IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 26  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2024-03-14
09:30
Osaka Osaka Univ. (Suita Campus) A Study on Malicious Communication Detection Using Attack Characteristics of Malware on an Internal Network.
Ken Aono, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95
Recently, targeted attacks have been increasing.
Malicious attackers use malware to gain access to the organization's ... [more]
IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95
pp.249-253
RCC, ISEC, IT, WBS 2024-03-14
15:05
Osaka Osaka Univ. (Suita Campus) Phishing Detection Method Based on Content-Similarity in DNS Graph
WenBo Zhou, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110
Phishing attacks, known as a prevalent form of social engineering attacks, have become one of the most significant cyber... [more] IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110
pp.332-336
RCC, ISEC, IT, WBS 2024-03-14
15:30
Osaka Osaka Univ. (Suita Campus) Phishing Detection Method Based on Machine Learning Using DNS Graph
Yuki Ishida, Syota Nihei, Junko Sato, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of Information Sciences) IT2023-129 ISEC2023-128 WBS2023-117 RCC2023-111
Recently, phishing scams have been on the rise, the need for effective defense methods against this phishing scams.
A b... [more]
IT2023-129 ISEC2023-128 WBS2023-117 RCC2023-111
pp.337-342
IA, SITE, IPSJ-IOT [detail] 2024-03-12
11:10
Okinawa Miyakojima City Future Creation Center
(Primary: On-site, Secondary: Online)
A Routing Method Using Redirection Based on User Movement Prediction in CCN-based MANET
Yuto Kanata, Masaki Hanada (Tokyo Univ. of information Sciences) SITE2023-70 IA2023-76
In recent years, many studies in terms of CCN-based MANET, applying CCN architecture to MANET, have been conducted with ... [more] SITE2023-70 IA2023-76
pp.12-17
NS, IN
(Joint)
2024-03-01
13:00
Okinawa Okinawa Convention Center Interest Packet Forwarding Scheme by MPR Set with Movement Prediction in CCN-based MANETs
Haruya Matsumoto, Masaki Hanada (Tokyo Univ. of information Sciences) IN2023-110
In recent years, many studies in terms of CCN-based MANET, applying CCN architecture to MANET, have been conducted.In a ... [more] IN2023-110
pp.267-272
ICM, NS, CQ, NV
(Joint)
2023-11-22
14:10
Ehime Ehime Prefecture Gender Equality Center
(Primary: On-site, Secondary: Online)
Probabilistic Block Transfer Method Considering Propagation Delay Between Regions in Blockchain Networks
Shintarou Ohtsuka, Yuki Ishida, Masaki Hanada, Fumikazu Iseki (Tokyo Univ. of information Sciences) NS2023-121
Blockchain is a secure distributed ledger system, which is based on peer-to-peer networks. Cryptocurrencies, such as Bi... [more] NS2023-121
pp.62-67
IN, NS
(Joint)
2023-03-03
10:30
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
A Routing Method Considering Content Server Mobility in a Tree-Structured Mobile Network over CCN
Yuto Nakagawa, Masaki Hanada (Tokyo Univ. of Information Sciences), Hidehiro Kanemitsu (Tokyo Univ. of Technology) IN2022-106
In recent years, mobile network traffic has been rapidly increasing with spread of mobile devices such as smartphones. It ... [more] IN2022-106
pp.241-246
SWIM 2022-11-26
15:40
Tokyo Kikai-Shinko-Kaikan Bldg.
(Primary: On-site, Secondary: Online)
Sample Program Recommendation System to Support Programming Education
Yoshihisa Udagawa (Tokyo Univ. of Information Sciences) SWIM2022-24
One effective way to learn programming techniques is to reuse sample programs. As the number of sample programs increase... [more] SWIM2022-24
pp.20-26
NS, IN
(Joint)
2022-03-11
15:50
Online Online A Routing Method Considering User Mobility in Tree-Structured Mobile Network over CCN
Yuto Nakagawa, Masaki Hanada (Tokyo Univ. of Information Sciences), Hidehiro Kanemitsu (Tokyo Univ. of Technology) IN2021-52
 [more] IN2021-52
pp.127-132
KBSE, SWIM 2021-05-21
14:45
Online Online Calculating similarity among Java programs based on method calls and visualization of similar programs
Yoshihisa Udagawa (Tokyo Univ. of Information Sciences) KBSE2021-5 SWIM2021-5
One of the promising ways to improve programming techniques is to refer to sample programs published on the Internet. Ho... [more] KBSE2021-5 SWIM2021-5
pp.25-30
IN, NS
(Joint)
2021-03-05
13:20
Online Online Study on Interest Packet Sending Rate for VoD Streaming over CCN.
Yuto Nakagawa, Masaki Hanada (Tokyo Univ. of Information Sciences.), Hidehiro Kanemitsu (Tokyo Univ. of Tech.)
 [more]
SWIM 2021-02-19
15:50
Online Online Statistical Analysis of Stock Price Fluctuations in Global Markets Before and After Corona Epidemic
Sho Nishi, Yoshitaka Nishino, Yoshihiko Shiina, Jyunya Ohkuma, Kunihiko Usami, Shouta Tokuda, Susumu Ohtsuki, Tomorou Tanabe, Yuta Nakazato, Keisuke Iwaki, Yoshihisa Udagawa (Tokyo Univ. of Information Sciences) SWIM2020-19
The spread of COVID-19 is making a serious impact on the world economy. As policies to maintain economic activities have... [more] SWIM2020-19
pp.44-49
EA, ASJ-H 2019-08-08
15:50
Miyagi Tohoku Univ. [Invited Talk] Sonic data transmission technology and its evaluation
Akira Nishimura (Tokyo Univ. of Information Sciences) EA2019-28
 [more] EA2019-28
pp.35-40
SITE, ISEC, LOIS 2018-11-04
11:30
Fukuoka   A Machine Learning-based Method for Detecting Malicious JavaScript using Information based on Abstract Syntax Tree
Ryota Sano, Junko Sato, Yoichi Murakami, Masaki Hanada, Eiji Nunohiro (Tokyo Univ. of Information Sciences) ISEC2018-75 SITE2018-53 LOIS2018-35
The number of Drive-by-Download attacks, which can be infected with malware via websites, has recently been increased. S... [more] ISEC2018-75 SITE2018-53 LOIS2018-35
pp.63-68
ET 2018-03-03
14:25
Kochi Kochi University of Technology (Eikokuji Campus) Training of program coding using dynamic algorithm visualization.
Masanori Ohshiro, Yasuo Nagai (Tokyo Univ. of Information Sciences) ET2017-113
In order to program the algorithm, it is necessary to understand how the process is carried out, and what kind of variab... [more] ET2017-113
pp.143-146
NS, IN
(Joint)
2018-03-02
13:10
Miyazaki Phoenix Seagaia Resort In-Network Caching Method Considering Content Popularity and Playback Sequence for VoD Services over CCN
Akira Toyozaki, Masaki Hanada (Tokyo Univ. of Information Sciences), Hidehiro Kanemitsu, Hidenori Nakazato (Waseda Univ.) IN2017-129
In recent years,Content-Centric Networking (CCN) has been emerged as a new networking paradigm for efficient content del... [more] IN2017-129
pp.237-242
NS, IN
(Joint)
2018-03-02
13:30
Miyazaki Phoenix Seagaia Resort MPR Selection and Routing Methods Using Link Disconnection Prediction in OLSR Protocol
Wataru Nagata, Akira Toyozaki, Masaki Hanada (Tokyo Univ. of Information Sciences), Hidehiro Kanemitsu (Waseda Univ.), Yasuo Nagai (Tokyo Univ. of Information Sciences) IN2017-134
OLSR is one of well-known proactive protocols for MANETs.
OLSR may cause the reduction of network performance because ... [more]
IN2017-134
pp.267-272
SRW 2017-12-18
11:10
Tokyo Waseda Univ. Dynamic transmission range control for exposed node reduction in Ad Hoc WLANs
Emilia Weyulu, Masaki Hanada, Moo Wan Kim (Tokyo Univ. Of Information Sciences) SRW2017-61
 [more] SRW2017-61
pp.7-11
RCS, IN, NV
(Joint)
2017-05-12
11:35
Tokyo Kikai-Shinko-Kaikan Bldg. Ad-hoc Routing Method based on Predicted Link Connection Duration and Hop Count
Wataru Nagata, Takeshi Misu, Masaki Hanada (Tokyo Univ. of Information Sciences), Hidehiro Kanemitsu (Waseda Univ.), Yasuo Nagai (Tokyo Univ. of Information Sciences) IN2017-6
With the growth of IoT (Internet of Things), cars that are equipped with Internet access (i.e., connected cars) are grad... [more] IN2017-6
pp.25-30
IE, EMM, LOIS, IEE-CMN, ITE-ME [detail] 2014-09-18
16:30
Kochi   Reversible and robust audio watermarking based on spread spectrum and amplitude expansion in the integer-MDCT domain
Akira Nishimura (Tokyo Univ. of Information Sciences) LOIS2014-22 IE2014-35 EMM2014-52
The present study proposes a novel reversible and robust technique
for hiding data in audio. It is perfectly reversib... [more]
LOIS2014-22 IE2014-35 EMM2014-52
pp.47-52
 Results 1 - 20 of 26  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan