Online edition: ISSN 2432-6380
[TOP] | [2018] | [2019] | [2020] | [2021] | [2022] | [2023] | [2024] | [Japanese] / [English]
LOIS2024-26
Detection of persons falling overboard using work probe system
Toshimasa Aso, Masahiro Miyasaka, Hideyuki Kashima, Takahiro Takemoto (Tokyo Univ. of Marine Science and Technology)
pp. 1 - 4
LOIS2024-27
Proposal of the Facility Layout Generation System using Hierarchical Reinforcement Learning
Shunsuke Furuta (Osaka Univ.), Hiroyuki Nakagawa (Okayama Univ.), Tatsuhiro Tsuchiya (Osaka Univ.)
pp. 5 - 10
LOIS2024-28
Gait Recognition from Overhead View Using Transformer-Based Models
Ryusei Kawa, Takeshi Umezawa, Noritaka Osawa (Chiba Univ.)
pp. 11 - 16
LOIS2024-29
Indoor positioning using Transformer model based on geomagnetism and movement displacement from dead reckoning
Haruki Nakano, Takeshi Umezawa, Noritaka Osawa (Chiba Univ.)
pp. 17 - 22
LOIS2024-30
Analysis of origin-destination statistics for mobile phones using location registration information from mobile phone operators
Yoichi Midorikawa, Takuya Nagata (SBKK), Masatsugu Ichino, Hiroshi Yoshiura (UEC), Hideki Yoshii (SBKK)
pp. 23 - 28
LOIS2024-31
BSIwRBA:Blockchain Service Infrastructure with Remote Biometric Authentication
Toshiaki Saisho (AITC)
pp. 29 - 36
LOIS2024-32
Multi-User Oblivious Transfer for Exclusive Data Distribution
Takehiro Takada, Yuichi Kaji (Nagoya Univ.)
pp. 37 - 42
LOIS2024-33
Design of an Educational Data Management System on Blockchain Utilizing Signatures with Limited Verifiers
Yudai Hata, Kouichi Sakurai (Kyushu Univ.)
pp. 43 - 49
LOIS2024-34
Statistical Model Analysis of Content Services Based on Viewer-Centric Data Utilization
Yasuhiro Murasaki (NHK)
pp. 50 - 57
LOIS2024-35
US-EU Umbrella Agreement on the Protection of Personal Information
-- A protection framework for personal information in counter-terrorism --
Kotono Koga (FIT)
pp. 58 - 65
LOIS2024-36
Loss based Byzantine-resilient Decentralized DeepLearning
Shinnosuke Masuda, Kazuyuki Shudo (Kyoto Univ)
pp. 66 - 70
LOIS2024-37
Higher Decentralization Does Not Necessarily Enhance Resistance to 51% Attacks
Taishi Nakai, Shudo Kazuyuki (Kyoto Univ.)
pp. 71 - 78
LOIS2024-38
Backdoor Attack by Noise Against Vision Transformer
Yuki Yamahata, Masaaki Shirase (FUN)
pp. 79 - 86
LOIS2024-39
Multi-Input XOR Protocol Using Playing Cards
Koichi Koizumi (Fukushima KOSEN), Takaaki Mizuki (Tohoku Univ.)
pp. 87 - 94
LOIS2024-40
Self-adaptive framework for machine learning systems under conditions where ground truth data is unavailable during operation
Kento Furukawa (Osaka Univ.), Hiroyuki Nakagawa (Okayama Univ.), Tatsuhiro Tsuchiya (Osaka Univ.)
pp. 95 - 100
LOIS2024-41
Assessing the Impact of Behavior Change Messages Using Large Language Models
Takuya Okada (YCU), Yoshiaki Takimoto, Takeshi Kurashima (NTT), Hiroyuki Toda (YCU)
pp. 101 - 106
LOIS2024-42
Accelerating Authentication for Homomorphic Encryption-based Facial Recognition Systems through Locality Sensitive Hashing
Sei Nakanishi, Yoshiaki Narusue, Hiroyuki Morikawa (UTkyo)
pp. 107 - 111
LOIS2024-43
A One-Time Password Authentication Scheme for IoT Environments
Koki Mizoguchi, Akihiro Shimizu (KUT)
pp. 112 - 117
LOIS2024-44
The Optimum Reaction Attack on TFHE Fully Homomorphic Encryption
Remma Kumazaki, Yuichi Kaji (Nagoya Univ.)
pp. 118 - 125
LOIS2024-45
A Study on Plaintext Prediction for a Lightweight Block Cipher Midori Using Neural Network
Eiki Furutsu, Shunsuke Araki (Kyutech)
pp. 126 - 133
LOIS2024-46
Report on the International Policy Trends in Data Protection
-- Analysis of EU AI act 1 --
Naonori Kato (KDDI Research/NFI/RIKEN AIP), Yosuke Murakami (KDDI Research)
pp. 134 - 139
LOIS2024-47
A Survey of the IoT Product Security Conformity Assessment Scheme
-- From the Perspective of Cyber Security Supply Chains --
Yusuke Tachibana (FIT)
pp. 140 - 143
LOIS2024-48
Practical Application of Case-based Learning on Public Key Authentication in General Information Education
Daisuke Suzuki (Hokuriku Univ.)
pp. 144 - 147
LOIS2024-49
Proposal for a multiple signature protocol based on Musig2 with addable signers
Katsuhiro Sato, Atsuko Miyaji (Osaka Univ)
pp. 148 - 154
LOIS2024-50
Considerations on Weak Keys in LWE Cryptography
Masaaki Shirase (FUN)
pp. 155 - 161
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.