Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-23 10:05 |
Hokkaido |
Sapporo Convention Center |
Intrinsic Cause of Adversarial Examples by Parameter Analysis of Deep Learning Viewed from Data Manifold Hajime Tasaki, Jinhui Chao (Chuo Univ.) |
(To be available after the conference date) [more] |
|
MBE, IEE-MBE |
2024-06-28 15:50 |
Hokkaido |
Hokkaido University of Science (Primary: On-site, Secondary: Online) |
Comparison of operational efficiency of job search status management systems using different programming languages Takayuki Torigoe (Kawasaki University of Medical Welfare), Hisashi Miyazaki (Nippon Bunri University), Isao Kayano (Kawasaki University of Medical Welfare) |
(To be available after the conference date) [more] |
|
EMCJ, IEE-EMC, IEE-SPC |
2024-06-28 11:10 |
Hokkaido |
Hotel Suncity |
Specific Absorption Rates Evaluation for Upward Radio Wave Exposure Using Various Numerical Phantom Models Minori Kagohashi, Takashi Hikage, Manabu Yamamoto (Hokkaido Univ.) |
(To be available after the conference date) [more] |
|
IBISML, NC, IPSJ-BIO, IPSJ-MPS [detail] |
2024-06-20 13:55 |
Okinawa |
OIST |
Evaluation of Transferability for Adversarial Examples Shunichi Kato, Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NC2024-6 IBISML2024-6 |
Adversarial Example (AE) has been reported as a threat to AI. AE is an attack that misclassify prediction results by add... [more] |
NC2024-6 IBISML2024-6 pp.37-42 |
NLP, CCS |
2024-06-06 10:20 |
Fukuoka |
West Japan General Exhibition Center AIM |
The Relationship between Power Laws in Neural Representation and Image Recognition Riku Matsumoto, Yasuhiro Tsuno (Ritsumeikan Univ.) NLP2024-16 CCS2024-3 |
Recent neuroscience research has found that when examining the dimensionality of the neural state space in the primary v... [more] |
NLP2024-16 CCS2024-3 pp.8-13 |
ISEC |
2024-05-15 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Detection of Adversarial Example Attacks in Deep Learning Focusing on Data Manifolds and Inner Product Signs in Classifiers Hiroki Hisashige, Hajime Tasaki, Mao Fujita, Jinhui Chao (Chuo Univ.) ISEC2024-2 |
Adversarial example attacks against Deep Learning are known to lead misclassification by adding invisible perturbations ... [more] |
ISEC2024-2 pp.7-12 |
ICSS, IPSJ-SPT |
2024-03-22 14:55 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Adversarial Examples with Missing Perturbation Using Laser Irradiation Daisuke Kosuge, Hayato Watanabe, Taiga Manabe, Yoshihisa Takayama, Toshihiro Ohigashi (Tokai Univ.) ICSS2023-97 |
In recent years, neural networks have made remarkable progress in the field of image processing and other areas, and the... [more] |
ICSS2023-97 pp.201-207 |
SIS |
2024-03-14 14:50 |
Kanagawa |
Kanagawa Institute of Technology (Primary: On-site, Secondary: Online) |
Improvement of Detection Accuracy for Detection of Calcification Regions in Dental Panoramic Radiographs Using LVAT Naoki Ikeda, Sei Takano, Mitsuji Muneyasu, Soh Yoshida, Akira Asano (Kansai Univ.), Nanae Dewake, Nobuo Yoshinari (Matsumoto Dental Univ.), Keiichi Uchida (Matsumoto Dental Univ. Hospital) SIS2023-50 |
Carotid arteries on dental panoramic radiographs may show areas of calcification, a sign of vascular disease. The sudden... [more] |
SIS2023-50 pp.27-32 |
CAS, CS |
2024-03-15 14:20 |
Okinawa |
|
Recoloring aware Countermeasure against Adversarial Examples Chisei Ishida, Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2023-134 CS2023-127 |
Adversarial Examples(AEs) which cause artificial intelligence (AI) to make a false prediction by embedded slight perturb... [more] |
CAS2023-134 CS2023-127 pp.128-133 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Performance Evaluation of Visible Light Communication System Using Imaginary Images based Image Classifier Masataka Naito, Tadahiro Wada, Kaiji Mukumoto (Shizuoka Univ.), Hiraku Okada (Nagoya Univ.) IT2023-78 ISEC2023-77 WBS2023-66 RCC2023-60 |
For visible light communication systems that utilizes machine learning-based image classifiers for information embedding... [more] |
IT2023-78 ISEC2023-77 WBS2023-66 RCC2023-60 pp.20-25 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Improving The Classification Accuracy of Imaged Malware through Data Expansion Kaoru Yokobori, Hiroki Tanioka, Masahiko Sano, Kenji Matsuura, Tetsushi Ueta (Tokushima Univ.) IT2023-115 ISEC2023-114 WBS2023-103 RCC2023-97 |
Although malware-based attacks have existed for years,
malware infections increased in 2019 and 2020.
One of the reaso... [more] |
IT2023-115 ISEC2023-114 WBS2023-103 RCC2023-97 pp.259-264 |
IA, SITE, IPSJ-IOT [detail] |
2024-03-13 13:40 |
Okinawa |
Miyakojima City Future Creation Center (Primary: On-site, Secondary: Online) |
A Steganalysis of Image Steganography using Real Image Denoising Shinnosuke Toguchi, Takamichi Miyata (CIT) SITE2023-100 IA2023-106 |
Image steganography is a technique for embedding secret messages in images. SteganoGAN, one of the previous methods, use... [more] |
SITE2023-100 IA2023-106 pp.195-202 |
NC, MBE (Joint) |
2024-03-12 13:30 |
Tokyo |
The Univ. of Tokyo (Primary: On-site, Secondary: Online) |
Diffusion-Based Immediate Adversarial Purification Yuito Narisawa, Motonobu Hattori (Yamanashi Univ.) NC2023-56 |
Neural networks have achieved high performance in image classification, but there is a problem known as Adversarial Exam... [more] |
NC2023-56 pp.75-80 |
PRMU, IBISML, IPSJ-CVIM |
2024-03-04 09:12 |
Hiroshima |
Hiroshima Univ. Higashi-Hiroshima campus (Primary: On-site, Secondary: Online) |
Creating Adversarial Examples to Deceive Both Humans and Machine Learning Models Ko Fujimori (Waseda Univ.), Toshiki Shibahara (NTT), Daiki Chiba (NTT Security), Mitsuaki Akiyama (NTT), Masato Uchida (Waseda Univ.) PRMU2023-65 |
One of the vulnerability attacks against neural networks is the generation of Adversarial Examples (AE), which induce mi... [more] |
PRMU2023-65 pp.82-87 |
PRMU, IBISML, IPSJ-CVIM |
2024-03-04 09:36 |
Hiroshima |
Hiroshima Univ. Higashi-Hiroshima campus (Primary: On-site, Secondary: Online) |
Disabling Adversarial Examples through Color Information Processing Ryo Soeda, Masato Uchida (Waseda Univ.) PRMU2023-67 |
Image classification using neural networks is expected to have a wide range of applications, including automated driving... [more] |
PRMU2023-67 pp.94-99 |
MI |
2024-03-04 09:00 |
Okinawa |
OKINAWAKEN SEINENKAIKAN (Primary: On-site, Secondary: Online) |
Distance-informed adversarial learning for metal artifact reduction Daisuke Shigemori, Megumi Nakao (Kyoto Univ.) MI2023-62 |
In this study, we propose an adversarial learning framework that utilises distance information from metal to reduce CT m... [more] |
MI2023-62 pp.95-98 |
PRMU, IBISML, IPSJ-CVIM |
2024-03-04 10:52 |
Hiroshima |
Hiroshima Univ. Higashi-Hiroshima campus (Primary: On-site, Secondary: Online) |
Illust Protection against Generative AI using DnCNN Yukiya Fukuda, Daiju Kanaoka (Kyutech), Hakaru Tamukoh (Kyutech/Research Center for Neuromorphic AI Hardware) PRMU2023-71 |
Although generative AI such as stable diffusion are rapidly developing, but there are concerns about problems such as un... [more] |
PRMU2023-71 pp.116-121 |
EMM |
2024-03-02 14:00 |
Overseas |
Day1:JEJU TECHNOPARK, Day2:JEJU Business Agency |
[Poster Presentation]
Detection of Partial Deepfake Videos Based on Facial Feature Points Sasuke Kobayashi, Hyunho Kang (NITTC) EMM2023-91 |
(To be available after the conference date) [more] |
EMM2023-91 pp.13-16 |
SIP, SP, EA, IPSJ-SLP [detail] |
2024-02-29 10:30 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Multi-task learning with age information model for highly accurate elderly speech recognition. Shine Takumi, Kinouchi Takahiro, Wakabayashi Yukoh, Kitaoka Norihide (TUT) EA2023-64 SIP2023-111 SP2023-46 |
The speech recognition of the elderly is less accurate, especially in smart speaker speech recognition, due to aging-rel... [more] |
EA2023-64 SIP2023-111 SP2023-46 pp.19-24 |
SIP, SP, EA, IPSJ-SLP [detail] |
2024-03-01 09:30 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Black-Box Adversarial Attack for Math Formula Recognition Model Haruto Namura, Masatomo Yoshida (Doshisha Univ.), Nicola Adami (UNIBS), Masahiro Okuda (Doshisha Univ.) EA2023-110 SIP2023-157 SP2023-92 |
Remarkable advances in deep learning have greatly improved the accuracy of image analysis. The progress of deep learning... [more] |
EA2023-110 SIP2023-157 SP2023-92 pp.289-293 |