IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 20  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
CS 2019-07-04
09:00
Kagoshima Amami City Social Welfare Center A Novel Visual Similarity-based Phishing Detection Methodology Using Hue Information with Auto Updating Database
Shuichiro Haruta, Fumitaka Yamazaki, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2019-14
In this paper, we propose a novel visual similarity-based phishing detection methodology using hue information with aut... [more] CS2019-14
pp.7-12
CS 2019-07-04
09:00
Kagoshima Amami City Social Welfare Center An Approximation Scheme for Better Visualization of Trajectory Mapping with BLE Beacons in Libraries
Ryusei Goto, Hiromu Asahina, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2019-16
To find out the bottleneck in the college library, it is necessary to estimate users' trajectory when searching books an... [more] CS2019-16
pp.19-24
CS 2019-07-04
09:00
Kagoshima Amami City Social Welfare Center Analyzing MAC address randomization for Wi-Fi signal based mobile device tracking
Yuki Furuya, Hiromu Asahina, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2019-17
Analyzing facility usage through Wi-Fi signals of users’ mobile devices has become controversial but
common. Although W... [more]
CS2019-17
pp.25-29
CS 2018-11-01
10:10
Ehime The Shiki Museum Duration of Stay Estimation Scheme for Academic Libraries using Wi-Fi Frame Data
Hiromu Asahina, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2018-59
 [more] CS2018-59
pp.19-24
CS 2018-11-02
10:30
Ehime The Shiki Museum False Density Information Attack Detection Scheme Using Overlap of Communication Range in VANET
Masashi Yoshida, Hiromu Asahina, Shuichiro Haruta, Iwao Sasase (Keio Univ) CS2018-66
In Vehicular Ad Hoc Network (VANET), it is important to detect false information. The previously published scheme detect... [more] CS2018-66
pp.63-66
CS 2018-07-12
10:44
Okinawa Eef Information Plaza (Kumejima Is.) Encounter Record Reduction Scheme based on Theoretical Contact Probability for Flooding Attack Mitigation in DTN
Keisuke Arai, Shuichirou Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2018-19
 [more] CS2018-19
pp.41-46
CS 2018-07-12
10:56
Okinawa Eef Information Plaza (Kumejima Is.) An Energy Efficient Target Specific Code Dissemination Scheme with RPL-based Forwarder Selection Algorithm
Hiromu Asahina, Kentaroh Toyoda, Iwao Sasase (Keio Univ.), P. Takis Mathiopoulos (UoA), Hisao Yamamoto (TCU) CS2018-23
In order to fix a bug or install a new application, disseminating a code to specific target sensors is an important mana... [more] CS2018-23
pp.61-66
RCS, NS
(Joint)
2017-12-15
14:05
Hiroshima Aster Plaza Efficient updates scheduling Method Using Genetic Algorithms in Wireless Sensor Networks
Satoshi Ito (Tokyo City Univ.), Hiromu Asahina (Keio Univ.), Akihide Utani (Tokyo City Univ.) RCS2017-265
With the rapid growth of IoT devices, malware targeting these devices have rapidly increased.
In order to protect the d... [more]
RCS2017-265
pp.83-88
CS 2017-11-16
10:50
Kumamoto Aso Plaza Hotel Traceroute-based Target Link Flooding Attack Detection Scheme by Analyzing Hop Count to the Destination
Kei Sakuma, Hiromu Asahina, Shuichiro Haruta, Iwao Sasase (Keio Univ.) CS2017-56
 [more] CS2017-56
pp.9-14
CS 2017-11-16
11:15
Kumamoto Aso Plaza Hotel Low Transmission Cost P2P Storage Scheme with Privacy Protection
Sanghun Choi, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2017-57
To safely store the user’s data without the central server, the P2P(Peer to Peer) storage methods have been studied. Eve... [more] CS2017-57
pp.15-20
CS 2017-07-27
09:36
Nagasaki Fukue Bunka Kaikan Low Cost Dummy Generation using Non-Trusted LBS
Sanghun Choi, Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2017-14
Although LBS(Location Based Service) is quite convenient and usually used these days, The location privacy of the user i... [more] CS2017-14
pp.7-12
CS 2017-07-27
09:39
Nagasaki Fukue Bunka Kaikan Obfuscated Malicious JavaScript Detection Scheme Using the Feature Based on Divided URL
Shoya Morishige, Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2017-15
Recently, obfuscated malicious JavaScript codes which divide URL into segments to evade the pattern matching of anti-vir... [more] CS2017-15
pp.13-18
CS 2017-07-27
09:42
Nagasaki Fukue Bunka Kaikan RFID-Based Deep Shopping Data Acquisition Scheme with Machine Learning using Read Count and Variance of Phase as Features
Shinichiro Aita, Hiromu Asahina, Kentaroh Toyada, Iwao Sasase (Keio Univ.) CS2017-16
 [more] CS2017-16
pp.19-24
CS 2017-07-27
09:48
Nagasaki Fukue Bunka Kaikan Code Dissemination based on RPL with Scope Selection and Code Acquisition in Wireless Sensor Networks
Hiromu Asahina, Iwao Sasase (Keio Univ.), Hisao Yamamoto (Tokyo City Univ.), P. Takis Mathiopoulos (UoA) CS2017-18
In this paper, we propose RPL based code dissemination with scope selection and code acquisition.
The scope selection ... [more]
CS2017-18
pp.29-34
ICSS, IPSJ-SPT 2017-03-14
09:30
Nagasaki University of Nagasaki Visual Similarity-based Phishing Websites Detection Scheme using Image and CSS with Target Website Finder
Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ) ICSS2016-58
Recently, detecting phishing websites and identifying their target are imperative. In several phishing detection schemes... [more] ICSS2016-58
pp.111-116
NS, CQ, ICM, NV
(Joint)
2016-11-25
11:45
Yamaguchi Shimonoseki Chember of Commerce and Industry A study of bypassing route construction scheme for congestion avoidance by using mobile relay stations in wireless mesh networks
Ryuichi Hayashi (Tokyo City Univ.), Hiromu Asahina (Keio Univ.), Hisao Yamamoto (Tokyo City Univ.) CQ2016-85
Wireless Mesh Networks is a highly scalable network because it is operated by a multi-hop communication. In the future, ... [more] CQ2016-85
pp.65-70
NS, CQ, ICM, NV
(Joint)
2016-11-25
12:10
Yamaguchi Shimonoseki Chember of Commerce and Industry Energy-Efficient Schemes for Disaster Scenarios in Wireless Mesh Networks
Satoshi Ito (Tokyo City Univ), Hiromu Asahina (Keio Univ), Hisao Yamamoto, Akihide Utani (Tokyo City Univ) CQ2016-86
In disaster scenarios, the communication infrastructure is required to verify the safety of family and loved ones and sh... [more] CQ2016-86
pp.71-76
CQ 2015-09-02
16:00
Kyoto Kyoto Institute of Technology Path Metric for Lower Throughput Fluctuation on the Other Paths in Wireless Mesh Networks
Hiromu Asahina (Keio Univ.), Hisao Yamamoto (TCU), Iwao Sasase (Keio Univ.) CQ2015-72
The video streaming service over Wireless Mesh Networks (WMNs) is an attractive feature for live streaming and video con... [more] CQ2015-72
pp.189-194
CQ 2015-07-07
13:50
Nara Nara Institute of Science and Technology Evaluation of Routing Metrics depending on an amount of Interference in Wireless Mesh Networks
Ryuichi Hayashi (Tokyo City Univ.), Hiromu Asahina (Keio Univ.), Hisao Yamamoto (Tokyo City Univ.) CQ2015-38
In Wireless Mesh Networks, It is assumes that CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is used to avo... [more] CQ2015-38
pp.97-100
CQ 2014-01-24
15:05
Tokyo Tokyo City University [Poster Presentation] A Wireless Mesh Network Rounting Scheme depending on the Number of Interfering Nodes
Hiromu Asahina, Hisao Yamamoto (Tokyo City Univ.) CQ2013-85
In Wireless Mesh Networks (WMNs), Carrier Sense Multiple Access / Collision Avoidance(CSMA/CA) is often used for solving... [more] CQ2013-85
pp.99-104
 Results 1 - 20 of 20  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan