Online edition: ISSN 2432-6380
[TOP] | [2018] | [2019] | [2020] | [2021] | [2022] | [2023] | [2024] | [Japanese] / [English]
ISEC2024-62
Detection of persons falling overboard using work probe system
Toshimasa Aso, Masahiro Miyasaka, Hideyuki Kashima, Takahiro Takemoto (Tokyo Univ. of Marine Science and Technology)
pp. 1 - 4
ISEC2024-63
Proposal of the Facility Layout Generation System using Hierarchical Reinforcement Learning
Shunsuke Furuta (Osaka Univ.), Hiroyuki Nakagawa (Okayama Univ.), Tatsuhiro Tsuchiya (Osaka Univ.)
pp. 5 - 10
ISEC2024-64
Gait Recognition from Overhead View Using Transformer-Based Models
Ryusei Kawa, Takeshi Umezawa, Noritaka Osawa (Chiba Univ.)
pp. 11 - 16
ISEC2024-65
Indoor positioning using Transformer model based on geomagnetism and movement displacement from dead reckoning
Haruki Nakano, Takeshi Umezawa, Noritaka Osawa (Chiba Univ.)
pp. 17 - 22
ISEC2024-66
Analysis of origin-destination statistics for mobile phones using location registration information from mobile phone operators
Yoichi Midorikawa, Takuya Nagata (SBKK), Masatsugu Ichino, Hiroshi Yoshiura (UEC), Hideki Yoshii (SBKK)
pp. 23 - 28
ISEC2024-67
Proposal of Blockchain Service Infrastructure with Remote Biometric Authentication(BSIwRBA)
Toshiaki Saisho (AITC)
pp. 29 - 36
ISEC2024-68
Multi-User Oblivious Transfer for Exclusive Data Distribution
Takehiro Takada, Yuichi Kaji (Nagoya Univ.)
pp. 37 - 42
ISEC2024-69
Design of an Educational Data Management System on Blockchain Utilizing Signatures with Limited Verifiers
Yudai Hata, Kouichi Sakurai (Kyushu Univ.)
pp. 43 - 49
ISEC2024-70
Statistical Model Analysis of Content Services Based on Viewer-Centric Data Utilization
Yasuhiro Murasaki (NHK)
pp. 50 - 57
ISEC2024-71
US-EU Umbrella Agreement on the Protection of Personal Information
-- A protection framework for personal information in counter-terrorism --
Kotono Koga (FIT)
pp. 58 - 65
ISEC2024-72
Loss based Byzantine-resilient Decentralized DeepLearning
Shinnosuke Masuda, Kazuyuki Shudo (Kyoto Univ)
pp. 66 - 70
ISEC2024-73
Higher Decentralization Does Not Necessarily Enhance Resistance to 51% Attacks
Taishi Nakai, Shudo Kazuyuki (Kyoto Univ.)
pp. 71 - 78
ISEC2024-74
Backdoor Attack by Noise Against Vision Transformer
Yuki Yamahata, Masaaki Shirase (FUN)
pp. 79 - 86
ISEC2024-75
Multi-Input XOR Protocol Using Playing Cards
Koichi Koizumi (Fukushima KOSEN), Takaaki Mizuki (Tohoku Univ.)
pp. 87 - 94
ISEC2024-76
Self-adaptive framework for machine learning systems under conditions where ground truth data is unavailable during operation
Kento Furukawa (Osaka Univ.), Hiroyuki Nakagawa (Okayama Univ.), Tatsuhiro Tsuchiya (Osaka Univ.)
pp. 95 - 100
ISEC2024-77
Assessing the Impact of Behavior Change Messages Using Large Language Models
Takuya Okada (YCU), Yoshiaki Takimoto, Takeshi Kurashima (NTT), Hiroyuki Toda (YCU)
pp. 101 - 106
ISEC2024-78
Accelerating Authentication for Homomorphic Encryption-based Facial Recognition Systems through Locality Sensitive Hashing
Sei Nakanishi, Yoshiaki Narusue, Hiroyuki Morikawa (UTkyo)
pp. 107 - 111
ISEC2024-79
A One-Time Password Authentication Scheme for IoT Environments
Koki Mizoguchi, Akihiro Shimizu (KUT)
pp. 112 - 117
ISEC2024-80
The Optimum Reaction Attack on TFHE Fully Homomorphic Encryption
Remma Kumazaki, Yuichi Kaji (Nagoya Univ.)
pp. 118 - 125
ISEC2024-81
A Study on Plaintext Prediction for a Lightweight Block Cipher Midori Using Neural Network
Eiki Furutsu, Shunsuke Araki (Kyutech)
pp. 126 - 133
ISEC2024-82
International regulatory trend survey report on AI
-- Analysis of EU AI act 1 --
Naonori Kato (KDDI Research/NFI/RIKEN AIP), Yosuke Murakami (KDDI Research)
pp. 134 - 139
ISEC2024-83
A Survey of the IoT Product Security Conformity Assessment Scheme
-- From the Perspective of Cyber Security Supply Chains --
Yusuke Tachibana (FIT)
pp. 140 - 143
ISEC2024-84
Practical Application of Case-based Learning on Public Key Authentication in General Information Education
Daisuke Suzuki (Hokuriku Univ.)
pp. 144 - 147
ISEC2024-85
Proposal for a Flexible Multiple Signature Protocol with Additional Signers
Katsuhiro Sato, Atsuko Miyaji (Osaka Univ)
pp. 148 - 154
ISEC2024-86
Considerations on Weak Keys in LWE Cryptography
Masaaki Shirase (FUN)
pp. 155 - 161
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.