IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


Technical Committee on Information Security (ISEC) [schedule] [select]
Chair Junji Shikata (Yokohama National Univ.)
Vice Chair Katsuyuki Takashima (Waseda Univ.), Shinsaku Kiyomoto (KDDI Research)
Secretary Hiroki Okada (KDDI Research), Yoshikazu Hanatani (Toshiba)
Assistant Atsushi Takayasu (Univ. of Tokyo)

Technical Committee on Social Implications of Technology and Information Ethics (SITE) [schedule] [select]
Chair Takeo Tatsumi (Open Univ. of Japan)
Vice Chair Soichiro Morishita (Cyber Agent), Yuko Murakami (Rikkyo Univ.)
Secretary Yusuke Kaneko (Japan Research Institute), Yusuke Tachibana (Fukuoka Inst. of Tech.)
Assistant Kaito Hosono (Kanagawa Univ.), Rodriguez Samudio Ruben Enrique (Waseda Univ.)

Technical Committee on Life Intelligence and Office Information Systems (LOIS) [schedule] [select]
Chair Manabu Motegi (Takushoku Univ.)
Vice Chair Makoto Nakatsuji (NTT)
Secretary Makoto Takita (Kobe Univ.), Shuhei Yamamoto (Univ. of Tsukuba)
Assistant Mitsuhiro Goto (NTT)

Conference Date Thu, Nov 14, 2024 10:05 - 17:40
Fri, Nov 15, 2024 10:00 - 16:45
Topics  
Conference Place  
Registration Fee This workshop will be held as the IEICE workshop in fully electronic publishing. Registration fee will be necessary except the speakers and participants other than the participants to workshop(s) in non-electronic publishing. See the registration fee page. We request the registration fee or presentation fee to participants who will attend the workshop(s) on SITE, LOIS, ISEC.

Thu, Nov 14 AM 
10:05 - 12:10
(1) 10:05-10:30 Detection of persons falling overboard using work probe system Toshimasa Aso, Masahiro Miyasaka, Hideyuki Kasima, Takahiro Takemoto (Tokyo Univ. of Marine Science and Technology)
(2) 10:30-10:55 Proposal of the Facility Layout Generation System using Hierarchical Reinforcement Learning Shunsuke Furuta (Osaka Univ.), Hiroyuki Nakagawa (Okayama Univ.), Tatsuhiro Tsuchiya (Osaka Univ.)
(3) 10:55-11:20 Gait Recognition from Overhead View Using Transformer-Based Models Ryusei Kawa, Takeshi Umezawa, Noritaka Osawa (Chiba Univ.)
(4) 11:20-11:45 Indoor positioning using Transformer model based on geomagnetism and movement displacement from dead reckoning Haruki Nakano, Takeshi Umezawa, Noritaka Osawa (Chiba Univ.)
(5) 11:45-12:10 Analysis of origin-destination statistics for smartphone mobility using location registration information from mobile phone operators Yoichi Midorikawa, Takuya Nagata (SBKK), Masatsugu Ichino, Hiroshi Yoshiura (UEC), Hideki Yoshii (SBKK)
Thu, Nov 14 PM 
13:10 - 14:25
(6) 13:10-13:35 Proposal of Blockchain Service Infrastructure with Remote Biometric Authentication(BSIwRBA) Toshiaki Saisho (AITC)
(7) 13:35-14:00 Multi-User Oblivious Transfer for Exclusive Data Distribution Takehiro Takada, Yuichi Kaji (Nagoya Univ.)
(8) 14:00-14:25 Design of an Educational Data Management System on Blockchain Utilizing Signatures with Limited Verifiers Yudai Hata, Kouichi Sakurai (Kyushu Univ.)
Thu, Nov 14 PM 
14:35 - 15:50
(9) 14:35-15:00 Statistical Model Analysis of Content Services Based on Viewer-Centric Data Utilization Yasuhiro Murasaki (NHK)
(10) 15:00-15:25 US-EU Umbrella Agreement on the Protection of Personal Information
-- A protection framework for personal information in counter-terrorism --
Kotono Koga (FIT)
(11) 15:25-15:50 Exploration on the concept of moral rights from the view of the right to maintain integrity Takushi Otani (Kibi International Univ.)
Thu, Nov 14 PM 
16:00 - 17:40
(12) 16:00-16:25 Loss based Byzantine-resilient Decentralized DeepLearning Shinnosuke Masuda, Kazuyuki Shudo (Kyoto Univ)
(13) 16:25-16:50 Higher Decentralization Does Not Necessarily Enhance Resistance to 51% Attacks Taishi Nakai, Shudo Kazuyuki (Kyoto Univ.)
(14) 16:50-17:15 Backdoor Attack by Noise Against Vision Transformer Yuki Yamahata, Masaaki Shirase (FUN)
(15) 17:15-17:40 Multi-Input XOR Protocol Using Playing Cards Koichi Koizumi (Fukushima KOSEN), Takaaki Mizuki (Tohoku Univ.)
Fri, Nov 15 AM 
10:00 - 11:40
(16) 10:00-10:25 Dynamic selection method for machine learning models considering data characteristics and prediction uncertainty Kento Furukawa (Osaka Univ.), Hiroyuki Nakagawa (Okayama Univ.), Tatsuhiro Tsuchiya (Osaka Univ.)
(17) 10:25-10:50 Assessing the Impact of Behavior Change Messages Using Large Language Models Takuya Okada (YCU), Yoshiaki Takimoto, Takeshi Kurashima (NTT), Hiroyuki Toda (YCU)
(18) 10:50-11:15 Accelerating Authentication for Homomorphic Encryption-based Facial Recognition Systems through Hashing Sei Nakanishi, Yoshiaki Narusue, Hiroyuki Morikawa (UTkyo)
(19) 11:15-11:40 A One-Time Password Authentication Scheme for IoT Environments Koki Mizoguchi, Akihiro Shimizu (KUT)
Fri, Nov 15 PM 
12:40 - 13:55
(20) 12:40-13:05 Reaction Attack with a reduced number of queries on TFHE Fully Homomorphic Encryption Remma Kumazaki, Yuichi Kaji (Nagoya Univ.)
(21) 13:05-13:30 A Study on Plaintext Prediction for a Lightweight Block Cipher Midori Using Neural Network Eiki Furutsu, Shunsuke Araki (Kyutech)
(22) 13:30-13:55 Differential-linear cryptanalysis using revised linear approximation for the stream cipher ChaCha Atsuki Nagai, Atsuko Miyaji (Osaka Univ.)
Fri, Nov 15 PM 
14:05 - 15:20
(23) 14:05-14:30 International regulatory trend survey report on AI
-- Analysis of EU AI act 1 --
Naonori Kato (KDDI Research/NFI/RIKEN AIP), Yosuke Murakami (KDDI Research)
(24) 14:30-14:55 A Survey of the Security Conformance Evaluation System for Internet of Things (IoT) Products
-- From the Perspective of Cyber Security Supply Chains --
Yusuke Tachibana (FIT)
(25) 14:55-15:20 Practical Application of Case-based Learning on Public Key Authentication in General Information Education Daisuke Suzuki (Hokuriku Univ.)
Fri, Nov 15 PM 
15:30 - 16:45
(26) 15:30-15:55 Proposal for a Flexible Multiple Signature Protocol with Additional Signers Katsuhiro Sato, Atsuko Miyaji (Osaka Univ)
(27) 15:55-16:20 Considerations on Weak Keys in LWE Cryptography Masaaki Shirase (FUN)
(28) 16:20-16:45 The Security Analysis of Ring-LWE Using the Ring-BKW Algorithm Kenjiro Hirose (Osaka Univ.)

Announcement for Speakers
General TalkEach speech will have 20 minutes for presentation and 5 minutes for discussion.

Contact Address and Latest Schedule Information
ISEC Technical Committee on Information Security (ISEC)   [Latest Schedule]
Contact Address Atsushi Takayasu (The University of Tokyo)
E--mail: ic-c (to ISEC secretaries) 
SITE Technical Committee on Social Implications of Technology and Information Ethics (SITE)   [Latest Schedule]
Contact Address  
LOIS Technical Committee on Life Intelligence and Office Information Systems (LOIS)   [Latest Schedule]
Contact Address Makoto Takita (Kobe University)
1-1, Rokkodai-cho, Nada-ku, Kobe, 657-8501, JAPAN
E--mail: portbe-u 


Last modified: 2024-09-21 10:18:15


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to ISEC Schedule Page]   /   [Return to SITE Schedule Page]   /   [Return to LOIS Schedule Page]   /  
 
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan