Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2020-03-03 16:00 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
ICSS2019-92 |
(To be available after the conference date) [more] |
ICSS2019-92 pp.151-155 |
ICSS, IPSJ-SPT |
2020-03-03 10:10 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
ICSS2019-100 |
(To be available after the conference date) [more] |
ICSS2019-100 pp.283-288 |
ICSS, IPSJ-SPT |
2019-03-08 10:00 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
ICSS2018-78 |
[more] |
ICSS2018-78 pp.89-94 |
ICSS, IPSJ-SPT |
2019-03-08 10:25 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
ICSS2018-79 |
[more] |
ICSS2018-79 pp.95-100 |
ICSS, IPSJ-SPT |
2019-03-08 10:50 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
ICSS2018-80 |
(To be available after the conference date) [more] |
ICSS2018-80 pp.101-104 |
ICSS, IPSJ-SPT |
2019-03-08 11:15 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Threat Information Analysis Using Conditional Generative Adversarial Network Keisuke Furumoto, Hideaki Kanehara, Takeshi Takahashi (NICT), Yoshiaki Shiraishi (Kobe Univ.), Daisuke Inoue (NICT) ICSS2018-81 |
[more] |
ICSS2018-81 pp.105-110 |
ICSS |
2018-11-21 15:15 |
Kagoshima |
|
Malware Analysis Method Using Conditional Generative Adversarial Network Keisuke Furumoto, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue (NICT) ICSS2018-57 |
Many schemes combining deep learning with methods for imaging malware have been proposed. These methods are considered t... [more] |
ICSS2018-57 pp.25-30 |
ICSS |
2018-11-21 15:40 |
Kagoshima |
|
ICSS2018-58 |
(To be available after the conference date) [more] |
ICSS2018-58 pp.31-36 |
ICSS |
2018-11-22 13:30 |
Kagoshima |
|
ICSS2018-64 |
(To be available after the conference date) [more] |
ICSS2018-64 pp.61-66 |
ICSS, IA |
2018-06-26 11:40 |
Ehime |
Ehime University |
A Study on Extraction Method of Characteristics of Malware Using Generative Adversalial Networks Keisuke Furumoto, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue (NICT) IA2018-13 ICSS2018-13 |
To classify malware families including many subspecies, several methods have been proposed for acquiring malware feature... [more] |
IA2018-13 ICSS2018-13 pp.77-82 |
ICSS, IPSJ-SPT |
2018-03-07 15:40 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
ICSS2017-64 |
[more] |
ICSS2017-64 pp.79-84 |
ICSS, IPSJ-SPT |
2018-03-08 11:10 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
ICSS2017-75 |
[more] |
ICSS2017-75 pp.145-150 |
ICSS, IPSJ-SPT |
2018-03-08 11:35 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
ICSS2017-76 |
[more] |
ICSS2017-76 pp.151-156 |
ICSS |
2017-11-21 10:55 |
Oita |
Beppu International Convention Center |
Subspecies Classification for Malwares based on Visualization of Dynamic Analysis result Taiki Gouda, Korehito Kashiki, Keisuke Furumoto, Masakatu Morii (Kobe Univ.) ICSS2017-45 |
Along with the activation of malware infection activity, the appearance frequency of new subspecies also tends to increa... [more] |
ICSS2017-45 pp.41-45 |
ICSS |
2017-11-21 14:00 |
Oita |
Beppu International Convention Center |
ICSS2017-50 |
[more] |
ICSS2017-50 pp.71-76 |
IA, ICSS |
2015-06-11 16:05 |
Fukuoka |
Kyushu Institute of Technology Univ. |
Traffic Data Analysis for Multiple Darknet and its Applications Kensho Murai, Keisuke Furumoto (Kobe Univ.), Kosuke Murakami (KDDI), Koji Nakao (KDDI/NICT), Masakatu Morii (Kobe Univ.) IA2015-7 ICSS2015-7 |
The Internet is transcending national boundaries to become an important and essential communication approach in the worl... [more] |
IA2015-7 ICSS2015-7 pp.33-38 |
IT |
2014-07-18 09:30 |
Hyogo |
Kobe University |
Recognition Accuracy Improvement of QR Code by Using GMD Decoding Keisuke Furumoto, Yoshihiro Kusanagi, Masakatu Morii (Kobe Univ) IT2014-27 |
In recent years, two-dimensional codes typified by QR code is used in various scenes such as in medical prescription and... [more] |
IT2014-27 pp.89-94 |
ICSS, IPSJ-SPT |
2014-03-27 13:05 |
Okinawa |
Meio Univiersity |
Practical Password Management System against password-list-attacks
-- Proposal of protection of Master Password -- Hironao Teruya, Wataru Nakamura (Meio Univ.), Keisuke Furumoto (Kobe Univ.), Takeshi Tengan, Katsuyoshi Tanabe (Meio Univ.), Masakatu Morii (Kobe Univ.) ICSS2013-70 |
With the increased use of the internet, the number of passwords which a user has to manage is also increasing. One of ma... [more] |
ICSS2013-70 pp.49-52 |
LOIS, IPSJ-CN, IPSJ-SPT |
2013-05-17 11:00 |
Tokyo |
UEC |
A Support System for Visually Impaired Persons Using QR codes without wireless network Keisuke Furumoto, Masakatu Morii (Kobe Univ.) LOIS2013-3 |
QR code has better recognition properties and error correction capabilityis.
QR code widely used, with the widespread u... [more] |
LOIS2013-3 pp.91-96 |
ICSS |
2012-11-22 11:10 |
Hiroshima |
Miyajima Mori-no-Yado |
Gray scale two-dimensional code and its applications Keisuke Furumoto, Yuhei Watanabe (Kobe Univ.), Masakatu Morii (kobe Univ.) ICSS2012-46 |
With the widespread use of mobile phones equipped with a decoder, two-dimensional code represented by QR code is widely ... [more] |
ICSS2012-46 pp.7-12 |