IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 431  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2024-07-22
13:50
Hokkaido Sapporo Convention Center An Empirical Analysis on the Network Structure of Free Proxies
Shion Ichikawa, Yin Minn Pa Pa, Katsunari Yoshioka (YNU)
 [more]
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2024-07-22
14:50
Hokkaido Sapporo Convention Center Building a Dataset for Accelerating Researches against Fraudulent Crypto Tokens
Iori Suzuki, Yin Minn Pa Pa, Katsunari Yoshioka (YNU)
 [more]
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2024-07-22
15:15
Hokkaido Sapporo Convention Center Detection of Web3 Phishing Sites Focused on Permission Requests After Wallet Connection
Riku Aoto, Yin Minn Pa Pa, Katsunari Yoshioka (YNU)
 [more]
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2024-07-22
17:55
Hokkaido Sapporo Convention Center A Machine Learning-Based Clone Detection Approach in Nano-Artifact Metrics
Naoki Yoshida, Iwaki Miyamoto, Katsunari Yoshioka (YNU), Tsutomu Matsumoto (AIST)
 [more]
RCC, RCS, SeMI, NS, SR, RISING
(Joint)
2024-07-18
16:20
Hokkaido Hokkaido Citizens Activities Promotion Center
(Primary: On-site, Secondary: Online)
A Detector for Grassmann Constellation using Deep Neural Network
Ryusei Baba (YNU), Hiroki Iimori, Chandan Pradhan, Szabolcs Malomsoky (Ericsson), Naoki Ishikawa (YNU)
 [more]
RCC, RCS, SeMI, NS, SR, RISING
(Joint)
2024-07-19
14:55
Hokkaido Hokkaido Citizens Activities Promotion Center
(Primary: On-site, Secondary: Online)
[Invited Talk] Recent Trends in Quantum Speedups for Wireless Communications
Naoki Ishikawa (YNU)
 [more]
NLP, CCS 2024-06-06
14:05
Fukuoka West Japan General Exhibition Center AIM Conflict-free multi-walker quantum walk based on entanglement
Honoka Shiratori, Andre Roehm, Tomoki Yamagami (UT), Etsuo Segawa (YNU), Takatomo Mihana, Ryoich Horisaki (UT)
 [more]
SANE 2024-06-05
14:20
Kanagawa Information Technology R & D Center, MITSUBISHI Electric Corp.
(Primary: On-site, Secondary: Online)
"Investigation of Causes for QZSS Emergency Signal Outage" -- Baud rate throttling and its relationship to signal loss --
Keiko Shimazu (Jigyo), Michi Hamashita, Tomoyo Shibata (TMU), Yuno Sudo (YNU), Sora Masaki (TIT), Sana Imamura, Mihiro Fujisawa (TMU)
(To be available after the conference date) [more]
QIT
(2nd)
2024-05-29
16:00
Ibaraki AIST Tsukuba Development of 436 nm frequency-stabilized excitation light source for entangled photon pair generation
Rina Takeda, Shinnosuke Aoyama, Kyosuke Sato, Feng-Lei Hong, Tomoyuki Horikiri, Daisuke Akamatsu (YNU)
(To be available after the conference date) [more]
QIT
(2nd)
2024-05-29
16:20
Ibaraki AIST Tsukuba Development of 436-nm light source for generation of entangled photon pairs at 606 nm and 1.5µm.
Kyosuke Sato, Shinnosuke Aoyama, Rina Takeda, Feng-Lei Hong, Tomoyuki Horikiri, Daisuke Akamatsu (YNU)
(To be available after the conference date) [more]
ISEC 2024-05-15
15:35
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Identity-Based Matchmaking Encryption Secure Against Key Generation Center (from ProvSec 2023)
Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) ISEC2024-6
Identity-based matchmaking encryption (IB-ME) is a generalization of identity-based encryption (IBE), in which both the ... [more] ISEC2024-6
p.22
HWS 2024-04-19
15:25
Tokyo
(Primary: On-site, Secondary: Online)
Applying Ring Oscillator-based Laser Detection Sensor to AES Circuitry on FPGA
Shungo Hayashi, Junichi Sakamoto, Tsutomu Matsumoto (AIST/YNU) HWS2024-3
(To be available after the conference date) [more] HWS2024-3
pp.8-13
ICSS, IPSJ-SPT 2024-03-21
11:20
Okinawa OIST
(Primary: On-site, Secondary: Online)
Analyzing Attackers and Victims Actions via LockBit3.0 Website Data Dynamics
Yuji Sekine, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-70
LockBit3.0 is one of the top ransomware groups that has been active since July 2022, targeting over 1,000 companies. In ... [more] ICSS2023-70
pp.9-16
ICSS, IPSJ-SPT 2024-03-21
12:10
Okinawa OIST
(Primary: On-site, Secondary: Online)
Unveiling the Shadows: Analyzing Cryptocurrency Address Management and Fund Movement of Darknet Markets
Aiman Syazwan Bin Abdul Razak, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-72
Darknet markets use cryptocurrencies like Bitcoin for anonymous transactions in exchanging illicit goods and services. T... [more] ICSS2023-72
pp.25-32
ICSS, IPSJ-SPT 2024-03-21
15:20
Okinawa OIST
(Primary: On-site, Secondary: Online)
Investigating the functionalities of IoT malware to disrupt the activities of other intruders
Shun Ikeda, Hiroki Yasui, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-76
 [more] ICSS2023-76
pp.51-56
ICSS, IPSJ-SPT 2024-03-21
15:45
Okinawa OIST
(Primary: On-site, Secondary: Online)
Enhanced Analysis of IoT Botnet Activity by Fusing Honeypots, Malware Dynamic Analysis, and C&C Observation
Yuki Endo, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-77
 [more] ICSS2023-77
pp.57-62
ICSS, IPSJ-SPT 2024-03-22
10:10
Okinawa OIST
(Primary: On-site, Secondary: Online)
Study of keyword-based search method for IoT devices deployed at important facilities
Mami Kawaguchi, Takayuki Sasaki, Kihara Momoka, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-86
IoT devices are increasingly deployed in various systems, including remote monitoring systems.Some of these IoT devices ... [more] ICSS2023-86
pp.123-128
ICSS, IPSJ-SPT 2024-03-22
11:45
Okinawa OIST
(Primary: On-site, Secondary: Online)
Impact of ChatGPT Assisted Polymorphic Malware on Antivirus Detection
Huang Zhewei, Yinn Minn Pa pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-89
With the rapid implementation of large-scale language models (LLMs), there are concerns about their misuse in cyberattac... [more] ICSS2023-89
pp.145-152
RCC, ISEC, IT, WBS 2024-03-13
- 2024-03-14
Osaka Osaka Univ. (Suita Campus) Proxy Re-encryption based on LPN
Haruki Fujimoto, Shingo Sato, Junji Shikata (YNU) IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70
We propose a proxy re-encryption (PRE) scheme based on the Learning Parity with Noise (LPN) problem using error-correcti... [more] IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70
pp.79-86
RCC, ISEC, IT, WBS 2024-03-13
- 2024-03-14
Osaka Osaka Univ. (Suita Campus) Proxy Re-Authentication Capable of Key and Data Compression
Yoshiro Matsuoka, Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65
In this paper, we propose a new cryptographic protocol called proxy re-authentication capable of key and data compressio... [more] IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65
pp.52-59
 Results 1 - 20 of 431  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan