Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SIP, SP, EA, IPSJ-SLP [detail] |
2024-02-29 09:30 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Vocal tract length perturbation-based pseudo-speaker augmentation for automatic speaker verification Tomoka Wakamatsu, Sayaka Shiota, Hitoshi Kiya (Tokyo Metropolitan Univ.) EA2023-61 SIP2023-108 SP2023-43 |
In recent years, deep neural network (DNN)-based automatic speaker verification (ASV) systems have become mainstream. Da... [more] |
EA2023-61 SIP2023-108 SP2023-43 pp.1-6 |
SIP, SP, EA, IPSJ-SLP [detail] |
2024-02-29 09:50 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Pseudo-speaker augmentation based on vocal tract length perturbation considering speaker variability for speaker verification Fumika Ono, Tomoka Wakamatsu, Sayaka Shiota (TMU) EA2023-62 SIP2023-109 SP2023-44 |
In order to construct a reliable speaker verification system based on speaker embeddings, it is necessary to train the s... [more] |
EA2023-62 SIP2023-109 SP2023-44 pp.7-12 |
SS |
2023-03-15 09:30 |
Okinawa |
(Primary: On-site, Secondary: Online) |
On Polynomial Interpretations Toward Termination of Logically Constrained Term Rewrite Systems with Bit Vector Arithmetic Ayuka Matsumi, Naoki Nishida, Misaki Kojima, Donghoon Shin (Nagoya Univ.) SS2022-61 |
Logically constrained term rewrite systems with the bit-vector theory (BV-LCTRSs, for short) are useful as models of pro... [more] |
SS2022-61 pp.85-90 |
HWS, VLD |
2023-03-02 15:20 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Secure Cache System against On-Chip Threats Keisuke Kamahori, Shinya Takamaeda (UTokyo) VLD2022-95 HWS2022-66 |
In this paper, we propose a new threat model for secure processor design that considers on-chip threats.
Also, we desi... [more] |
VLD2022-95 HWS2022-66 pp.113-118 |
CNR, BioX |
2023-03-02 10:00 |
Oita |
(Primary: On-site, Secondary: Online) |
Using hiragana and katakana Writer's verification by Siamese Network Daichi Kaku, Akira Kubota (Chuo Univ) BioX2022-70 CNR2022-36 |
Due to the measures against infectious diseases of the new coronavirus, the online processing of documents has progresse... [more] |
BioX2022-70 CNR2022-36 pp.47-52 |
MSS, SS |
2023-01-10 11:00 |
Osaka |
(Primary: On-site, Secondary: Online) |
[Panel Discussion]
Review of Mathematical Systems Science and its Applications (MSS) Research Group Activities and Future Prospects
-- Messages from Past MSS Chairs -- Atsuo Ozaki (OIT), Kunihiko Hiraishi (JAIST), Yuichi Nakamura (NEC), Satoshi Yamane (Kanazawa Univ.), Morikazu Nakamura (Univ. of the Ryukyus), Shigemasa Takai (Osaka Univ.) MSS2022-44 SS2022-29 |
Ten years have passed since the Mathematical Systems Science and its Applications (MSS) was established in 2011. To comm... [more] |
MSS2022-44 SS2022-29 pp.1-4 |
MSS, NLP |
2022-03-29 14:55 |
Online |
Online |
Verification of spacecraft operational scenario using Little-JIL Kazunori Someya (JAXA), Kunihiko Hiraishi (JAIST) MSS2021-78 NLP2021-149 |
Inadequate operational scenario leads to satellite loss in the case of the operational accident of the X-ray astronomy s... [more] |
MSS2021-78 NLP2021-149 pp.121-126 |
SS |
2022-03-07 14:30 |
Online |
Online |
Learning Assumptions for Compositional Verification of Timed Systems with Tree Queries Kotaro Niimi, Shoji Yuen (Nagoya Univ) SS2021-49 |
This paper presents an automatic assumption-learning for compositional verification of timed systems. We focus on Assume... [more] |
SS2021-49 pp.43-48 |
CNR, BioX |
2022-03-04 14:20 |
Online |
Online |
Synthesizing Deep Master Voices for Wolf Attacking on Speaker Recognition Systems Jun Tsuchiya, Masakatsu Nishigaki, Tetsushi Ohki (Shizuoka Univ.) BioX2021-53 CNR2021-34 |
In this paper, we propose an attack on speaker verification systems by Deep Master Voice using GAN-based wolf voice.GAN-... [more] |
BioX2021-53 CNR2021-34 pp.33-38 |
SANE |
2021-11-11 13:20 |
Online |
Online |
TDOA and AOA Measurement System for Investigating Aircraft Position Verification Junichi Naganawa, Hiromi Miyazaki, Hirohisa Tajima, Tadashi Koga, Jun Kitaori (ENRI) SANE2021-44 |
ADS-B (Automatic Dependent Surveillance—Broadcast) is an emerging means of aeronautical surveillance for air traffic con... [more] |
SANE2021-44 pp.65-70 |
SANE |
2021-06-25 14:20 |
Online |
Online |
System Design Consideration for Aircraft Position Verification Method using TDOA and AOA Junichi Naganawa, Hiromi Miyazaki, Tadashi Koga, Hirohisa tajima, Yasuyuki Kakubari (ENRI) SANE2021-14 |
ADS-B (Automatic Dependent Surveillance-Broadcast) is one of the next generation aeronautical surveillance systems, wher... [more] |
SANE2021-14 pp.29-34 |
HCGSYMPO (2nd) |
2020-12-15 - 2020-12-17 |
Online |
Online |
Speaker verification system using singing voice Yui Moriyama, Yasuo Horiuchi, Shingo Kuroiwa (Chiba Univ.) |
We propose to use a singing voice of one or two phrases in a speaker verification system. The system consists of a tradi... [more] |
|
NS, ICM, CQ, NV (Joint) |
2020-11-27 11:45 |
Online |
Online |
A Proposal of Framework for Authentication Systems and Verification Method Motoshi Horii, Toshihiro Shimizu (Fujitsu Lab.), Satoshi Imai (Fujitsu) CQ2020-58 |
With the digitization of various procedures, various security incidents have been occurring frequently. To prevent the o... [more] |
CQ2020-58 pp.62-65 |
SS |
2020-03-04 15:10 |
Okinawa |
(Cancelled but technical report was issued) |
Transforming Programs with Exclusive Control into Logically Constrained Term Rewrite Systems Misaki Kojima, Naoki Nishida, Yutaka Matsubara, Masahiko Sakai (Nagoya Univ.) SS2019-46 |
To apply Logically Constrained Term Rewrite Systems (LCTRSs, for short) to program verification, a previous work targets... [more] |
SS2019-46 pp.31-36 |
SP, EA, SIP |
2020-03-02 13:00 |
Okinawa |
Okinawa Industry Support Center (Cancelled but technical report was issued) |
Vulnerability investigation of speaker verification against black-box adversarial attacks Hiroto Kai, Sayaka Shiota, Hitoshi Kiya (TMU) EA2019-106 SIP2019-108 SP2019-55 |
Recently,vulnerability against adversarial attacks is being feared for machine learning-based systems.Adversarial attack... [more] |
EA2019-106 SIP2019-108 SP2019-55 pp.29-33 |
SANE |
2019-11-28 16:15 |
Osaka |
OIT UMEDA Campus |
Experimental Evaluation of Aircraft Position Verification Method using TDOA Junichi Naganawa, Hiromi Miyazaki (ENRI) SANE2019-75 |
ADS-B (Automatic Dependent Surveillance - Broadcast) is one of the next generation aeronautical surveillance systems.
... [more] |
SANE2019-75 pp.29-34 |
KBSE, SC |
2019-11-08 15:40 |
Nagano |
Shinshu University |
A Case-study for Developpment and Verification of an Embedded System Kozo Okano, Shinpei Ogata, Miki Natsume (Shinshu Univ.) KBSE2019-30 SC2019-27 |
Through a development of an embedded system and design verification, we report on the issues and workload when novice en... [more] |
KBSE2019-30 SC2019-27 pp.41-46 |
SS |
2019-03-04 17:10 |
Okinawa |
|
Formal STAMP Modelling toward Safety Verification of Hybrid Systems Mitsuaki Tsuji, Toshinori Takai (NAIST), Masafumi Katahira, Naoki Ishihama (JAXA), Kazuki Kakimoto, Hajimu Iida (NAIST) SS2018-67 |
Safety-critical systems, for example, autonomous vehicles and space systems, are required to be safe and reliable. Recen... [more] |
SS2018-67 pp.91-96 |
SANE |
2019-01-25 16:05 |
Nagasaki |
Nagasaki Prefectural Art Museum |
Construction of Development Environment for High Reliability and Development Efficiency of Nano Satellite Orbit Control Software Yota Uehara, Shinichi Kimura (TUS) SANE2018-109 |
In recent years, requirement for micro satellites have diversified with the activation of micro satellite development, a... [more] |
SANE2018-109 pp.109-113 |
SANE |
2018-10-12 09:30 |
Tokyo |
The University of Electro-Communications |
Considering Latency in TDOA-based ADS-B Position Verification Junichi Naganawa, Hiromi Miyazaki (ENRI) SANE2018-44 |
ADS-B (Automatic Dependent Surveillance - Broadcast) is one of the next generation aeronautical surveillance systems.
... [more] |
SANE2018-44 pp.1-6 |