Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
CS |
2019-07-04 09:00 |
Kagoshima |
Amami City Social Welfare Center |
A Novel Visual Similarity-based Phishing Detection Methodology Using Hue Information with Auto Updating Database Shuichiro Haruta, Fumitaka Yamazaki, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2019-14 |
In this paper, we propose a novel visual similarity-based phishing detection methodology using hue information with aut... [more] |
CS2019-14 pp.7-12 |
CS |
2019-07-04 09:00 |
Kagoshima |
Amami City Social Welfare Center |
An Approximation Scheme for Better Visualization of Trajectory Mapping with BLE Beacons in Libraries Ryusei Goto, Hiromu Asahina, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2019-16 |
To find out the bottleneck in the college library, it is necessary to estimate users' trajectory when searching books an... [more] |
CS2019-16 pp.19-24 |
CS |
2019-07-04 09:00 |
Kagoshima |
Amami City Social Welfare Center |
Analyzing MAC address randomization for Wi-Fi signal based mobile device tracking Yuki Furuya, Hiromu Asahina, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2019-17 |
Analyzing facility usage through Wi-Fi signals of users’ mobile devices has become controversial but
common. Although W... [more] |
CS2019-17 pp.25-29 |
CS |
2018-11-01 10:10 |
Ehime |
The Shiki Museum |
Duration of Stay Estimation Scheme for Academic Libraries using Wi-Fi Frame Data Hiromu Asahina, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2018-59 |
[more] |
CS2018-59 pp.19-24 |
CS |
2018-11-02 10:30 |
Ehime |
The Shiki Museum |
False Density Information Attack Detection Scheme Using Overlap of Communication Range in VANET Masashi Yoshida, Hiromu Asahina, Shuichiro Haruta, Iwao Sasase (Keio Univ) CS2018-66 |
In Vehicular Ad Hoc Network (VANET), it is important to detect false information. The previously published scheme detect... [more] |
CS2018-66 pp.63-66 |
CS |
2018-07-12 10:44 |
Okinawa |
Eef Information Plaza (Kumejima Is.) |
Encounter Record Reduction Scheme based on Theoretical Contact Probability for Flooding Attack Mitigation in DTN Keisuke Arai, Shuichirou Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2018-19 |
[more] |
CS2018-19 pp.41-46 |
CS |
2018-07-12 10:56 |
Okinawa |
Eef Information Plaza (Kumejima Is.) |
An Energy Efficient Target Specific Code Dissemination Scheme with RPL-based Forwarder Selection Algorithm Hiromu Asahina, Kentaroh Toyoda, Iwao Sasase (Keio Univ.), P. Takis Mathiopoulos (UoA), Hisao Yamamoto (TCU) CS2018-23 |
In order to fix a bug or install a new application, disseminating a code to specific target sensors is an important mana... [more] |
CS2018-23 pp.61-66 |
RCS, NS (Joint) |
2017-12-15 14:05 |
Hiroshima |
Aster Plaza |
Efficient updates scheduling Method Using Genetic Algorithms in Wireless Sensor Networks Satoshi Ito (Tokyo City Univ.), Hiromu Asahina (Keio Univ.), Akihide Utani (Tokyo City Univ.) RCS2017-265 |
With the rapid growth of IoT devices, malware targeting these devices have rapidly increased.
In order to protect the d... [more] |
RCS2017-265 pp.83-88 |
CS |
2017-11-16 10:50 |
Kumamoto |
Aso Plaza Hotel |
Traceroute-based Target Link Flooding Attack Detection Scheme by Analyzing Hop Count to the Destination Kei Sakuma, Hiromu Asahina, Shuichiro Haruta, Iwao Sasase (Keio Univ.) CS2017-56 |
[more] |
CS2017-56 pp.9-14 |
CS |
2017-11-16 11:15 |
Kumamoto |
Aso Plaza Hotel |
Low Transmission Cost P2P Storage Scheme with Privacy Protection Sanghun Choi, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2017-57 |
To safely store the user’s data without the central server, the P2P(Peer to Peer) storage methods have been studied. Eve... [more] |
CS2017-57 pp.15-20 |
CS |
2017-07-27 09:36 |
Nagasaki |
Fukue Bunka Kaikan |
Low Cost Dummy Generation using Non-Trusted LBS Sanghun Choi, Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2017-14 |
Although LBS(Location Based Service) is quite convenient and usually used these days, The location privacy of the user i... [more] |
CS2017-14 pp.7-12 |
CS |
2017-07-27 09:39 |
Nagasaki |
Fukue Bunka Kaikan |
Obfuscated Malicious JavaScript Detection Scheme Using the Feature Based on Divided URL Shoya Morishige, Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2017-15 |
Recently, obfuscated malicious JavaScript codes which divide URL into segments to evade the pattern matching of anti-vir... [more] |
CS2017-15 pp.13-18 |
CS |
2017-07-27 09:42 |
Nagasaki |
Fukue Bunka Kaikan |
RFID-Based Deep Shopping Data Acquisition Scheme with Machine Learning using Read Count and Variance of Phase as Features Shinichiro Aita, Hiromu Asahina, Kentaroh Toyada, Iwao Sasase (Keio Univ.) CS2017-16 |
[more] |
CS2017-16 pp.19-24 |
CS |
2017-07-27 09:48 |
Nagasaki |
Fukue Bunka Kaikan |
Code Dissemination based on RPL with Scope Selection and Code Acquisition in Wireless Sensor Networks Hiromu Asahina, Iwao Sasase (Keio Univ.), Hisao Yamamoto (Tokyo City Univ.), P. Takis Mathiopoulos (UoA) CS2017-18 |
In this paper, we propose RPL based code dissemination with scope selection and code acquisition.
The scope selection ... [more] |
CS2017-18 pp.29-34 |
ICSS, IPSJ-SPT |
2017-03-14 09:30 |
Nagasaki |
University of Nagasaki |
Visual Similarity-based Phishing Websites Detection Scheme using Image and CSS with Target Website Finder Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ) ICSS2016-58 |
Recently, detecting phishing websites and identifying their target are imperative. In several phishing detection schemes... [more] |
ICSS2016-58 pp.111-116 |
NS, CQ, ICM, NV (Joint) |
2016-11-25 11:45 |
Yamaguchi |
Shimonoseki Chember of Commerce and Industry |
A study of bypassing route construction scheme for congestion avoidance by using mobile relay stations in wireless mesh networks Ryuichi Hayashi (Tokyo City Univ.), Hiromu Asahina (Keio Univ.), Hisao Yamamoto (Tokyo City Univ.) CQ2016-85 |
Wireless Mesh Networks is a highly scalable network because it is operated by a multi-hop communication. In the future, ... [more] |
CQ2016-85 pp.65-70 |
NS, CQ, ICM, NV (Joint) |
2016-11-25 12:10 |
Yamaguchi |
Shimonoseki Chember of Commerce and Industry |
Energy-Efficient Schemes for Disaster Scenarios in Wireless Mesh Networks Satoshi Ito (Tokyo City Univ), Hiromu Asahina (Keio Univ), Hisao Yamamoto, Akihide Utani (Tokyo City Univ) CQ2016-86 |
In disaster scenarios, the communication infrastructure is required to verify the safety of family and loved ones and sh... [more] |
CQ2016-86 pp.71-76 |
CQ |
2015-09-02 16:00 |
Kyoto |
Kyoto Institute of Technology |
Path Metric for Lower Throughput Fluctuation on the Other Paths in Wireless Mesh Networks Hiromu Asahina (Keio Univ.), Hisao Yamamoto (TCU), Iwao Sasase (Keio Univ.) CQ2015-72 |
The video streaming service over Wireless Mesh Networks (WMNs) is an attractive feature for live streaming and video con... [more] |
CQ2015-72 pp.189-194 |
CQ |
2015-07-07 13:50 |
Nara |
Nara Institute of Science and Technology |
Evaluation of Routing Metrics depending on an amount of Interference in Wireless Mesh Networks Ryuichi Hayashi (Tokyo City Univ.), Hiromu Asahina (Keio Univ.), Hisao Yamamoto (Tokyo City Univ.) CQ2015-38 |
In Wireless Mesh Networks, It is assumes that CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is used to avo... [more] |
CQ2015-38 pp.97-100 |
CQ |
2014-01-24 15:05 |
Tokyo |
Tokyo City University |
[Poster Presentation]
A Wireless Mesh Network Rounting Scheme depending on the Number of Interfering Nodes Hiromu Asahina, Hisao Yamamoto (Tokyo City Univ.) CQ2013-85 |
In Wireless Mesh Networks (WMNs), Carrier Sense Multiple Access / Collision Avoidance(CSMA/CA) is often used for solving... [more] |
CQ2013-85 pp.99-104 |