Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-22 12:35 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Open Secrets of GPTs Yusuke Kubo (NTT Communications), Tomoaki Tani (NTT Security), Ryusei Watanabe (N.F.Laboratories/Waseda Univ), Takuro Wakai, Yuto Toshikawa (Waseda Univ.), Tatsuya Mori (Waseda Univ. /NICT/ RIKEN) ICSS2023-91 |
OpenAI released a service called GPTs in November 2023. Creating GPTs with arbitrary functionalities is straightforward;... [more] |
ICSS2023-91 pp.160-165 |
SeMI, RCS, RCC, NS, SR (Joint) |
2023-07-12 11:15 |
Osaka |
Osaka University Nakanoshima Center + Online (Primary: On-site, Secondary: Online) |
HAPS Trajectory Optimization Based on Throughput Heat Map Tatsuya Mori, Tomoaki Ohtsuki (Keio Univ.) RCS2023-82 |
The High Altitude Platform Station (HAPS) is a platform that provides communication from the air to user equipment (UE) ... [more] |
RCS2023-82 pp.19-24 |
ICSS, IPSJ-SPT |
2023-03-13 12:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Developing a Hand Gesture Recognition System for VR Devices Mei Suzuki, Ryo Iijima, Kazuki Nomoto (Waseda Univ.), Tetsushi Ohki (Shizuoka Univ./AIP), Tatsuya Mori (Waseda Univ./NICT/AIP) ICSS2022-48 |
We develop a hand gesture recognition scheme using finger movements to recognize the VR user wearing a head-mounted disp... [more] |
ICSS2022-48 pp.1-6 |
ICSS, IPSJ-SPT |
2023-03-13 13:10 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
sEMG-based Gesture Authentication for Smartwatch Akihisa Watanabe, Ryo Iijima, Tatsuya Mori (Waseda Univ.,) ICSS2022-50 |
We propose a gesture-based user recognition system using sEMG signals for smartwatches.
We designed the system to reali... [more] |
ICSS2022-50 pp.13-18 |
ICSS, IPSJ-SPT |
2023-03-13 16:10 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Evaluation of Copy Protection Technology Using Web Font Kazuki Nomoto (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT/RIKEN AIP) ICSS2022-61 |
This study proposes and evaluates Fonty, a copy protection technology for text content. First, Fonty encrypts text conte... [more] |
ICSS2022-61 pp.79-84 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 14:50 |
Online |
Online |
Distributed Random Number Generation Method on Smart Contracts Kentaro Sako (Waseda Univ), Shin'ichiro Matsuo (Georgetown Univ), Tatsuya Mori (Waseda Univ) ISEC2022-25 SITE2022-29 BioX2022-50 HWS2022-25 ICSS2022-33 EMM2022-33 |
We propose N-choice game (NCG), a decentralized pseudo-random number generation method that can be executed on smart con... [more] |
ISEC2022-25 SITE2022-29 BioX2022-50 HWS2022-25 ICSS2022-33 EMM2022-33 pp.104-109 |
IA, ICSS |
2022-06-24 10:25 |
Nagasaki |
Univ. of Nagasaki (Primary: On-site, Secondary: Online) |
Application of Adversarial Examples to Physical ECG Signals Taiga Ono (Waseda Univ.), Takeshi Sugawara (UEC), Jun Sakuma (Tsukuba Univ./RIKEN), Tatsuya Mori (Waseda Univ./RIKEN/NICT) IA2022-11 ICSS2022-11 |
This work aims to assess the reality and feasibility of applying adversarial examples to attack cardiac diagnosis system... [more] |
IA2022-11 ICSS2022-11 pp.61-66 |
ITS, IEE-ITS |
2022-03-11 15:20 |
Online |
Online |
EV Power Consumption Estimation Model Using Actual Vehicle Driving Data Tatsuya Morioka, Hideaki Uchida, Yutaka Ota, Yohei Yamaguchi, Yoshiyuki Shimoda (OU) ITS2021-71 |
(To be available after the conference date) [more] |
ITS2021-71 pp.44-47 |
ICSS, IPSJ-SPT |
2021-03-01 10:00 |
Online |
Online |
Understanding the Adoption and Operation of DNS Cookie: Current State and Future Prospects Masanori Yajima (Waseda Univ.), Daiki Chiba (NTT), Yoshiro Yoneya (JPRS), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-28 |
DNS cache poisoning attacks have received increasing attention these days.
As a countermeasure against such attacks, DN... [more] |
ICSS2020-28 pp.13-18 |
ICSS, IPSJ-SPT |
2021-03-01 09:10 |
Online |
Online |
On the Privacy Risk of Exposure Notification Framework: Assessment and Countermeasures Kazuki Nomoto (Waseda Univ.), Mitsuaki Akiyama (NTT), Masashi Eto (NICT), Atsuo Inomata (Osaka Univ.), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-34 |
The Exposure Notification Framework uses the Bluetooth Low Energy (BLE) signal generated by a smartphone to determine cl... [more] |
ICSS2020-34 pp.49-54 |
ICSS, IPSJ-SPT |
2021-03-02 13:40 |
Online |
Online |
Research on the vulnerability of homoglyph attacks to online machine translation system Takeshi Sakamoto, Tatsuya Mori (Waseda Univ) ICSS2020-50 |
It has been widely known that systems empowered by neural network algorithms are vulnerable against an intrinsic attack ... [more] |
ICSS2020-50 pp.144-149 |
ICSS, IPSJ-SPT |
2021-03-02 14:05 |
Online |
Online |
Developing an Interactive Analysis System for Voice Assistant Apps Atsuko Natatsuka (Waseda Univ.), Ryo Iijima (Waseda Univ./NICT), Takuya Watanabe, Mitsuaki Akiyama (NTT), Tetsuya Sakai (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-48 |
In Voice Assistant Services, official or third-party Voice Assistant Apps (VA apps) are provided. Since a VA app works a... [more] |
ICSS2020-48 pp.132-137 |
ICSS, IPSJ-SPT |
2021-03-02 16:00 |
Online |
Online |
Evaluation of resonance-induced attacks on inertial measurement unit Yuta Minamisawa, Ryo Iijima (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-52 |
Self-localization is a technique for estimating the current position and orientation of self-driving cars, drones, robot... [more] |
ICSS2020-52 pp.154-159 |
ICSS, IPSJ-SPT |
2021-03-02 09:10 |
Online |
Online |
A Study on the Adoption of Link Preview by the Phishing Sites Norihito Omori (Waseda Univ.), Satoshi Furutani, Takuya Watanabe, Toshiki Shibahara, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.) ICSS2020-54 |
Search engines are not the only means of accessing online content. The distribution of malicious content has become mor... [more] |
ICSS2020-54 pp.166-171 |
ICSS, IPSJ-SPT |
2020-03-03 11:20 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Adversarial Attack against Neural Machine Translation Systems Takeshi Sakamoto, Tatsuya Mori (Waseda Univ.) ICSS2019-89 |
It has been widely known that systems empowered by neural network algorithms are vulnerable against an intrinsic attack ... [more] |
ICSS2019-89 pp.125-130 |
ICSS, IPSJ-SPT |
2020-03-03 11:40 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Adversarial Attacks against Electrocardiograms Taiga Ono (Waseda Univ.), Takeshi Sugawara (UEC), Tatsuya Mori (Waseda Univ.) ICSS2019-90 |
Recent advancements in clinical services powered by deep learning have been met with the threat of Adversarial Examples.... [more] |
ICSS2019-90 pp.131-136 |
ICSS, IPSJ-SPT |
2020-03-02 11:50 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Generating Adversarial Videos that Bypass Content Filtering Norihito Omori, Tatsuya Mori (Waseda Univ.) ICSS2019-95 |
A huge number of user-generated contents (UGC) are being uploaded on prominent internet video sharing sites such as YouT... [more] |
ICSS2019-95 pp.201-206 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 09:30 |
Kochi |
Kochi University of Technology |
SecureHID: Securing the USB Interface Jan Goette (Waseda Univ.), Naoto Yanai (Osaka Univ.), Tatsuya Mori (Waseda Univ.) ISEC2019-35 SITE2019-29 BioX2019-27 HWS2019-30 ICSS2019-33 EMM2019-38 |
[more] |
ISEC2019-35 SITE2019-29 BioX2019-27 HWS2019-30 ICSS2019-33 EMM2019-38 pp.199-206 |
ICSS, IPSJ-SPT |
2019-03-08 15:15 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Understanding DNS over TLS: Performance Evaluation and Large-scale Measurement Study Masahiro Maki, Tatsuya Mori (Waseda Univ.) ICSS2018-89 |
In this paper, we report an empirical study on the promising DNS encryption technology --- DNS over TLS (DoT). The study... [more] |
ICSS2018-89 pp.179-184 |
HWS (2nd) |
2018-12-13 11:35 |
Tokyo |
Tokyo Univ. Takeda Bldg. Takeda Hall |
|
(Advance abstract in Japanese is available) [more] |
|