Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-22 14:50 |
Hokkaido |
Sapporo Convention Center |
Performance Evaluation of Improved SuperSonic Glitch PUF Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ISEC2024-26 SITE2024-23 BioX2024-36 HWS2024-26 ICSS2024-30 EMM2024-32 |
In accordance with the basic plan for science and technology in Japan, The fundamental technologies of digital social in... [more] |
ISEC2024-26 SITE2024-23 BioX2024-36 HWS2024-26 ICSS2024-30 EMM2024-32 pp.128-132 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-22 16:05 |
Hokkaido |
Sapporo Convention Center |
Spoofing Attack for Payment Systems based on Barcode Wristbands and its Coutermeasure Yoshiteru Hibino, Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ISEC2024-29 SITE2024-26 BioX2024-39 HWS2024-29 ICSS2024-33 EMM2024-35 |
A wristband payment system is a payment system that allows any payment in an area to be made and settled together later,... [more] |
ISEC2024-29 SITE2024-26 BioX2024-39 HWS2024-29 ICSS2024-33 EMM2024-35 pp.143-146 |
IBISML, NC, IPSJ-BIO, IPSJ-MPS [detail] |
2024-06-20 13:55 |
Okinawa |
OIST |
Evaluation of Transferability for Adversarial Examples Shunichi Kato, Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NC2024-6 IBISML2024-6 |
Adversarial Example (AE) has been reported as a threat to AI. AE is an attack that misclassify prediction results by add... [more] |
NC2024-6 IBISML2024-6 pp.37-42 |
IBISML, NC, IPSJ-BIO, IPSJ-MPS [detail] |
2024-06-20 16:30 |
Okinawa |
OIST |
Performance Evaluation of Quantized MLP-Mixer Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NC2024-11 IBISML2024-11 |
MLP-Mixer is an image classification model consisting only of multi-layer perceptrons, and is competitive with the lates... [more] |
NC2024-11 IBISML2024-11 pp.73-78 |
CAS, CS |
2024-03-15 14:20 |
Okinawa |
|
Recoloring aware Countermeasure against Adversarial Examples Chisei Ishida, Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2023-134 CS2023-127 |
Adversarial Examples(AEs) which cause artificial intelligence (AI) to make a false prediction by embedded slight perturb... [more] |
CAS2023-134 CS2023-127 pp.128-133 |
VLD, HWS, ICD |
2024-03-01 12:05 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Security Evaluation of Fault Analysis for SuperSonic Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2023-126 HWS2023-86 ICD2023-115 |
SuperSonic, a low-latency lightweight block cipher, is suitable for securing edge devices with high real-time performanc... [more] |
VLD2023-126 HWS2023-86 ICD2023-115 pp.141-144 |
VLD, HWS, ICD |
2024-03-02 09:20 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Countermeasure on AI Hardware against Adversarial Examples Kosuke Hamaguchi, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2023-134 HWS2023-94 ICD2023-123 |
The demand for edge AI, in which artificial intelligence (AI) is directly embedded in devices, is increasing, and the se... [more] |
VLD2023-134 HWS2023-94 ICD2023-123 pp.184-189 |
ITS, IE, ITE-MMS, ITE-ME, ITE-AIT [detail] |
2024-02-19 10:45 |
Hokkaido |
Hokkaido Univ. |
Brightness Adjustment based Countermeasure against Adversarial Examples Takumi Tojo, Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ITS2023-47 IE2023-36 |
Recently, image classification using deep learning AI has been used for in-vehicle AI, and its accuracy and response spe... [more] |
ITS2023-47 IE2023-36 pp.7-12 |
ICM, NS, CQ, NV (Joint) |
2023-11-21 13:15 |
Ehime |
Ehime Prefecture Gender Equality Center (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
Security Evaluation of Low-latency Cipher based on Improved Simon against Deep Learning Analysis using Profiled Power Consumption Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NS2023-114 |
Society 5.0 aims to solve problems in social systems through the intercommunication of small devices. On the other hand,... [more] |
NS2023-114 pp.20-25 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2023-11-16 13:20 |
Kumamoto |
Civic Auditorium Sears Home Yume Hall (Primary: On-site, Secondary: Online) |
Tamper Resistance Evaluation on FPGA for Low-Latency Cipher Sonic Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52 |
Industry 5.0 promotes smart factories for system optimization by utilizing IoT and AI in the industrial field. The smart... [more] |
VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52 pp.101-105 |
AI |
2023-09-12 15:35 |
Hokkaido |
|
Variational Autoencoder Oriented Protection for Intellectual Property Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) AI2023-31 |
In recent years, generative AI, which generates images based on instructions in natural language, has developed rapidly ... [more] |
AI2023-31 pp.180-186 |
ICSS, IPSJ-SPT |
2023-03-13 13:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Basic Study on IoT Security Using Robot Arm Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ICSS2022-51 |
The introduction of IoT devices in industrial systems is becoming increasingly active in order to realise Industry 4.0. ... [more] |
ICSS2022-51 pp.19-24 |
IE, ITS, ITE-MMS, ITE-ME, ITE-AIT [detail] |
2023-02-22 10:15 |
Hokkaido |
Hokkaido Univ. |
Generation Method of Targeted Adversarial Examples using Gradient Information for the Target Class of the Image Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ITS2022-61 IE2022-78 |
With the advancement of AI technology, the vulnerability of AI system is pointed out. The adversarial examples (AE), whi... [more] |
ITS2022-61 IE2022-78 pp.107-111 |
NS, ICM, CQ, NV (Joint) |
2022-11-24 11:10 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
Deep Learning Side-Channel Attack in Noise Based Countermeasure Simon Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NS2022-103 |
The IoT requires the implementation of cryptographic techniques to ensure the confidentiality, integrity, and availabili... [more] |
NS2022-103 pp.19-22 |
SIP |
2022-08-26 14:26 |
Okinawa |
Nobumoto Ohama Memorial Hall (Ishigaki Island) (Primary: On-site, Secondary: Online) |
Generation method of Adversarial Examples using XAI Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) SIP2022-72 |
With the advancement of AI technology, AI can be applied to various fields. Therefore the accountability for the decisio... [more] |
SIP2022-72 pp.115-120 |
ICD, SDM, ITE-IST [detail] |
2022-08-08 15:45 |
Online |
|
Evaluation of Low-Latency Cryptography MANTIS based Low-Power oriented Tamper-Resistant Circuit Kosuke Hamaguchi, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) SDM2022-41 ICD2022-9 |
Lightweight cryptography can not only be implemented in a small area, but also with low latency and low power consumptio... [more] |
SDM2022-41 ICD2022-9 pp.31-36 |
IN, CCS (Joint) |
2022-08-05 15:00 |
Hokkaido |
Hokkaido University(Centennial Hall) (Primary: On-site, Secondary: Online) |
Countermeasure of In-vehicle System using Authenticated Encryption against DoS Attacks Daichi Hirose, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) IN2022-22 |
In-vehicle systems adopt Controller Area Network (CAN) which is the standard communication protocol. Many kinds of data ... [more] |
IN2022-22 pp.39-44 |
SS, IPSJ-SE, KBSE [detail] |
2022-07-28 16:30 |
Hokkaido |
Hokkaido-Jichiro-Kaikan (Sapporo) (Primary: On-site, Secondary: Online) |
Deep Learning Power Analysis Against Protected PRINCE Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) SS2022-4 KBSE2022-14 |
In recent years, with the development of deep learning, AI has been incorporated in the field of cyber security. On the ... [more] |
SS2022-4 KBSE2022-14 pp.19-24 |
AI |
2022-07-04 10:40 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
Deep Learning Side-Channel Attacks for Rolled Architecture of PRINCE and Midori128 Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) AI2022-3 |
With the recent expansion of small autonomous mobile robots such as drones, cyber security for small devices is very imp... [more] |
AI2022-3 pp.13-18 |
CNR |
2022-07-01 14:30 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Evaluation of a Lightweight Cryptographic Finalist on SROS2 Shu Takemoto, Kosuke Hamaguchi, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CNR2022-7 |
In recent years, autonomous mobile robots have been utilized in a wide range of fields, including industrial fields, req... [more] |
CNR2022-7 pp.29-34 |