|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-22 12:35 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Open Secrets of GPTs Yusuke Kubo (NTT Communications), Tomoaki Tani (NTT Security), Ryusei Watanabe (N.F.Laboratories/Waseda Univ), Takuro Wakai, Yuto Toshikawa (Waseda Univ.), Tatsuya Mori (Waseda Univ. /NICT/ RIKEN) ICSS2023-91 |
OpenAI released a service called GPTs in November 2023. Creating GPTs with arbitrary functionalities is straightforward;... [more] |
ICSS2023-91 pp.160-165 |
PRMU, IBISML, IPSJ-CVIM |
2024-03-04 09:12 |
Hiroshima |
Hiroshima Univ. Higashi-Hiroshima campus (Primary: On-site, Secondary: Online) |
Creating Adversarial Examples to Deceive Both Humans and Machine Learning Models Ko Fujimori (Waseda Univ.), Toshiki Shibahara (NTT), Daiki Chiba (NTT Security), Mitsuaki Akiyama (NTT), Masato Uchida (Waseda Univ.) PRMU2023-65 |
One of the vulnerability attacks against neural networks is the generation of Adversarial Examples (AE), which induce mi... [more] |
PRMU2023-65 pp.82-87 |
ICSS, IPSJ-SPT |
2023-03-13 15:00 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
ICSS2022-58 |
(To be available after the conference date) [more] |
ICSS2022-58 pp.61-66 |
ICSS, IPSJ-SPT |
2019-03-07 16:40 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Web Application Identification Method Applicable to Large-scale Flow Data Using a Small-scale Labeled Data Shun Tobiyama, Shohei Araki, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT), Kenji Takahashi (NTT Security) ICSS2018-77 |
[more] |
ICSS2018-77 pp.53-58 |
ICSS |
2018-11-21 13:50 |
Kagoshima |
|
[Invited Talk]
Advanced R&D Required at the Leading Edge of Cybersecurity Takeshi Yagi (NTT Security Japan) ICSS2018-55 |
[more] |
ICSS2018-55 pp.13-18 |
ICSS, IPSJ-SPT |
2017-03-13 17:05 |
Nagasaki |
University of Nagasaki |
Effective Analysis of Macro Malware Based on Clustering Toshinori Usui (NTT), Tomonori Ikuse (NTT Security Japan), Makoto Iwamura, Takeshi Yada (NTT) ICSS2016-55 |
[more] |
ICSS2016-55 pp.91-96 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|