Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCS, SR, SRW (Joint) |
2022-03-04 13:00 |
Online |
Online (Online) |
[Special Invited Talk]
Enjoyment of research and education What is true information and communication?
-- Looking back on 36 years of teaching life at university -- Iwao Sasase (Keio Univ.) RCS2021-287 SR2021-117 SRW2021-88 |
It is required to challenge the dream of information and communication and the prosperous future society realized by it,... [more] |
RCS2021-287 SR2021-117 SRW2021-88 pp.171-176(RCS), pp.133-138(SR), pp.84-89(SRW) |
MIKA (3rd) |
2021-10-27 11:00 |
Okinawa |
(Okinawa, Online) (Primary: On-site, Secondary: Online) |
[Special Invited Talk]
Efforts for Research and Educational Activities toward New Normal Iwao Sasase (Keio Univ.) |
[more] |
|
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-19 10:30 |
Online |
Online (Online) |
A Website Fingerprinting Attack Based on the Virtual Memory of the Process on Android Devices Tatsuya Okazaki, Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.) ISEC2021-13 SITE2021-7 BioX2021-14 HWS2021-13 ICSS2021-18 EMM2021-18 |
[more] |
ISEC2021-13 SITE2021-7 BioX2021-14 HWS2021-13 ICSS2021-18 EMM2021-18 pp.20-27 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-19 10:55 |
Online |
Online (Online) |
Rogue Access Point Detection by Using ARP Failure under the MAC Address Duplication Kosuke Igarashi, Hiroya Kato, Iwao Sasase (Keio Univ.) ISEC2021-14 SITE2021-8 BioX2021-15 HWS2021-14 ICSS2021-19 EMM2021-19 |
Detecting a Rogue Access Point (RAP) in Wi-Fi network is imperative. In this paper, we propose RAP detection by using Ad... [more] |
ISEC2021-14 SITE2021-8 BioX2021-15 HWS2021-14 ICSS2021-19 EMM2021-19 pp.28-34 |
CS |
2019-07-04 09:00 |
Kagoshima |
Amami City Social Welfare Center (Kagoshima) |
Trust-based Verification Attack Prevention Scheme using Tendency of Contents Request on NDN Hironori Nakano, Hiroya Kato, Shuichiro Haruta, Masashi Yoshida, Iwao Sasase (Keio Univ.) CS2019-13 |
In this paper, we propose a trust-based verification attack prevention scheme using tendency of contents request on NDN.... [more] |
CS2019-13 pp.1-6 |
CS |
2019-07-04 09:00 |
Kagoshima |
Amami City Social Welfare Center (Kagoshima) |
A Novel Visual Similarity-based Phishing Detection Methodology Using Hue Information with Auto Updating Database Shuichiro Haruta, Fumitaka Yamazaki, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2019-14 |
In this paper, we propose a novel visual similarity-based phishing detection methodology using hue information with aut... [more] |
CS2019-14 pp.7-12 |
CS |
2019-07-04 09:00 |
Kagoshima |
Amami City Social Welfare Center (Kagoshima) |
Android Malware Detection Scheme Based on Level of SSL Server Certificate Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.) CS2019-15 |
In this paper, in order to detect Android malwares which encrypt packets, we propose an Android malware detection scheme... [more] |
CS2019-15 pp.13-18 |
CS |
2019-07-04 09:00 |
Kagoshima |
Amami City Social Welfare Center (Kagoshima) |
An Approximation Scheme for Better Visualization of Trajectory Mapping with BLE Beacons in Libraries Ryusei Goto, Hiromu Asahina, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2019-16 |
To find out the bottleneck in the college library, it is necessary to estimate users' trajectory when searching books an... [more] |
CS2019-16 pp.19-24 |
CS |
2019-07-04 09:00 |
Kagoshima |
Amami City Social Welfare Center (Kagoshima) |
Analyzing MAC address randomization for Wi-Fi signal based mobile device tracking Yuki Furuya, Hiromu Asahina, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2019-17 |
Analyzing facility usage through Wi-Fi signals of users’ mobile devices has become controversial but
common. Although W... [more] |
CS2019-17 pp.25-29 |
CS |
2019-07-04 09:00 |
Kagoshima |
Amami City Social Welfare Center (Kagoshima) |
Traffic Feature-based Botnet Detection Scheme Emphasizing the Importance of Long Patterns Yichen An, Shuichiro Haruta, Sanghun Choi, Iwao Sasase (Keio Univ.) CS2019-18 |
The botnet detection is imperative. Among several detection schemes, the promising one uses the communication sequences.... [more] |
CS2019-18 pp.31-35 |
CS |
2018-11-01 09:50 |
Ehime |
The Shiki Museum (Ehime) |
A User Study in College Library Through Experiments on Searching Behavior Kentaroh Toyoda, Yumiko Igarashi, Hoshika Imai, Iwao Sasase (Keio Univ.) CS2018-58 |
[more] |
CS2018-58 pp.13-18 |
CS |
2018-11-01 10:10 |
Ehime |
The Shiki Museum (Ehime) |
Duration of Stay Estimation Scheme for Academic Libraries using Wi-Fi Frame Data Hiromu Asahina, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2018-59 |
[more] |
CS2018-59 pp.19-24 |
CS |
2018-11-02 10:10 |
Ehime |
The Shiki Museum (Ehime) |
Feature Selection Scheme for Android ICC-related Features Based on the Gap of the Appearance Ratio Kyohei Osuge, Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.) CS2018-65 |
Android malwares are rapidly becoming a potential threat to users. Among several Android malware detection schemes, the ... [more] |
CS2018-65 pp.57-62 |
CS |
2018-11-02 10:30 |
Ehime |
The Shiki Museum (Ehime) |
False Density Information Attack Detection Scheme Using Overlap of Communication Range in VANET Masashi Yoshida, Hiromu Asahina, Shuichiro Haruta, Iwao Sasase (Keio Univ) CS2018-66 |
In Vehicular Ad Hoc Network (VANET), it is important to detect false information. The previously published scheme detect... [more] |
CS2018-66 pp.63-66 |
CS |
2018-07-12 10:44 |
Okinawa |
Eef Information Plaza (Kumejima Is.) (Okinawa) |
Encounter Record Reduction Scheme based on Theoretical Contact Probability for Flooding Attack Mitigation in DTN Keisuke Arai, Shuichirou Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2018-19 |
[more] |
CS2018-19 pp.41-46 |
CS |
2018-07-12 10:56 |
Okinawa |
Eef Information Plaza (Kumejima Is.) (Okinawa) |
An Energy Efficient Target Specific Code Dissemination Scheme with RPL-based Forwarder Selection Algorithm Hiromu Asahina, Kentaroh Toyoda, Iwao Sasase (Keio Univ.), P. Takis Mathiopoulos (UoA), Hisao Yamamoto (TCU) CS2018-23 |
In order to fix a bug or install a new application, disseminating a code to specific target sensors is an important mana... [more] |
CS2018-23 pp.61-66 |
CS |
2017-11-16 10:00 |
Kumamoto |
Aso Plaza Hotel (Kumamoto) |
Reduce Complexity in Resource Allocation for Hyper MIMO System with Block Diagonalization Precoding Technique Maung Sann Maw, Iwao Sasase (Keio Univ) CS2017-54 |
Hyper Multi-input Multi-output (hyper-MIMO) is considered as a promising technology for the fifth generation (5G) of wir... [more] |
CS2017-54 pp.1-4 |
CS |
2017-11-16 10:25 |
Kumamoto |
Aso Plaza Hotel (Kumamoto) |
Reduced Complexity Transmit Antenna Selection Method for the Large Scale MIMO System with the Average Channel Gain Aye Mon Htun, Maung Sann Maw, Iwao Sasase (Keio Univ) CS2017-55 |
[more] |
CS2017-55 pp.5-8 |
CS |
2017-11-16 10:50 |
Kumamoto |
Aso Plaza Hotel (Kumamoto) |
Traceroute-based Target Link Flooding Attack Detection Scheme by Analyzing Hop Count to the Destination Kei Sakuma, Hiromu Asahina, Shuichiro Haruta, Iwao Sasase (Keio Univ.) CS2017-56 |
[more] |
CS2017-56 pp.9-14 |
CS |
2017-11-16 11:15 |
Kumamoto |
Aso Plaza Hotel (Kumamoto) |
Low Transmission Cost P2P Storage Scheme with Privacy Protection Sanghun Choi, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2017-57 |
To safely store the user’s data without the central server, the P2P(Peer to Peer) storage methods have been studied. Eve... [more] |
CS2017-57 pp.15-20 |