IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 22  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2024-03-13
- 2024-03-14
Osaka Osaka Univ. (Suita Campus) Phishing Detection Method Based on Content-Similarity in DNS Graph
WenBo Zhou, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110
Phishing attacks, known as a prevalent form of social engineering attacks, have become one of the most significant cyber... [more] IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110
pp.332-336
RCC, ISEC, IT, WBS 2024-03-13
- 2024-03-14
Osaka Osaka Univ. (Suita Campus) Phishing Detection Method Based on Machine Learning Using DNS Graph
Yuki Ishida, Syota Nihei, Junko Sato, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of Information Sciences) IT2023-129 ISEC2023-128 WBS2023-117 RCC2023-111
Recently, phishing scams have been on the rise, the need for effective defense methods against this phishing scams.
A b... [more]
IT2023-129 ISEC2023-128 WBS2023-117 RCC2023-111
pp.337-342
NS, IN
(Joint)
2024-03-01
14:15
Okinawa Okinawa Convention Center A centralized control scheme of router switching for suppressing malware spreading within a metabolic router
Rei Ishioka, Yuya Suga, Junichi Murayama (Tokai Univ.) IN2023-113
As a countermeasure against router targeting malware, we have been studying a metabolic-type router. In this metabolic-t... [more] IN2023-113
pp.283-286
MIKA
(3rd)
2023-10-11
14:30
Okinawa Okinawa Jichikaikan
(Primary: On-site, Secondary: Online)
[Poster Presentation] Detecting Poisoning Attacks Using Adversarial Examples in Deep Phishing Detection
Koko Nishiura, Tomotaka Kimura, Jun Cheng (Doshisha Univ.)
In recent years, the convenience of online services has greatly improved, but the number of phishing scams has skyrocket... [more]
MIKA
(3rd)
2022-10-14
10:40
Niigata Niigata Citizens Plaza
(Primary: On-site, Secondary: Online)
[Poster Presentation] Countermeasure Backdoor Attacks against Phishing Countermeasures Using Deep Learning
Koko Nishiura, Tomotaka Kimura, Jun Cheng (Doshisha Univ.)
The convenience has greatly improved with the wide spread of online services in recent years, though the number of victi... [more]
IA, ICSS 2022-06-23
14:55
Nagasaki Univ. of Nagasaki
(Primary: On-site, Secondary: Online)
Control method for web push notification by browser extension
Masaya Sato, Hibiki Watanabe (OPU) IA2022-5 ICSS2022-5
Along with the increase of web push notifications, its abuse is increased. For example, some web push notifications indu... [more] IA2022-5 ICSS2022-5
pp.25-30
CS 2021-07-16
10:25
Online Online Countermeasures against Adversarial Examples using Majority Decision Discriminators for Deep learning-Based Phishing Detection Methods
Yuji Ogawa, Tomotaka Kimura, Jun Cheng (Doshisha Univ.) CS2021-33
In recent years, the number of phishing attacks has been increasing, and the detection of phishing URLs using deep learn... [more] CS2021-33
pp.78-79
IA, ICSS 2021-06-22
09:00
Online Online Feature analysis of phishing website and phishing detection based on machine learning algorithms
Yi Wei, Yuji Sekiya (Todai) IA2021-9 ICSS2021-9
Phishing is a kind of cybercrime that uses disguised websites to trick people into providing personally sensitive inform... [more] IA2021-9 ICSS2021-9
pp.44-49
ICSS, IPSJ-SPT 2021-03-02
09:10
Online Online A Study on the Adoption of Link Preview by the Phishing Sites
Norihito Omori (Waseda Univ.), Satoshi Furutani, Takuya Watanabe, Toshiki Shibahara, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.) ICSS2020-54
Search engines are not the only means of accessing online content. The distribution of malicious content has become mor... [more] ICSS2020-54
pp.166-171
CQ, CBE
(Joint)
2021-01-21
16:00
Online Online [Poster Presentation] Vulnerability Assessment for Deep-Learning Based Phishing Detection System
Yuji Ogawa, Tomotaka Kimura, Jun Cheng (Doshisha Univ.) CQ2020-83
 [more] CQ2020-83
pp.84-85
KBSE 2020-09-19
10:45
Online Online Analysis of smishing messages focusing on delivery notices
Tatsuo Fujii, Takako Nakatani (OUJ) KBSE2020-8
There are a lot of phishing scams using SMS. They are named "smishing." Though SMS fooling couriers have been sending me... [more] KBSE2020-8
pp.43-48
KBSE 2020-03-06
16:30
Okinawa Tenbusu-Naha
(Cancelled but technical report was issued)
Information analysis from images of Smishing mail posted on the Internet
Tatsuo Fujii, Takako Nakatani (Open Univ.) KBSE2019-51
In recent years, phishing scams using a short message service (SMS) is called “smishing” and has been increasing. Since ... [more] KBSE2019-51
pp.31-36
ICSS 2019-11-13
14:55
Miyazaki MRT Terrace(Miyazaki) ICSS2019-63 E-mail has been one of the most widely used tools for computer-based communication since the early days of the Internet.... [more] ICSS2019-63
pp.19-23
CS 2019-07-04
09:00
Kagoshima Amami City Social Welfare Center A Novel Visual Similarity-based Phishing Detection Methodology Using Hue Information with Auto Updating Database
Shuichiro Haruta, Fumitaka Yamazaki, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2019-14
In this paper, we propose a novel visual similarity-based phishing detection methodology using hue information with aut... [more] CS2019-14
pp.7-12
IA 2017-11-15
13:50
Overseas KMITL, Bangkok, Thailand Machine Learning Approach for Phishing Detection in SDN Networking
Yu-Hung Chen, Jiun-Yu Yang, Po-Chun Hou, Jiann-Liang Chen (National Taiwan University of Science & Technology) IA2017-30
People have become increasingly dependent on information technology since the emergence of the Internet. Therefore, many... [more] IA2017-30
pp.1-6
ICSS, IPSJ-SPT 2017-03-14
09:30
Nagasaki University of Nagasaki Visual Similarity-based Phishing Websites Detection Scheme using Image and CSS with Target Website Finder
Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ) ICSS2016-58
Recently, detecting phishing websites and identifying their target are imperative. In several phishing detection schemes... [more] ICSS2016-58
pp.111-116
ICSS 2014-11-28
11:10
Miyagi Tohoku Gakuin University (Tagajo Campus) searching malicious URL from vast webspace
Bo Sun (Waseda Univ.), Mitsuaki Akiyama, Takeshi Yagi (NTT), Tatsuya Mori (Waseda Univ.) ICSS2014-61
Many Web-based attacks such as Drive-by-download and phishing scam
are easily triggered by accessing landing page URL.... [more]
ICSS2014-61
pp.61-66
IA, SITE, IPSJ-IOT [detail] 2013-03-14
11:05
Nara Todaiji Total Cultural Center Design and implementation of mutual authentication based on PAKE in the Web SSO
Kouhei Sugiyama, Toyokazu Akiyama (Kyoto Sangyo Univ.) SITE2012-50 IA2012-88
Recently, large amount of Web services exist, such as file sharing, Web mail and so on. When we use Web services, usuall... [more] SITE2012-50 IA2012-88
pp.31-36
ICSS, IA 2012-06-22
09:00
Tokyo Room 1206, 1st bldg, Takanawa Campus, Tokai University Proposed phishing countermeasures based on URL information analysis
Shingo Matsugaya, Naoshi Sato (IISEC) IA2012-6 ICSS2012-6
Although phishing has been conducted from various countermeasures already, the number of victims are still more likely t... [more] IA2012-6 ICSS2012-6
pp.31-36
SP 2011-06-24
10:30
Aichi Nagoya Univ. A study of psychological stress detection based on the non-verbal information
Naoshi Matsuo, Nobuyuki Washio, Shouji Harada, Akira Kamano (FUJITSU), Shoji Hayakawa (FUJITSU LABORATORIES), Kazuya Takeda (Nagoya University) SP2011-35
We study the detection of a phone phishing scam from non-verbal information of victim’s voice to prevent the remittance ... [more] SP2011-35
pp.29-33
 Results 1 - 20 of 22  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan