|
Chair |
|
Junji Shikata (Yokohama National Univ.) |
Vice Chair |
|
Katsuyuki Takashima (Waseda Univ.), Shinsaku Kiyomoto (KDDI Research) |
Secretary |
|
Hiroki Okada (KDDI Research), Yoshikazu Hanatani (Toshiba) |
Assistant |
|
Atsushi Takayasu (Univ. of Tokyo) |
|
Technical Committee on Social Implications of Technology and Information Ethics (SITE) |
[schedule] [select]
|
|
Chair |
|
Takeo Tatsumi (Open Univ. of Japan) |
Vice Chair |
|
Soichiro Morishita (Cyber Agent), Yuko Murakami (Rikkyo Univ.) |
Secretary |
|
Yusuke Kaneko (Japan Research Institute), Yusuke Tachibana (Fukuoka Inst. of Tech.) |
Assistant |
|
Kaito Hosono (Kanagawa Univ.), Rodriguez Samudio Ruben Enrique (Waseda Univ.) |
|
Technical Committee on Life Intelligence and Office Information Systems (LOIS) |
[schedule] [select]
|
|
Chair |
|
Manabu Motegi (Takushoku Univ.) |
Vice Chair |
|
Makoto Nakatsuji (NTT) |
Secretary |
|
Makoto Takita (Kobe Univ.), Shuhei Yamamoto (Univ. of Tsukuba) |
Assistant |
|
Mitsuhiro Goto (NTT) |
|
Conference Date |
Thu, Nov 14, 2024 10:05 - 17:40
Fri, Nov 15, 2024 10:00 - 16:45 |
Topics |
|
Conference Place |
|
Registration Fee |
This workshop will be held as the IEICE workshop in fully electronic publishing. Registration fee will be necessary except the speakers and participants other than the participants to workshop(s) in non-electronic publishing. See the registration fee page. We request the registration fee or presentation fee to participants who will attend the workshop(s) on SITE, LOIS, ISEC. |
Thu, Nov 14 AM 10:05 - 12:10 |
(1) |
10:05-10:30 |
Detection of persons falling overboard using work probe system |
Toshimasa Aso, Masahiro Miyasaka, Hideyuki Kasima, Takahiro Takemoto (Tokyo Univ. of Marine Science and Technology) |
(2) |
10:30-10:55 |
Proposal of the Facility Layout Generation System using Hierarchical Reinforcement Learning |
Shunsuke Furuta (Osaka Univ.), Hiroyuki Nakagawa (Okayama Univ.), Tatsuhiro Tsuchiya (Osaka Univ.) |
(3) |
10:55-11:20 |
Gait Recognition from Overhead View Using Transformer-Based Models |
Ryusei Kawa, Takeshi Umezawa, Noritaka Osawa (Chiba Univ.) |
(4) |
11:20-11:45 |
Indoor positioning using Transformer model based on geomagnetism and movement displacement from dead reckoning |
Haruki Nakano, Takeshi Umezawa, Noritaka Osawa (Chiba Univ.) |
(5) |
11:45-12:10 |
Analysis of origin-destination statistics for smartphone mobility using location registration information from mobile phone operators |
Yoichi Midorikawa, Takuya Nagata (SBKK), Masatsugu Ichino, Hiroshi Yoshiura (UEC), Hideki Yoshii (SBKK) |
Thu, Nov 14 PM 13:10 - 14:25 |
(6) |
13:10-13:35 |
Proposal of Blockchain Service Infrastructure with Remote Biometric Authentication(BSIwRBA) |
Toshiaki Saisho (AITC) |
(7) |
13:35-14:00 |
Multi-User Oblivious Transfer for Exclusive Data Distribution |
Takehiro Takada, Yuichi Kaji (Nagoya Univ.) |
(8) |
14:00-14:25 |
Design of an Educational Data Management System on Blockchain Utilizing Signatures with Limited Verifiers |
Yudai Hata, Kouichi Sakurai (Kyushu Univ.) |
Thu, Nov 14 PM 14:35 - 15:50 |
(9) |
14:35-15:00 |
Statistical Model Analysis of Content Services Based on Viewer-Centric Data Utilization |
Yasuhiro Murasaki (NHK) |
(10) |
15:00-15:25 |
US-EU Umbrella Agreement on the Protection of Personal Information
-- A protection framework for personal information in counter-terrorism -- |
Kotono Koga (FIT) |
(11) |
15:25-15:50 |
Exploration on the concept of moral rights from the view of the right to maintain integrity |
Takushi Otani (Kibi International Univ.) |
Thu, Nov 14 PM 16:00 - 17:40 |
(12) |
16:00-16:25 |
Loss based Byzantine-resilient Decentralized DeepLearning |
Shinnosuke Masuda, Kazuyuki Shudo (Kyoto Univ) |
(13) |
16:25-16:50 |
Higher Decentralization Does Not Necessarily Enhance Resistance to 51% Attacks |
Taishi Nakai, Shudo Kazuyuki (Kyoto Univ.) |
(14) |
16:50-17:15 |
Backdoor Attack by Noise Against Vision Transformer |
Yuki Yamahata, Masaaki Shirase (FUN) |
(15) |
17:15-17:40 |
Multi-Input XOR Protocol Using Playing Cards |
Koichi Koizumi (Fukushima KOSEN), Takaaki Mizuki (Tohoku Univ.) |
Fri, Nov 15 AM 10:00 - 11:40 |
(16) |
10:00-10:25 |
Dynamic selection method for machine learning models considering data characteristics and prediction uncertainty |
Kento Furukawa (Osaka Univ.), Hiroyuki Nakagawa (Okayama Univ.), Tatsuhiro Tsuchiya (Osaka Univ.) |
(17) |
10:25-10:50 |
Assessing the Impact of Behavior Change Messages Using Large Language Models |
Takuya Okada (YCU), Yoshiaki Takimoto, Takeshi Kurashima (NTT), Hiroyuki Toda (YCU) |
(18) |
10:50-11:15 |
Accelerating Authentication for Homomorphic Encryption-based Facial Recognition Systems through Hashing |
Sei Nakanishi, Yoshiaki Narusue, Hiroyuki Morikawa (UTkyo) |
(19) |
11:15-11:40 |
A One-Time Password Authentication Scheme for IoT Environments |
Koki Mizoguchi, Akihiro Shimizu (KUT) |
Fri, Nov 15 PM 12:40 - 13:55 |
(20) |
12:40-13:05 |
Reaction Attack with a reduced number of queries on TFHE Fully Homomorphic Encryption |
Remma Kumazaki, Yuichi Kaji (Nagoya Univ.) |
(21) |
13:05-13:30 |
A Study on Plaintext Prediction for a Lightweight Block Cipher Midori Using Neural Network |
Eiki Furutsu, Shunsuke Araki (Kyutech) |
(22) |
13:30-13:55 |
Differential-linear cryptanalysis using revised linear approximation for the stream cipher ChaCha |
Atsuki Nagai, Atsuko Miyaji (Osaka Univ.) |
Fri, Nov 15 PM 14:05 - 15:20 |
(23) |
14:05-14:30 |
International regulatory trend survey report on AI
-- Analysis of EU AI act 1 -- |
Naonori Kato (KDDI Research/NFI/RIKEN AIP), Yosuke Murakami (KDDI Research) |
(24) |
14:30-14:55 |
A Survey of the Security Conformance Evaluation System for Internet of Things (IoT) Products
-- From the Perspective of Cyber Security Supply Chains -- |
Yusuke Tachibana (FIT) |
(25) |
14:55-15:20 |
Practical Application of Case-based Learning on Public Key Authentication in General Information Education |
Daisuke Suzuki (Hokuriku Univ.) |
Fri, Nov 15 PM 15:30 - 16:45 |
(26) |
15:30-15:55 |
Proposal for a Flexible Multiple Signature Protocol with Additional Signers |
Katsuhiro Sato, Atsuko Miyaji (Osaka Univ) |
(27) |
15:55-16:20 |
Considerations on Weak Keys in LWE Cryptography |
Masaaki Shirase (FUN) |
(28) |
16:20-16:45 |
The Security Analysis of Ring-LWE Using the Ring-BKW Algorithm |
Kenjiro Hirose (Osaka Univ.) |
Announcement for Speakers |
General Talk | Each speech will have 20 minutes for presentation and 5 minutes for discussion. |
Contact Address and Latest Schedule Information |
ISEC |
Technical Committee on Information Security (ISEC) [Latest Schedule]
|
Contact Address |
Atsushi Takayasu (The University of Tokyo)
E-: ic-c (to ISEC secretaries) |
SITE |
Technical Committee on Social Implications of Technology and Information Ethics (SITE) [Latest Schedule]
|
Contact Address |
|
LOIS |
Technical Committee on Life Intelligence and Office Information Systems (LOIS) [Latest Schedule]
|
Contact Address |
Makoto Takita (Kobe University)
1-1, Rokkodai-cho, Nada-ku, Kobe, 657-8501, JAPAN
E-: portbe-u |
Last modified: 2024-09-21 10:18:15
|