IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 367 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IN, IA
(Joint)
2022-12-13
09:50
Hiroshima Higashi-Senda campus, Hiroshima Univ.
(Primary: On-site, Secondary: Online)
A Study on Obfuscation of Node Centrality in Large-Scale Networks
Hiroki Kawamura, Takeaki Iwata, Ryotaro Matsuo, Hiroyuki Ohsaki (Kwansei Gakuin Univ.) IA2022-55
Node centrality (e.g., degree centrality, eigenvector centrality, betweenness centrality), which is determined by the ne... [more] IA2022-55
pp.40-46
IN, IA
(Joint)
2022-12-13
15:50
Hiroshima Higashi-Senda campus, Hiroshima Univ.
(Primary: On-site, Secondary: Online)
Verification of Environmental Differences in Latency caused by Dynamic Access Control Based on Users' Reliability
Atsushi Shinoda (Nagoya Univ.), Hirokazu Hasegawa (NII), Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) IA2022-66
Nowadays, environment has changed with increasing of telecommuting, and information security risks are rising in enterpr... [more] IA2022-66
pp.91-98
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2022-11-29
15:05
Kumamoto  
(Primary: On-site, Secondary: Online)
Evaluation of power delivery networks in secure semiconductor systems
Masaru Mashiba, Kazuki Monta (Kobe Univ.), Takaaki Okidono (SCU), Takuzi Miki, Makoto Nagata (Kobe Univ.) VLD2022-33 ICD2022-50 DC2022-49 RECONF2022-56
With the development of the IoT, hardware security is becoming increasingly important. Physical attacks on cryptoprocess... [more] VLD2022-33 ICD2022-50 DC2022-49 RECONF2022-56
pp.82-86
ICTSSL, IN, NWS, IEE-SMF 2022-10-27
14:30
Nagano Shinshu University
(Primary: On-site, Secondary: Online)
Proposal for an Electronic Medicine Notebook System Using Blockchain Technology
Takumi Kusano, Koichi Gyoda (SIT) ICTSSL2022-18
In Japan, a medicine notebook is used to keep a record of medication history as part of the personal health information ... [more] ICTSSL2022-18
pp.6-11
HWS, ICD 2022-10-25
10:25
Shiga
(Primary: On-site, Secondary: Online)
A Study on Profiled Side-channel Analysis against AES-CTR
Katsumi Ebina, Rei Ueno, Naohumi Homma (Tohoku Univ) HWS2022-31 ICD2022-23
This paper describes profiling Side-Channel Analysis for AES counter mode.
AES-CTR is a mode in which an internally sto... [more]
HWS2022-31 ICD2022-23
pp.6-11
HWS, ICD 2022-10-25
17:05
Shiga
(Primary: On-site, Secondary: Online)
How to Identify the Physical Direction of CAN Message Transmission
Yosuke Maekawa, Camille Gay (TOYOTA/YNU), Tsutomu Matsumoto (YNU) HWS2022-43 ICD2022-35
The impact of cyber-attacks on automobiles is becoming more serious as vehicles become more connected and multi-function... [more] HWS2022-43 ICD2022-35
pp.76-81
R 2022-10-07
14:50
Fukuoka
(Primary: On-site, Secondary: Online)
A Note on A Transformer Encoder-Based Malware Classification Using API Calls
Chen Li (Kyutech), Junjun Zheng (Osaka Univ.) R2022-36
Malware is a major security threat to computer systems and significantly impacts system reliability. Recurrent neural ne... [more] R2022-36
pp.25-30
SIP 2022-08-26
14:26
Okinawa Nobumoto Ohama Memorial Hall (Ishigaki Island)
(Primary: On-site, Secondary: Online)
Generation method of Adversarial Examples using XAI
Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) SIP2022-72
With the advancement of AI technology, AI can be applied to various fields. Therefore the accountability for the decisio... [more] SIP2022-72
pp.115-120
NS, SR, RCS, SeMI, RCC
(Joint)
2022-07-14
11:10
Ishikawa The Kanazawa Theatre + Online
(Primary: On-site, Secondary: Online)
Construction of IoT System Based on Zero Trust Networks
Yudai Sakurai, Eishin Nagaoka, Osamu Mizuno (Kogakuin Univ) NS2022-41
With increasing of IoT devices, the number of cyber-attacks targeting IoT systems is also increasing. Cyber-attacks can ... [more] NS2022-41
pp.71-76
CQ, CS
(Joint)
2022-05-12
14:20
Fukui Fukui (Fuku Pref.)
(Primary: On-site, Secondary: Online)
Distributed Network Intrusion Detection System Using Federated Learning
Yuya Tsuru, Tomoya Kawakami, Tatsuhito Hasegawa (Univ. of Fukui) CQ2022-5
A network-based intrusion detection system (NIDS) monitors a network and detects unauthorized traffic. Currently, a vari... [more] CQ2022-5
pp.20-25
VLD, HWS [detail] 2022-03-08
10:20
Online Online Evaluation of leakage-based LR-PUF's resistance to machine learning attacks
Tomoaki Oikawa, Kimiyoshi Usami (SIT) VLD2021-93 HWS2021-70
One of the LSI individual identification technologies is PUF (Physically Unclonable Function), which utilizes the physic... [more] VLD2021-93 HWS2021-70
pp.93-98
IA, SITE, IPSJ-IOT [detail] 2022-03-08
13:55
Kyoto Kyoto University, Yoshida Campus
(Primary: On-site, Secondary: Online)
An Examination about Management of IP Address Assignment with IPoE in a Campus Network
Kenji Ohira (Osaka Univ.) SITE2021-58 IA2021-71
When an information security incident occurs, an investigation is started using the IP address as a starting point, but ... [more] SITE2021-58 IA2021-71
pp.75-78
AI 2022-02-28
15:00
Miyazaki Youth Hostel Sunflower MIYAZAKI
(Primary: On-site, Secondary: Online)
Basic Study for Backdoor Attack based on Invisible Trigger
Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) AI2021-21
A backdoor attack is a threat to deep neural networks (DNN). In an attack on a DNN for the purpose of image classificati... [more] AI2021-21
pp.53-58
RCS, NS
(Joint)
2021-12-17
10:35
Nara Nara-ken Bunka Kaikan and Online
(Primary: On-site, Secondary: Online)
Proposal of Network Digital Replica
kyota hattori, tomohiro korikawa, chikako takasaki, hidenari oowada, masafumi shimizu, naoki takaya (NTT) NS2021-104
Future network infrastructures will need to provide network services safely and rapidly under complex conditions such as... [more] NS2021-104
pp.41-46
CQ, ICM, NS, NV
(Joint)
2021-11-26
11:15
Fukuoka JR Hakata Stn. Hakata EkiHigashi Rental Room
(Primary: On-site, Secondary: Online)
[Invited Talk] Security Technology for SDN-Based New Generation Network
Satoru Izumi (NIT, Sendai) NS2021-90 CQ2021-72 ICM2021-25
Internet of Things (IoT) society in which various devices such as laptop, smart phone, tablet, home appliances, vehicle,... [more] NS2021-90 CQ2021-72 ICM2021-25
p.36(NS), p.41(CQ), p.19(ICM)
RISING
(3rd)
2021-11-16
09:30
Tokyo
(Primary: On-site, Secondary: Online)
On Attack Pattern Classification in IoT Networks for Network Intrusion Detection Systems
Jesse Atuhurra, Takanori Hara (NAIST), Yuanyu Zhang (Xidian Univ.), Shoji Kasahara (NAIST)
With the proliferation of IoT devices, IoT security problems arise. To protect heterogeneous connected devices in IoT ne... [more]
RISING
(3rd)
2021-11-16
11:30
Tokyo
(Primary: On-site, Secondary: Online)
Throughput Prediction by Radio Environment Correlation Recognition Using Crowd Sensing and Federated Learning
Satoshi Nakaniida, Takeo Fujii (UEC)
We propose an approach using federated learning for predicting Wi-Fi and LTE transmission control protocol (TCP) through... [more]
SR 2021-11-05
11:15
Online Online Throughput Prediction by Radio Environment Correlation Recognition Using Crowd Sensing and Federated Learning
Satoshi Nakaniida, Takeo Fujii (UEC) SR2021-53
We propose an approach using federated learning for predicting Wi-Fi and LTE transmission control protocol (TCP) through... [more] SR2021-53
pp.72-78
IA 2021-10-15
16:50
Online Online Malware Traffic Detection at Certain Time Using IP Flow Information
Seiya Komatsu, Yusei Katsura, Masatoshi Kakiuchi, Ismail Arai, Kazutoshi Fujikawa (NAIST) IA2021-27
The damage caused by the activities of malware such as botnets and ransomware has become a social problem. In order to d... [more] IA2021-27
pp.6-11
ICM 2021-07-15
16:40
Online Online [Special Talk] Report on IEEE International Conference on Network Softwarization (NetSoft) 2021
Kohei Shiomoto (TCU) ICM2021-14
International Conference on Network Softwarization (NetSoft) is a flagship conference aiming at addressing the “Softwari... [more] ICM2021-14
pp.22-27
 Results 21 - 40 of 367 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan