
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
11:20
Hokkaido Hokkaido Jichiro Kaikan Secure Cryptographic Unit with built-in Signature Generation Hardware for Aggregate Signature Schemes and its FPGA Implementation
Toshihiro Sato, Shohei Kawasaki (SCU), Kaoru Masada (Tokyo Univ.), Riku Anzai, Junichi Sakamoto, Naoki Yoshida (YNU), Yasuyoshi Uemura (SCU), Makoto Ikeda (Tokyo Univ.), Tsutomu Matsumoto (YNU) ISEC2023-42 SITE2023-36 BioX2023-45 HWS2023-42 ICSS2023-39 EMM2023-42
Secure Cryptographic Unit (SCU) consists of a hardware cryptographic engine and an access control mechanism for the engi... [more] ISEC2023-42 SITE2023-36 BioX2023-45 HWS2023-42 ICSS2023-39 EMM2023-42
pp.182-187
CQ 2023-07-13
10:50
Hokkaido
(Primary: On-site, Secondary: Online)
[Invited Talk] Interaction between Human and Autonomous Artifacts from the Perspective of Cognitive Psychology
Akihiro Maehigashi (Shizuoka Univ.) CQ2023-21
This paper showed the related works about trust in humans-AI interaction and system designs for trust calibration and in... [more] CQ2023-21
pp.71-73
SeMI, RCS, RCC, NS, SR
(Joint)
2023-07-14
15:00
Osaka Osaka University Nakanoshima Center + Online
(Primary: On-site, Secondary: Online)
Initial implementation of CYPHONIC end-device functions on WindowsOS
Guilherme Seidy Ujiie, Ren Goto, Kazushige Matama, Yoshiya Suzuki, Katsuhiro Naitou (AIT), Hidekazu Suzuki (Meijo Univ.) SeMI2023-38
The authors have been researching and developing CYber PHysical Overlay Network over Internet Communication (CYPHONIC), ... [more] SeMI2023-38
pp.76-81
QIT
(2nd)
2023-05-30
15:50
Kyoto Katsura Campus, Kyoto University General treatment of trusted receiver noise in continuous variable quantum key distribution
Shinichiro Yamano (UT), Takaya Matsuura (RMIT University), Yui Kuramochi (Kyushu Univ.), Toshihiko Sasaki, Masato Koashi (UT)
Continuous Variable (CV) quantum key distribution (QKD) is a promising candidate for practical implementations due to it... [more]
IA, SITE, IPSJ-IOT [detail] 2023-03-15
15:35
Gunma Maebashi Institute of Technology
(Primary: On-site, Secondary: Online)
Approach to design ELSI handbook through the fusion of humanities and sciences
Hironori Furumiya, Kenichiro Yanagi, Reiko Takou, Masaru Miyazaki (NHK) SITE2022-57 IA2022-80
Ethical issues, legal issues, and social issues (ELSI) may arise when we attempt to implement new technologies in societ... [more] SITE2022-57 IA2022-80
pp.21-24
IMQ, IE, MVE, CQ
(Joint) [detail]
2023-03-15
09:45
Okinawa Okinawaken Seinenkaikan (Naha-shi)
(Primary: On-site, Secondary: Online)
A Study about Face Age Manipulation and Morph Rate Control to Improve Trustworthiness of Self-face Morphed Agent
Shinji Iwata (Nagoya Univ.), Naoto Yoshida (Kogakuin Univ.), Tomoko Yonezawa (Kansai Univ.), Kenji Mase, Yu Enokibori (Nagoya Univ.) IMQ2022-19 IE2022-96 MVE2022-49
In our recent research, we found that the self-face morphing had a significant impact on agent impression, but was negat... [more] IMQ2022-19 IE2022-96 MVE2022-49
pp.1-7
NS, NWS
(Joint)
2023-01-26
13:00
Yamaguchi Hybrid Meeting (Yamaguchi Prefecture)
(Primary: On-site, Secondary: Online)
[Encouragement Talk] A User Authenticity Verification Method Using Behavioral and Cognitive Biometrics for Zero Trust Access Control Mechanisms
Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-153
In recent years, remote access to confidential data necessary for work has been rapidly increasing due to the spread of ... [more] NS2022-153
pp.19-24
HCGSYMPO
(2nd)
2022-12-14
- 2022-12-16
Kagawa Onsite (Sunport Takamatsu) and Online
(Primary: On-site, Secondary: Online)
Trust, Altruism and Relational Mobility in Virtual Reality and Reality
Yang Li (Nagoya Univ.), Junko Yamada (Rissho Univ.), Yota Mizuguchi (OX Brooks Univ.)
With the spread of VR technology, while the construction of relationships with others in a VR space is rapidly developin... [more]
HCS 2022-08-27
14:45
Hyogo
(Primary: On-site, Secondary: Online)
Factor Analysis of the Overtrust Scale for Recommender Systems
Reika Miwa, Aika Tsuchida, Yoshinori Hijikata (KGU), Masahiro Hamasaki, Masataka Goto (AIST) HCS2022-46
Recommender systems have been used in many online services. People may have come to accept the recommended items without... [more] HCS2022-46
pp.55-60
SWIM, SC 2022-08-26
15:45
Online Held online Proposal for Introduction of Resource control policies apply to Decentralized ID
Ryo Tateishi, Hosono Shigeru (TUT) SWIM2022-19 SC2022-25
Realization of Web 3.0 architecture requires a shift from Centralized ID to Decentralized ID with Self-Sovereign, and a ... [more] SWIM2022-19 SC2022-25
pp.52-57
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-20
13:00
Online Online Investigation of credit card fraud model and deterrence method on SNS
Zhixian Zhao, Shigeyuki Osada (JRI) ISEC2022-22 SITE2022-26 BioX2022-47 HWS2022-22 ICSS2022-30 EMM2022-30
In recent years, the number theft of credit card information has become a growing problem in Japan. Some of the credit c... [more] ISEC2022-22 SITE2022-26 BioX2022-47 HWS2022-22 ICSS2022-30 EMM2022-30
pp.81-87
 Results 1 - 20 of 106  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan