IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 27  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
CAS, CS 2024-03-15
14:20
Okinawa   Recoloring aware Countermeasure against Adversarial Examples
Chisei Ishida, Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2023-134 CS2023-127
Adversarial Examples(AEs) which cause artificial intelligence (AI) to make a false prediction by embedded slight perturb... [more] CAS2023-134 CS2023-127
pp.128-133
VLD, HWS, ICD 2024-03-01
12:05
Okinawa
(Primary: On-site, Secondary: Online)
Security Evaluation of Fault Analysis for SuperSonic
Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2023-126 HWS2023-86 ICD2023-115
SuperSonic, a low-latency lightweight block cipher, is suitable for securing edge devices with high real-time performanc... [more] VLD2023-126 HWS2023-86 ICD2023-115
pp.141-144
VLD, HWS, ICD 2024-03-02
09:20
Okinawa
(Primary: On-site, Secondary: Online)
Countermeasure on AI Hardware against Adversarial Examples
Kosuke Hamaguchi, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2023-134 HWS2023-94 ICD2023-123
The demand for edge AI, in which artificial intelligence (AI) is directly embedded in devices, is increasing, and the se... [more] VLD2023-134 HWS2023-94 ICD2023-123
pp.184-189
ITS, IE, ITE-MMS, ITE-ME, ITE-AIT [detail] 2024-02-19
10:45
Hokkaido Hokkaido Univ. Brightness Adjustment based Countermeasure against Adversarial Examples
Takumi Tojo, Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ITS2023-47 IE2023-36
Recently, image classification using deep learning AI has been used for in-vehicle AI, and its accuracy and response spe... [more] ITS2023-47 IE2023-36
pp.7-12
ICM, NS, CQ, NV
(Joint)
2023-11-21
13:15
Ehime Ehime Prefecture Gender Equality Center
(Primary: On-site, Secondary: Online)
[Encouragement Talk] Security Evaluation of Low-latency Cipher based on Improved Simon against Deep Learning Analysis using Profiled Power Consumption
Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NS2023-114
Society 5.0 aims to solve problems in social systems through the intercommunication of small devices. On the other hand,... [more] NS2023-114
pp.20-25
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2023-11-16
13:20
Kumamoto Civic Auditorium Sears Home Yume Hall
(Primary: On-site, Secondary: Online)
Tamper Resistance Evaluation on FPGA for Low-Latency Cipher Sonic
Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52
Industry 5.0 promotes smart factories for system optimization by utilizing IoT and AI in the industrial field. The smart... [more] VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52
pp.101-105
AI 2023-09-12
15:35
Hokkaido   Variational Autoencoder Oriented Protection for Intellectual Property
Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) AI2023-31
In recent years, generative AI, which generates images based on instructions in natural language, has developed rapidly ... [more] AI2023-31
pp.180-186
ICSS, IPSJ-SPT 2023-03-13
13:30
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Basic Study on IoT Security Using Robot Arm
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ICSS2022-51
The introduction of IoT devices in industrial systems is becoming increasingly active in order to realise Industry 4.0. ... [more] ICSS2022-51
pp.19-24
IE, ITS, ITE-MMS, ITE-ME, ITE-AIT [detail] 2023-02-22
10:15
Hokkaido Hokkaido Univ. Generation Method of Targeted Adversarial Examples using Gradient Information for the Target Class of the Image
Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ITS2022-61 IE2022-78
With the advancement of AI technology, the vulnerability of AI system is pointed out. The adversarial examples (AE), whi... [more] ITS2022-61 IE2022-78
pp.107-111
NS, ICM, CQ, NV
(Joint)
2022-11-24
11:10
Fukuoka Humanities and Social Sciences Center, Fukuoka Univ. + Online
(Primary: On-site, Secondary: Online)
Deep Learning Side-Channel Attack in Noise Based Countermeasure Simon
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NS2022-103
The IoT requires the implementation of cryptographic techniques to ensure the confidentiality, integrity, and availabili... [more] NS2022-103
pp.19-22
SIP 2022-08-26
14:26
Okinawa Nobumoto Ohama Memorial Hall (Ishigaki Island)
(Primary: On-site, Secondary: Online)
Generation method of Adversarial Examples using XAI
Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) SIP2022-72
With the advancement of AI technology, AI can be applied to various fields. Therefore the accountability for the decisio... [more] SIP2022-72
pp.115-120
ICD, SDM, ITE-IST [detail] 2022-08-08
15:45
Online   Evaluation of Low-Latency Cryptography MANTIS based Low-Power oriented Tamper-Resistant Circuit
Kosuke Hamaguchi, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) SDM2022-41 ICD2022-9
Lightweight cryptography can not only be implemented in a small area, but also with low latency and low power consumptio... [more] SDM2022-41 ICD2022-9
pp.31-36
IN, CCS
(Joint)
2022-08-05
15:00
Hokkaido Hokkaido University(Centennial Hall)
(Primary: On-site, Secondary: Online)
Countermeasure of In-vehicle System using Authenticated Encryption against DoS Attacks
Daichi Hirose, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) IN2022-22
In-vehicle systems adopt Controller Area Network (CAN) which is the standard communication protocol. Many kinds of data ... [more] IN2022-22
pp.39-44
SS, IPSJ-SE, KBSE [detail] 2022-07-28
16:30
Hokkaido Hokkaido-Jichiro-Kaikan (Sapporo)
(Primary: On-site, Secondary: Online)
Deep Learning Power Analysis Against Protected PRINCE
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) SS2022-4 KBSE2022-14
In recent years, with the development of deep learning, AI has been incorporated in the field of cyber security. On the ... [more] SS2022-4 KBSE2022-14
pp.19-24
AI 2022-07-04
10:40
Hokkaido
(Primary: On-site, Secondary: Online)
Deep Learning Side-Channel Attacks for Rolled Architecture of PRINCE and Midori128
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) AI2022-3
With the recent expansion of small autonomous mobile robots such as drones, cyber security for small devices is very imp... [more] AI2022-3
pp.13-18
CNR 2022-07-01
14:30
Okinawa
(Primary: On-site, Secondary: Online)
Evaluation of SROS2 Using the Tweakable Block Cipher
Shu Takemoto, Kosuke Hamaguchi, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CNR2022-7
In recent years, autonomous mobile robots have been utilized in a wide range of fields, including industrial fields, req... [more] CNR2022-7
pp.29-34
VLD, HWS [detail] 2022-03-08
11:00
Online Online Evaluation of a Lightweight Cryptographic Finalist on SROS2
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2021-94 HWS2021-71
In cyber-physical systems, small devices are connected to the network to enable the analysis of sensor values. Also, sin... [more] VLD2021-94 HWS2021-71
pp.99-104
VLD, HWS [detail] 2022-03-08
13:00
Online Online Implementation Evaluation of Glitch PUF Using a Low-Latency Cryptography MANTIS
Kosuke Hamaguchi, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2021-96 HWS2021-73
This paper proposes a low-latency cipher MANTIS based PUF which uses signal glitch during encryption. The security level... [more] VLD2021-96 HWS2021-73
pp.111-116
CAS, CS 2022-03-04
13:45
Online Online Evaluation of Trojan Detector for AI Hardware
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2021-94 CS2021-96
In recent years, AI edge computing has been expanding to realize real-time inference by implementing AI models on edge d... [more] CAS2021-94 CS2021-96
pp.106-111
CAS, CS 2022-03-04
14:10
Online Online Secure In-vehicle System using Authenticated Encryption Midori-OTR and its Implementation Evaluation
Daichi Hirose, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2021-95 CS2021-97
In recent years, many electronic control units called ECUs have been installed in automobiles to perform various functio... [more] CAS2021-95 CS2021-97
pp.112-117
 Results 1 - 20 of 27  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan