Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-22 13:50 |
Hokkaido |
Sapporo Convention Center |
An Empirical Analysis on the Network Structure of Free Proxies Shion Ichikawa, Yin Minn Pa Pa, Katsunari Yoshioka (YNU) |
[more] |
|
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-22 14:50 |
Hokkaido |
Sapporo Convention Center |
Building a Dataset for Accelerating Researches against Fraudulent Crypto Tokens Iori Suzuki, Yin Minn Pa Pa, Katsunari Yoshioka (YNU) |
[more] |
|
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-22 15:15 |
Hokkaido |
Sapporo Convention Center |
Detection of Web3 Phishing Sites Focused on Permission Requests After Wallet Connection Riku Aoto, Yin Minn Pa Pa, Katsunari Yoshioka (YNU) |
[more] |
|
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-22 17:55 |
Hokkaido |
Sapporo Convention Center |
A Machine Learning-Based Clone Detection Approach in Nano-Artifact Metrics Naoki Yoshida, Iwaki Miyamoto, Katsunari Yoshioka (YNU), Tsutomu Matsumoto (AIST) |
[more] |
|
RCC, RCS, SeMI, NS, SR, RISING (Joint) |
2024-07-18 16:20 |
Hokkaido |
Hokkaido Citizens Activities Promotion Center (Primary: On-site, Secondary: Online) |
A Detector for Grassmann Constellation using Deep Neural Network Ryusei Baba (YNU), Hiroki Iimori, Chandan Pradhan, Szabolcs Malomsoky (Ericsson), Naoki Ishikawa (YNU) |
[more] |
|
RCC, RCS, SeMI, NS, SR, RISING (Joint) |
2024-07-19 14:55 |
Hokkaido |
Hokkaido Citizens Activities Promotion Center (Primary: On-site, Secondary: Online) |
[Invited Talk]
Recent Trends in Quantum Speedups for Wireless Communications Naoki Ishikawa (YNU) |
[more] |
|
NLP, CCS |
2024-06-06 14:05 |
Fukuoka |
West Japan General Exhibition Center AIM |
Conflict-free multi-walker quantum walk based on entanglement Honoka Shiratori, Andre Roehm, Tomoki Yamagami (UT), Etsuo Segawa (YNU), Takatomo Mihana, Ryoich Horisaki (UT) |
[more] |
|
SANE |
2024-06-05 14:20 |
Kanagawa |
Information Technology R & D Center, MITSUBISHI Electric Corp. (Primary: On-site, Secondary: Online) |
"Investigation of Causes for QZSS Emergency Signal Outage"
-- Baud rate throttling and its relationship to signal loss -- Keiko Shimazu (Jigyo), Michi Hamashita, Tomoyo Shibata (TMU), Yuno Sudo (YNU), Sora Masaki (TIT), Sana Imamura, Mihiro Fujisawa (TMU) |
(To be available after the conference date) [more] |
|
QIT (2nd) |
2024-05-29 16:00 |
Ibaraki |
AIST Tsukuba |
Development of 436 nm frequency-stabilized excitation light source for entangled photon pair generation Rina Takeda, Shinnosuke Aoyama, Kyosuke Sato, Feng-Lei Hong, Tomoyuki Horikiri, Daisuke Akamatsu (YNU) |
(To be available after the conference date) [more] |
|
QIT (2nd) |
2024-05-29 16:20 |
Ibaraki |
AIST Tsukuba |
Development of 436-nm light source for generation of entangled photon pairs at 606 nm and 1.5µm. Kyosuke Sato, Shinnosuke Aoyama, Rina Takeda, Feng-Lei Hong, Tomoyuki Horikiri, Daisuke Akamatsu (YNU) |
(To be available after the conference date) [more] |
|
ISEC |
2024-05-15 15:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Identity-Based Matchmaking Encryption Secure Against Key Generation Center (from ProvSec 2023) Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) ISEC2024-6 |
Identity-based matchmaking encryption (IB-ME) is a generalization of identity-based encryption (IBE), in which both the ... [more] |
ISEC2024-6 p.22 |
HWS |
2024-04-19 15:25 |
Tokyo |
(Primary: On-site, Secondary: Online) |
Applying Ring Oscillator-based Laser Detection Sensor to AES Circuitry on FPGA Shungo Hayashi, Junichi Sakamoto, Tsutomu Matsumoto (AIST/YNU) HWS2024-3 |
(To be available after the conference date) [more] |
HWS2024-3 pp.8-13 |
ICSS, IPSJ-SPT |
2024-03-21 11:20 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Analyzing Attackers and Victims Actions via LockBit3.0 Website Data Dynamics Yuji Sekine, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-70 |
LockBit3.0 is one of the top ransomware groups that has been active since July 2022, targeting over 1,000 companies. In ... [more] |
ICSS2023-70 pp.9-16 |
ICSS, IPSJ-SPT |
2024-03-21 12:10 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Unveiling the Shadows: Analyzing Cryptocurrency Address Management and Fund Movement of Darknet Markets Aiman Syazwan Bin Abdul Razak, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-72 |
Darknet markets use cryptocurrencies like Bitcoin for anonymous transactions in exchanging illicit goods and services. T... [more] |
ICSS2023-72 pp.25-32 |
ICSS, IPSJ-SPT |
2024-03-21 15:20 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Investigating the functionalities of IoT malware to disrupt the activities of other intruders Shun Ikeda, Hiroki Yasui, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-76 |
[more] |
ICSS2023-76 pp.51-56 |
ICSS, IPSJ-SPT |
2024-03-21 15:45 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Enhanced Analysis of IoT Botnet Activity by Fusing Honeypots, Malware Dynamic Analysis, and C&C Observation Yuki Endo, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-77 |
[more] |
ICSS2023-77 pp.57-62 |
ICSS, IPSJ-SPT |
2024-03-22 10:10 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Study of keyword-based search method for IoT devices deployed at important facilities Mami Kawaguchi, Takayuki Sasaki, Kihara Momoka, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-86 |
IoT devices are increasingly deployed in various systems, including remote monitoring systems.Some of these IoT devices ... [more] |
ICSS2023-86 pp.123-128 |
ICSS, IPSJ-SPT |
2024-03-22 11:45 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Impact of ChatGPT Assisted Polymorphic Malware on Antivirus Detection Huang Zhewei, Yinn Minn Pa pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-89 |
With the rapid implementation of large-scale language models (LLMs), there are concerns about their misuse in cyberattac... [more] |
ICSS2023-89 pp.145-152 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Proxy Re-encryption based on LPN Haruki Fujimoto, Shingo Sato, Junji Shikata (YNU) IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70 |
We propose a proxy re-encryption (PRE) scheme based on the Learning Parity with Noise (LPN) problem using error-correcti... [more] |
IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70 pp.79-86 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Proxy Re-Authentication Capable of Key and Data Compression Yoshiro Matsuoka, Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65 |
In this paper, we propose a new cryptographic protocol called proxy re-authentication capable of key and data compressio... [more] |
IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65 pp.52-59 |