IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 9 of 9  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
PRMU, IBISML, IPSJ-CVIM 2024-03-04
09:12
Hiroshima Hiroshima Univ. Higashi-Hiroshima campus
(Primary: On-site, Secondary: Online)
Creating Adversarial Examples to Deceive Both Humans and Machine Learning Models
Ko Fujimori (Waseda Univ.), Toshiki Shibahara (NTT), Daiki Chiba (NTT Security), Mitsuaki Akiyama (NTT), Masato Uchida (Waseda Univ.) PRMU2023-65
One of the vulnerability attacks against neural networks is the generation of Adversarial Examples (AE), which induce mi... [more] PRMU2023-65
pp.82-87
ICSS, IPSJ-SPT 2021-03-01
10:00
Online Online Understanding the Adoption and Operation of DNS Cookie: Current State and Future Prospects
Masanori Yajima (Waseda Univ.), Daiki Chiba (NTT), Yoshiro Yoneya (JPRS), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-28
DNS cache poisoning attacks have received increasing attention these days.
As a countermeasure against such attacks, DN... [more]
ICSS2020-28
pp.13-18
ICSS, IPSJ-SPT 2019-03-07
16:15
Okinawa NICT Okinawa Electromagnetic Technology Center Analyzing Deceptive Internationalized Domain Names
Daiki Chiba, Ayako Akiyama Hasegawa, Takashi Koide (NTT), Yuta Sawabe, Shigeki Goto (Waseda Univ.), Mitsuaki Akiyama (NTT) ICSS2018-76
Internationalized domain names (IDNs) are abused to create domain names visually similar to those of legitimate brands. ... [more] ICSS2018-76
pp.47-52
ICSS, IPSJ-SPT 2018-03-08
09:45
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Automatically Collecting User-initiated Web-based Attacks
Takashi Koide, Daiki Chiba, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT) ICSS2017-66
Recently, web content uses social engineering techniques to lure victims into clicking on them, originating malware down... [more] ICSS2017-66
pp.91-96
ICSS, IPSJ-SPT 2018-03-08
10:10
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center An Empirical Analysis of Online Advertising Fraud by analyzing User Activities Observed in the Ad Network
Fumihiro Kanei, Daiki Chiba, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT) ICSS2017-67
With the growth of online advertising market, it has become the target of abuse, such as ad fraud by adware and bots. To... [more] ICSS2017-67
pp.97-102
ICSS, IA 2016-06-07
09:55
Saga Saga University Report on the 2016 Network and Distributed System Security Symposium
Shinichi Matsumoto (ISIT), Daiki Chiba (NTT), Kuniyasu Suzaki (AIST), Mirang Park (Kanagawa Institute of Technology) IA2016-8 ICSS2016-8
 [more] IA2016-8 ICSS2016-8
pp.39-44
ICSS, IPSJ-SPT 2016-03-03
15:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University Detection of Vulnerability Scanning Using Features of Collective Accesses Collected from Several Honeypots
Naomi Kuze, Shu Ishikura (Osaka Univ.), Takeshi Yagi, Daiki Chiba (NTT), Masayuki Murata (Osaka Univ.) ICSS2015-55
Attacks against websites are increasing rapidly with the expansion of web services. Diversifying web services make it di... [more] ICSS2015-55
pp.47-52
IA, ICSS 2015-06-12
10:50
Fukuoka Kyushu Institute of Technology Univ. Detecting Malicious Domain Names based on the Time-series Analysis of Attackers Network Resources
Daiki Chiba (NTT/Waseda Univ.), Takeshi Yagi, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.), Takeshi Yada, Takeo Hariu (NTT), Shigeki Goto (Waseda Univ.) IA2015-10 ICSS2015-10
Attackers launching cyber attacks frequently change their malicious websites to evade countermeasures such as blacklisti... [more] IA2015-10 ICSS2015-10
pp.51-56
ICSS, IPSJ-SPT 2014-03-28
14:20
Okinawa Meio Univiersity Design of HTTP Communication Profiling for Infected Hosts Detection
Daiki Chiba, Kensuke Nakata, Mitsuaki Akiyama, Kazufumi Aoki, Kazunori Kamiya, Takeshi Yagi (NTT) ICSS2013-84
Countermeasures against malware should need both prevention and detection of malware infection. Detection of malware-inf... [more] ICSS2013-84
pp.155-160
 Results 1 - 9 of 9  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan