Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
DC |
2024-02-28 13:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Test Point Selection Method for Multi-Cycle BIST Using Deep Reinforcement Learning Kohei Shiotani, Tatsuya Nishikawa, Shaoqi Wei, Senling Wang, Hiroshi Kai, Yoshinobu Higami, Hiroshi Takahashi (Ehime Univ.) DC2023-98 |
Multi-cycle BIST is a test method that performs multiple captures for each scan pattern, proving effective in reducing t... [more] |
DC2023-98 pp.23-28 |
MI, MICT |
2023-11-14 15:40 |
Fukuoka |
|
Improving image quality of sparse-view micro-CT using Wasserstein GAN Naoki Ikezawa, Takayuki Okamoto, Hideaki Haneishi (Chiba Univ.) MICT2023-36 MI2023-29 |
Applications of micro-CT in pathology and histology have been studied in recent years, and we need to shorten the scanni... [more] |
MICT2023-36 MI2023-29 pp.45-47 |
IN, NS (Joint) |
2023-03-03 09:50 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Cyber-Attack Detection Method for Closed Network
-- A study of the detection technique of network-bridged equipment -- Nobuyuki Nakamura (OKI) IN2022-100 |
Cyber-Attacks in closed network occur recently. As closed network is not connected to the internet and may contain equip... [more] |
IN2022-100 pp.205-210 |
NS, IN (Joint) |
2022-03-10 10:20 |
Online |
Online |
Implementation and Evaluation of Real-Time Threat Detection System at the Network Edge Kota Tsuchie, Nobuyuki Nakamura, Toshihiko Matsunaga, Taketsugu Yao (OKI) IN2021-31 |
Data leakages and malware infections from the network edge have become to a social issue. NDR is an expected technology ... [more] |
IN2021-31 pp.1-6 |
IPSJ-AVM, CS, IE, ITE-BCT [detail] |
2021-11-25 10:25 |
Online |
Online |
wganBCS: Block-wise image compressive sensing and reconstruction model using adversarial training to eliminate block effects Boyan Chen (Hosei Univ./NPU), Kaoru Uchida (Hosei Univ.) CS2021-60 IE2021-19 |
The famous block-wise compressive sensing (BCS) paradigm can greatly reduce the memory consumption of sensing
matrix co... [more] |
CS2021-60 IE2021-19 pp.1-6 |
IA |
2021-10-15 16:50 |
Online |
Online |
Malware Traffic Detection at Certain Time Using IP Flow Information Seiya Komatsu, Yusei Katsura, Masatoshi Kakiuchi, Ismail Arai, Kazutoshi Fujikawa (NAIST) IA2021-27 |
The damage caused by the activities of malware such as botnets and ransomware has become a social problem. In order to d... [more] |
IA2021-27 pp.6-11 |
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2021-03-26 11:00 |
Online |
Online |
An Estimation Method of a Defect Types for Suspected Fault Lines in Logical Faulty VLSI Using Neural Networks Natsuki Ota, Toshinori Hosokawa (Nihon Univ.), Koji Yamazaki (Meiji Univ.), Yukari Yamauchi, Masayuki Arai (Nihon Univ.) CPSY2020-61 DC2020-91 |
Since fault diagnosis methods for specified fault models might cause misprediction and non-prediction, a fault diagnosis... [more] |
CPSY2020-61 DC2020-91 pp.67-72 |
WBS, IT, ISEC |
2021-03-05 14:20 |
Online |
Online |
Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts Nami Ashizawa, Naoto Yanai, Jason Paul Cruz (Osaka Univ.), Singo Okamura (NITNC) IT2020-156 ISEC2020-86 WBS2020-75 |
Ethereum smart contracts are programs that run on the Ethereum blockchain, and many smart contract vulnerabilities have ... [more] |
IT2020-156 ISEC2020-86 WBS2020-75 pp.273-280 |
IN, NS (Joint) |
2021-03-05 13:40 |
Online |
Online |
Computational Complexity Reduction by Dynamic Clustering in Network Scan Scheduling Takuya Kurihara, Kazuto Yano, Yoshinori Suzuki (ATR) NS2020-157 |
In recent years, some users have required network scans for security or business.
On the other hand, since the number o... [more] |
NS2020-157 pp.203-207 |
NS, NWS (Joint) |
2021-01-22 14:20 |
Online |
Online |
An Aggregation Approach for Improving Network Scan Failure and Delay Estimation of IoT Wireless Equipment Babatunde Ojetunde, Kenta Suzuki, Kazuto Yano, Yoshinori Suzuki (ATR) NS2020-118 |
Recently we proposed a method for identifying the network scan response state that is needed to estimate the cause of ne... [more] |
NS2020-118 pp.43-52 |
NS, ICM, CQ, NV (Joint) |
2020-11-26 12:10 |
Online |
Online |
A study on Estimation of Retransmission Rate of Background Traffic with Scan Response Delay of Network Scan Kenta Suzuki, Takuya Kurihara, Kazuto Yano, Yoshinori Suzuki (ATR) NS2020-79 |
Recently, in order to find vulnerable IoT devices for cyber-attacks, network scans have been required. In existing netwo... [more] |
NS2020-79 pp.20-25 |
IA |
2020-11-09 14:57 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
Development and evaluation of efficient vulnerability scanning system for IoT networks Kazusyoshi Watanabe, Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ) IA2020-19 |
In recent years, a security incident called DRDoS attack, which is a kind of DoS attack using reflections and amplificat... [more] |
IA2020-19 pp.7-12 |
SP, EA, SIP |
2020-03-03 16:15 |
Okinawa |
Okinawa Industry Support Center (Cancelled but technical report was issued) |
A Portscan Detection Based on Low-rankness of Destination Port Matrices Hiroki Nousou, Masao Yamagishi, Isao Yamada (Tokyo Tech) EA2019-167 SIP2019-169 SP2019-116 |
The detection of port scans as possible preliminaries to more serious attacks is important for system administrators and... [more] |
EA2019-167 SIP2019-169 SP2019-116 pp.385-390 |
ICSS, IPSJ-SPT |
2020-03-02 15:40 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Proposing Criteria for Detecting Internet-Wide Scanners for Darknet Monitoring Yukiko Endo, Yoshiki Mori (NICT), Jumpei Shimamura (Clwit), Masaki Kubo (NICT) ICSS2019-80 |
The NICTER project has been observing the darknet (observing packets arriving at unused IP addresses) for over 10 years.... [more] |
ICSS2019-80 pp.73-78 |
IN, IA (Joint) |
2019-12-19 15:15 |
Hiroshima |
Satellite Campus Hiroshima |
Design of Honeynet to avoid IPv6 alias detection Hyuga Kobayashi, Yudai Aratsu (Tokyo Univ.), Satoru Kobayashi, Kensuke Fukuda (NII), Hiroshi Esaki (Tokyo Univ.) IA2019-50 |
In IPv6, full scan is infeasible due to its enourmous address space, thought it is easy in IPv4.
Hitlist, which is the ... [more] |
IA2019-50 pp.13-18 |
PRMU |
2019-12-20 10:45 |
Oita |
|
An Efficient Block-wise Object Detection Method using Consecutive Frames for High Resolution Video Kazuki Hozumi, Yoichi Tomioka (UoA) PRMU2019-57 |
In recent years, in the fields such as surveillance cameras and in-vehicle camera systems, efficient deep-learning-based... [more] |
PRMU2019-57 pp.69-74 |
RISING (2nd) |
2019-11-26 14:10 |
Tokyo |
Fukutake Learning Theater, Hongo Campus, Univ. Tokyo |
[Poster Presentation]
Utilization of convolutional neural network for the fabrication processes of semiconductor nanostructures Tomoki Tanoue, Kyoko Kitamura (Kyoto Inst. Tech.), Masahiro Yoshida, Kohei Suenaga, Kenji Ishizaki, Susumu Noda (Kyoto Univ.) |
Photonic-crystal laser is a surface-emitting semiconductor laser which possesses semiconductor nanostructures (photonic ... [more] |
|
MIKA (2nd) |
2019-10-04 10:15 |
Hokkaido |
Hokkaido Univ. |
[Poster Presentation]
Estimating of congestion level in wireless network using the result of network scan Kenta Suzuki, Takuya Kurihara, Kazuto Yano, Yoshinori Suzuki (ATR) |
As a part of countermeasure against cyber attacks targeting vulnerabilities of IoT devices without enough security level... [more] |
|
SeMI, RCS, NS, SR, RCC (Joint) |
2019-07-10 13:25 |
Osaka |
I-Site Nanba(Osaka) |
Quantification of the impact of wide network scanning on IoT data communication in WLAN Hiroaki Hashida, Yuichi Kawamoto, Nei Kato (Tohoku Univ.) NS2019-44 |
In recent years, security issues of IoT devices have attracted the interest in the use of the wide network scanning as a... [more] |
NS2019-44 pp.7-12 |
SeMI, RCS, NS, SR, RCC (Joint) |
2019-07-12 11:25 |
Osaka |
I-Site Nanba(Osaka) |
Research and Development on Wide Area Network Scan Techniques for IoT Wireless Equipment Kazuto Yano, Naoto Egashira, Takuya Kurihara, Satoru Shimizu, Yoshinori Suzuki (ATR) RCC2019-49 NS2019-85 RCS2019-142 SR2019-61 SeMI2019-58 |
This paper introduces three elemental technologies to realize confident and efficient network scanning for a large amoun... [more] |
RCC2019-49 NS2019-85 RCS2019-142 SR2019-61 SeMI2019-58 pp.177-182(RCC), pp.203-208(NS), pp.199-204(RCS), pp.209-214(SR), pp.191-196(SeMI) |