Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
COMP, IPSJ-AL |
2024-05-08 14:35 |
Kyoto |
Kyoto University (Rakuyu-kaikan) |
Physical Bucket Sort on Two Kind of Items Hitomi Kozaki, Atsuki Nagao (Ochanomizu Univ.) |
(To be available after the conference date) [more] |
|
ICSS, IPSJ-SPT |
2024-03-22 12:10 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Study of the Label-Flipping Poisoning Attack on Machine-Learning Based Malicious URL Query Detection. Akira Matsunami (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2023-90 |
In recent years, there have been a large increase of cyber attacks with increasing use of web applications. A method to... [more] |
ICSS2023-90 pp.153-159 |
NS, IN (Joint) |
2024-03-01 11:10 |
Okinawa |
Okinawa Convention Center |
Performance evaluation of wake-up control for top-k query in multi-hop wireless sensor networks Takuya Murakami (Kansai Univ.), Junya Shiraishi (Aalborg Univ.), Hiroyuki Yomo (Kansai Univ.) NS2023-206 |
In this paper, we focus on top-k query in on-demand multi-hop WSNs (Wireless Sensor Networks) employing wake-up receiver... [more] |
NS2023-206 pp.202-207 |
DE, IPSJ-DBS, IPSJ-IFAT [detail] |
2023-09-22 10:55 |
Fukuoka |
Kitakyushu International Conference Center |
A Preliminary Study of Dynamic Query Optimization Using MLIR Genki Kimura, Kazuo Goda (UT) DE2023-23 |
Query optimizer generates execution plans from input queries and has a significant impact on database performance. Tradi... [more] |
DE2023-23 pp.72-77 |
NLP, MSS |
2023-03-17 10:40 |
Nagasaki |
(Primary: On-site, Secondary: Online) |
Machine Learning-Based Risk Evaluation of Reconstruction Attack on Query System for Handling Privacy Data Mohd Anuaruddin Bin Ahmadon (山口大) MSS2022-96 NLP2022-141 |
In this paper, we proposed a method to evaluate the strength of a data privacy protection mechanism by separating the me... [more] |
MSS2022-96 NLP2022-141 pp.160-163 |
IN, NS (Joint) |
2023-03-03 12:00 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Multi-Attribute Queries in IPFS Hidehiro (TUT), Kenji Kanai, Hidenori Nakazato (WAS) IN2022-114 |
IPFS (InterPlanetary File System) is a distributed database middleware, and that is focused on as a Web3.0 key technolog... [more] |
IN2022-114 pp.289-292 |
QIT (2nd) |
2022-12-08 14:00 |
Kanagawa |
Keio Univ. (Primary: On-site, Secondary: Online) |
[Poster Presentation]
A Note on Quantum Divide and Conquer for Minimal String Rotation Qisheng Wang (NU) |
Lexicographically minimal string rotation is a fundamental problem on string processing that has recently attracted a lo... [more] |
|
RISING (3rd) |
2022-10-31 14:00 |
Kyoto |
Kyoto Terrsa (Day 1), and Online (Day 2, 3) |
[Poster Presentation]
Machine Learning Analyze for Undiscovered Malicious Domain Detection by using DNS Query Analysis Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (kyutech) |
Network users is increasing in recently and there is concern about the malware infection.
Malware exist various types a... [more] |
|
SAT, RCS (Joint) |
2022-08-25 18:30 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
Multi-hop Wake-up Control for top-k Query in Wireless Sensor Networks Takuya Murakami, Junya shiraishi, Hiroyuki Yomo (Kansai Univ.) RCS2022-113 |
In this paper, we focus on top-k query in on-demand Wireless Sensor Networks (WSNs) employing wake-up receivers, which a... [more] |
RCS2022-113 pp.90-95 |
AI |
2022-07-04 11:50 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
Efficient Query Solution and Highly Compressed Indexing for Large RDF Graphs Koji Fujiwara, Ken Kaneiwa (UEC) AI2022-6 |
The number and size of RDF graphs on the Web grow continuously and demand efficient solutions with compressed data stora... [more] |
AI2022-6 pp.31-36 |
IA, ICSS |
2022-06-24 11:50 |
Nagasaki |
Univ. of Nagasaki (Primary: On-site, Secondary: Online) |
Studies on Blacklists based DNS Query Analysis for Malicious Domain Detection Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (Kyutech) IA2022-14 ICSS2022-14 |
Malware infection of network users is one of the critical threats on the Internet. Users have a risk of being infected w... [more] |
IA2022-14 ICSS2022-14 pp.76-80 |
NS, IN (Joint) |
2022-03-10 10:10 |
Online |
Online |
User Attribute Analysis Based on Similarity of DNS Query Logs. Akiko Yano, Daiki Nobayashi, Kazuya Tsukamoto, Takeshi Ikenaga (KIT) NS2021-129 |
It is expected to realize selective and effective information distribution
for users of smart devices, such as providi... [more] |
NS2021-129 pp.43-46 |
SS |
2022-03-07 14:30 |
Online |
Online |
Learning Assumptions for Compositional Verification of Timed Systems with Tree Queries Kotaro Niimi, Shoji Yuen (Nagoya Univ) SS2021-49 |
This paper presents an automatic assumption-learning for compositional verification of timed systems. We focus on Assume... [more] |
SS2021-49 pp.43-48 |
SS |
2022-03-07 15:40 |
Online |
Online |
An algorithm for determining the existence of weakly appropriate data publishing policies in the relational data exchange framework Seiya Aizaki, Yasunori Ishihara (Nanzan Univ.) SS2021-51 |
In the relational data exchange framework, we consider a situation where data are exchanged by not only the source and t... [more] |
SS2021-51 pp.54-59 |
SS |
2022-03-07 18:00 |
Online |
Online |
Extracting Optimal Query Keywords from Bug Report for IR-based Bug Localization Kazuki Hayashi, Takashi Kobayashi (Tokyo Tech.) SS2021-56 |
Bug Localization is a field that is researched to support locating bugs in software programs. Recent research created op... [more] |
SS2021-56 pp.84-89 |
DE, IPSJ-DBS, IPSJ-IFAT |
2021-09-16 14:45 |
Online |
Online |
Approximate query processing using synopses embedded b+trees and preliminary experiments Hiroki Yuasa, Kazuo Goda, Masaru Kitsuregawa (UT) DE2021-13 |
In this paper, we propose a new data structure made by incorporating synopses into b+trees, and make use of the incorpor... [more] |
DE2021-13 pp.7-12 |
IA |
2021-09-08 15:15 |
Online |
Online |
Detection and blocking system for suspicious DNS outbound query using RPZ Hikaru Ichise, Yong Jin (Tokyo Tech), Katsuyoshi Iida (Hokkaido Univ) IA2021-24 |
Bot programs that send DNS query without using the DNS full resolvers in an organization network (direct outbound DNS qu... [more] |
IA2021-24 pp.59-64 |
RCS, SR, NS, SeMI, RCC (Joint) |
2021-07-15 10:30 |
Online |
Online |
Extraction of User Communication Behavior from DNS Query Logs by Non-Negative Tensor Factorization Approach Kotaro Hatanaka, Tatsuaki Kimura, Tetsuya Takine (Osaka Univ.) NS2021-43 |
Understanding user communication behavior by analyzing network logs has been playing an important role in security monit... [more] |
NS2021-43 pp.57-62 |
QIT (2nd) |
2021-05-24 12:10 |
Online |
Online |
Tighter lower bounds of the error probability of multiple quantum channel discrimination Ryo Ito, Ryuhei Mori (Tokyo Tech) |
We give lower bounds of the error probability of general multiple quantum channel discrimination problem for a given num... [more] |
|
QIT (2nd) |
2021-05-25 10:30 |
Online |
Online |
On Efficiencies of Two TPCP maps Discrimination using Quantum Queries Takehisa Iwakoshi (Mie Univ.) |
This study analyses the efficiency of three strategies to discriminate two Trace-Preserving Completely Positive maps (TP... [more] |
|