IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 7 of 7  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
CQ, CS
(Joint)
2022-05-13
10:10
Fukui Fukui (Fuku Pref.)
(Primary: On-site, Secondary: Online)
Force adjustment control for carrying object between remote robot systems with force feedback
Hiroya Kato, Yutaka Ishibashi (NITech), Hitoshi Ohnishi (OUJ), Pingguo Huang (Gifu-shi) CQ2022-13
 [more] CQ2022-13
pp.68-73
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2021-07-19
10:30
Online Online A Website Fingerprinting Attack Based on the Virtual Memory of the Process on Android Devices
Tatsuya Okazaki, Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.) ISEC2021-13 SITE2021-7 BioX2021-14 HWS2021-13 ICSS2021-18 EMM2021-18
 [more] ISEC2021-13 SITE2021-7 BioX2021-14 HWS2021-13 ICSS2021-18 EMM2021-18
pp.20-27
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2021-07-19
10:55
Online Online Rogue Access Point Detection by Using ARP Failure under the MAC Address Duplication
Kosuke Igarashi, Hiroya Kato, Iwao Sasase (Keio Univ.) ISEC2021-14 SITE2021-8 BioX2021-15 HWS2021-14 ICSS2021-19 EMM2021-19
Detecting a Rogue Access Point (RAP) in Wi-Fi network is imperative. In this paper, we propose RAP detection by using Ad... [more] ISEC2021-14 SITE2021-8 BioX2021-15 HWS2021-14 ICSS2021-19 EMM2021-19
pp.28-34
CS 2019-07-04
09:00
Kagoshima Amami City Social Welfare Center Trust-based Verification Attack Prevention Scheme using Tendency of Contents Request on NDN
Hironori Nakano, Hiroya Kato, Shuichiro Haruta, Masashi Yoshida, Iwao Sasase (Keio Univ.) CS2019-13
In this paper, we propose a trust-based verification attack prevention scheme using tendency of contents request on NDN.... [more] CS2019-13
pp.1-6
CS 2019-07-04
09:00
Kagoshima Amami City Social Welfare Center Android Malware Detection Scheme Based on Level of SSL Server Certificate
Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.) CS2019-15
In this paper, in order to detect Android malwares which encrypt packets, we propose an Android malware detection scheme... [more] CS2019-15
pp.13-18
CS 2018-11-02
10:10
Ehime The Shiki Museum Feature Selection Scheme for Android ICC-related Features Based on the Gap of the Appearance Ratio
Kyohei Osuge, Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.) CS2018-65
Android malwares are rapidly becoming a potential threat to users. Among several Android malware detection schemes, the ... [more] CS2018-65
pp.57-62
ICSS, IPSJ-SPT 2017-03-13
16:40
Nagasaki University of Nagasaki Malicious PDF Detection Scheme using Keywords Feature based on Fuzzy inference
Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.) ICSS2016-54
Detecting malicious PDFs (Portable Document Format) is imperative. In several malicious PDF detection schemes, the schem... [more] ICSS2016-54
pp.85-90
 Results 1 - 7 of 7  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan