|
|
All Technical Committee Conferences (Searched in: Recent 10 Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IN, NS (Joint) |
2025-03-06 09:45 |
Okinawa |
Okinawa Industry Support Center |
Overclocked LiDAR: Rotation Speed Falsification Against Spinning LiDAR for Autonomous Vehicle Systems Takuma Koyama, Masaru Matsubayashi, Masashi Tanaka (NTT) IN2024-87 |
Abstract In this study, we explore the feasibility of a new attack method that manipulates the rotational speed of rota... [more] |
IN2024-87 pp.40-46 |
ICSS, IPSJ-SPT |
2025-03-06 13:45 |
Okinawa |
Okinawa Prefectural Museum & Art Museum |
A Signature Generation System for IoT Malware Communications Using Large Language Models Kazuma Shinomiya, Kazunori Kamiya, Yasuyuki Hamada, Kenji Takahashi (NTT) ICSS2024-76 |
IoT botnet-based DDoS attacks have become a serious concern, and detecting C&C communications plays a crucial role in mi... [more] |
ICSS2024-76 pp.55-62 |
ICSS, IPSJ-SPT |
2025-03-07 16:25 |
Okinawa |
Okinawa Prefectural Museum & Art Museum |
Collecting Infrequently Accessed but Trustworthy Domain Names Daiki Chiba, Hiroki Nakano, Takashi Koide (NTT Security Holdings/NTT) ICSS2024-118 |
DomainHarvester, a novel system for generating domain name allowlists, is introduced. Unlike popularity-based methods, D... [more] |
ICSS2024-118 pp.383-390 |
ICSS, IPSJ-SPT |
2024-03-22 12:35 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Open Secrets of GPTs Yusuke Kubo (NTT Communications), Tomoaki Tani (NTT Security), Ryusei Watanabe (N.F.Laboratories/Waseda Univ), Takuro Wakai, Yuto Toshikawa (Waseda Univ.), Tatsuya Mori (Waseda Univ. /NICT/ RIKEN) ICSS2023-91 |
OpenAI released a service called GPTs in November 2023. Creating GPTs with arbitrary functionalities is straightforward;... [more] |
ICSS2023-91 pp.160-165 |
PRMU, IBISML, IPSJ-CVIM |
2024-03-04 09:12 |
Hiroshima |
Hiroshima Univ. Higashi-Hiroshima campus (Primary: On-site, Secondary: Online) |
Creating Adversarial Examples to Deceive Both Humans and Machine Learning Models Ko Fujimori (Waseda Univ.), Toshiki Shibahara (NTT), Daiki Chiba (NTT Security), Mitsuaki Akiyama (NTT), Masato Uchida (Waseda Univ.) PRMU2023-65 |
One of the vulnerability attacks against neural networks is the generation of Adversarial Examples (AE), which induce mi... [more] |
PRMU2023-65 pp.82-87 |
ICSS, IPSJ-SPT |
2023-03-13 15:00 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
ICSS2022-58 |
(To be available after the conference date) [more] |
ICSS2022-58 pp.61-66 |
ICSS, IPSJ-SPT |
2019-03-07 16:40 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Web Application Identification Method Applicable to Large-scale Flow Data Using a Small-scale Labeled Data Shun Tobiyama, Shohei Araki, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT), Kenji Takahashi (NTT Security) ICSS2018-77 |
[more] |
ICSS2018-77 pp.53-58 |
ICSS |
2018-11-21 13:50 |
Kagoshima |
|
[Invited Talk]
Advanced R&D Required at the Leading Edge of Cybersecurity Takeshi Yagi (NTT Security Japan) ICSS2018-55 |
[more] |
ICSS2018-55 pp.13-18 |
ICSS, IPSJ-SPT |
2017-03-13 17:05 |
Nagasaki |
University of Nagasaki |
Effective Analysis of Macro Malware Based on Clustering Toshinori Usui (NTT), Tomonori Ikuse (NTT Security Japan), Makoto Iwamura, Takeshi Yada (NTT) ICSS2016-55 |
[more] |
ICSS2016-55 pp.91-96 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|