IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 109  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCS, SR, SRW
(Joint)
2022-03-04
13:00
Online Online [Special Invited Talk] Enjoyment of research and education What is true information and communication? -- Looking back on 36 years of teaching life at university --
Iwao Sasase (Keio Univ.) RCS2021-287 SR2021-117 SRW2021-88
It is required to challenge the dream of information and communication and the prosperous future society realized by it,... [more] RCS2021-287 SR2021-117 SRW2021-88
pp.171-176(RCS), pp.133-138(SR), pp.84-89(SRW)
MIKA
(3rd)
2021-10-27
11:00
Okinawa
(Primary: On-site, Secondary: Online)
[Special Invited Talk] Efforts for Research and Educational Activities toward New Normal
Iwao Sasase (Keio Univ.)
 [more]
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2021-07-19
10:30
Online Online A Website Fingerprinting Attack Based on the Virtual Memory of the Process on Android Devices
Tatsuya Okazaki, Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.) ISEC2021-13 SITE2021-7 BioX2021-14 HWS2021-13 ICSS2021-18 EMM2021-18
 [more] ISEC2021-13 SITE2021-7 BioX2021-14 HWS2021-13 ICSS2021-18 EMM2021-18
pp.20-27
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2021-07-19
10:55
Online Online Rogue Access Point Detection by Using ARP Failure under the MAC Address Duplication
Kosuke Igarashi, Hiroya Kato, Iwao Sasase (Keio Univ.) ISEC2021-14 SITE2021-8 BioX2021-15 HWS2021-14 ICSS2021-19 EMM2021-19
Detecting a Rogue Access Point (RAP) in Wi-Fi network is imperative. In this paper, we propose RAP detection by using Ad... [more] ISEC2021-14 SITE2021-8 BioX2021-15 HWS2021-14 ICSS2021-19 EMM2021-19
pp.28-34
CS 2019-07-04
09:00
Kagoshima Amami City Social Welfare Center Trust-based Verification Attack Prevention Scheme using Tendency of Contents Request on NDN
Hironori Nakano, Hiroya Kato, Shuichiro Haruta, Masashi Yoshida, Iwao Sasase (Keio Univ.) CS2019-13
In this paper, we propose a trust-based verification attack prevention scheme using tendency of contents request on NDN.... [more] CS2019-13
pp.1-6
CS 2019-07-04
09:00
Kagoshima Amami City Social Welfare Center A Novel Visual Similarity-based Phishing Detection Methodology Using Hue Information with Auto Updating Database
Shuichiro Haruta, Fumitaka Yamazaki, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2019-14
In this paper, we propose a novel visual similarity-based phishing detection methodology using hue information with aut... [more] CS2019-14
pp.7-12
CS 2019-07-04
09:00
Kagoshima Amami City Social Welfare Center Android Malware Detection Scheme Based on Level of SSL Server Certificate
Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.) CS2019-15
In this paper, in order to detect Android malwares which encrypt packets, we propose an Android malware detection scheme... [more] CS2019-15
pp.13-18
CS 2019-07-04
09:00
Kagoshima Amami City Social Welfare Center An Approximation Scheme for Better Visualization of Trajectory Mapping with BLE Beacons in Libraries
Ryusei Goto, Hiromu Asahina, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2019-16
To find out the bottleneck in the college library, it is necessary to estimate users' trajectory when searching books an... [more] CS2019-16
pp.19-24
CS 2019-07-04
09:00
Kagoshima Amami City Social Welfare Center Analyzing MAC address randomization for Wi-Fi signal based mobile device tracking
Yuki Furuya, Hiromu Asahina, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2019-17
Analyzing facility usage through Wi-Fi signals of users’ mobile devices has become controversial but
common. Although W... [more]
CS2019-17
pp.25-29
CS 2019-07-04
