Conference Date |
Tue, Jun 20, 2023 13:20 - 16:45
Wed, Jun 21, 2023 09:30 - 11:50 |
Topics |
Internet Security, etc. |
Conference Place |
Honjo Campus, Saga University |
Address |
1 Honjo-cho, Saga-shi, Saga, Japan. |
Transportation Guide |
http://www.saga-u.ac.jp/access/index.html |
Registration Fee |
This workshop will be held as the IEICE workshop in fully electronic publishing. Registration fee will be necessary except the speakers and participants other than the participants to workshop(s) in non-electronic publishing. See the registration fee page. We request the registration fee or presentation fee to participants who will attend the workshop(s) on IA, ICSS. |
Tue, Jun 20 PM 13:20 - 13:30 |
(1) |
13:20-13:30 |
|
Tue, Jun 20 PM 13:30 - 14:55 |
(2) |
13:30-13:55 |
Development and evaluation of a micro-plastic collection network system utilizing underwater drones |
Shosei Mimoto, Hirosi Yamamoto (Ritsumeikan Univ) |
(3) |
13:55-14:20 |
Development and evaluation of NFT content utilization management platform across multiple devices and services |
Raiya Araki, Hiroshi Yamamoto (Ritsumeikan Univ.) |
(4) |
14:20-14:45 |
Development and evaluation of a dangerous behavior detection system at station platforms utilizing 3D LiDAR |
Yusuke Koyama, Hiroshi Yamamoto (Ritsumeikan Univ.) |
|
14:45-14:55 |
Break ( 10 min. ) |
Tue, Jun 20 PM 14:55 - 16:00 |
(5) |
14:55-15:20 |
Development and evaluation of an underwater environmental condition observation network system utilizing underwater drones |
Kenshin Iwaki, Hiroshi Yamamoto (Ritsumeikan) |
(6) |
15:20-15:45 |
Proposal of Packet Transfer Method that Suppresses Fluctuations of Communication Delays in In-Vehicle Networks with SOME/IP |
Kazuki Iehira, Inoue Hiroyuki (Kyoto Sangyo Univ.) |
|
15:45-16:00 |
Break ( 15 min. ) |
Tue, Jun 20 PM 16:00 - 16:45 |
(7) |
16:00-16:45 |
[Invited Talk]
Cybersecurity education and the role of universities |
Hiroshi Koide (Kyushu Univ.) |
Wed, Jun 21 PM Chair: Masaya Sato (Okayama Prefectural University) 09:30 - 10:30 |
(8) |
09:30-09:55 |
A Precise Approach of Software Vulnerability Detection Using Set Similarity Calculation Algorithm |
Reika Arakawa, Yo Kanemoto, Eitaro Shioji, Mitsuaki Akiyama (NTT) |
(9) |
09:55-10:20 |
A Proposal for Access Control Method based on File Relation Inference from Users Behavior |
Yuki Kodaka (SOKENDAI), Hirokazu Hasegawa, Hiroki Takakura (NII) |
|
10:20-10:30 |
Break ( 10 min. ) |
Wed, Jun 21 PM 10:30 - 11:20 |
(10) |
10:30-10:55 |
A Mobile Device Management Method in a M2M Architecture Utilizing MEC and Device Virtualization |
Haruto Takano, Rempei Sawada, Fumio Teraoka (Keio Univ.) |
(11) |
10:55-11:20 |
A Consideration of Privacy Preserved IoT Data Inquiry System using DoT |
Hayato Sagara (Hokkaido Univ.), Yong Jin (Tokyo Tech), Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ.) |
Wed, Jun 21 PM 11:20 - 11:50 |
(12) |
11:20-11:30 |
|
(13) |
11:30-11:40 |
|
(14) |
11:40-11:50 |
|