Communication-Communication Systems(Date:2017/06/08)

Presentation
Training simulator for creating list of victims at the disaster medical base

Keijiro Okamura(Excite),  Sato Fumiya(Kochi Univ.of Tech),  Fukumoto masahiro(Kochi Univ.of Tech),  

[Date]2017-06-08
[Paper #]IA2017-8,ICSS2017-8
Digital Contract Protocols using Blockchain

Atsumu Mishima(Tsukuba Univ.),  Takashi Nishide(Tsukuba Univ.),  

[Date]2017-06-08
[Paper #]IA2017-6,ICSS2017-6
Study on Email address harvesting by free service

Keisuke Hashida(NEC),  Masaru Kawakita(NEC),  Shigeyoshi Shima(NEC),  

[Date]2017-06-08
[Paper #]IA2017-5,ICSS2017-5
Study of a Load Equalization Method Using Phase Shift for Distributed Sensor Data Stream Delivery

Tomoya Kawakami(NAIST),  Yoshimasa Ishi(Osaka Univ.),  Tomoki Yoshihisa(Osaka Univ.),  Yuuichi Teranishi(NICT/Osaka Univ.),  

[Date]2017-06-08
[Paper #]IA2017-1,ICSS2017-1
A First Trend Review of Runtime Packers for IoT Malware

Ryoichi Isawa(NICT),  Ying Tie(YNU),  Katsunari Yoshioka(YNU/NICT),  Tao Ban(NICT),  Daisuke Inoue(NICT),  

[Date]2017-06-08
[Paper #]IA2017-4,ICSS2017-4
Development and evaluation of wild bird identification system using audio sensing and machine learning

Takemi Morimatsu(Nagoya Univ.),  Hiroshi Yamamoto(Ritsumeikan Univ.),  

[Date]2017-06-08
[Paper #]IA2017-2,ICSS2017-2
Development and evaluation of victim detection system using autonomous UAV flight based on beacon radio sensing

Seiji Andon(Ritsumeikan Univ.),  Hiroshi Yamamoto(Ritsumeikan Univ.),  

[Date]2017-06-08
[Paper #]IA2017-3,ICSS2017-3
Raspberry Guardian: Security Management for IoT Environment using Social Network Systems

Hiroyuki Ohno(Kanazawa Univ),  Yoshiaki Kitaguchi(Kanazawa Univ),  Hironobu Suzuki(Senshu Univ),  

[Date]2017-06-08
[Paper #]
On the Zero Knowledge Proof Type Authentication Scheme Using LDPC Codes

Haruka Ito(Saga Univ.),  Masanori Hirotomo(Saga Univ.),  Youji Fukuta(Kindai Univ.),  Masami Mohri(Gifu Univ.),  Yoshiaki Shiraishi(Kobe Univ.),  

[Date]2017-06-08
[Paper #]IA2017-7,ICSS2017-7
Analysis of First Meeting Time of Two Random Walkers toward Understanding Information Dissemination and Gathering with Mobile users

Yusuke Sakumoto(Tokyo Metropolitan Univ.),  Hiroyuki Ohsaki(Kwansei Gakuin Univ.),  

[Date]2017-06-09
[Paper #]IA2017-9,ICSS2017-9
A Solution for Minimum Link Flow Problem with Sparse Modeling

Ryotaro Matsuo(Kwansei Gakuin Univ.),  Ryo Nakamura(Kwansei Gakuin Univ.),  Hiroyuki Ohsaki(Kwansei Gakuin Univ.),  

[Date]2017-06-09
[Paper #]IA2017-10,ICSS2017-10
[Invited Talk] Applying AI for Cyber Security

Jun'ichi Takeuchi(Kyushu Univ./NICT),  

[Date]2017-06-09
[Paper #]
[Invited Talk] WarpDrive: Web-based Attack Response with Practical and Deployable Research InitiatiVE

Akira Yamada(KDDI Research),  

[Date]2017-06-09
[Paper #]IA2017-11,ICSS2017-11