09:00
Kagoshima Amami City Social Welfare Center Traffic Feature-based Botnet Detection Scheme Emphasizing the Importance of Long Patterns
Yichen An, Shuichiro Haruta, Sanghun Choi, Iwao Sasase (Keio Univ.) CS2019-18
The botnet detection is imperative. Among several detection schemes, the promising one uses the communication sequences.... [more] CS2019-18
pp.31-35
CS 2018-11-01
09:50
Ehime The Shiki Museum A User Study in College Library Through Experiments on Searching Behavior
Kentaroh Toyoda, Yumiko Igarashi, Hoshika Imai, Iwao Sasase (Keio Univ.) CS2018-58
 [more] CS2018-58
pp.13-18
CS 2018-11-01
10:10
Ehime The Shiki Museum Duration of Stay Estimation Scheme for Academic Libraries using Wi-Fi Frame Data
Hiromu Asahina, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2018-59
 [more] CS2018-59
pp.19-24
CS 2018-11-02
10:10
Ehime The Shiki Museum Feature Selection Scheme for Android ICC-related Features Based on the Gap of the Appearance Ratio
Kyohei Osuge, Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.) CS2018-65
Android malwares are rapidly becoming a potential threat to users. Among several Android malware detection schemes, the ... [more] CS2018-65
pp.57-62
CS 2018-07-12
10:56
Okinawa Eef Information Plaza (Kumejima Is.) An Energy Efficient Target Specific Code Dissemination Scheme with RPL-based Forwarder Selection Algorithm
Hiromu Asahina, Kentaroh Toyoda, Iwao Sasase (Keio Univ.), P. Takis Mathiopoulos (UoA), Hisao Yamamoto (TCU) CS2018-23
In order to fix a bug or install a new application, disseminating a code to specific target sensors is an important mana... [more] CS2018-23
pp.61-66
CS 2017-11-16
10:50
Kumamoto Aso Plaza Hotel Traceroute-based Target Link Flooding Attack Detection Scheme by Analyzing Hop Count to the Destination
Kei Sakuma, Hiromu Asahina, Shuichiro Haruta, Iwao Sasase (Keio Univ.) CS2017-56
 [more] CS2017-56
pp.9-14
CS 2017-11-16
11:15
Kumamoto Aso Plaza Hotel Low Transmission Cost P2P Storage Scheme with Privacy Protection
Sanghun Choi, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2017-57
To safely store the user’s data without the central server, the P2P(Peer to Peer) storage methods have been studied. Eve... [more] CS2017-57
pp.15-20
CS 2017-07-27
09:36
Nagasaki Fukue Bunka Kaikan Low Cost Dummy Generation using Non-Trusted LBS
Sanghun Choi, Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2017-14
Although LBS(Location Based Service) is quite convenient and usually used these days, The location privacy of the user i... [more] CS2017-14
pp.7-12
CS 2017-07-27
09:39
Nagasaki Fukue Bunka Kaikan Obfuscated Malicious JavaScript Detection Scheme Using the Feature Based on Divided URL
Shoya Morishige, Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2017-15
Recently, obfuscated malicious JavaScript codes which divide URL into segments to evade the pattern matching of anti-vir... [more] CS2017-15
pp.13-18
CS 2017-07-27
09:42
Nagasaki Fukue Bunka Kaikan RFID-Based Deep Shopping Data Acquisition Scheme with Machine Learning using Read Count and Variance of Phase as Features
Shinichiro Aita, Hiromu Asahina, Kentaroh Toyada, Iwao Sasase (Keio Univ.) CS2017-16
 [more] CS2017-16
pp.19-24
CS 2017-07-27
09:48
Nagasaki Fukue Bunka Kaikan Code Dissemination based on RPL with Scope Selection and Code Acquisition in Wireless Sensor Networks
Hiromu Asahina, Iwao Sasase (Keio Univ.), Hisao Yamamoto (Tokyo City Univ.), P. Takis Mathiopoulos (UoA) CS2017-18
In this paper, we propose RPL based code dissemination with scope selection and code acquisition.
The scope selection ... [more]
CS2017-18
pp.29-34
 Results 1 - 20 of 109  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan