Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IN, IA (Joint) |
2022-12-13 09:50 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Primary: On-site, Secondary: Online) |
A Study on Obfuscation of Node Centrality in Large-Scale Networks Hiroki Kawamura, Takeaki Iwata, Ryotaro Matsuo, Hiroyuki Ohsaki (Kwansei Gakuin Univ.) IA2022-55 |
Node centrality (e.g., degree centrality, eigenvector centrality, betweenness centrality), which is determined by the ne... [more] |
IA2022-55 pp.40-46 |
IN, IA (Joint) |
2022-12-13 15:50 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Primary: On-site, Secondary: Online) |
Verification of Environmental Differences in Latency caused by Dynamic Access Control Based on Users' Reliability Atsushi Shinoda (Nagoya Univ.), Hirokazu Hasegawa (NII), Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) IA2022-66 |
Nowadays, environment has changed with increasing of telecommuting, and information security risks are rising in enterpr... [more] |
IA2022-66 pp.91-98 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2022-11-29 15:05 |
Kumamoto |
(Primary: On-site, Secondary: Online) |
Evaluation of power delivery networks in secure semiconductor systems Masaru Mashiba, Kazuki Monta (Kobe Univ.), Takaaki Okidono (SCU), Takuzi Miki, Makoto Nagata (Kobe Univ.) VLD2022-33 ICD2022-50 DC2022-49 RECONF2022-56 |
With the development of the IoT, hardware security is becoming increasingly important. Physical attacks on cryptoprocess... [more] |
VLD2022-33 ICD2022-50 DC2022-49 RECONF2022-56 pp.82-86 |
ICTSSL, IN, NWS, IEE-SMF |
2022-10-27 14:30 |
Nagano |
Shinshu University (Primary: On-site, Secondary: Online) |
Proposal for an Electronic Medicine Notebook System Using Blockchain Technology Takumi Kusano, Koichi Gyoda (SIT) ICTSSL2022-18 |
In Japan, a medicine notebook is used to keep a record of medication history as part of the personal health information ... [more] |
ICTSSL2022-18 pp.6-11 |
HWS, ICD |
2022-10-25 10:25 |
Shiga |
(Primary: On-site, Secondary: Online) |
A Study on Profiled Side-channel Analysis against AES-CTR Katsumi Ebina, Rei Ueno, Naohumi Homma (Tohoku Univ) HWS2022-31 ICD2022-23 |
This paper describes profiling Side-Channel Analysis for AES counter mode.
AES-CTR is a mode in which an internally sto... [more] |
HWS2022-31 ICD2022-23 pp.6-11 |
HWS, ICD |
2022-10-25 17:05 |
Shiga |
(Primary: On-site, Secondary: Online) |
How to Identify the Physical Direction of CAN Message Transmission Yosuke Maekawa, Camille Gay (TOYOTA/YNU), Tsutomu Matsumoto (YNU) HWS2022-43 ICD2022-35 |
The impact of cyber-attacks on automobiles is becoming more serious as vehicles become more connected and multi-function... [more] |
HWS2022-43 ICD2022-35 pp.76-81 |
R |
2022-10-07 14:50 |
Fukuoka |
(Primary: On-site, Secondary: Online) |
A Note on A Transformer Encoder-Based Malware Classification Using API Calls Chen Li (Kyutech), Junjun Zheng (Osaka Univ.) R2022-36 |
Malware is a major security threat to computer systems and significantly impacts system reliability. Recurrent neural ne... [more] |
R2022-36 pp.25-30 |
SIP |
2022-08-26 14:26 |
Okinawa |
Nobumoto Ohama Memorial Hall (Ishigaki Island) (Primary: On-site, Secondary: Online) |
Generation method of Adversarial Examples using XAI Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) SIP2022-72 |
With the advancement of AI technology, AI can be applied to various fields. Therefore the accountability for the decisio... [more] |
SIP2022-72 pp.115-120 |
NS, SR, RCS, SeMI, RCC (Joint) |
2022-07-14 11:10 |
Ishikawa |
The Kanazawa Theatre + Online (Primary: On-site, Secondary: Online) |
Construction of IoT System Based on Zero Trust Networks Yudai Sakurai, Eishin Nagaoka, Osamu Mizuno (Kogakuin Univ) NS2022-41 |
With increasing of IoT devices, the number of cyber-attacks targeting IoT systems is also increasing. Cyber-attacks can ... [more] |
NS2022-41 pp.71-76 |
CQ, CS (Joint) |
2022-05-12 14:20 |
Fukui |
Fukui (Fuku Pref.) (Primary: On-site, Secondary: Online) |
Distributed Network Intrusion Detection System Using Federated Learning Yuya Tsuru, Tomoya Kawakami, Tatsuhito Hasegawa (Univ. of Fukui) CQ2022-5 |
A network-based intrusion detection system (NIDS) monitors a network and detects unauthorized traffic. Currently, a vari... [more] |
CQ2022-5 pp.20-25 |
VLD, HWS [detail] |
2022-03-08 10:20 |
Online |
Online |
Evaluation of leakage-based LR-PUF's resistance to machine learning attacks Tomoaki Oikawa, Kimiyoshi Usami (SIT) VLD2021-93 HWS2021-70 |
One of the LSI individual identification technologies is PUF (Physically Unclonable Function), which utilizes the physic... [more] |
VLD2021-93 HWS2021-70 pp.93-98 |
IA, SITE, IPSJ-IOT [detail] |
2022-03-08 13:55 |
Kyoto |
Kyoto University, Yoshida Campus (Primary: On-site, Secondary: Online) |
An Examination about Management of IP Address Assignment with IPoE in a Campus Network Kenji Ohira (Osaka Univ.) SITE2021-58 IA2021-71 |
When an information security incident occurs, an investigation is started using the IP address as a starting point, but ... [more] |
SITE2021-58 IA2021-71 pp.75-78 |
AI |
2022-02-28 15:00 |
Miyazaki |
Youth Hostel Sunflower MIYAZAKI (Primary: On-site, Secondary: Online) |
Basic Study for Backdoor Attack based on Invisible Trigger Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) AI2021-21 |
A backdoor attack is a threat to deep neural networks (DNN). In an attack on a DNN for the purpose of image classificati... [more] |
AI2021-21 pp.53-58 |
RCS, NS (Joint) |
2021-12-17 10:35 |
Nara |
Nara-ken Bunka Kaikan and Online (Primary: On-site, Secondary: Online) |
Proposal of Network Digital Replica kyota hattori, tomohiro korikawa, chikako takasaki, hidenari oowada, masafumi shimizu, naoki takaya (NTT) NS2021-104 |
Future network infrastructures will need to provide network services safely and rapidly under complex conditions such as... [more] |
NS2021-104 pp.41-46 |
CQ, ICM, NS, NV (Joint) |
2021-11-26 11:15 |
Fukuoka |
JR Hakata Stn. Hakata EkiHigashi Rental Room (Primary: On-site, Secondary: Online) |
[Invited Talk]
Security Technology for SDN-Based New Generation Network Satoru Izumi (NIT, Sendai) NS2021-90 CQ2021-72 ICM2021-25 |
Internet of Things (IoT) society in which various devices such as laptop, smart phone, tablet, home appliances, vehicle,... [more] |
NS2021-90 CQ2021-72 ICM2021-25 p.36(NS), p.41(CQ), p.19(ICM) |
RISING (3rd) |
2021-11-16 09:30 |
Tokyo |
(Primary: On-site, Secondary: Online) |
On Attack Pattern Classification in IoT Networks for Network Intrusion Detection Systems Jesse Atuhurra, Takanori Hara (NAIST), Yuanyu Zhang (Xidian Univ.), Shoji Kasahara (NAIST) |
With the proliferation of IoT devices, IoT security problems arise. To protect heterogeneous connected devices in IoT ne... [more] |
|
RISING (3rd) |
2021-11-16 11:30 |
Tokyo |
(Primary: On-site, Secondary: Online) |
Throughput Prediction by Radio Environment Correlation Recognition Using Crowd Sensing and Federated Learning Satoshi Nakaniida, Takeo Fujii (UEC) |
We propose an approach using federated learning for predicting Wi-Fi and LTE transmission control protocol (TCP) through... [more] |
|
SR |
2021-11-05 11:15 |
Online |
Online |
Throughput Prediction by Radio Environment Correlation Recognition Using Crowd Sensing and Federated Learning Satoshi Nakaniida, Takeo Fujii (UEC) SR2021-53 |
We propose an approach using federated learning for predicting Wi-Fi and LTE transmission control protocol (TCP) through... [more] |
SR2021-53 pp.72-78 |
IA |
2021-10-15 16:50 |
Online |
Online |
Malware Traffic Detection at Certain Time Using IP Flow Information Seiya Komatsu, Yusei Katsura, Masatoshi Kakiuchi, Ismail Arai, Kazutoshi Fujikawa (NAIST) IA2021-27 |
The damage caused by the activities of malware such as botnets and ransomware has become a social problem. In order to d... [more] |
IA2021-27 pp.6-11 |
ICM |
2021-07-15 16:40 |
Online |
Online |
[Special Talk]
Report on IEEE International Conference on Network Softwarization (NetSoft) 2021 Kohei Shiomoto (TCU) ICM2021-14 |
International Conference on Network Softwarization (NetSoft) is a flagship conference aiming at addressing the “Softwari... [more] |
ICM2021-14 pp.22-27 |