Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS |
2024-04-11 15:30 |
Okayama |
Okayama Prefectural Library + Online (Primary: On-site, Secondary: Online) |
[Invited Talk]
Trust in the Recommender System and its Prediction based on the Performance Beliefs Yoshinori Hijikata (KGU) NS2024-4 |
This paper introduces our study on users’ perceived trust in the recommendation system. In recent years, as represented ... [more] |
NS2024-4 pp.17-22 |
ICSS, IPSJ-SPT |
2024-03-21 12:35 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
A certain classification of trust services Yuji Suga (IIJ) ICSS2023-73 |
This paper describes the trust services that are currently under consideration for international interoperability, and o... [more] |
ICSS2023-73 pp.33-35 |
IE, MVE, CQ, IMQ (Joint) [detail] |
2024-03-14 16:00 |
Okinawa |
Okinawa Sangyo Shien Center (Primary: On-site, Secondary: Online) |
Effects of physical touch interactions on reduced moral trust during conversations with VR agents Atsuya Matsumoto, Takashige Suzuki, Hideaki Kuzuoka (UTokyo) IMQ2023-50 IE2023-105 MVE2023-79 |
When developing conversational agents, the agents' speech which sometimes sounds immoral becomes a problem as it causes ... [more] |
IMQ2023-50 IE2023-105 MVE2023-79 pp.202-207 |
CQ, CBE (Joint) |
2024-01-25 16:10 |
Kumamoto |
Kurokawa-Onsen (Primary: On-site, Secondary: Online) |
[Invited Talk]
Psychological Evaluation of Trust in the Recommender System Yoshinori Hijikata (KGU) CQ2023-58 |
This paper describes the author's development and validation of a recommendation acceptance tendency scale that measures... [more] |
CQ2023-58 pp.37-42 |
ICM, NS, CQ, NV (Joint) |
2023-11-22 09:50 |
Ehime |
Ehime Prefecture Gender Equality Center (Primary: On-site, Secondary: Online) |
A survey on suitable hook points for outbound packet monitoring using eBPF Masaya Okabe, Hiroshi Tsunoda (Tohtech) ICM2023-27 |
The use of VPNs and similar technologies has made it difficult to define network boundaries, and traditional boundary se... [more] |
ICM2023-27 pp.26-31 |
ICSS |
2023-11-16 14:30 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Formal Verification of an Edge Computing Platform based on Modular Architecture using Intel SGX Yuma Nishihira (Tokai Univ.), Hayato Kimura (Univ. of Hyogo), Toshihiro Ohigashi (Tokai Univ.) ICSS2023-54 |
The proliferation of IoT devices requires an edge computing infrastructure that can process large amounts of data in a f... [more] |
ICSS2023-54 pp.22-29 |
HCS, CNR |
2023-11-05 11:15 |
Tokyo |
Kogakuin University (Primary: On-site, Secondary: Online) |
Proposal and Evaluation of Recommendation Acceptance Tendency Scale for Overtrust Awareness Yoshinori Hijikata, Reika Miwa, Aika Tsuchida (KGU), Masahiro Hamasaki, Masataka Goto (AIST) CNR2023-10 HCS2023-72 |
As services providing recommendations or judgments of AI (artificial intelligence) become popular, the problem of "recom... [more] |
CNR2023-10 HCS2023-72 pp.15-20 |
IN, ICTSSL, IEE-SMF |
2023-10-19 09:00 |
Fukuoka |
Fukuoka University |
Effects and Investigate Attack Messages on the IoT-ZTN System Yudai Sakurai, Osamu Mizuno (Kogakuin Univ.) IN2023-32 |
There are many cyber-attacks targeting the IoT system. Cyber-attacks can occur not only from external networks in conven... [more] |
IN2023-32 pp.1-4 |
IA |
2023-09-21 16:30 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
Performance Evaluation of Access Control Functions in IoT-ZTN System Gateway Yudai Sakurai, Osamu Mizuno (Kogakuin Univ.) IA2023-17 |
With the increasing of IoT devices, the number of cyber-attacks targeting IoT systems is also increasing. Cyber-attacks ... [more] |
IA2023-17 pp.38-42 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 11:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Secure Cryptographic Unit with built-in Signature Generation Hardware for Aggregate Signature Schemes and its FPGA Implementation Toshihiro Sato, Shohei Kawasaki (SCU), Kaoru Masada (Tokyo Univ.), Riku Anzai, Junichi Sakamoto, Naoki Yoshida (YNU), Yasuyoshi Uemura (SCU), Makoto Ikeda (Tokyo Univ.), Tsutomu Matsumoto (YNU) ISEC2023-42 SITE2023-36 BioX2023-45 HWS2023-42 ICSS2023-39 EMM2023-42 |
Secure Cryptographic Unit (SCU) consists of a hardware cryptographic engine and an access control mechanism for the engi... [more] |
ISEC2023-42 SITE2023-36 BioX2023-45 HWS2023-42 ICSS2023-39 EMM2023-42 pp.182-187 |
CQ |
2023-07-13 10:50 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
[Invited Talk]
Interaction between Human and Autonomous Artifacts from the Perspective of Cognitive Psychology Akihiro Maehigashi (Shizuoka Univ.) CQ2023-21 |
This paper showed the related works about trust in humans-AI interaction and system designs for trust calibration and in... [more] |
CQ2023-21 pp.71-73 |
SeMI, RCS, RCC, NS, SR (Joint) |
2023-07-14 15:00 |
Osaka |
Osaka University Nakanoshima Center + Online (Primary: On-site, Secondary: Online) |
Initial implementation of CYPHONIC end-device functions on WindowsOS Guilherme Seidy Ujiie, Ren Goto, Kazushige Matama, Yoshiya Suzuki, Katsuhiro Naitou (AIT), Hidekazu Suzuki (Meijo Univ.) SeMI2023-38 |
The authors have been researching and developing CYber PHysical Overlay Network over Internet Communication (CYPHONIC), ... [more] |
SeMI2023-38 pp.76-81 |
QIT (2nd) |
2023-05-30 15:50 |
Kyoto |
Katsura Campus, Kyoto University |
General treatment of trusted receiver noise in continuous variable quantum key distribution Shinichiro Yamano (UT), Takaya Matsuura (RMIT University), Yui Kuramochi (Kyushu Univ.), Toshihiko Sasaki, Masato Koashi (UT) |
Continuous Variable (CV) quantum key distribution (QKD) is a promising candidate for practical implementations due to it... [more] |
|
IA, SITE, IPSJ-IOT [detail] |
2023-03-15 15:35 |
Gunma |
Maebashi Institute of Technology (Primary: On-site, Secondary: Online) |
Approach to design ELSI handbook through the fusion of humanities and sciences Hironori Furumiya, Kenichiro Yanagi, Reiko Takou, Masaru Miyazaki (NHK) SITE2022-57 IA2022-80 |
Ethical issues, legal issues, and social issues (ELSI) may arise when we attempt to implement new technologies in societ... [more] |
SITE2022-57 IA2022-80 pp.21-24 |
IMQ, IE, MVE, CQ (Joint) [detail] |
2023-03-15 09:45 |
Okinawa |
Okinawaken Seinenkaikan (Naha-shi) (Primary: On-site, Secondary: Online) |
A Study about Face Age Manipulation and Morph Rate Control to Improve Trustworthiness of Self-face Morphed Agent Shinji Iwata (Nagoya Univ.), Naoto Yoshida (Kogakuin Univ.), Tomoko Yonezawa (Kansai Univ.), Kenji Mase, Yu Enokibori (Nagoya Univ.) IMQ2022-19 IE2022-96 MVE2022-49 |
In our recent research, we found that the self-face morphing had a significant impact on agent impression, but was negat... [more] |
IMQ2022-19 IE2022-96 MVE2022-49 pp.1-7 |
NS, NWS (Joint) |
2023-01-26 13:00 |
Yamaguchi |
Hybrid Meeting (Yamaguchi Prefecture) (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
A User Authenticity Verification Method Using Behavioral and Cognitive Biometrics for Zero Trust Access Control Mechanisms Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-153 |
In recent years, remote access to confidential data necessary for work has been rapidly increasing due to the spread of ... [more] |
NS2022-153 pp.19-24 |
HCGSYMPO (2nd) |
2022-12-14 - 2022-12-16 |
Kagawa |
Onsite (Sunport Takamatsu) and Online (Primary: On-site, Secondary: Online) |
Trust, Altruism and Relational Mobility in Virtual Reality and Reality Yang Li (Nagoya Univ.), Junko Yamada (Rissho Univ.), Yota Mizuguchi (OX Brooks Univ.) |
With the spread of VR technology, while the construction of relationships with others in a VR space is rapidly developin... [more] |
|
HCS |
2022-08-27 14:45 |
Hyogo |
(Primary: On-site, Secondary: Online) |
Factor Analysis of the Overtrust Scale for Recommender Systems Reika Miwa, Aika Tsuchida, Yoshinori Hijikata (KGU), Masahiro Hamasaki, Masataka Goto (AIST) HCS2022-46 |
Recommender systems have been used in many online services. People may have come to accept the recommended items without... [more] |
HCS2022-46 pp.55-60 |
SWIM, SC |
2022-08-26 15:45 |
Online |
Held online |
Proposal for Introduction of Resource control policies apply to Decentralized ID Ryo Tateishi, Hosono Shigeru (TUT) SWIM2022-19 SC2022-25 |
Realization of Web 3.0 architecture requires a shift from Centralized ID to Decentralized ID with Self-Sovereign, and a ... [more] |
SWIM2022-19 SC2022-25 pp.52-57 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 13:00 |
Online |
Online |
Investigation of credit card fraud model and deterrence method on SNS Zhixian Zhao, Shigeyuki Osada (JRI) ISEC2022-22 SITE2022-26 BioX2022-47 HWS2022-22 ICSS2022-30 EMM2022-30 |
In recent years, the number theft of credit card information has become a growing problem in Japan. Some of the credit c... [more] |
ISEC2022-22 SITE2022-26 BioX2022-47 HWS2022-22 ICSS2022-30 EMM2022-30 pp.81-87 |