Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, SITE, IPSJ-IOT [detail] |
2025-03-04 12:00 |
Kagoshima |
Ama-Home Plaza (Primary: On-site, Secondary: Online) |
A Two-Stage Classification-Based Intrusion Detection Model for Mitigating Unknown Attacks on MQTT Brokers Masako Miyazawa (Chuo Univ.), Shunsuke Hashimoto (Univ. of Hyogo), Takatsugu Nakayama (Ritsumeikan Univ.), Hiroyuki Inoue (Kyoto Sangyo Univ.), Atsuo Inomata (Osaka Univ.) SITE2024-105 IA2024-85 |
[more] |
SITE2024-105 IA2024-85 pp.118-123 |
NC, NLP (Joint) |
2025-01-28 17:35 |
Osaka |
|
Training support for a professional boxer by motion analysis using pose estimation and depth estimation models LU WEI, Rikiya Inafuku, Eiji Kitajima, Yuta Torichigai (Univ Ryukyu), Ao Tamai, Hiroyuki Inoue, Hayato Komai (HARVEST Inc.), Ryota Miyata (Univ Ryukyu) NC2024-48 |
In this study, we applied pose estimation and depth estimation models to training videos of a professional boxer to supp... [more] |
NC2024-48 pp.42-46 |
ICSS, IPSJ-SPT |
2024-03-22 08:30 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Proposal of Moving Target Defense Approach on Reliability in Web Services Mamoru Saita (Keio Univ.), Shunsuke Hashimoto (Univ. of Hyogo), Atsuo Inomata (Osaka Univ.), Hiroyuki Inoue (Kyoto Sangyo Univ.) ICSS2023-82 |
Although modern Web services are built on a high level of security and reliability, the static properties of networks re... [more] |
ICSS2023-82 pp.93-99 |
ICSS, IPSJ-SPT |
2022-03-08 10:00 |
Online |
Online |
Input predictive attack by keyboard acoustic emanations using BERT and its countermeasures Masahiro Iida (Teikyo Univ.), Mitsuaki Akiyama (NTT), Masaki Kamizono (DTCY), Takahiro Kasama (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Kyoto Sangyo Univ.), Atsuo Inomata (Osaka Univ.) ICSS2021-67 |
The Keyboard Acoustic Emanations has been proposed to estimate the input key from keystroke sounds as a kind of side-cha... [more] |
ICSS2021-67 pp.49-54 |
ICSS, IPSJ-SPT |
2021-03-01 09:35 |
Online |
Online |
A Method for Reconstructing Hidden Background Image in Tele-conference with Virtual Background Satoki Tsuji, Ryusei Ishikawa (Ritsumeikan Univ.), Masashi Eto (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Hiroshima City Univ.) ICSS2020-35 |
Interpersonal communications through video chat software has become essential since a remote work is now encouraged. Whe... [more] |
ICSS2020-35 pp.55-60 |
ICSS, IPSJ-SPT |
2021-03-01 10:00 |
Online |
Online |
Implementation and Evaluation of a Plagiarism Detection Method for Source Code on Programming Contest Ryusei Ishikawa (Ritsumeikan Univ.), Yuichi Hattori (Secure Cycle), Hiroyuki Inoue (Hiroshima City Univ.), Atsuo Inomata (Osaka Univ.) ICSS2020-36 |
Programming competitions are held all over the world to write programs accurately in a short time. However, because many... [more] |
ICSS2020-36 pp.61-65 |
SANE |
2020-06-26 15:20 |
Online |
Online |
[Special Talk]
IoT satellite HATOSAT with CMG Noriyuki Nakazato, Tomoki Ishii, Yoshiaki Hayasaka, Yoko Furukori, Hiroyuki Inoue, Takao Misono, Khota Yoshinari, Akihiko Tsukahara, Keita Tanaka (TDU) SANE2020-14 |
HATOSAT is being developed by Tokyo Denki University to perform a mission of Store and Forward (S&F) which is an IoT via... [more] |
SANE2020-14 pp.31-36 |
NS, IN (Joint) |
2017-03-03 09:30 |
Okinawa |
OKINAWA ZANPAMISAKI ROYAL HOTEL |
Implementation and Evaluation of the Dynamic Filtering Mechanism using a Machine Learning on the In-vehicle Security Gateway Mizuki Teshiba, Hiroyuki Inoue, Kenji Ishida (Hiroshima City Univ.) IN2016-131 |
In-vehicle devices such as infotainment and telematics devices have been connected to external networks because of the d... [more] |
IN2016-131 pp.205-210 |
ICSS |
2016-11-25 14:40 |
Kanagawa |
Institute of Information Security |
A fuzz testing method cooperated with threat modeling Yasuhiko Nishio, Tadashi Shiroma (CCDS), Hiroyuki Inoue (CCDS/HCU) ICSS2016-41 |
The purpose of this study is to develop a fuzz testing method that can ensure the IoT security especially automotive sys... [more] |
ICSS2016-41 pp.15-20 |
NS |
2016-04-21 15:00 |
Wakayama |
wakayama university |
[Invited Talk]
Security Aspects and the Protection Mechanisms of a Vehicle Connected with the External Networks Hiroyuki Inoue (Hiroshima City Univ.) |
(To be available after the conference date) [more] |
|
IN |
2016-01-21 15:50 |
Aichi |
Nagoya Kigyou Fukushi Kaikan |
A Content Selection Mechanism Based on User Preferences Derived from Search Keywords on a Mobile Terminal Sho Nishimoto, Kuya Taira, Kenshiro Yada, Junichi Funasaka (Hiroshima City Univ.), Hiroyuki Inoue (Hiroshima City Univ./NICT) IN2015-99 |
Recently, the user context is used for content delivery. In this research, the mobile terminal owned by users is assumed... [more] |
IN2015-99 pp.23-28 |
NS |
2015-04-16 14:45 |
Gifu |
Hida-jibasan |
A Study on P2P Streaming Performance Considering Piece Selection and Network Topology Junichi Funasaka, Kenshiro Yada, Hiroyuki Inoue (Hiroshima City Univ.) NS2015-5 |
BitTorrent-like P2P Live streaming or Video on Demand (VoD) services, which have been developed these days, have been re... [more] |
NS2015-5 pp.23-28 |