Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 14:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Non-profiled Side-Channel Attacks by using Clustering Scores in Deep Learning model (2)
-- Attacks by using Models to Predict Ciphertext against Hardware-implemented AES with Countermeasures -- Yuta Fukuda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) ISEC2023-15 SITE2023-9 BioX2023-18 HWS2023-15 ICSS2023-12 EMM2023-15 |
[more] |
ISEC2023-15 SITE2023-9 BioX2023-18 HWS2023-15 ICSS2023-12 EMM2023-15 pp.7-12 |
BioX, SIP, IE, ITE-IST, ITE-ME [detail] |
2023-05-19 15:15 |
Mie |
Sansui Hall, Mie University (Primary: On-site, Secondary: Online) |
Object Detection with Split Images Based on Signal Range for Single Exposure High Dynamic Range Image Sensors Yuta Nakahigashi, Shunsuke Okura, Kota Yoshida, Yu Osuka (Ritsumeikan Univ.) |
[more] |
|
BioX, SIP, IE, ITE-IST, ITE-ME [detail] |
2023-05-19 15:45 |
Mie |
Sansui Hall, Mie University (Primary: On-site, Secondary: Online) |
On-Chip Data Reduction and Object Detection for a Feature Extractable CMOS Image Sensor Yudai Morikaku (Ritsumeikan Univ.), Ryuichi Ujiie, Daisuke Morikawa, Hideki Shima, Kota Yoshida, Shunsuke Okura (Ritsumeikan Univ.) |
[more] |
|
HWS |
2023-04-14 15:35 |
Oita |
(Primary: On-site, Secondary: Online) |
Object Generation - Backdoor Attack against Object-Detection DNN Triggered by Fault Injection into MIPI Takumi Takubo, Tatsuya Oyama, Kota Yoshida, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ.) HWS2023-6 |
Backdoor attacks that induce misclassification by poisoning training data and adding specific patterns (trigger marks) t... [more] |
HWS2023-6 pp.20-25 |
HWS, VLD |
2023-03-03 15:45 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Study of Intrinsic ID extracted from RG-DTM Arbiter PUF implemented on FPGA Mika Sakai, Tatsuya Oyama, Kota Yoshida (Ritsumeikan Univ.), Yohei Hori, Toshihiro Katashita (AIST), Masayoshi Shirahata, Takeshi Fujino (Ritsumeikan Univ.) VLD2022-111 HWS2022-82 |
We studied the implementation method of PUF for generating a unique ID on FPGA. We adopted a method of controlling the p... [more] |
VLD2022-111 HWS2022-82 pp.209-214 |
CPSY, IPSJ-ARC |
2023-01-11 11:40 |
Online |
Online |
Reliability Enhancement Techniques for On-Device Learning on Wireless Sensor Nodes Kazuki Sunaga (Keio Univ.), Kota Yoshida (Ritsumeikan Univ.), Hiroki Matsutani (Keio Univ.) CPSY2022-33 |
(To be available after the conference date) [more] |
CPSY2022-33 pp.29-34 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2022-11-30 16:40 |
Kumamoto |
(Primary: On-site, Secondary: Online) |
Evaluation of Model Quantization Method on Vitis-AI for Mitigating Adversarial Examples Yuta Fukuda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) VLD2022-51 ICD2022-68 DC2022-67 RECONF2022-74 |
Adversarial examples (AEs) are security threats in deep neural networks (DNNs). One of the countermeasures is adversaria... [more] |
VLD2022-51 ICD2022-68 DC2022-67 RECONF2022-74 pp.182-187 |
HWS, ICD |
2022-10-25 13:50 |
Shiga |
(Primary: On-site, Secondary: Online) |
Fundamental Study of Adversarial Examples Created by Fault Injection Attack on Image Sensor Interface Tatsuya Oyama, Kota Yoshida, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ.) HWS2022-36 ICD2022-28 |
Adversarial examples (AEs), which cause misclassification by adding subtle perturbations to input images, have been prop... [more] |
HWS2022-36 ICD2022-28 pp.35-40 |
HWS, ICD |
2022-10-25 16:40 |
Shiga |
(Primary: On-site, Secondary: Online) |
A Study on Small Area HMAC-SHA256 Circuit suitable for CMOS Image Sensor Yu Sekioka, Tatsuya Oyama, Hayato Tatsuno, Kota Yoshida, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ) HWS2022-42 ICD2022-34 |
In order to realize data integrity and authentication for the edge imaging devices and to prevent the image information ... [more] |
HWS2022-42 ICD2022-34 pp.70-75 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 15:15 |
Online |
Online |
Revealing PUF Responses by Differential Power Analysis against Reed-Muller-Code-based Fuzzy Extractor Soma Watanabe, Yuta Fukuda, Tatsuya Oyama, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ) ISEC2022-12 SITE2022-16 BioX2022-37 HWS2022-12 ICSS2022-20 EMM2022-20 |
IoT devices that use the Physically Unclonable Function (PUF) response to generate a secret key has been proposed. Since... [more] |
ISEC2022-12 SITE2022-16 BioX2022-37 HWS2022-12 ICSS2022-20 EMM2022-20 pp.29-34 |
HWS |
2022-04-26 10:55 |
Tokyo |
AIST Tokyo Waterfront (Annex) (Primary: On-site, Secondary: Online) |
Deep Learning Side-Channel Attacks against Hardware-Implemented Lightweight Cipher Midori64 Madoka Sako, Kunihiro Kuroda, Yuta Fukuda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) HWS2022-2 |
Midori is a lightweight cipher and it is developed to achieve superior circuit size, low latency, and low power consumpt... [more] |
HWS2022-2 pp.7-12 |
SDM, ICD, ITE-IST [detail] |
2021-08-17 13:55 |
Online |
Online |
Study of an Event-Driven CMOS Image Sensor Using Deep Learning (1)
-- Verification of Image Classification Using Low Bit-Resolution Feature Images -- Kohei Yamamoto, Kota Yoshida, Shunsuke Okura (Ritsumeikan Univ.) |
[more] |
|
SDM, ICD, ITE-IST [detail] |
2021-08-17 14:45 |
Online |
Online |
Image Recognition of HDR Images with Dual Gain CMOS Image Sensor Takuya Kitamura, Kota Yoshida, Tetsushi Ikeda (Ritsumeikan Univ.), Shinichi Ikenaga, Isao Takayanagi (Brillnics), Shunsuke Okura (Ritsumeikan Univ.) |
[more] |
|
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-20 14:50 |
Online |
Online |
Deep Learning Side-Channel Attacks against Unprotected AES and RSM-AES Implemented in ASIC Yuta Fukuda, Kota Yoshida, Hisashi Hashimoto, Takeshi Fujino (Ritsumeikan Univ.) ISEC2021-24 SITE2021-18 BioX2021-25 HWS2021-24 ICSS2021-29 EMM2021-29 |
The cryptographic key can be revealed by exploiting side-channel information such as power traces under operation.
Rec... [more] |
ISEC2021-24 SITE2021-18 BioX2021-25 HWS2021-24 ICSS2021-29 EMM2021-29 pp.86-91 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-20 15:30 |
Online |
Online |
Implimentation of RISC-V TEE using PUF as Root of Trust Kota Yoshida (Ritsumeikan Univ.), Kuniyasu Suzaki (AIST), Takeshi Fujino (Ritsumeikan Univ.) ISEC2021-25 SITE2021-19 BioX2021-26 HWS2021-25 ICSS2021-30 EMM2021-30 |
In society 5.0, acquiring trustworthy data from a huge amount of IoT devices in physical spaces, it is important to veri... [more] |
ISEC2021-25 SITE2021-19 BioX2021-26 HWS2021-25 ICSS2021-30 EMM2021-30 pp.92-97 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-21 10:50 |
Online |
Online |
Adversarial scan attack against ICP algorithm for pose estimation on LiDAR-based SLAM Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) ISEC2020-26 SITE2020-23 BioX2020-29 HWS2020-19 ICSS2020-13 EMM2020-23 |
An autonomous robot is controlled on physical information acquired by various sensors. Some physical attacks are propose... [more] |
ISEC2020-26 SITE2020-23 BioX2020-29 HWS2020-19 ICSS2020-13 EMM2020-23 pp.81-86 |
HWS (2nd) |
2019-12-06 16:00 |
Tokyo |
Asakusabashi Hulic Conference |
[Poster Presentation]
Model Reverse-Engineering Attack using Correlation Power Analysis against Systolic Array Based Neural Network Accelerator Kota Yoshida, Shunsuke Okura, Mitsuru Shiozaki, Takaya Kubota, Takeshi Fujino (Ritsumeikan Univ.) |
[more] |
|
HCS, HIP, HI-SIGCE [detail] |
2019-05-17 15:35 |
Okinawa |
Okinawa Industry Support Center |
Behavioral analysis at interactive appreciation of photographs
-- Making a decision based on preference and influence from partner -- Kota Yoshida, Daisuke Tanaka (Tottori Univ.) HCS2019-28 HIP2019-28 |
[more] |
HCS2019-28 HIP2019-28 pp.221-226 |
HWS, VLD |
2019-03-02 13:05 |
Okinawa |
Okinawa Ken Seinen Kaikan |
A study of interference method using flicker noise for a pedestrian detection system Hirotaka Sakakibara, Kota Yoshida, Masayoshi Shirahata, Takeshi Kumaki, Takeshi Fujino (Ritsumeikan Univ) VLD2018-140 HWS2018-103 |
[more] |
VLD2018-140 HWS2018-103 pp.277-282 |
HWS (2nd) |
2018-12-13 10:45 |
Tokyo |
Tokyo Univ. Takeda Bldg. Takeda Hall |
Study of Secure Implementation of AI Hardware on IoT edge Takeshi Fujino, Kota Yoshida (Ritsumeikan Univ.) |
(Advance abstract in Japanese is available) [more] |
|