IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 13 of 13  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IBISML 2022-12-23
13:00
Kyoto Kyoto University
(Primary: On-site, Secondary: Online)
Initial evaluation of node embedding using quantum walk
Rei Sato, Shuichiro Haruta, Kazuhiro Saito, Mori Kurokawa (KDDI Research, Inc.) IBISML2022-57
DeepWalk is one of the node-embedding methods which represents node features using sequences obtained from a random walk... [more] IBISML2022-57
pp.101-105
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2021-07-19
10:30
Online Online A Website Fingerprinting Attack Based on the Virtual Memory of the Process on Android Devices
Tatsuya Okazaki, Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.) ISEC2021-13 SITE2021-7 BioX2021-14 HWS2021-13 ICSS2021-18 EMM2021-18
 [more] ISEC2021-13 SITE2021-7 BioX2021-14 HWS2021-13 ICSS2021-18 EMM2021-18
pp.20-27
CS 2019-07-04
09:00
Kagoshima Amami City Social Welfare Center Trust-based Verification Attack Prevention Scheme using Tendency of Contents Request on NDN
Hironori Nakano, Hiroya Kato, Shuichiro Haruta, Masashi Yoshida, Iwao Sasase (Keio Univ.) CS2019-13
In this paper, we propose a trust-based verification attack prevention scheme using tendency of contents request on NDN.... [more] CS2019-13
pp.1-6
CS 2019-07-04
09:00
Kagoshima Amami City Social Welfare Center A Novel Visual Similarity-based Phishing Detection Methodology Using Hue Information with Auto Updating Database
Shuichiro Haruta, Fumitaka Yamazaki, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2019-14
In this paper, we propose a novel visual similarity-based phishing detection methodology using hue information with aut... [more] CS2019-14
pp.7-12
CS 2019-07-04
09:00
Kagoshima Amami City Social Welfare Center Android Malware Detection Scheme Based on Level of SSL Server Certificate
Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.) CS2019-15
In this paper, in order to detect Android malwares which encrypt packets, we propose an Android malware detection scheme... [more] CS2019-15
pp.13-18
CS 2019-07-04
09:00
Kagoshima Amami City Social Welfare Center Traffic Feature-based Botnet Detection Scheme Emphasizing the Importance of Long Patterns
Yichen An, Shuichiro Haruta, Sanghun Choi, Iwao Sasase (Keio Univ.) CS2019-18
The botnet detection is imperative. Among several detection schemes, the promising one uses the communication sequences.... [more] CS2019-18
pp.31-35
CS 2018-11-02
10:10
Ehime The Shiki Museum Feature Selection Scheme for Android ICC-related Features Based on the Gap of the Appearance Ratio
Kyohei Osuge, Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.) CS2018-65
Android malwares are rapidly becoming a potential threat to users. Among several Android malware detection schemes, the ... [more] CS2018-65
pp.57-62
CS 2018-11-02
10:30
Ehime The Shiki Museum False Density Information Attack Detection Scheme Using Overlap of Communication Range in VANET
Masashi Yoshida, Hiromu Asahina, Shuichiro Haruta, Iwao Sasase (Keio Univ) CS2018-66
In Vehicular Ad Hoc Network (VANET), it is important to detect false information. The previously published scheme detect... [more] CS2018-66
pp.63-66
CS 2017-11-16
10:50
Kumamoto Aso Plaza Hotel Traceroute-based Target Link Flooding Attack Detection Scheme by Analyzing Hop Count to the Destination
Kei Sakuma, Hiromu Asahina, Shuichiro Haruta, Iwao Sasase (Keio Univ.) CS2017-56
 [more] CS2017-56
pp.9-14
CS 2017-07-27
09:36
Nagasaki Fukue Bunka Kaikan Low Cost Dummy Generation using Non-Trusted LBS
Sanghun Choi, Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2017-14
Although LBS(Location Based Service) is quite convenient and usually used these days, The location privacy of the user i... [more] CS2017-14
pp.7-12
CS 2017-07-27
09:39
Nagasaki Fukue Bunka Kaikan Obfuscated Malicious JavaScript Detection Scheme Using the Feature Based on Divided URL
Shoya Morishige, Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2017-15
Recently, obfuscated malicious JavaScript codes which divide URL into segments to evade the pattern matching of anti-vir... [more] CS2017-15
pp.13-18
ICSS, IPSJ-SPT 2017-03-13
16:40
Nagasaki University of Nagasaki Malicious PDF Detection Scheme using Keywords Feature based on Fuzzy inference
Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.) ICSS2016-54
Detecting malicious PDFs (Portable Document Format) is imperative. In several malicious PDF detection schemes, the schem... [more] ICSS2016-54
pp.85-90
ICSS, IPSJ-SPT 2017-03-14
09:30
Nagasaki University of Nagasaki Visual Similarity-based Phishing Websites Detection Scheme using Image and CSS with Target Website Finder
Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ) ICSS2016-58
Recently, detecting phishing websites and identifying their target are imperative. In several phishing detection schemes... [more] ICSS2016-58
pp.111-116
 Results 1 - 13 of 13  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan