Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS, ICD, VLD |
2025-03-08 09:20 |
Okinawa |
(Okinawa, Online) (Primary: On-site, Secondary: Online) |
Interpretable Deep Learning-based Side-channel Analysis Using Kolmogorov-Arnold Networks Kota Yoshida (Ritsumeikan Univ.), Sengim Karayalcin (Leiden Univ.), Stjepan Picek (Radboud Univ.) |
[more] |
|
HWS, ICD, VLD |
2025-03-08 09:45 |
Okinawa |
(Okinawa, Online) (Primary: On-site, Secondary: Online) |
Implementation of Side-channel-attack Environment against In-vehicle ECUs Using CAN Packet Monitoring for Triggering Waveform Acquisition Tomoe Kato, Yuta Fukuda, Mizuki Nagahisa, Masato Okuda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) |
[more] |
|
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2024-11-12 16:25 |
Oita |
COMPAL HALL (Oita, Online) (Primary: On-site, Secondary: Online) |
Implementation and Evaluation of Arithmetic Masking to Mitigate Side-channel Attacks on Wavefront Array-based DNN Accelerator Hirokatsu Yamasaki, Kota Yoshida, Yuta Fukuda, Takeshi Fujino (Ritsumeikan Univ) VLD2024-36 ICD2024-54 DC2024-58 RECONF2024-66 |
Since training deep neural networks (DNNs) requires huge costs, trained models are important intellectual property. Ther... [more] |
VLD2024-36 ICD2024-54 DC2024-58 RECONF2024-66 pp.55-60 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-22 16:40 |
Hokkaido |
Sapporo Convention Center (Hokkaido) |
Defending against adversarial example attacks by a denoising autoencoder and physical random noise Yuki Rogi, Kota Yoshida, Tatsuya Oyama, Takeshi Fujino, Shunsuke Okura (Ritsumeikan Univ.) ISEC2024-38 SITE2024-35 BioX2024-48 HWS2024-38 ICSS2024-42 EMM2024-44 |
With the development of IoT technology, edge AI has attracted widespread attention. However, edge AI shows vulnerability... [more] |
ISEC2024-38 SITE2024-35 BioX2024-48 HWS2024-38 ICSS2024-42 EMM2024-44 pp.194-199 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-23 09:15 |
Hokkaido |
Sapporo Convention Center (Hokkaido) |
Evaluation of Accuracy and Security on Deep Learning Model by Utilizing K-Anonymization With Attribute Selection for Reducing Computational Cost Rei Ueda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ) ISEC2024-46 SITE2024-43 BioX2024-56 HWS2024-46 ICSS2024-50 EMM2024-52 |
In recent years, personal data has been used for various purposes. In general, personal data contains a lot of private i... [more] |
ISEC2024-46 SITE2024-43 BioX2024-56 HWS2024-46 ICSS2024-50 EMM2024-52 pp.247-254 |
ITE-ME, ITE-IST, BioX, SIP, MI, IE [detail] |
2024-06-07 13:15 |
Niigata |
Nigata University (Ekinan-Campus "TOKIMATE") (Niigata) |
Lightweight Object Detection Model for a Binary Feature Extractable CMOS Image Sensor Keiichiro Kuroda, Yudai Morikaku, Yu Osuka (Ritumeikan Univ), Ryuichi Ujiie, Daisuke Morikawa, Hideki Shima, Okura Syunsuke, Kota Yoshida (Ritumeikan Univ) |
For the coming Society 5.0, we propose an object detection system using a CMOS image sensor capable of extracting binary... [more] |
|
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 14:20 |
Hokkaido |
Hokkaido Jichiro Kaikan (Hokkaido) |
Non-profiled Side-Channel Attacks by using Clustering Scores in Deep Learning model (2)
-- Attacks by using Models to Predict Ciphertext against Hardware-implemented AES with Countermeasures -- Yuta Fukuda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) ISEC2023-15 SITE2023-9 BioX2023-18 HWS2023-15 ICSS2023-12 EMM2023-15 |
[more] |
ISEC2023-15 SITE2023-9 BioX2023-18 HWS2023-15 ICSS2023-12 EMM2023-15 pp.7-12 |
BioX, SIP, IE, ITE-IST, ITE-ME [detail] |
2023-05-19 15:15 |
Mie |
Sansui Hall, Mie University (Mie, Online) (Primary: On-site, Secondary: Online) |
Object Detection with Split Images Based on Signal Range for Single Exposure High Dynamic Range Image Sensors Yuta Nakahigashi, Shunsuke Okura, Kota Yoshida, Yu Osuka (Ritsumeikan Univ.) |
[more] |
|
BioX, SIP, IE, ITE-IST, ITE-ME [detail] |
2023-05-19 15:45 |
Mie |
Sansui Hall, Mie University (Mie, Online) (Primary: On-site, Secondary: Online) |
On-Chip Data Reduction and Object Detection for a Feature Extractable CMOS Image Sensor Yudai Morikaku (Ritsumeikan Univ.), Ryuichi Ujiie, Daisuke Morikawa, Hideki Shima, Kota Yoshida, Shunsuke Okura (Ritsumeikan Univ.) |
[more] |
|
HWS |
2023-04-14 15:35 |
Oita |
(Oita, Online) (Primary: On-site, Secondary: Online) |
Object Generation - Backdoor Attack against Object-Detection DNN Triggered by Fault Injection into MIPI Takumi Takubo, Tatsuya Oyama, Kota Yoshida, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ.) HWS2023-6 |
Backdoor attacks that induce misclassification by poisoning training data and adding specific patterns (trigger marks) t... [more] |
HWS2023-6 pp.20-25 |
HWS, VLD |
2023-03-03 15:45 |
Okinawa |
(Okinawa, Online) (Primary: On-site, Secondary: Online) |
Study of Intrinsic ID extracted from RG-DTM Arbiter PUF implemented on FPGA Mika Sakai, Tatsuya Oyama, Kota Yoshida (Ritsumeikan Univ.), Yohei Hori, Toshihiro Katashita (AIST), Masayoshi Shirahata, Takeshi Fujino (Ritsumeikan Univ.) VLD2022-111 HWS2022-82 |
We studied the implementation method of PUF for generating a unique ID on FPGA. We adopted a method of controlling the p... [more] |
VLD2022-111 HWS2022-82 pp.209-214 |
CPSY, IPSJ-ARC |
2023-01-11 11:40 |
Online |
Online (Online) |
Reliability Enhancement Techniques for On-Device Learning on Wireless Sensor Nodes Kazuki Sunaga (Keio Univ.), Kota Yoshida (Ritsumeikan Univ.), Hiroki Matsutani (Keio Univ.) CPSY2022-33 |
(To be available after the conference date) [more] |
CPSY2022-33 pp.29-34 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2022-11-30 16:40 |
Kumamoto |
(Kumamoto, Online) (Primary: On-site, Secondary: Online) |
Evaluation of Model Quantization Method on Vitis-AI for Mitigating Adversarial Examples Yuta Fukuda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) VLD2022-51 ICD2022-68 DC2022-67 RECONF2022-74 |
Adversarial examples (AEs) are security threats in deep neural networks (DNNs). One of the countermeasures is adversaria... [more] |
VLD2022-51 ICD2022-68 DC2022-67 RECONF2022-74 pp.182-187 |
HWS, ICD |
2022-10-25 13:50 |
Shiga |
(Shiga, Online) (Primary: On-site, Secondary: Online) |
Fundamental Study of Adversarial Examples Created by Fault Injection Attack on Image Sensor Interface Tatsuya Oyama, Kota Yoshida, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ.) HWS2022-36 ICD2022-28 |
Adversarial examples (AEs), which cause misclassification by adding subtle perturbations to input images, have been prop... [more] |
HWS2022-36 ICD2022-28 pp.35-40 |
HWS, ICD |
2022-10-25 16:40 |
Shiga |
(Shiga, Online) (Primary: On-site, Secondary: Online) |
A Study on Small Area HMAC-SHA256 Circuit suitable for CMOS Image Sensor Yu Sekioka, Tatsuya Oyama, Hayato Tatsuno, Kota Yoshida, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ) HWS2022-42 ICD2022-34 |
In order to realize data integrity and authentication for the edge imaging devices and to prevent the image information ... [more] |
HWS2022-42 ICD2022-34 pp.70-75 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 15:15 |
Online |
Online (Online) |
Revealing PUF Responses by Differential Power Analysis against Reed-Muller-Code-based Fuzzy Extractor Soma Watanabe, Yuta Fukuda, Tatsuya Oyama, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ) ISEC2022-12 SITE2022-16 BioX2022-37 HWS2022-12 ICSS2022-20 EMM2022-20 |
IoT devices that use the Physically Unclonable Function (PUF) response to generate a secret key has been proposed. Since... [more] |
ISEC2022-12 SITE2022-16 BioX2022-37 HWS2022-12 ICSS2022-20 EMM2022-20 pp.29-34 |
HWS |
2022-04-26 10:55 |
Tokyo |
AIST Tokyo Waterfront (Annex) (Tokyo, Online) (Primary: On-site, Secondary: Online) |
Deep Learning Side-Channel Attacks against Hardware-Implemented Lightweight Cipher Midori64 Madoka Sako, Kunihiro Kuroda, Yuta Fukuda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) HWS2022-2 |
Midori is a lightweight cipher and it is developed to achieve superior circuit size, low latency, and low power consumpt... [more] |
HWS2022-2 pp.7-12 |
SDM, ICD, ITE-IST [detail] |
2021-08-17 13:55 |
Online |
Online (Online) |
Study of an Event-Driven CMOS Image Sensor Using Deep Learning (1)
-- Verification of Image Classification Using Low Bit-Resolution Feature Images -- Kohei Yamamoto, Kota Yoshida, Shunsuke Okura (Ritsumeikan Univ.) |
[more] |
|
SDM, ICD, ITE-IST [detail] |
2021-08-17 14:45 |
Online |
Online (Online) |
Image Recognition of HDR Images with Dual Gain CMOS Image Sensor Takuya Kitamura, Kota Yoshida, Tetsushi Ikeda (Ritsumeikan Univ.), Shinichi Ikenaga, Isao Takayanagi (Brillnics), Shunsuke Okura (Ritsumeikan Univ.) |
[more] |
|
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-20 14:50 |
Online |
Online (Online) |
Deep Learning Side-Channel Attacks against Unprotected AES and RSM-AES Implemented in ASIC Yuta Fukuda, Kota Yoshida, Hisashi Hashimoto, Takeshi Fujino (Ritsumeikan Univ.) ISEC2021-24 SITE2021-18 BioX2021-25 HWS2021-24 ICSS2021-29 EMM2021-29 |
The cryptographic key can be revealed by exploiting side-channel information such as power traces under operation.
Rec... [more] |
ISEC2021-24 SITE2021-18 BioX2021-25 HWS2021-24 ICSS2021-29 EMM2021-29 pp.86-91 |