IEICE Technical Report

Online edition: ISSN 2432-6380

Volume 124, Number 256

Social Implications of Technology and Information Ethics

Workshop Date : 2024-11-14 - 2024-11-15 / Issue Date : 2024-11-07

[PREV] [NEXT]

[TOP] | [2018] | [2019] | [2020] | [2021] | [2022] | [2023] | [2024] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

SITE2024-59
Detection of persons falling overboard using work probe system
Toshimasa Aso, Masahiro Miyasaka, Hideyuki Kashima, Takahiro Takemoto (Tokyo Univ. of Marine Science and Technology)
pp. 1 - 4

SITE2024-60
Proposal of the Facility Layout Generation System using Hierarchical Reinforcement Learning
Shunsuke Furuta (Osaka Univ.), Hiroyuki Nakagawa (Okayama Univ.), Tatsuhiro Tsuchiya (Osaka Univ.)
pp. 5 - 10

SITE2024-61
Gait Recognition from Overhead View Using Transformer-Based Models
Ryusei Kawa, Takeshi Umezawa, Noritaka Osawa (Chiba Univ.)
pp. 11 - 16

SITE2024-62
Indoor positioning using Transformer model based on geomagnetism and movement displacement from dead reckoning
Haruki Nakano, Takeshi Umezawa, Noritaka Osawa (Chiba Univ.)
pp. 17 - 22

SITE2024-63
Analysis of origin-destination statistics for mobile phones using location registration information from mobile phone operators
Yoichi Midorikawa, Takuya Nagata (SBKK), Masatsugu Ichino, Hiroshi Yoshiura (UEC), Hideki Yoshii (SBKK)
pp. 23 - 28

SITE2024-64
Proposal of Blockchain Service Infrastructure with Remote Biometric Authentication(BSIwRBA)
Toshiaki Saisho (AITC)
pp. 29 - 36

SITE2024-65
Multi-User Oblivious Transfer for Exclusive Data Distribution
Takehiro Takada, Yuichi Kaji (Nagoya Univ.)
pp. 37 - 42

SITE2024-66
Design of an Educational Data Management System on Blockchain Utilizing Signatures with Limited Verifiers
Yudai Hata, Kouichi Sakurai (Kyushu Univ.)
pp. 43 - 49

SITE2024-67
Statistical Model Analysis of Content Services Based on Viewer-Centric Data Utilization
Yasuhiro Murasaki (NHK)
pp. 50 - 57

SITE2024-68
US-EU Umbrella Agreement on the Protection of Personal Information -- A protection framework for personal information in counter-terrorism --
Kotono Koga (FIT)
pp. 58 - 65

SITE2024-69
Loss based Byzantine-resilient Decentralized DeepLearning
Shinnosuke Masuda, Kazuyuki Shudo (Kyoto Univ)
pp. 66 - 70

SITE2024-70
Higher Decentralization Does Not Necessarily Enhance Resistance to 51% Attacks
Taishi Nakai, Shudo Kazuyuki (Kyoto Univ.)
pp. 71 - 78

SITE2024-71
Backdoor Attack by Noise Against Vision Transformer
Yuki Yamahata, Masaaki Shirase (FUN)
pp. 79 - 86

SITE2024-72
Multi-Input XOR Protocol Using Playing Cards
Koichi Koizumi (Fukushima KOSEN), Takaaki Mizuki (Tohoku Univ.)
pp. 87 - 94

SITE2024-73
Self-adaptive framework for machine learning systems under conditions where ground truth data is unavailable during operation
Kento Furukawa (Osaka Univ.), Hiroyuki Nakagawa (Okayama Univ.), Tatsuhiro Tsuchiya (Osaka Univ.)
pp. 95 - 100

SITE2024-74
Assessing the Impact of Behavior Change Messages Using Large Language Models
Takuya Okada (YCU), Yoshiaki Takimoto, Takeshi Kurashima (NTT), Hiroyuki Toda (YCU)
pp. 101 - 106

SITE2024-75
Accelerating Authentication for Homomorphic Encryption-based Facial Recognition Systems through Locality Sensitive Hashing
Sei Nakanishi, Yoshiaki Narusue, Hiroyuki Morikawa (UTkyo)
pp. 107 - 111

SITE2024-76
A One-Time Password Authentication Scheme for IoT Environments
Koki Mizoguchi, Akihiro Shimizu (KUT)
pp. 112 - 117

SITE2024-77
The Optimum Reaction Attack on TFHE Fully Homomorphic Encryption
Remma Kumazaki, Yuichi Kaji (Nagoya Univ.)
pp. 118 - 125

SITE2024-78
A Study on Plaintext Prediction for a Lightweight Block Cipher Midori Using Neural Network
Eiki Furutsu, Shunsuke Araki (Kyutech)
pp. 126 - 133

SITE2024-79
International regulatory trend survey report on AI -- Analysis of EU AI act 1 --
Naonori Kato (KDDI Research/NFI/RIKEN AIP), Yosuke Murakami (KDDI Research)
pp. 134 - 139

SITE2024-80
A Survey of the IoT Product Security Conformity Assessment Scheme -- From the Perspective of Cyber Security Supply Chains --
Yusuke Tachibana (FIT)
pp. 140 - 143

SITE2024-81
Practical Application of Case-based Learning on Public Key Authentication in General Information Education
Daisuke Suzuki (Hokuriku Univ.)
pp. 144 - 147

SITE2024-82
Proposal for a Flexible Multiple Signature Protocol with Additional Signers
Katsuhiro Sato, Atsuko Miyaji (Osaka Univ)
pp. 148 - 154

SITE2024-83
Considerations on Weak Keys in LWE Cryptography
Masaaki Shirase (FUN)
pp. 155 - 161

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan