IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 52  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
DC 2024-02-28
13:40
Tokyo Kikai-Shinko-Kaikan Bldg. Test Point Selection Method for Multi-Cycle BIST Using Deep Reinforcement Learning
Kohei Shiotani, Tatsuya Nishikawa, Shaoqi Wei, Senling Wang, Hiroshi Kai, Yoshinobu Higami, Hiroshi Takahashi (Ehime Univ.) DC2023-98
Multi-cycle BIST is a test method that performs multiple captures for each scan pattern, proving effective in reducing t... [more] DC2023-98
pp.23-28
MI, MICT 2023-11-14
15:40
Fukuoka   Improving image quality of sparse-view micro-CT using Wasserstein GAN
Naoki Ikezawa, Takayuki Okamoto, Hideaki Haneishi (Chiba Univ.) MICT2023-36 MI2023-29
Applications of micro-CT in pathology and histology have been studied in recent years, and we need to shorten the scanni... [more] MICT2023-36 MI2023-29
pp.45-47
IN, NS
(Joint)
2023-03-03
09:50
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
Cyber-Attack Detection Method for Closed Network -- A study of the detection technique of network-bridged equipment --
Nobuyuki Nakamura (OKI) IN2022-100
Cyber-Attacks in closed network occur recently. As closed network is not connected to the internet and may contain equip... [more] IN2022-100
pp.205-210
NS, IN
(Joint)
2022-03-10
10:20
Online Online Implementation and Evaluation of Real-Time Threat Detection System at the Network Edge
Kota Tsuchie, Nobuyuki Nakamura, Toshihiko Matsunaga, Taketsugu Yao (OKI) IN2021-31
Data leakages and malware infections from the network edge have become to a social issue. NDR is an expected technology ... [more] IN2021-31
pp.1-6
IPSJ-AVM, CS, IE, ITE-BCT [detail] 2021-11-25
10:25
Online Online wganBCS: Block-wise image compressive sensing and reconstruction model using adversarial training to eliminate block effects
Boyan Chen (Hosei Univ./NPU), Kaoru Uchida (Hosei Univ.) CS2021-60 IE2021-19
The famous block-wise compressive sensing (BCS) paradigm can greatly reduce the memory consumption of sensing
matrix co... [more]
CS2021-60 IE2021-19
pp.1-6
IA 2021-10-15
16:50
Online Online Malware Traffic Detection at Certain Time Using IP Flow Information
Seiya Komatsu, Yusei Katsura, Masatoshi Kakiuchi, Ismail Arai, Kazutoshi Fujikawa (NAIST) IA2021-27
The damage caused by the activities of malware such as botnets and ransomware has become a social problem. In order to d... [more] IA2021-27
pp.6-11
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] 2021-03-26
11:00
Online Online An Estimation Method of a Defect Types for Suspected Fault Lines in Logical Faulty VLSI Using Neural Networks
Natsuki Ota, Toshinori Hosokawa (Nihon Univ.), Koji Yamazaki (Meiji Univ.), Yukari Yamauchi, Masayuki Arai (Nihon Univ.) CPSY2020-61 DC2020-91
Since fault diagnosis methods for specified fault models might cause misprediction and non-prediction, a fault diagnosis... [more] CPSY2020-61 DC2020-91
pp.67-72
WBS, IT, ISEC 2021-03-05
14:20
Online Online Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts
Nami Ashizawa, Naoto Yanai, Jason Paul Cruz (Osaka Univ.), Singo Okamura (NITNC) IT2020-156 ISEC2020-86 WBS2020-75
Ethereum smart contracts are programs that run on the Ethereum blockchain, and many smart contract vulnerabilities have ... [more] IT2020-156 ISEC2020-86 WBS2020-75
pp.273-280
IN, NS
(Joint)
2021-03-05
13:40
Online Online Computational Complexity Reduction by Dynamic Clustering in Network Scan Scheduling
Takuya Kurihara, Kazuto Yano, Yoshinori Suzuki (ATR) NS2020-157
In recent years, some users have required network scans for security or business.
On the other hand, since the number o... [more]
NS2020-157
pp.203-207
NS, NWS
(Joint)
2021-01-22
14:20
Online Online An Aggregation Approach for Improving Network Scan Failure and Delay Estimation of IoT Wireless Equipment
Babatunde Ojetunde, Kenta Suzuki, Kazuto Yano, Yoshinori Suzuki (ATR) NS2020-118
Recently we proposed a method for identifying the network scan response state that is needed to estimate the cause of ne... [more] NS2020-118
pp.43-52
NS, ICM, CQ, NV
(Joint)
2020-11-26
12:10
Online Online A study on Estimation of Retransmission Rate of Background Traffic with Scan Response Delay of Network Scan
Kenta Suzuki, Takuya Kurihara, Kazuto Yano, Yoshinori Suzuki (ATR) NS2020-79
Recently, in order to find vulnerable IoT devices for cyber-attacks, network scans have been required. In existing netwo... [more] NS2020-79
pp.20-25
IA 2020-11-09
14:57
Hokkaido
(Primary: On-site, Secondary: Online)
Development and evaluation of efficient vulnerability scanning system for IoT networks
Kazusyoshi Watanabe, Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ) IA2020-19
In recent years, a security incident called DRDoS attack, which is a kind of DoS attack using reflections and amplificat... [more] IA2020-19
pp.7-12
SP, EA, SIP 2020-03-03
16:15
Okinawa Okinawa Industry Support Center
(Cancelled but technical report was issued)
A Portscan Detection Based on Low-rankness of Destination Port Matrices
Hiroki Nousou, Masao Yamagishi, Isao Yamada (Tokyo Tech) EA2019-167 SIP2019-169 SP2019-116
The detection of port scans as possible preliminaries to more serious attacks is important for system administrators and... [more] EA2019-167 SIP2019-169 SP2019-116
pp.385-390
ICSS, IPSJ-SPT 2020-03-02
15:40
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Proposing Criteria for Detecting Internet-Wide Scanners for Darknet Monitoring
Yukiko Endo, Yoshiki Mori (NICT), Jumpei Shimamura (Clwit), Masaki Kubo (NICT) ICSS2019-80
The NICTER project has been observing the darknet (observing packets arriving at unused IP addresses) for over 10 years.... [more] ICSS2019-80
pp.73-78
IN, IA
(Joint)
2019-12-19
15:15
Hiroshima Satellite Campus Hiroshima Design of Honeynet to avoid IPv6 alias detection
Hyuga Kobayashi, Yudai Aratsu (Tokyo Univ.), Satoru Kobayashi, Kensuke Fukuda (NII), Hiroshi Esaki (Tokyo Univ.) IA2019-50
In IPv6, full scan is infeasible due to its enourmous address space, thought it is easy in IPv4.
Hitlist, which is the ... [more]
IA2019-50
pp.13-18
PRMU 2019-12-20
10:45
Oita   An Efficient Block-wise Object Detection Method using Consecutive Frames for High Resolution Video
Kazuki Hozumi, Yoichi Tomioka (UoA) PRMU2019-57
In recent years, in the fields such as surveillance cameras and in-vehicle camera systems, efficient deep-learning-based... [more] PRMU2019-57
pp.69-74
RISING
(2nd)
2019-11-26
14:10
Tokyo Fukutake Learning Theater, Hongo Campus, Univ. Tokyo [Poster Presentation] Utilization of convolutional neural network for the fabrication processes of semiconductor nanostructures
Tomoki Tanoue, Kyoko Kitamura (Kyoto Inst. Tech.), Masahiro Yoshida, Kohei Suenaga, Kenji Ishizaki, Susumu Noda (Kyoto Univ.)
Photonic-crystal laser is a surface-emitting semiconductor laser which possesses semiconductor nanostructures (photonic ... [more]
MIKA
(2nd)
2019-10-04
10:15
Hokkaido Hokkaido Univ. [Poster Presentation] Estimating of congestion level in wireless network using the result of network scan
Kenta Suzuki, Takuya Kurihara, Kazuto Yano, Yoshinori Suzuki (ATR)
As a part of countermeasure against cyber attacks targeting vulnerabilities of IoT devices without enough security level... [more]
SeMI, RCS, NS, SR, RCC
(Joint)
2019-07-10
13:25
Osaka I-Site Nanba(Osaka) Quantification of the impact of wide network scanning on IoT data communication in WLAN
Hiroaki Hashida, Yuichi Kawamoto, Nei Kato (Tohoku Univ.) NS2019-44
In recent years, security issues of IoT devices have attracted the interest in the use of the wide network scanning as a... [more] NS2019-44
pp.7-12
SeMI, RCS, NS, SR, RCC
(Joint)
2019-07-12
11:25
Osaka I-Site Nanba(Osaka) Research and Development on Wide Area Network Scan Techniques for IoT Wireless Equipment
Kazuto Yano, Naoto Egashira, Takuya Kurihara, Satoru Shimizu, Yoshinori Suzuki (ATR) RCC2019-49 NS2019-85 RCS2019-142 SR2019-61 SeMI2019-58
This paper introduces three elemental technologies to realize confident and efficient network scanning for a large amoun... [more] RCC2019-49 NS2019-85 RCS2019-142 SR2019-61 SeMI2019-58
pp.177-182(RCC), pp.203-208(NS), pp.199-204(RCS), pp.209-214(SR), pp.191-196(SeMI)
 Results 1 - 20 of 52  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan