IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 39  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2024-07-22
13:00
Hokkaido Sapporo Convention Center [Invited Talk] Cybernetic Avata Service Use Cases and Security -- Backcasting from Year 2050 --
Masakatsu Nishigaki (Shizuoka Univ.), Yasushi Makihara (Osaka Univ.), Yin Chen (Reitaku Univ.), Tetsushi Ohki (Shizuoka Univ.), Rie Yamaguchi (Univ. of Tokyo), Yasushi Yagi (Osaka Univ.)
 [more]
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2024-07-22
14:15
Hokkaido Sapporo Convention Center A Study of Multibiometrics Using a Single Face Image
Koichi Ito, Taito Tonosaki, Takafumi Aoki (Tohoku Univ.), Tetsushi Ohki, Masakatsu Nishigaki (Shizuoka Univ.)
 [more]
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2024-07-23
14:50
Hokkaido Sapporo Convention Center Innovations in Security Mechanisms through Decomposition and Reuse of Body Functions: A Preliminary Study on Password Authentication(part 2)
Takumi Takaiwa, Seiya Kajihara, Tsubasa Shibata, Soichi Takigawa, Tetsushi Ohki, Masakatsu Nishigaki (Shizuoka Univ.)
 [more]
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2024-07-23
16:05
Hokkaido Sapporo Convention Center CAPT-AI: Study on AI identification using differences in ability (part 2)
Seiya Kajihara, Takumi Takaiwa, Tsubasa Shibata (Shizuoka Univ.), Nami Ashizawa (NTT/Shizuoka Univ.), Naoto Kiribuchi, Toshiki Shibahara (NTT), Tetsushi Ohki, Masakatsu Nishigaki (Shizuoka Univ.)
 [more]
ITE-ME, ITE-IST, BioX, SIP, MI, IE [detail] 2024-06-07
10:30
Niigata Nigata University (Ekinan-Campus "TOKIMATE") Innovations in Security Mechanisms through Decomposition and Reuse of Body Functions: A Preliminary Study on Password Authentication
Takumi Takaiwa, Seiya Kajihara, Tsubasa Shibata, Soichi Takigawa, Tetsushi Ohki, Masakatsu Nishigaki (Shizuoka Univ.) SIP2024-7 BioX2024-7 IE2024-7 MI2024-7
(To be available after the conference date) [more] SIP2024-7 BioX2024-7 IE2024-7 MI2024-7
pp.34-39
BioX 2023-10-12
16:55
Okinawa Nobumoto Ohama Memorial Hall Detecting Human Psychological Consistency: Study on Attack Detection Against Advanced Persistent Social Engineering
Kota Numada, Shinnosuke Nozaki, Takumi Takaiwa, Tetsushi Ohki, Masakatsu Nishigaki (Shizuoka univ.) BioX2023-63
(To be available after the conference date) [more] BioX2023-63
pp.26-31
BioX 2023-10-12
17:15
Okinawa Nobumoto Ohama Memorial Hall A Study of Multibiometrics Considering Properties of Biometric Traits
Taito Tonosaki, Koichi Ito, Takafumi Aoki (Tohoku Univ.), Tetsushi Ohki, Masakatsu Nishigaki (Shizuoka Univ.) BioX2023-64
The performance of biometric authentication can be improved by combining multiple biometric traits, which is known as mu... [more] BioX2023-64
pp.32-36
ICSS, IPSJ-SPT 2023-03-13
12:30
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Developing a Hand Gesture Recognition System for VR Devices
Mei Suzuki, Ryo Iijima, Kazuki Nomoto (Waseda Univ.), Tetsushi Ohki (Shizuoka Univ./AIP), Tatsuya Mori (Waseda Univ./NICT/AIP) ICSS2022-48
We develop a hand gesture recognition scheme using finger movements to recognize the VR user wearing a head-mounted disp... [more] ICSS2022-48
pp.1-6
SC 2022-05-27
09:55
Online Online Considerations for Identifying Machine Learning Models
Naoto Kiribuchi, Ryohei Suzuki, Nami Ashizawa (NTT), Tetsushi Ohki, Hiroshi Mineno, Masakatsu Nishigaki (Shizuoka Univ.) SC2022-2
As a part of considerations for identifying machine learning models, we experimented whether we can identify multiple di... [more] SC2022-2
pp.7-12
IT, ISEC, RCC, WBS 2022-03-10
11:35
Online Online Improving accuracy by optimizing activation function for convolutional neural network using homomorphic encryption
Kohei Yagyu, Ren Takeuchi, Vo Ngoc Khoi Nguyen, Masakatsu Nishigaki, Tetsushi Ohki (Shizuoka Univ.) IT2021-92 ISEC2021-57 WBS2021-60 RCC2021-67
The development of secure neural network technology that performs prediction while encrypting data using homomorphic enc... [more] IT2021-92 ISEC2021-57 WBS2021-60 RCC2021-67
pp.58-65
CNR, BioX 2022-03-04
14:20
Online Online Synthesizing Deep Master Voices for Wolf Attacking on Speaker Recognition Systems
Jun Tsuchiya, Masakatsu Nishigaki, Tetsushi Ohki (Shizuoka Univ.) BioX2021-53 CNR2021-34
In this paper, we propose an attack on speaker verification systems by Deep Master Voice using GAN-based wolf voice.GAN-... [more] BioX2021-53 CNR2021-34
pp.33-38
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2021-07-19
16:55
Online Online Evaluation on Biometric Template Protection System Based on Somewhat Homomorphic Encryption
Hiroto Tamiya, Toshiyuki Isshiki, Kengo Mori (NEC), Satoshi Obana (Hosei Univ.), Tetsushi Ohki (Shizuoka Univ.) ISEC2021-21 SITE2021-15 BioX2021-22 HWS2021-21 ICSS2021-26 EMM2021-26
Many biometric template protection systems have been proposed to perform biometric authentication while keeping the biom... [more] ISEC2021-21 SITE2021-15 BioX2021-22 HWS2021-21 ICSS2021-26 EMM2021-26
pp.68-73
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2021-07-20
10:55
Online Online A Study of Black-box Adversarial Attack for Face Recognition Systems
Vo Ngoc Khoi Nguyen, Takamichi Terada, Masakatsu Nishigaki, Tetsushi Ohki (Shizuoka Univ.) ISEC2021-22 SITE2021-16 BioX2021-23 HWS2021-22 ICSS2021-27 EMM2021-27
 [more] ISEC2021-22 SITE2021-16 BioX2021-23 HWS2021-22 ICSS2021-27 EMM2021-27
pp.74-79
ICSS, IPSJ-SPT 2021-03-02
11:30
Online Online Detecting unknown malware families by anomaly detection using deep learning
Ren Takeuchi, Shintaro Mizuno, Vo Ngoc Khoi Nguyen, Jun Tsuchiya, Masakatsu Nishigaki, Tetsushi Ohki (Shizuoka Univ.) ICSS2020-59
The analysis of malware has become an indispensable process for anti-malware. Malware is diversifying day by day, so tha... [more] ICSS2020-59
pp.195-200
HWS 2020-04-07
11:15
Online Online IoTPoCoFuzz: Power Consumption aware Fuzzing against IoT device
Shintaro Mizuno, Masakatsu Nishigaki, Tetsushi Ohki (Shizuoka Univ.) HWS2020-4
In many cases, IoT devices have limitations on input and program activation, and that makes it difficult for external te... [more] HWS2020-4
pp.19-24
BioX, CNR 2020-03-04
17:35
Tokyo
(Cancelled but technical report was issued)
A Study of Liveness Detection Method using Perspiration
Ryosuke Okudera, Yumo Ouchi, Yuya Shiomi, Ayaka Sugimoto, Genki Sugimoto, Masahiro Fujita, Yuto Mano, Tetsushi Ohki, Masakatsu Nishigaki (Shizuoka Univ.) BioX2019-67 CNR2019-50
 [more] BioX2019-67 CNR2019-50
pp.31-34
PRMU, BioX 2019-03-17
10:30
Tokyo   A Study on Human Reflex Based Biometric Authentication Using Eye-Head Coordination (part 3)
Yosuke Takahashi, Masashi Endo, Hiroaki Matsuno, Hiroaki Muramatsu, Tetsushi Ohki, Masakatsu Nishigaki (Shizuoka Univ.) BioX2018-35 PRMU2018-139
Biometric information could be easily leaked and/or copied. Therefore, biometric authentication in which biometric infor... [more] BioX2018-35 PRMU2018-139
pp.37-42
PRMU, BioX 2019-03-17
14:45
Tokyo   Biometric bit string generation using voice data on smart-phones considering usage environment
Aki Harada, Yasushi Yamazaki (The Univ. of Kitakyushu), Tetsushi Ohki (Shizuoka Univ.) BioX2018-42 PRMU2018-146
 [more] BioX2018-42 PRMU2018-146
pp.79-84
MBE, BioX 2018-07-27
14:00
Tottori   Biometric-bit-string generation from speech information on smart-phones
Aki Harada, Yasushi Yamazaki (The Univ. of Kitakyushu), Tetsushi Ohki (Shizuoka Univ.) BioX2018-18 MBE2018-26
Because smart-phones are in wide use, biometric authentication has attracted substantial attention as a user authenticat... [more] BioX2018-18 MBE2018-26
pp.63-68
PRMU, BioX 2018-03-18
13:55
Tokyo   A Study on Human Reflex Based Biometric Authentication Using Eye-Head Coordination (part 2)
Yosuke Takahashi, Masashi Endo, Hiroaki Matsuno, Hiroaki Muramatsu, Tetsushi Ohki, Masakatsu Nishigaki (Shizuoka Univ.) BioX2017-44 PRMU2017-180
Biometric information could be easily leaked and/or copied. Therefore, biometric authentication in which biometric infor... [more] BioX2017-44 PRMU2017-180
pp.49-54
 Results 1 - 20 of 39  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan