IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 1448  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
AP 2024-06-13
13:55
Tokyo Kikai-Shinko-Kaikan Bldg.
(Primary: On-site, Secondary: Online)
Generation of Virtual City 3D Model and Analysis of Pathloss Distribution
Rento Hagiwara, Koichi Ichige (Yokohama National Univ), Tatsuya Nagao, Takahiro Hayashi (KDDI Research)
 [more]
NLP, CCS 2024-06-06
14:05
Fukuoka West Japan General Exhibition Center AIM Conflict-free multi-walker quantum walk based on entanglement
Honoka Shiratori, Andre Roehm, Tomoki Yamagami (UT), Etsuo Segawa (YNU), Takatomo Mihana, Ryoich Horisaki (UT)
 [more]
QIT
(2nd)
2024-05-29
14:45
Ibaraki AIST Tsukuba Laser Phase Control for Entanglement Sharing at Remote Locations
Riho Amaki, Yohei Sugiyama, Yuto Shitaka (Yokohama National Univ), Tomoki Tsuno, Daisuke Yoshida (Yokohama National Univ, LQUOM Inc.), Koji Nagano (LQUOM Inc.), Tomoyuki Horikiri (Yokohama National Univ, LQUOM Inc.), Daisuke Akamatsu, Feng-Lei Hong (Yokohama National Univ.)
(To be available after the conference date) [more]
QIT
(2nd)
2024-05-29
16:00
Ibaraki AIST Tsukuba Development of 436 nm frequency-stabilized excitation light source for entangled photon pair generation
Rina Takeda, Shinnosuke Aoyama, Kyosuke Sato, Feng-Lei Hong, Tomoyuki Horikiri, Daisuke Akamatsu (YNU)
(To be available after the conference date) [more]
QIT
(2nd)
2024-05-29
16:20
Ibaraki AIST Tsukuba Development of 436-nm light source for generation of entangled photon pairs at 606 nm and 1.5µm.
Kyosuke Sato, Shinnosuke Aoyama, Rina Takeda, Feng-Lei Hong, Tomoyuki Horikiri, Daisuke Akamatsu (YNU)
(To be available after the conference date) [more]
ISEC 2024-05-15
15:35
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Identity-Based Matchmaking Encryption Secure Against Key Generation Center (from ProvSec 2023)
Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) ISEC2024-6
(To be available after the conference date) [more] ISEC2024-6
p.22
HWS 2024-04-19
15:25
Tokyo
(Primary: On-site, Secondary: Online)
Applying Ring Oscillator-based Laser Detection Sensor to AES Circuitry on FPGA
Shungo Hayashi, Junichi Sakamoto, Tsutomu Matsumoto (AIST/YNU) HWS2024-3
 [more] HWS2024-3
pp.8-13
ICSS, IPSJ-SPT 2024-03-21
11:20
Okinawa OIST
(Primary: On-site, Secondary: Online)
Analyzing Attackers and Victims Actions via LockBit3.0 Website Data Dynamics
Yuji Sekine, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-70
LockBit3.0 is one of the top ransomware groups that has been active since July 2022, targeting over 1,000 companies. In ... [more] ICSS2023-70
pp.9-16
ICSS, IPSJ-SPT 2024-03-21
12:10
Okinawa OIST
(Primary: On-site, Secondary: Online)
Unveiling the Shadows: Analyzing Cryptocurrency Address Management and Fund Movement of Darknet Markets
Aiman Syazwan Bin Abdul Razak, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-72
Darknet markets use cryptocurrencies like Bitcoin for anonymous transactions in exchanging illicit goods and services. T... [more] ICSS2023-72
pp.25-32
ICSS, IPSJ-SPT 2024-03-21
15:20
Okinawa OIST
(Primary: On-site, Secondary: Online)
Investigating the functionalities of IoT malware to disrupt the activities of other intruders
Shun Ikeda, Hiroki Yasui, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-76
 [more] ICSS2023-76
pp.51-56
ICSS, IPSJ-SPT 2024-03-21
15:45
Okinawa OIST
(Primary: On-site, Secondary: Online)
Enhanced Analysis of IoT Botnet Activity by Fusing Honeypots, Malware Dynamic Analysis, and C&C Observation
Yuki Endo, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-77
 [more] ICSS2023-77
pp.57-62
ICSS, IPSJ-SPT 2024-03-22
10:10
Okinawa OIST
(Primary: On-site, Secondary: Online)
Study of keyword-based search method for IoT devices deployed at important facilities
Mami Kawaguchi, Takayuki Sasaki, Kihara Momoka, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-86
IoT devices are increasingly deployed in various systems, including remote monitoring systems.Some of these IoT devices ... [more] ICSS2023-86
pp.123-128
ICSS, IPSJ-SPT 2024-03-22
11:45
Okinawa OIST
(Primary: On-site, Secondary: Online)
Impact of ChatGPT Assisted Polymorphic Malware on Antivirus Detection
Huang Zhewei, Yinn Minn Pa pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-89
With the rapid implementation of large-scale language models (LLMs), there are concerns about their misuse in cyberattac... [more] ICSS2023-89
pp.145-152
AP 2024-03-14
15:15
Fukui UNIVERSITY OF FUKUI
(Primary: On-site, Secondary: Online)
[Invited Talk (Young Researcher)] Study of non-contact PIM measurement systems for balanced transmission lines with electrically equivalent characteristics to microstrip lines
Ryunosuke Murofushi (Yokohama Natl. Univ./Polytechnic Univ.), Nobuhiro Kuga (Yokohama Natl. Univ.), Eiji Hanayama (Polytechnic Univ.) AP2023-209
In many communication systems, passive intermoduration (PIM) is known as one of noises. The termination method standardi... [more] AP2023-209
pp.45-50
RCC, ISEC, IT, WBS 2024-03-13
11:35
Osaka Osaka Univ. (Suita Campus) Proxy Re-Authentication Capable of Key and Data Compression
Yoshiro Matsuoka, Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65
In this paper, we propose a new cryptographic protocol called proxy re-authentication capable of key and data compressio... [more] IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65
pp.52-59
RCC, ISEC, IT, WBS 2024-03-13
14:15
Osaka Osaka Univ. (Suita Campus) Proxy Re-encryption based on LPN
Haruki Fujimoto, Shingo Sato, Junji Shikata (YNU) IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70
We propose a proxy re-encryption (PRE) scheme based on the Learning Parity with Noise (LPN) problem using error-correcti... [more] IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70
pp.79-86
RCC, ISEC, IT, WBS 2024-03-13
16:35
Osaka Osaka Univ. (Suita Campus) A Study on Polar Codes Design with Robustness against Channel SNR Fluctuation
Hidetake Matsui, Hideki Ochiai (YNU) IT2023-102 ISEC2023-101 WBS2023-90 RCC2023-84
Polar codes are known to achieve high reliability with low decoding complexity. The design of polar codes requires the s... [more] IT2023-102 ISEC2023-101 WBS2023-90 RCC2023-84
pp.179-184
RCC, ISEC, IT, WBS 2024-03-14
09:30
Osaka Osaka Univ. (Suita Campus) Security Analysis of Backdoored Classic McEliece in a Multi-User Setting
Dai Miura, Hyungrok Jo, Shingo Sato, Junji Shikata (Yokohama National Univ.) IT2023-105 ISEC2023-104 WBS2023-93 RCC2023-87
Several attacks have been proposed for the Classic McEliece cryptosystem, which is one of the 4th round candidates of th... [more] IT2023-105 ISEC2023-104 WBS2023-93 RCC2023-87
pp.197-204
RCC, ISEC, IT, WBS 2024-03-14
14:40
Osaka Osaka Univ. (Suita Campus) Performance Evaluation of OFDM Systems with Clipping and Partial Filtering
Wataru Hatano, Hideki Ochiai (YNU) IT2023-123 ISEC2023-122 WBS2023-111 RCC2023-105
 [more] IT2023-123 ISEC2023-122 WBS2023-111 RCC2023-105
pp.300-305
RCC, ISEC, IT, WBS 2024-03-14
15:05
Osaka Osaka Univ. (Suita Campus) Secrity Oriented Design of Polar-Coded OFDM on Selective Fading Channels
Yuki Kuraya, Hideki Ochiai (YNU) IT2023-124 ISEC2023-123 WBS2023-112 RCC2023-106
We introduce a physical layer security scheme based on a polar-coded OFDM system in wireless communication. Our approach... [more] IT2023-124 ISEC2023-123 WBS2023-112 RCC2023-106
pp.306-311
 Results 1 - 20 of 1448  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan