IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Biometrics (BioX)  (Searched in: 2019)

Search Results: Keywords 'from:2019-07-23 to:2019-07-23'

[Go to Official BioX Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 21 - 40 of 50 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
13:35
Kochi Kochi University of Technology Proposal of Spam Filter by Applying Neural Network for Mitigating Catastrophic Forgetting
Shuiti Kawahara, Lu Chen, Hiroyuki Inaba (KIT) ISEC2019-32 SITE2019-26 BioX2019-24 HWS2019-27 ICSS2019-30 EMM2019-35
The trend of spam mails is changing. Since, in recent years, spam mails sent from overseas mail serversare increasing, s... [more] ISEC2019-32 SITE2019-26 BioX2019-24 HWS2019-27 ICSS2019-30 EMM2019-35
pp.171-178
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
14:00
Kochi Kochi University of Technology Video Watermarking Using Difference of Persistent Homology in Consecutive Frames
Takaya Kimura, Hiroyuki Inaba (KIT) ISEC2019-33 SITE2019-27 BioX2019-25 HWS2019-28 ICSS2019-31 EMM2019-36
Copyright infringement such as illegal copying and uploading video contents frequently happen in many
video distributio... [more]
ISEC2019-33 SITE2019-27 BioX2019-25 HWS2019-28 ICSS2019-31 EMM2019-36
pp.179-186
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
14:25
Kochi Kochi University of Technology A simulation of a 3-D visual cryptography using holography
Takumi Takazawa, Kazuhiro Suzuki, Naoki Takada (Kochi Univ.) ISEC2019-34 SITE2019-28 BioX2019-26 HWS2019-29 ICSS2019-32 EMM2019-37
With the development of technologies for acquiring and recording data of 3-D objects, their security and privacy protect... [more] ISEC2019-34 SITE2019-28 BioX2019-26 HWS2019-29 ICSS2019-32 EMM2019-37
pp.187-192
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
09:30
Kochi Kochi University of Technology SecureHID: Securing the USB Interface
Jan Goette (Waseda Univ.), Naoto Yanai (Osaka Univ.), Tatsuya Mori (Waseda Univ.) ISEC2019-35 SITE2019-29 BioX2019-27 HWS2019-30 ICSS2019-33 EMM2019-38
 [more] ISEC2019-35 SITE2019-29 BioX2019-27 HWS2019-30 ICSS2019-33 EMM2019-38
pp.199-206
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
09:55
Kochi Kochi University of Technology A Performance Analysis of Supersingular Isogeny Diffie-Hellman with Several Classes of the Quadratic Extension Fields
Yuki Nanjo (Okayama Univ.), Masaaki Shirase (Future Univ. Hakodate), Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) ISEC2019-36 SITE2019-30 BioX2019-28 HWS2019-31 ICSS2019-34 EMM2019-39
It is well-known that the class of binomial extension field (BEF) is widely used to construct a quadratic extension fiel... [more] ISEC2019-36 SITE2019-30 BioX2019-28 HWS2019-31 ICSS2019-34 EMM2019-39
pp.207-214
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
10:20
Kochi Kochi University of Technology Privacy for Documents and Prototype of Risk Evaluation Tool
Tomoaki Mimoto, Shinsaku Kiyomoto (KDDI Research), Koji Kitamura (AIST), Atsuko Miyaji (Osaka Univ.) ISEC2019-23 SITE2019-17 BioX2019-15 HWS2019-18 ICSS2019-21 EMM2019-26
 [more] ISEC2019-23 SITE2019-17 BioX2019-15 HWS2019-18 ICSS2019-21 EMM2019-26
pp.113-118
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
09:05
Kochi Kochi University of Technology Instruction Replacement Fault Attack for TVC using Double Laser Station
Tomoro Suzuki, Junichi Sakamoto, Tsutomu Matsumoto (YNU) ISEC2019-38 SITE2019-32 BioX2019-30 HWS2019-33 ICSS2019-36 EMM2019-41
A powerful attack method called instruction replacement attack has been reported. The method manipulates any 1bit of a m... [more] ISEC2019-38 SITE2019-32 BioX2019-30 HWS2019-33 ICSS2019-36 EMM2019-41
pp.221-225
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
09:30
Kochi Kochi University of Technology Electromagnetic Analysis Attacks on an ASIC Implementation of a Ring-Oscillator PUF
Mitsuru Shiozaki, Takeshi Fujino (Ritsumeikan Univ.) ISEC2019-39 SITE2019-33 BioX2019-31 HWS2019-34 ICSS2019-37 EMM2019-42
Physically unclonable functions (PUFs) are assumed to provide high tamper resistance against counterfeits and hardware a... [more] ISEC2019-39 SITE2019-33 BioX2019-31 HWS2019-34 ICSS2019-37 EMM2019-42
pp.227-234
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
09:55
Kochi Kochi University of Technology Fundamental Study on an Estimation Method of Irradiate Frequencies to Forcibly Cause Electromagnetic Information Leakage
Shugo Kaji (NAIST), Masahiro Kinugawa (NIT), Daisuke Fujimoto, Yu-ichi Hayashi (NAIST) ISEC2019-40 SITE2019-34 BioX2019-32 HWS2019-35 ICSS2019-38 EMM2019-43
The threats of electromagnetic (EM) information leakage from the input/output (I/O) signal of an IC mounted on a de-vice... [more] ISEC2019-40 SITE2019-34 BioX2019-32 HWS2019-35 ICSS2019-38 EMM2019-43
pp.235-238
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
10:20
Kochi Kochi University of Technology Instrumentation Security of Ranging Pulse LIDARs Using Multiple Photodetectors
Tatsuya Suehiro, Ryuya Ichinose, Satoru Sakurazawa, Naoki Yoshida, Tsutomu Matsumoto (YNU) ISEC2019-41 SITE2019-35 BioX2019-33 HWS2019-36 ICSS2019-39 EMM2019-44
Instrumentation security, that is the security at the sensing or instrumentation stage, is recognized as a major issue i... [more] ISEC2019-41 SITE2019-35 BioX2019-33 HWS2019-36 ICSS2019-39 EMM2019-44
pp.239-242
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
09:30
Kochi Kochi University of Technology Generation of Family Resemblance Inference Rules by Boid Annotation and Labeled-LDA -- A Machine Learning Approach to Integrate Inference Attack Analysis and Covert Channel Attack Analysis --
Kosuke Kurebayashi, Tetsuya Morizumi, Hirotsugu Kinoshita (KU) ISEC2019-42 SITE2019-36 BioX2019-34 HWS2019-37 ICSS2019-40 EMM2019-45
In this paper we propose a method for machine learning similar chains of words (word chains) similar to "rules for infer... [more] ISEC2019-42 SITE2019-36 BioX2019-34 HWS2019-37 ICSS2019-40 EMM2019-45
pp.243-249
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
09:55
Kochi Kochi University of Technology Implicit Guidance & Control at OODA Loop using as Countermeasures -- against SMS phishing --
Yuidhi Takigawa (N.D.A.), Takeo Tatsumi (O.U.J/) ISEC2019-43 SITE2019-37 BioX2019-35 HWS2019-38 ICSS2019-41 EMM2019-46
This document describes the benefit of “‘Implicit Guidance & Control” in the OODA loop as a countermeasure against phish... [more] ISEC2019-43 SITE2019-37 BioX2019-35 HWS2019-38 ICSS2019-41 EMM2019-46
pp.251-258
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
10:20
Kochi Kochi University of Technology Server Configuration Training Including Vulnerability Assessment and Remediation process
Daisuke Suzuki (Hokuriku Univ.) ISEC2019-44 SITE2019-38 BioX2019-36 HWS2019-39 ICSS2019-42 EMM2019-47
Penetration testing exercise as a part of the information security education for undergraduate students is effective on ... [more] ISEC2019-44 SITE2019-38 BioX2019-36 HWS2019-39 ICSS2019-42 EMM2019-47
pp.259-263
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
10:55
Kochi Kochi University of Technology Investigation on Blockchain-based Malware Information Sharing Method in Malware Detection System
Ryusei Fuji, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama (Univ. of Miyazaki), Mirang Park (Kanagawa Inst. of Tech.), Norio Shiratori (Chuo Univ.), Naonobu Okazaki (Univ. of Miyazaki) ISEC2019-45 SITE2019-39 BioX2019-37 HWS2019-40 ICSS2019-43 EMM2019-48
Rapid malware detection is very important because malware causes serious damage to the modern society based on the Inter... [more] ISEC2019-45 SITE2019-39 BioX2019-37 HWS2019-40 ICSS2019-43 EMM2019-48
pp.293-298
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
11:20
Kochi Kochi University of Technology Automatic Node Manipulation System for Active Monitoring Environment
Shingo Yasuda, Nobuyuki Kanaya, Yu Tsuda, Satoshi Ohta, Ryosuke Miura, Daisuke Inoue (NICT) ISEC2019-46 SITE2019-40 BioX2019-38 HWS2019-41 ICSS2019-44 EMM2019-49
 [more] ISEC2019-46 SITE2019-40 BioX2019-38 HWS2019-41 ICSS2019-44 EMM2019-49
pp.299-304
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
11:45
Kochi Kochi University of Technology A Study on Suppression of Inappropriate Use of Illegal Contents Based on Conformity Caused by Normative Influence
Hiroki Yamaguchi, Kazuhiro Kono (Kansai Univ.) ISEC2019-47 SITE2019-41 BioX2019-39 HWS2019-42 ICSS2019-45 EMM2019-50
Copyright infringement by illegal contents uploaded on the Internet has become a social issue. However, it is hard to su... [more] ISEC2019-47 SITE2019-41 BioX2019-39 HWS2019-42 ICSS2019-45 EMM2019-50
pp.305-310
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
12:10
Kochi Kochi University of Technology Recording device identification based on audio distortion depending on system-on-chip
Akira Nishimura (Tokyo Univ. Info. Sci.) ISEC2019-48 SITE2019-42 BioX2019-40 HWS2019-43 ICSS2019-46 EMM2019-51
This study addresses device-specific distortion observed in recorded
audio, to identify a built-in system-on-a-chip (... [more]
ISEC2019-48 SITE2019-42 BioX2019-40 HWS2019-43 ICSS2019-46 EMM2019-51
pp.311-316
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
10:55
Kochi Kochi University of Technology Stochastic Existence Connecting Logos that are not necessarily completely divided and Language Games -- Limitations of Security Models and the Possibility of Artificial Intelligence --
Tetsuya Morizumi (KU) ISEC2019-49 SITE2019-43 BioX2019-41 HWS2019-44 ICSS2019-47 EMM2019-52
In this paper we describe that AI architecture including input data in artificial intelligence system for Bayesian estim... [more] ISEC2019-49 SITE2019-43 BioX2019-41 HWS2019-44 ICSS2019-47 EMM2019-52
pp.317-324
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
11:20
Kochi Kochi University of Technology International regulatory trend survey report on AI -- Focusing on the OECD Principles on AI --
Naonori Kato (KDDI Research), Masatomo Suzuki (Niigata Univ./RIKEN), Yoichiro Itakura (Hikari Sogoh Law Offices/RIKEN), Yosuke Murakami (KDDI Research) ISEC2019-50 SITE2019-44 BioX2019-42 HWS2019-45 ICSS2019-48 EMM2019-53
 [more] ISEC2019-50 SITE2019-44 BioX2019-42 HWS2019-45 ICSS2019-48 EMM2019-53
pp.325-331
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
11:45
Kochi Kochi University of Technology Development of the Ethics Assessment for Research & Innovation Guidelines under the SATORI project in Europe (1) -- Background and Outline --
Takushi Otani (Kibi International Univ.), Hirotaka Osawa (Tsukuba Univ.), Minao Kukita (Nagoya Univ.), Reina Saijo (Kyoto Univ.) ISEC2019-51 SITE2019-45 BioX2019-43 HWS2019-46 ICSS2019-49 EMM2019-54
This presentation summarizes the background and outline of the European Commission (EC)’s Stakeholders Acting Together O... [more] ISEC2019-51 SITE2019-45 BioX2019-43 HWS2019-46 ICSS2019-49 EMM2019-54
pp.333-340
 Results 21 - 40 of 50 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan