Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
AP |
2024-06-13 13:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. (Primary: On-site, Secondary: Online) |
Generation of Virtual City 3D Model and Analysis of Pathloss Distribution Rento Hagiwara, Koichi Ichige (Yokohama National Univ), Tatsuya Nagao, Takahiro Hayashi (KDDI Research) |
[more] |
|
NLP, CCS |
2024-06-06 14:05 |
Fukuoka |
West Japan General Exhibition Center AIM |
Conflict-free multi-walker quantum walk based on entanglement Honoka Shiratori, Andre Roehm, Tomoki Yamagami (UT), Etsuo Segawa (YNU), Takatomo Mihana, Ryoich Horisaki (UT) |
[more] |
|
QIT (2nd) |
2024-05-29 14:45 |
Ibaraki |
AIST Tsukuba |
Laser Phase Control for Entanglement Sharing at Remote Locations Riho Amaki, Yohei Sugiyama, Yuto Shitaka (Yokohama National Univ), Tomoki Tsuno, Daisuke Yoshida (Yokohama National Univ, LQUOM Inc.), Koji Nagano (LQUOM Inc.), Tomoyuki Horikiri (Yokohama National Univ, LQUOM Inc.), Daisuke Akamatsu, Feng-Lei Hong (Yokohama National Univ.) |
(To be available after the conference date) [more] |
|
QIT (2nd) |
2024-05-29 16:00 |
Ibaraki |
AIST Tsukuba |
Development of 436 nm frequency-stabilized excitation light source for entangled photon pair generation Rina Takeda, Shinnosuke Aoyama, Kyosuke Sato, Feng-Lei Hong, Tomoyuki Horikiri, Daisuke Akamatsu (YNU) |
(To be available after the conference date) [more] |
|
QIT (2nd) |
2024-05-29 16:20 |
Ibaraki |
AIST Tsukuba |
Development of 436-nm light source for generation of entangled photon pairs at 606 nm and 1.5µm. Kyosuke Sato, Shinnosuke Aoyama, Rina Takeda, Feng-Lei Hong, Tomoyuki Horikiri, Daisuke Akamatsu (YNU) |
(To be available after the conference date) [more] |
|
ISEC |
2024-05-15 15:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Identity-Based Matchmaking Encryption Secure Against Key Generation Center (from ProvSec 2023) Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) ISEC2024-6 |
(To be available after the conference date) [more] |
ISEC2024-6 p.22 |
HWS |
2024-04-19 15:25 |
Tokyo |
(Primary: On-site, Secondary: Online) |
Applying Ring Oscillator-based Laser Detection Sensor to AES Circuitry on FPGA Shungo Hayashi, Junichi Sakamoto, Tsutomu Matsumoto (AIST/YNU) HWS2024-3 |
[more] |
HWS2024-3 pp.8-13 |
ICSS, IPSJ-SPT |
2024-03-21 11:20 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Analyzing Attackers and Victims Actions via LockBit3.0 Website Data Dynamics Yuji Sekine, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-70 |
LockBit3.0 is one of the top ransomware groups that has been active since July 2022, targeting over 1,000 companies. In ... [more] |
ICSS2023-70 pp.9-16 |
ICSS, IPSJ-SPT |
2024-03-21 12:10 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Unveiling the Shadows: Analyzing Cryptocurrency Address Management and Fund Movement of Darknet Markets Aiman Syazwan Bin Abdul Razak, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-72 |
Darknet markets use cryptocurrencies like Bitcoin for anonymous transactions in exchanging illicit goods and services. T... [more] |
ICSS2023-72 pp.25-32 |
ICSS, IPSJ-SPT |
2024-03-21 15:20 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Investigating the functionalities of IoT malware to disrupt the activities of other intruders Shun Ikeda, Hiroki Yasui, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-76 |
[more] |
ICSS2023-76 pp.51-56 |
ICSS, IPSJ-SPT |
2024-03-21 15:45 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Enhanced Analysis of IoT Botnet Activity by Fusing Honeypots, Malware Dynamic Analysis, and C&C Observation Yuki Endo, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-77 |
[more] |
ICSS2023-77 pp.57-62 |
ICSS, IPSJ-SPT |
2024-03-22 10:10 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Study of keyword-based search method for IoT devices deployed at important facilities Mami Kawaguchi, Takayuki Sasaki, Kihara Momoka, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-86 |
IoT devices are increasingly deployed in various systems, including remote monitoring systems.Some of these IoT devices ... [more] |
ICSS2023-86 pp.123-128 |
ICSS, IPSJ-SPT |
2024-03-22 11:45 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Impact of ChatGPT Assisted Polymorphic Malware on Antivirus Detection Huang Zhewei, Yinn Minn Pa pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-89 |
With the rapid implementation of large-scale language models (LLMs), there are concerns about their misuse in cyberattac... [more] |
ICSS2023-89 pp.145-152 |
AP |
2024-03-14 15:15 |
Fukui |
UNIVERSITY OF FUKUI (Primary: On-site, Secondary: Online) |
[Invited Talk (Young Researcher)]
Study of non-contact PIM measurement systems for balanced transmission lines with electrically equivalent characteristics to microstrip lines Ryunosuke Murofushi (Yokohama Natl. Univ./Polytechnic Univ.), Nobuhiro Kuga (Yokohama Natl. Univ.), Eiji Hanayama (Polytechnic Univ.) AP2023-209 |
In many communication systems, passive intermoduration (PIM) is known as one of noises. The termination method standardi... [more] |
AP2023-209 pp.45-50 |
RCC, ISEC, IT, WBS |
2024-03-13 11:35 |
Osaka |
Osaka Univ. (Suita Campus) |
Proxy Re-Authentication Capable of Key and Data Compression Yoshiro Matsuoka, Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65 |
In this paper, we propose a new cryptographic protocol called proxy re-authentication capable of key and data compressio... [more] |
IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65 pp.52-59 |
RCC, ISEC, IT, WBS |
2024-03-13 14:15 |
Osaka |
Osaka Univ. (Suita Campus) |
Proxy Re-encryption based on LPN Haruki Fujimoto, Shingo Sato, Junji Shikata (YNU) IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70 |
We propose a proxy re-encryption (PRE) scheme based on the Learning Parity with Noise (LPN) problem using error-correcti... [more] |
IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70 pp.79-86 |
RCC, ISEC, IT, WBS |
2024-03-13 16:35 |
Osaka |
Osaka Univ. (Suita Campus) |
A Study on Polar Codes Design with Robustness against Channel SNR Fluctuation Hidetake Matsui, Hideki Ochiai (YNU) IT2023-102 ISEC2023-101 WBS2023-90 RCC2023-84 |
Polar codes are known to achieve high reliability with low decoding complexity. The design of polar codes requires the s... [more] |
IT2023-102 ISEC2023-101 WBS2023-90 RCC2023-84 pp.179-184 |
RCC, ISEC, IT, WBS |
2024-03-14 09:30 |
Osaka |
Osaka Univ. (Suita Campus) |
Security Analysis of Backdoored Classic McEliece in a Multi-User Setting Dai Miura, Hyungrok Jo, Shingo Sato, Junji Shikata (Yokohama National Univ.) IT2023-105 ISEC2023-104 WBS2023-93 RCC2023-87 |
Several attacks have been proposed for the Classic McEliece cryptosystem, which is one of the 4th round candidates of th... [more] |
IT2023-105 ISEC2023-104 WBS2023-93 RCC2023-87 pp.197-204 |
RCC, ISEC, IT, WBS |
2024-03-14 14:40 |
Osaka |
Osaka Univ. (Suita Campus) |
Performance Evaluation of OFDM Systems with Clipping and Partial Filtering Wataru Hatano, Hideki Ochiai (YNU) IT2023-123 ISEC2023-122 WBS2023-111 RCC2023-105 |
[more] |
IT2023-123 ISEC2023-122 WBS2023-111 RCC2023-105 pp.300-305 |
RCC, ISEC, IT, WBS |
2024-03-14 15:05 |
Osaka |
Osaka Univ. (Suita Campus) |
Secrity Oriented Design of Polar-Coded OFDM on Selective Fading Channels Yuki Kuraya, Hideki Ochiai (YNU) IT2023-124 ISEC2023-123 WBS2023-112 RCC2023-106 |
We introduce a physical layer security scheme based on a polar-coded OFDM system in wireless communication. Our approach... [more] |
IT2023-124 ISEC2023-123 WBS2023-112 RCC2023-106 pp.306-311 |