Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, IN (Joint) |
2024-02-29 10:45 |
Okinawa |
Okinawa Convention Center |
A privacy protection mechanism using Bloom Filter for a P2P-based tracking system watching over children Yuki Matsumoto, Akihiro Fujimoto (Wakayama Univ), Hideki Tode (Osaka Metropolitan Univ) NS2023-193 |
With the increase in the number of single-parent and elderly-only families, as well as changes in work patterns such as ... [more] |
NS2023-193 pp.125-130 |
IN, ICTSSL, IEE-SMF |
2023-10-19 09:00 |
Fukuoka |
Fukuoka University |
Effects and Investigate Attack Messages on the IoT-ZTN System Yudai Sakurai, Osamu Mizuno (Kogakuin Univ.) IN2023-32 |
There are many cyber-attacks targeting the IoT system. Cyber-attacks can occur not only from external networks in conven... [more] |
IN2023-32 pp.1-4 |
SeMI, RCS, RCC, NS, SR (Joint) |
2023-07-14 11:15 |
Osaka |
Osaka University Nakanoshima Center + Online (Primary: On-site, Secondary: Online) |
[Invited Talk]
Highly reliable communication network design using broadband wireless link and optical fiber networks
-- Toward the use of cyber-physical systems in infrastructure -- Kensuke IKeda, Akihiro Tanaka, Shun Morimura, Michifumi Miyashita (CRIEPI), Kazuki Nakamura, Satoko Ryuo (RTRI) RCC2023-21 NS2023-45 RCS2023-96 SR2023-44 SeMI2023-37 |
In critical infrastructures such as electric power and railroads, communication networks are indispensable for various s... [more] |
RCC2023-21 NS2023-45 RCS2023-96 SR2023-44 SeMI2023-37 pp.27-34(RCC), pp.63-70(NS), pp.83-90(RCS), pp.70-77(SR), pp.68-75(SeMI) |
NLP, MSS |
2023-03-17 10:40 |
Nagasaki |
(Primary: On-site, Secondary: Online) |
Machine Learning-Based Risk Evaluation of Reconstruction Attack on Query System for Handling Privacy Data Mohd Anuaruddin Bin Ahmadon (山口大) MSS2022-96 NLP2022-141 |
In this paper, we proposed a method to evaluate the strength of a data privacy protection mechanism by separating the me... [more] |
MSS2022-96 NLP2022-141 pp.160-163 |
RCC, ISEC, IT, WBS |
2023-03-15 13:00 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
A proposal of an attribute protection scheme in self-sovereign identity systems with shared terminals Wataru Nakamura, Kenta Takahashi (Hitachi) IT2022-127 ISEC2022-106 WBS2022-124 RCC2022-124 |
The concept of Self-Sovereign Identity (SSI), which states that users' identity information should be controlled by them... [more] |
IT2022-127 ISEC2022-106 WBS2022-124 RCC2022-124 pp.372-377 |
CNR, BioX |
2023-03-01 14:15 |
Oita |
(Primary: On-site, Secondary: Online) |
[Invited Talk]
A study on biometric performance evaluation using artificially generated sample images Mitsutoshi Himaga (JAISA) BioX2022-68 CNR2022-34 |
In order to evaluate the accuracy of biometric systems, it is necessary to collect biometric samples from a large number... [more] |
BioX2022-68 CNR2022-34 pp.36-41 |
ISEC, SITE, LOIS |
2022-11-18 16:55 |
Online |
Online |
Reducing Authentication Data Size in Decentralized Blacklistable Anonymous Credential System Using DualRing Atsuki Iriboshi, Toru Nakanishi, Katsunobu Imai (Hiroshima Univ.) ISEC2022-44 SITE2022-48 LOIS2022-28 |
For privacy protection, blacklistable anonymous credential systems have been proposed, where a user is authenticated wit... [more] |
ISEC2022-44 SITE2022-48 LOIS2022-28 pp.85-91 |
NS, SR, RCS, SeMI, RCC (Joint) |
2022-07-14 13:35 |
Ishikawa |
The Kanazawa Theatre + Online (Primary: On-site, Secondary: Online) |
Building a Federated Personalized Recommendation Model to Balance Similarity and Diversity Masahiro Hamada, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-46 |
With the spread of on-demand movie distribution, personalized movie recommendations that match user preferences are requ... [more] |
NS2022-46 pp.100-105 |
RCS, SR, SRW (Joint) |
2022-03-03 10:20 |
Online |
Online |
Radio Protection Area Estimation for Sub-6GHz-Band Spectrum Sharing System Assisted by VHF-Band Radio Sensing Information Shingo Tomida, Keiichi Mizutani, Hiroshi Harada (Kyoto Univ.) SRW2021-73 |
5G system service was launched in 2020. In Japan, apart from the nationwide public service of 5G systems by telecommunic... [more] |
SRW2021-73 pp.21-26 |
EA, SIP, SP, IPSJ-SLP [detail] |
2022-03-02 15:35 |
Okinawa |
(Primary: On-site, Secondary: Online) |
[Poster Presentation]
Adaptive audio correction for multiway systems based on FxLMS algorithms Sota Oka, Toshihisa Tanaka (TAT) EA2021-93 SIP2021-120 SP2021-78 |
We propose system identification methods of audio correction systems for multiway loudspeakers selectively controlling s... [more] |
EA2021-93 SIP2021-120 SP2021-78 pp.183-188 |
CS, IN, NS, NV (Joint) |
2020-09-11 14:10 |
Online |
Online |
Proposal of a Camera-Type Surveillance System for Elementary School Students on the Way to and from School Based on MCR Centric Model Keisuke Komatsubara, Naoto Hoshikawa, Katsumi Hirata (NIT, Oyama College), Takashi Nishitsuji (TMU), Tomoyoshi Ito (Chiba Uni) NS2020-48 |
At present, elementary school students on their way to and from school are supervised by their teacher or parents. Howev... [more] |
NS2020-48 pp.39-44 |
SSS |
2019-03-26 13:20 |
Tokyo |
|
High Reliability and Safety Protection Method for Applying Artificial Intelligence to Embedded Systems Yasuhiro Omori, Akihiko Higuchi, Daisuke Kawakami (Mitsubishi Electric Co.) SSS2018-32 |
This paper proposes an architecture for embedded systems, which employs machine learning results. The proposed architect... [more] |
SSS2018-32 pp.3-6 |
MoNA |
2019-01-16 13:25 |
Kyoto |
T. B. D. |
[Encouragement Talk]
A Study of Distributed Secure Data Mining System while Updating Database using Fully Homomorphic Encryption Yuri Yamamoto, Masato Oguchi (Ochanomizu Univ.) MoNA2018-62 |
Uploading commercial data to third-party cloud services is popular in general. To further promote the active utilizatio... [more] |
MoNA2018-62 pp.27-32 |
IN, NS, CS, NV (Joint) |
2018-09-07 09:20 |
Miyagi |
Research Institute of Electrical Communication, Tohoku Univ. |
A Consideration of Evaluation Dataset for Malware Detection System Hisashi Takahara (UNP) IN2018-33 |
Today, while internet cyber-attacks are increasing, protection against the cyber-attacks have become indispensable. Amon... [more] |
IN2018-33 pp.65-69 |
MWP |
2018-05-18 14:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Assessment methods for radio protection with respect to advanced wireless systems Teruo Onishi (NTT DOCOMO) MWP2018-1 |
Currently research and development as well as standardization on the 5th mobile communication system (5G) have been acti... [more] |
MWP2018-1 pp.1-6 |
SSS |
2018-03-27 14:10 |
Tokyo |
|
Efficiency verification of supportive protection system at demonstration experiment site in mobile robot running environment virtualizing tunnel construction site Hiroki ITO, Katsumi Matsui (Nihon U), Rieko Hojo, Kyoko Hamajima, Shigeo Umezaki (JNIOSH), Masao Tsuchiya (Advatege Risk Management), Takabumi Fukuda (Nagaoka-U of Technology), Shoken Shimizu (JNIOSH), Sei Takahashi (Nihon U) SSS2017-33 |
We applied the supportive protective system (SPS), which was newly established to reduce residual risks, to a virtual tu... [more] |
SSS2017-33 pp.9-12 |
NS, IN (Joint) |
2018-03-02 14:40 |
Miyazaki |
Phoenix Seagaia Resort |
Development of an Emulation System for Autonomous and Distributed Internet Security Infrastructure Masaya Shimode, Tomohiro Akasaki, Hiroyuki Kimiyama, Kaoru Sano, Naoki Yonezaki, Tomoaki Tsutsumi, Hirofumi Yamaki, Yoichiro Ueno, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) NS2017-236 |
We proposed "Autonomous and distributed Internet security (AIS) infrastructure" for protecting our resources on the Inte... [more] |
NS2017-236 pp.385-390 |
MoNA |
2017-12-21 14:40 |
Tokyo |
Ochanomizu University |
A Study of Decentralization for Data Mining System Implemented with Fully Homomorphic Encryption Yuri Yamamoto, Masato Oguchi (Ochanomizu Univ.) MoNA2017-37 |
For promoting utilization of big data, outsourcing systems have been proposed in which transaction data such as purchase... [more] |
MoNA2017-37 pp.49-53 |
SSS |
2017-12-19 15:40 |
Tokyo |
|
Examination of validity of the supporting protection system (SPS)
-- For improvement of working efficiency using the SPS and intervention procedure of behavior analysis. -- Rieko Hojo, Shoken Shimizu, Kyoko Hamajima, Masao Tsuchiya, Shigeo Umezaki (JNIOSH) SSS2017-29 |
The "supporting protective system (SPS)" was newly established to protect safety and to decrease work load of workers. T... [more] |
SSS2017-29 pp.17-20 |
SIS, IPSJ-AVM |
2017-10-12 13:20 |
Nara |
Todaiji Culture Center |
A JPEG-Friendly Image Encryption Scheme Ayana Kawamura, Tatsuya Chuman, Kenta Iida, Hitoshi Kiya (Tokyo Metropolitan Univ.) SIS2017-22 |
Conventional secure image transmission systems are based on Compression-then-Encryption systems, where image encryption ... [more] |
SIS2017-22 pp.7-12 |