IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 84  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IN, IA
(Joint)
2023-12-21
12:45
Hiroshima Satellite Campus Hiroshima A proposal on performance improvement method of machine learning-based congestion control using L4S ultra-low latency services
Kazuma Aoki, Rikima Mitsuhashi, Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ.) IA2023-44
In recent years, a wide variety of IoT devices have been deployed, but their low computing power makes it difficult to i... [more] IA2023-44
pp.5-11
RISING
(3rd)
2023-10-31
13:00
Hokkaido Kaderu 2・7 (Sapporo) [Poster Presentation] A consideration of performance improvement of machine learning-based congestion control using L4S ultra-low latency services
Kazuma Aoki, Rikima Mitsuhashi, Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ.)
 [more]
IA 2023-09-21
13:50
Hokkaido Hokkaido Univeristy
(Primary: On-site, Secondary: Online)
A consideration about a discovering method of privacy-enhanced authoritative DNS servers
Satoru Sunahara (CIST), Yong Jin (Tokyo Tech), Katsuyoshi Iida (HU) IA2023-11
Plain-text communication of DNS queries poses a risk of privacy leakage. Therefore, it is imperative to achieve protecti... [more] IA2023-11
pp.1-5
IA, ICSS 2023-06-21
10:55
Saga Saga Univ.
(Primary: On-site, Secondary: Online)
A Consideration of Privacy Preserved IoT Data Inquiry System using DoT
Hayato Sagara (Hokkaido Univ.), Yong Jin (Tokyo Tech), Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ.) IA2023-10 ICSS2023-10
Recently, with the increase of Internet of Things (IoT) devices, the number of cyber-attacks against IoT devices has als... [more] IA2023-10 ICSS2023-10
pp.56-61
IN, IA
(Joint)
2022-12-13
16:40
Hiroshima Higashi-Senda campus, Hiroshima Univ.
(Primary: On-site, Secondary: Online)
[Short Paper] A consideration of DoH-based name resolution architecture for Preventing Privady Leakage from IP Header
Satoru Sunahara (CIST), Yong Jin (Tokyo Tech), Katsuyosh Iida (HU) IA2022-67
 [more] IA2022-67
pp.99-100
IA, CQ, MIKA
(Joint)
2022-09-15
15:35
Hokkaido Hokkaido Citizens Actives Center
(Primary: On-site, Secondary: Online)
Literature survey about Knowledge Defined Networking
Katsuyoshi Iida (Hokkaido Univ.) IA2022-18
There currently are many R&D efforts about AI/ML technologies within the computer networking field. In this paper, we in... [more] IA2022-18
pp.21-25
IA, CQ, MIKA
(Joint)
2022-09-15
17:50
Hokkaido Hokkaido Citizens Actives Center
(Primary: On-site, Secondary: Online)
A consideration of DoH-exclusive DNS architecture
Satoru Sunahara (CIST), Yong Jin (Tokyo Tech), Katsuyoshi Iida (HU) IA2022-23
Conventional DNS communication uses non-encrypted UDP protocol so that DNS cache poisoning attacks and privacy leakage h... [more] IA2022-23
pp.50-53
IA, SITE, IPSJ-IOT [detail] 2022-03-08
14:20
Kyoto Kyoto University, Yoshida Campus
(Primary: On-site, Secondary: Online)
A proposal of detection system for malicious DoH communication generated by DGA-based malware
Rikima Mitsuhashi (The Univ. of Tokyo), Yong Jin (Titech), Katsuyoshi Iida (Hokkaido Univ.), Takahiro Shinagawa (The Univ. of Tokyo), Yoshiaki Takai (Hokkaido Univ.) SITE2021-59 IA2021-72
(To be available after the conference date) [more] SITE2021-59 IA2021-72
pp.79-82
IN, IA
(Joint)
2021-12-17
14:55
Hiroshima Higashi-Senda campus, Hiroshima Univ.
(Primary: On-site, Secondary: Online)
Recognition of Malicious DNS Tunnel Tools by DoH Traffic Analysis Using Multi-stage Machine Learning Technology
Rikima Mitsuhashi (The Univ. of Tokyo), Yong Jin (Titech), Katsuyoshi Iida (Hokkaido Univ.), Takahiro Shinagawa (The Univ. of Tokyo), Yoshiaki Takai (Hokkaido Univ.) IA2021-48
(To be available after the conference date) [more] IA2021-48
pp.85-92
IA 2021-09-08
15:15
Online Online Detection and blocking system for suspicious DNS outbound query using RPZ
Hikaru Ichise, Yong Jin (Tokyo Tech), Katsuyoshi Iida (Hokkaido Univ) IA2021-24
Bot programs that send DNS query without using the DNS full resolvers in an organization network (direct outbound DNS qu... [more] IA2021-24
pp.59-64
IA 2020-11-09
14:57
Hokkaido
(Primary: On-site, Secondary: Online)
Development and evaluation of efficient vulnerability scanning system for IoT networks
Kazusyoshi Watanabe, Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ) IA2020-19
In recent years, a security incident called DRDoS attack, which is a kind of DoS attack using reflections and amplificat... [more] IA2020-19
pp.7-12
IA 2020-11-09
15:19
Hokkaido
(Primary: On-site, Secondary: Online)
A case study on virtual exercise in undergraduate course using network exercise environment fully implemented within browser
Katsuyoshi Iida, Hiroyuki Minami (Hokkaido Univ.) IA2020-20
(To be available after the conference date) [more] IA2020-20
pp.13-20
ET 2020-09-10
10:50
Ishikawa Japan Advanced Institute of Science and Technology Realtime sharing of multiple study notes on a learning website -- Implementation of a learning website: SHIKAKUNO IROHA --
Takanori Sano, Yoshiaki Takai, Katsuyoshi Iida (hokudai) ET2020-13
In this paper , to encourage and facilitate individual web learning activity by well sharing his/her own learning experi... [more] ET2020-13
pp.19-22
CS, IN, NS, NV
(Joint)
2020-09-10
14:50
Online Online [Invited Talk] Recent Research Trends in Detection and Blocking System of Botnet Communications by DNS Traffic Analysis
Katsuyoshi Iida (Hokkaido Univ.), Hikaru Ichise, Yong Jin (Tokyo Tech.) NS2020-41
Botnet, a logical network used by bot-type malware, is becoming a social issue. In this paper, we give an outline of the... [more] NS2020-41
pp.3-6
IA, SITE, IPSJ-IOT [detail] 2020-03-02
14:05
Online Online Implementation and Evaluation of Detection and Blocking System against DGA-based Bot by Focusing on NXDOMAIN Responses
Yuki Iuchi (Hokkaido Univ.), Yong Jin, Hikaru Ichise (Tokyo Tech), Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ.) SITE2019-89 IA2019-67
Recently, security attacks caused by a bot have been widely spreading. In this research, we aim to detect and block Doma... [more] SITE2019-89 IA2019-67
pp.7-12
IA, SITE, IPSJ-IOT [detail] 2019-03-08
10:45
Tokushima Grand XIV Naruto Development and evaluation of human friendly sandbox environment using virtual desktop to provide security and usability
Kazuyoshi Watanabe, Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ.) SITE2018-81 IA2018-73
Sandboxed environment is widely used in computers to protect secret information from Marware. On the other hand, users m... [more] SITE2018-81 IA2018-73
pp.253-258
IN, CCS
(Joint)
2018-08-01
14:50
Hokkaido Kitayuzawa Mori-no-Soraniwa [Invited Talk] Investigate of Low-latency Network based on Edge Computing
Katsuyoshi Iida (Hokkaido Univ.), Krittin Intharawijitr (Tokyo Tech) CCS2018-26 IN2018-13
There currently are many R&D efforts about edge computing, which introduces computing facilities at edge of the network.... [more] CCS2018-26 IN2018-13
pp.7-8
IA 2017-11-15
14:15
Overseas KMITL, Bangkok, Thailand Design and implementation of NS record history database for detecting DNS-based botnet communication
Hikaru Ichise (Tokyo Tech./Hokkaido Univ.), Yong Jin (Tokyo Tech.), Katsuyoshi Iida (Tokyo Tech./Hokkaido Univ.) IA2017-31
DNS (Domain Name System) based domain name resolution service is one of the most fundamental
Internet services for the... [more]
IA2017-31
pp.7-11
NS 2017-10-26
14:55
Osaka I-site nanba [Poster Presentation] Preliminary investigation of approximation analysis about low-latency network architecture
Takeshi Kimura (Hokkaido Univ.), Krittin Intharawijitr (Tokyo Tech.), Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ.) NS2017-104
In cloud computing, geographic distance between data centres and user devices may not let the delay requirement be satis... [more] NS2017-104
pp.69-71
NS, IN
(Joint)
2017-03-02
10:10
Okinawa OKINAWA ZANPAMISAKI ROYAL HOTEL A Bandwidth Allocation Scheme to Meet Flow Requirements in Mobile Edge Computing
Yusuke Ito, Hiroyuki Koga (Univ. of Kitakyushu), Katsuyoshi Iida (Hokkaido Univ.) NS2016-175
Cloud computing has enabled users to enjoy various Internet services provided by data centers through a wide variety of ... [more] NS2016-175
pp.105-110
 Results 1 - 20 of 84  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan