Thu, Mar 8 AM 09:00 - 10:40 |
(1) |
09:00-09:25 |
Evaluation of Bayes Predictive Distributions under Unknown Parametric Models on Misspecified Models IT2017-103 ISEC2017-91 WBS2017-84 |
Hirokazu Kono, Shota Saito, Toshiyasu Matsushima (Waseda Univ.) |
(2) |
09:25-09:50 |
Information Geometrical Study of Cluster-Model Approximation for Boltzmann Machines IT2017-104 ISEC2017-92 WBS2017-85 |
Kenta Toyoda, Tomohiro Ogawa (Univ. of Electro- Commu.) |
(3) |
09:50-10:15 |
Redundancy Analysis of Univarsal Lossless Source Coding via Estimation of Prior
-- Relaxing an Ergodicity Condition -- IT2017-105 ISEC2017-93 WBS2017-86 |
Ryosuke Ikarashi, Tsutomu Kawabata (UEC) |
(4) |
10:15-10:40 |
Evaluation of the Worst-Case Redundancy of Strongly Universal FV Source Codes Using the Source Approximation and the Asymptotically Sufficient Statistic IT2017-106 ISEC2017-94 WBS2017-87 |
Mitsuharu Arimura (Shonan Inst. Tech.), Hiroshi Nagaoka (Univ. of Electro-Comm.) |
|
10:40-10:50 |
Break ( 10 min. ) |
Thu, Mar 8 AM 10:50 - 12:05 |
(5) |
10:50-11:15 |
The Access Structure of a Secret Sharing Scheme Using Locally Repairable Codes IT2017-107 ISEC2017-95 WBS2017-88 |
Masanobu Nakata, Tomohiko Uyematsu, Tetsunao Matsuta (Tokyo Tech) |
(6) |
11:15-11:40 |
Construction of Secret Sharing Schemes with Small Thresholds for Countably Infinite Participants IT2017-108 ISEC2017-96 WBS2017-89 |
Takashi Hisatome, Hiroki Koga (Univ. Tsukuba) |
(7) |
11:40-12:05 |
Constructions of the (3,n) and (4,n) Threshold Visual Cryptography Using Combinatorial Designs and Their Performance Evaluation IT2017-109 ISEC2017-97 WBS2017-90 |
Kotaro Okada, Hiroki Koga (Univ. of Tsukuba) |
|
12:05-13:00 |
Lunch Break ( 55 min. ) |
Thu, Mar 8 PM 13:00 - 14:40 |
(8) |
13:00-13:25 |
Outage Capacity of a Two-User MIMO Interference Channel for Simultaneous Information and Energy Transfer IT2017-110 ISEC2017-98 WBS2017-91 |
Kengo Ikebata, Tomohiko Uyematsu (Tokyo Tech), Ryutaroh Matsumoto (Nagoya Univ), Tetsunao Matsuta (Tokyo Tech) |
(9) |
13:25-13:50 |
Optimality for the Iterative Construction Scheme of AIFV-$m$ codes IT2017-111 ISEC2017-99 WBS2017-92 |
Ryusei Fujita, Ken-ichi Iwata (Univ. of Fukui), Hirosuke Yamamoto (The Univ. of Tokyo) |
(10) |
13:50-14:15 |
Optimal Coded Caching using Linear Programming IT2017-112 ISEC2017-100 WBS2017-93 |
Shota Kamiya, Hiroki Koga (Univ. Tsukuba) |
(11) |
14:15-14:40 |
Shifted Coded Slotted ALOHA IT2017-113 ISEC2017-101 WBS2017-94 |
Tomokazu Emoto, Takayuki Nozaki (Yamaguchi Univ.) |
|
14:40-15:00 |
Break ( 20 min. ) |
Thu, Mar 8 PM 15:00 - 15:50 |
(12) |
15:00-15:50 |
[Invited Talk]
On Traitor Tracings and Related Topics IT2017-114 ISEC2017-102 WBS2017-95 |
Shota Yamada (AIST) |
|
15:50-16:00 |
Break ( 10 min. ) |
Thu, Mar 8 PM 16:00 - 16:50 |
(13) |
16:00-16:50 |
[Invited Talk]
Research and Development of Transmission Technologies for the Next Generation Terrestrial Broadcasting IT2017-115 ISEC2017-103 WBS2017-96 |
Tomoaki Takeuchi (NHK) |
|
16:50-17:00 |
Break ( 10 min. ) |
Thu, Mar 8 PM 17:00 - 17:50 |
(14) |
17:00-17:50 |
[Invited Talk]
On fast multiplications of multiple-valued logic polynomials by discrete Fourier transforms IT2017-116 ISEC2017-104 WBS2017-97 |
Hajime Matsui (Toyota Technological Institute) |
Thu, Mar 8 AM 09:00 - 10:40 |
(15) |
09:00-09:25 |
Effect on randomizing components to the security of Minalpher IT2017-117 ISEC2017-105 WBS2017-98 |
Yuki Kishi, Keita Osafune, Yuta Kuwano, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ) |
(16) |
09:25-09:50 |
A study on hierarchical secret sharing schemes applicable to any level based on XOR operations IT2017-118 ISEC2017-106 WBS2017-99 |
Koji Shima, Hiroshi Doi (IISEC) |
(17) |
09:50-10:15 |
Succinct Oblivious RAM IT2017-119 ISEC2017-107 WBS2017-100 |
Taku Onodera, Tetsuo Shibuya (IMSUT) |
(18) |
10:15-10:40 |
High Efficient Scalar Multiplication in Elliptic Curve Cryptography IT2017-120 ISEC2017-108 WBS2017-101 |
Noboru Takeuchi, Toshiyuki Kinoshita (TUT) |
|
10:40-10:50 |
Break ( 10 min. ) |
Thu, Mar 8 AM 10:50 - 12:05 |
(19) |
10:50-11:15 |
Digital watermark using deep-learning classification IT2017-121 ISEC2017-109 WBS2017-102 |
Mashu Sakai, Taiki Shigeta, Hikaru Morita (Kanagawa Univ.) |
(20) |
11:15-11:40 |
Evaluation of deep learning method for detection of intrusion packets IT2017-122 ISEC2017-110 WBS2017-103 |
Tomoki Ueno, Mitiko Harayama (GIFU Univ) |
(21) |
11:40-12:05 |
Reply analysis between Twitter users using machine learning
-- Distinguish real-life/online friends -- IT2017-123 ISEC2017-111 WBS2017-104 |
Takakuwa Ranka, Sasaki Taroh, Fujioka Atsushi (KU) |
|
12:05-13:00 |
Lunch Break ( 55 min. ) |
Thu, Mar 8 PM 13:00 - 13:50 |
(22) |
13:00-13:25 |
On the Number of Rounds by Card-based Cryptographic Protocols Using Private Operations IT2017-124 ISEC2017-112 WBS2017-105 |
Hibiki Ono, Yoshifumi Manabe (Kogakuin Univ.) |
(23) |
13:25-13:50 |
Card-Based Cryptographic Protocols with Private Operations which can Prevent Malicious Behaviors IT2017-125 ISEC2017-113 WBS2017-106 |
Youhei Shimizu, Yuki Kishi, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ) |
Fri, Mar 9 AM 09:25 - 10:40 |
(24) |
09:25-09:50 |
A study on segmented deletion error correction using polar code IT2017-126 ISEC2017-114 WBS2017-107 |
Hikari Koremura, Haruhiko Kaneko (Tokyo Tech) |
(25) |
09:50-10:15 |
Bayes Optimal AMP Decoder for Sparse Superposition Codes IT2017-127 ISEC2017-115 WBS2017-108 |
Yuwa Hatae (Kyushu Univ.), Kazushi Mimura (Hiroshima City Univ.), Masanori Kawakita, Jun'ichi Takeuchi (Kyushu Univ.) |
(26) |
10:15-10:40 |
Ordered Shuffle-BP Decoding Based on the Loops of LDPC Code IT2017-128 ISEC2017-116 WBS2017-109 |
Ryoma Sakai, Kazuhiko Yamaguchi (UEC) |
|
10:40-10:50 |
Break ( 10 min. ) |
Fri, Mar 9 AM 10:50 - 12:30 |
(27) |
10:50-11:15 |
Efficient Scheduling of Serial Iterative Decoding for Zigzag Decodable Fountain Codes IT2017-129 ISEC2017-117 WBS2017-110 |
Yoshihiro Murayama, Takayuki Nozaki (Yamaguchi Univ.) |
(28) |
11:15-11:40 |
Non-binary codes correcting a burst of deletions or insertions IT2017-130 ISEC2017-118 WBS2017-111 |
Toyohiko Saeki, Takayuki Nozaki (Yamaguchi Univ.) |
(29) |
11:40-12:05 |
Asymptotic Analysis of LDPC Codes for Two-Way Relay Channels IT2017-131 ISEC2017-119 WBS2017-112 |
Yuta Ishimatsu, Satoshi Takabe, Tadashi Wadayama (NITech), Masahito Hayashi (Nagoya Univ.) |
(30) |
12:05-12:30 |
Consideration of error correction code suitable for WBAN IT2017-132 ISEC2017-120 WBS2017-113 |
Akihiro Yamada, Hiroyoshi Morita, Akiko Manada (The Univ. of Electro-Communications) |
|
12:30-13:30 |
Lunch Break ( 60 min. ) |
Fri, Mar 9 PM 13:30 - 15:10 |
(31) |
13:30-13:55 |
On the Generalization of Fano's Inequality for Countably Infinite Alphabets, List-Decoding, and General Conditional Information Measures IT2017-133 ISEC2017-121 WBS2017-114 |
Yuta Sakai (Univ. Fukui) |
(32) |
13:55-14:20 |
Parameter orthogonalization method in quantum parameter estimation problem IT2017-134 ISEC2017-122 WBS2017-115 |
Jun Suzuki (UEC) |
(33) |
14:20-14:45 |
Improved Lossless Compression by Substring Enumeration Using Sorting IT2017-135 ISEC2017-123 WBS2017-116 |
Takahiro Ota (NPIT), Akiko Manada (UEC) |
(34) |
14:45-15:10 |
The Error Performance Analysis of the K-best Viterbi Decoding Algorithm IT2017-136 ISEC2017-124 WBS2017-117 |
Hideki Yoshikawa (Tohoku Gakuin Univ.) |
|
15:10-15:45 |
Break ( 35 min. ) |
Fri, Mar 9 PM 15:45 - 16:35 |
(35) |
15:45-16:10 |
Quantum &Classical Radar Camera for Automotive and Effect of Fog-2
-- Sparse Modeling -- IT2017-137 ISEC2017-125 WBS2017-118 |
Osamu Hirota (Tamagawa Univ.) |
(36) |
16:10-16:35 |
Attacks on several Multivariate PKCs
-- Attack on K(AVII)MVPKC -- IT2017-138 ISEC2017-126 WBS2017-119 |
Ryuichi Sakai (Osaka Electro-Communication Univ.), Masao Kasahara (Waseda Univ.) |
Fri, Mar 9 AM 09:00 - 10:40 |
(37) |
09:00-09:25 |
A Note on Security Notions of Anonymity in Identity-Based Encryption
-- Case of ID-CCA2 Security -- IT2017-139 ISEC2017-127 WBS2017-120 |
Honomu Ohtomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) |
(38) |
09:25-09:50 |
On Confirming Ciphertext Update in Key-Updatable Public-key Encryption with Keyword Search IT2017-140 ISEC2017-128 WBS2017-121 |
Yuka Sakoda, Honomu Ohtomo, Naoki Matsunaga, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) |
(39) |
09:50-10:15 |
On (Un)Deniability of Plausible Deniability IT2017-141 ISEC2017-129 WBS2017-122 |
Atsushi Waseda, Ryo Nojima (NICT) |
(40) |
10:15-10:40 |
Information-Theoretically Secure Authentication Codes with Arbitration using Non-Uniformly Random Keys IT2017-142 ISEC2017-130 WBS2017-123 |
Miho Ishikawa, Junji Shikata (Yokohama National Univ.) |
|
10:40-10:50 |
Break ( 10 min. ) |
Fri, Mar 9 AM 10:50 - 11:40 |
(41) |
10:50-11:15 |
On Security Evaluation for Coset Coding in Wiretap Channel Coding IT2017-143 ISEC2017-131 WBS2017-124 |
Yuki Mori, Tomohiro Ogawa (UEC) |
(42) |
11:15-11:40 |
Secure Communications over the Two-Way Wiretap Channel II with Noisy Main Channel Using Cooperative Jamming IT2017-144 ISEC2017-132 WBS2017-125 |
Hiroki Iizuka, Ryota Tanaka, Junji Shikata (Yokohama National Univ.) |
|
11:40-13:30 |
Lunch Break ( 110 min. ) |
Fri, Mar 9 PM 13:30 - 15:10 |
(43) |
13:30-13:55 |
Time-Space Jointly Path-Matched MC-CDM Wide Band Radio Modulation with TX and RX Array Antennas
-- for High Performance Error-Control Coding -- IT2017-145 ISEC2017-133 WBS2017-126 |
Kohji Itoh, Akira Nakamura, Makoto Itami (TUS) |
(44) |
13:55-14:20 |
Influence of Channel Estimation Error on Noise Enhancement Suppression by Using Novel Multilevel Spreading Codes IT2017-146 ISEC2017-134 WBS2017-127 |
Tatsuya Motoki, Takehiko Kobayashi (Tokyo Denki Univ.) |
(45) |
14:20-14:45 |
Performance Comparison of User Position Detection Method using Multiple Unmanned Aerial Vehicles based Positioning Accuracy Index IT2017-147 ISEC2017-135 WBS2017-128 |
Hiroyasu Ishikawa, Hiroki Onuki (Nihon Univ.) |
(46) |
14:45-15:10 |
Study on Aerial Cooperative Relaying for Coverage Extension of High-Altitude Unmanned Aircraft Systems IT2017-148 ISEC2017-136 WBS2017-129 |
Fumie Ono (NICT), Hideki Ochiai (Yokohama National Univ.), Ryu Miura, Fumihide Kojima (NICT) |
|
15:10-15:20 |
Break ( 10 min. ) |
Fri, Mar 9 PM 15:20 - 17:00 |
(47) |
15:20-15:45 |
On Adaptive Self-Interference Suppression for Full Duplex Filter-and-Forward Relaying IT2017-149 ISEC2017-137 WBS2017-130 |
Hayato Teshiromori, Teruyuki Miyajima, Yoshiki Sugitani (Ibaraki Univ.) |
(48) |
15:45-16:10 |
Evaluation of synchronization jitter caused by the distance from base-station on optical wireless RVC system using CSK-MPPM IT2017-150 ISEC2017-138 WBS2017-131 |
Masayuki Ishikawa, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.) |
(49) |
16:10-16:35 |
A study of Bit Error Rate Taking into Account Synchronization Performance on Optical Wireless Framed-DOOK System IT2017-151 ISEC2017-139 WBS2017-132 |
Yuta Asano, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.) |
(50) |
16:35-17:00 |
BER Performance Evaluation of ROD-WSN using Modified Pseudo Orthogonal M-sequences under Fading Channel IT2017-152 ISEC2017-140 WBS2017-133 |
Tomohiro Okawa, Hiromasa Habuchi (Ibaraki Univ.), Koichiro Hashiura (Akita Prefectural Univ.) |