Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Efficient Replay Data Selection in Continual Federated Learning Model Yuto Kitano (Kobe Univ), Lihua Wang (NICT), Seiichi Ozawa (Kobe Univ) IT2023-96 ISEC2023-95 WBS2023-84 RCC2023-78 |
In this study, we propose a continual federated learning that can continuously learn distributed data generated daily by... [more] |
IT2023-96 ISEC2023-95 WBS2023-84 RCC2023-78 pp.135-141 |
MBE, NC (Joint) |
2020-12-18 16:40 |
Online |
Online |
A Consideration on Efficient Visual Search from the Perspective of Complex Networks Yoshinobu Maeda (Niigata Univ.), Makoto Ozawa, Taishin Nomura (Osaka Univ.), Akira Tsukada (NIT Toyama) MBE2020-23 |
Visual search is an operation so as to find visually a target symbol in many alternatives. It is efficient in the sense... [more] |
MBE2020-23 pp.18-23 |
NC, MBE (Joint) |
2020-03-06 09:55 |
Tokyo |
University of Electro Communications (Cancelled but technical report was issued) |
An intermittent control model during fixational eye movements Makoto Ozawa, Taishin Nomura (Osaka Univ.) MBE2019-93 |
Fixational eye movements consist of two components: drift-tremor (DRT) and microsaccades (MS). In this study, we explore... [more] |
MBE2019-93 p.69 |
MBE |
2019-05-19 13:10 |
Niigata |
Niigata University |
Classification of gaze steps during visual search into fixations and saccades Mizuki Matsui, Masayuki Tsuno (Niigata Univ), Makoto Ozawa, Taishin Nomura (Osaka Univ), Akira Tsukada (NIT, Toyama College), Yoshinobu Maeda (Niigata Univ) MBE2019-7 |
We often search for a specific target from a lot of visual alternative information. According to Hick's law, the search ... [more] |
MBE2019-7 pp.33-38 |
IT, ISEC, WBS |
2019-03-07 09:55 |
Tokyo |
University of Electro-Communications |
Exploring Malicious URL in Dark Web Using Tor Crawler Yuki Kawaguchi, Seiichi Ozawa (Kobe Univ.) IT2018-76 ISEC2018-82 WBS2018-77 |
In recent years, various web-based attacks such as Drive-by-Download attacks are becoming serious. To protect legitimate... [more] |
IT2018-76 ISEC2018-82 WBS2018-77 pp.7-12 |
CAS, ICTSSL |
2019-01-24 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Classification of fixation and saccade in visual search Mizuki Matsui, Masayuki Tsuno, Ryunosuke Kodera (Niigata Univ), Makoto Ozawa, Taishin Nomura (Osaka Univ), Akira Tsukada (NIT, Toyama college), Yoshinobu Maeda (Niigata Univ) CAS2018-125 ICTSSL2018-44 |
We often search for specific targets from a lot of visual information. According to Hick's law, the search time is logar... [more] |
CAS2018-125 ICTSSL2018-44 pp.45-48 |
CAS, NLP |
2018-10-18 11:25 |
Miyagi |
Tohoku Univ. |
A Modeling on Eye Movements in Visual Search Yoshinobu Maeda, Ryunosuke Kodera, Masayuki Tsuno (Niigata Univ.), Makoto Ozawa, Taishin Nomura (Osaka Univ.), Akira Tsukada (NIT Toyama College) CAS2018-40 NLP2018-75 |
According to Hick’s law, the time to find a target symbol from many alternatives is relatively short, i.e., it is not pr... [more] |
CAS2018-40 NLP2018-75 pp.19-24 |
MBE, NC (Joint) |
2018-05-19 16:50 |
Toyama |
Univ. of Toyama |
Consideration on Frequency Distribution of Eye Movement in Visual Search Ryunosuke Kodera (Niigata Univ.), Makoto Ozawa, Taishin Nomura (Osaka Univ.), Akira Tsukada (NIT,Toyama College), Yoshinobu Maeda (Niigata Univ.) MBE2018-5 |
You can find a target symbol quickly with your eye movement. Why does the eye movement enable to do it? In the previous ... [more] |
MBE2018-5 pp.23-26 |
ICSS, IPSJ-SPT |
2016-03-03 12:40 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Malicious-Spam-Mail Detection System with Autonomous Learning Ability Shogo Osaka, Jun Kitazono, Seiichi Ozawa (Kobe Univ.), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit) ICSS2015-50 |
Recently, damages caused by spam mails that guide receivers to malicious
web pages become more and more serious. In thi... [more] |
ICSS2015-50 pp.19-24 |
ICSS, IPSJ-SPT |
2016-03-04 14:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
An Autonomous DDoS Backscatter Detection System from Darknet Traffic Yuki Ukawa, Jun Kitazono, Seiichi Ozawa (Kobe Univ.), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit) ICSS2015-67 |
This paper proposes an autonomous DDoS backscatter detection system from UDP darknet traffic. To identify DDoS backscatt... [more] |
ICSS2015-67 pp.123-128 |
ICSS |
2014-11-28 10:20 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
Detecting Backscatter of DDoS Attacks from Darknet Traffic Nobuaki Furutani (Kobe Univ), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit), Jun Kitazono, Seiichi Ozawa (Kobe Univ) ICSS2014-59 |
In this work, we propose a method to quickly discriminate DDoS backscatter packets from those of other traffic observed ... [more] |
ICSS2014-59 pp.49-53 |
NC, IPSJ-BIO |
2012-06-28 09:20 |
Okinawa |
OIST, Okinawa |
Fast Incremental Principal Component Analysis and Its Application to Face Image Recognition Daijiro Aoki, Seiichi Ozawa (Kobe Univ.) NC2012-1 |
In the conventional Incremental Principal Component Analysis (IPCA), an eigenvalue problem has to be solved whenever one... [more] |
NC2012-1 pp.1-6 |
NC |
2011-07-25 15:40 |
Hyogo |
Graduate School of Engineering, Kobe University |
An Incremental Learning Algorithm of Kernel Principal Component Analysis for Chunk Data Takaomi Tokumoto, Seiichi Ozawa (Kobe Univ) NC2011-29 |
In this paper, a new algorithm for Kernel Principal Component Analysis (KPCA) is proposed.
We extended Takeuchi et al's... [more] |
NC2011-29 pp.49-54 |