Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ITE-ME, ITE-IST, BioX, SIP, MI, IE [detail] |
2024-06-07 10:30 |
Niigata |
Nigata University (Ekinan-Campus "TOKIMATE") |
Innovations in Security Mechanisms through Decomposition and Reuse of Body Functions: A Preliminary Study on Password Authentication Takumi Takaiwa, Seiya Kajihara, Tsubasa Shibata, Soichi Takigawa, Tetsushi Ohki, Masakatsu Nishigaki (Shizuoka Univ.) |
[more] |
|
BioX |
2023-10-12 16:55 |
Okinawa |
Nobumoto Ohama Memorial Hall |
Detecting Human Psychological Consistency: Study on Attack Detection Against Advanced Persistent Social Engineering Kota Numada, Shinnosuke Nozaki, Takumi Takaiwa, Tetsushi Ohki, Masakatsu Nishigaki (Shizuoka univ.) BioX2023-63 |
(To be available after the conference date) [more] |
BioX2023-63 pp.26-31 |
BioX |
2023-10-12 17:15 |
Okinawa |
Nobumoto Ohama Memorial Hall |
A Study of Multibiometrics Considering Properties of Biometric Traits Taito Tonosaki, Koichi Ito, Takafumi Aoki (Tohoku Univ.), Tetsushi Ohki, Masakatsu Nishigaki (Shizuoka Univ.) BioX2023-64 |
The performance of biometric authentication can be improved by combining multiple biometric traits, which is known as mu... [more] |
BioX2023-64 pp.32-36 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 09:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Automatic Credential Entry EMS: EMS System that reproduces Secret Information without exposing biometric data Takumi Takaiwa, Nozaki Shinnosuke, Numada Kota, Shibata Tsubasa, Okumura Sana, Takigawa Soichi, Ohki Tetsushi, Nishigaki Masakatsu (Shizuoka Univ.) ISEC2023-37 SITE2023-31 BioX2023-40 HWS2023-37 ICSS2023-34 EMM2023-37 |
(To be available after the conference date) [more] |
ISEC2023-37 SITE2023-31 BioX2023-40 HWS2023-37 ICSS2023-34 EMM2023-37 pp.152-158 |
SC |
2022-05-27 09:55 |
Online |
Online |
Considerations for Identifying Machine Learning Models Naoto Kiribuchi, Ryohei Suzuki, Nami Ashizawa (NTT), Tetsushi Ohki, Hiroshi Mineno, Masakatsu Nishigaki (Shizuoka Univ.) SC2022-2 |
As a part of considerations for identifying machine learning models, we experimented whether we can identify multiple di... [more] |
SC2022-2 pp.7-12 |
IT, ISEC, RCC, WBS |
2022-03-10 11:35 |
Online |
Online |
Improving accuracy by optimizing activation function for convolutional neural network using homomorphic encryption Kohei Yagyu, Ren Takeuchi, Vo Ngoc Khoi Nguyen, Masakatsu Nishigaki, Tetsushi Ohki (Shizuoka Univ.) IT2021-92 ISEC2021-57 WBS2021-60 RCC2021-67 |
The development of secure neural network technology that performs prediction while encrypting data using homomorphic enc... [more] |
IT2021-92 ISEC2021-57 WBS2021-60 RCC2021-67 pp.58-65 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-20 10:55 |
Online |
Online |
A Study of Black-box Adversarial Attack for Face Recognition Systems Vo Ngoc Khoi Nguyen, Takamichi Terada, Masakatsu Nishigaki, Tetsushi Ohki (Shizuoka Univ.) ISEC2021-22 SITE2021-16 BioX2021-23 HWS2021-22 ICSS2021-27 EMM2021-27 |
[more] |
ISEC2021-22 SITE2021-16 BioX2021-23 HWS2021-22 ICSS2021-27 EMM2021-27 pp.74-79 |
ICSS, IPSJ-SPT |
2021-03-02 11:30 |
Online |
Online |
Detecting unknown malware families by anomaly detection using deep learning Ren Takeuchi, Shintaro Mizuno, Vo Ngoc Khoi Nguyen, Jun Tsuchiya, Masakatsu Nishigaki, Tetsushi Ohki (Shizuoka Univ.) ICSS2020-59 |
The analysis of malware has become an indispensable process for anti-malware. Malware is diversifying day by day, so tha... [more] |
ICSS2020-59 pp.195-200 |
HWS |
2020-04-07 11:15 |
Online |
Online |
IoTPoCoFuzz: Power Consumption aware Fuzzing against IoT device Shintaro Mizuno, Masakatsu Nishigaki, Tetsushi Ohki (Shizuoka Univ.) HWS2020-4 |
In many cases, IoT devices have limitations on input and program activation, and that makes it difficult for external te... [more] |
HWS2020-4 pp.19-24 |
PRMU, BioX |
2019-03-17 10:30 |
Tokyo |
|
A Study on Human Reflex Based Biometric Authentication Using Eye-Head Coordination (part 3) Yosuke Takahashi, Masashi Endo, Hiroaki Matsuno, Hiroaki Muramatsu, Tetsushi Ohki, Masakatsu Nishigaki (Shizuoka Univ.) BioX2018-35 PRMU2018-139 |
Biometric information could be easily leaked and/or copied. Therefore, biometric authentication in which biometric infor... [more] |
BioX2018-35 PRMU2018-139 pp.37-42 |
ICSS, IPSJ-SPT |
2019-03-08 14:25 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
ICSS2018-91 |
(To be available after the conference date) [more] |
ICSS2018-91 pp.191-196 |
CQ, ICM, NS, NV (Joint) |
2018-11-16 16:50 |
Ishikawa |
|
Function comparison with Private LoRa MAC protocol of field server system for field management and IEEE804.15.4e Kaito Hayashi (ICT), Yumeto Kojima (KIT), Mikiko Sode (ICT), Koichi Tanaka, Masakatsu Nishigaki (Shizuoka Univ.), Tadanori Mizuno (AIT) NS2018-155 |
[more] |
NS2018-155 pp.149-154 |
PRMU, BioX |
2018-03-18 13:55 |
Tokyo |
|
A Study on Human Reflex Based Biometric Authentication Using Eye-Head Coordination (part 2) Yosuke Takahashi, Masashi Endo, Hiroaki Matsuno, Hiroaki Muramatsu, Tetsushi Ohki, Masakatsu Nishigaki (Shizuoka Univ.) BioX2017-44 PRMU2017-180 |
Biometric information could be easily leaked and/or copied. Therefore, biometric authentication in which biometric infor... [more] |
BioX2017-44 PRMU2017-180 pp.49-54 |
PRMU, BioX |
2018-03-19 10:00 |
Tokyo |
|
Disposable Biometric Authentication
-- Micro Biometric Authentication Using Fingernail Textures -- Genki Sugimoto, Masahiro Fujita, Yuto Mano, Tetsushi Ohki, Masakatsu Nishigaki (Shizuoka Univ.) BioX2017-57 PRMU2017-193 |
Recently, biometric authentication has been applied to not only important services such as in emigration/immigration ins... [more] |
BioX2017-57 PRMU2017-193 pp.127-132 |
BioX, ITE-ME, ITE-IST |
2017-05-23 10:30 |
Ishikawa |
|
A Study on Human Reflex Based Biometric Authentication Using Eye-Head Coordination Yosuke Takahashi, Masashi Endo, Hiroaki Matsuno, Hiroaki Muramatsu, Masakatsu Nishigaki (Shizuoka Univ.) BioX2017-8 |
Biometric information could be easily leaked and/or copied. Therefore, biometric authentication in which biometric infor... [more] |
BioX2017-8 pp.61-65 |
PRMU, BioX |
2017-03-20 15:45 |
Aichi |
|
A Proposal of Differential Biometric Authentication to Absorb Biometric Fluctuations: Preliminary Discussion Hiroaki Muramatsu, Masatsugu Niwayama, Masakatsu Nishigaki (Shizuoka Univ.) BioX2016-47 PRMU2016-210 |
To improve the accuracy of the dynamic biometric authentication, it is desirable to be able to absorb the fluctuation of... [more] |
BioX2016-47 PRMU2016-210 pp.87-91 |
PRMU, BioX |
2017-03-20 16:10 |
Aichi |
|
A Proposal of Micro Biometric Authentication using Nail Texture Genki Sugimoto, Masahiro Fujita, Yuto Mano, Hiroaki Muramatsu, Masakatsu Nishigaki (Shizuoka Univ.) BioX2016-48 PRMU2016-211 |
Micro biometric authentication is an authentication mechanism which applies minute patterns of a user’s body parts into ... [more] |
BioX2016-48 PRMU2016-211 pp.93-97 |
ICSS, IPSJ-SPT |
2017-03-13 16:15 |
Nagasaki |
University of Nagasaki |
A Study on Parameter Adjustment of Whitelist Detection Rule Takeshi Ueda (Mitsubishi Electric Corp.), Kobayashi Nobuhiro (Mitsubishi Electric Corp./ Shizuoka Univ.), Masakatsu Nishigaki (Shizuoka Univ) ICSS2016-56 |
Recently, the whitelist detection rule has been used as security measures for various system such control systems.
Only... [more] |
ICSS2016-56 pp.97-102 |
ICSS, IPSJ-SPT |
2017-03-14 12:45 |
Nagasaki |
University of Nagasaki |
A Study of Security Evaluation for Composite Systems Kobayashi Nobuhiro (Mitsubishi Electric Corp./ Shizuoka Univ.), Takeshi Ueda (Mitsubishi Electric Corp.), Masakatsu Nishigaki (Shizuoka Univ.) ICSS2016-70 |
(To be available after the conference date) [more] |
ICSS2016-70 pp.183-187 |
MBE, BioX, NC |
2016-10-22 17:20 |
Osaka |
Osaka Electro-Communication University |
Report on long-term experiment of micro biometric authentication using human skin texture Masahiro Fujita, Yuto Mano, Hiroaki Muramatsu (Shizuoka Univ.), Kenta Takahashi (Hitachi), Masakatsu Nishigaki (Shizuoka Univ.) BioX2016-31 MBE2016-45 NC2016-30 |
[more] |
BioX2016-31 MBE2016-45 NC2016-30 pp.77-82 |