Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-23 09:40 |
Hokkaido |
Sapporo Convention Center |
ISEC2024-53 SITE2024-50 BioX2024-63 HWS2024-53 ICSS2024-57 EMM2024-59 |
(To be available after the conference date) [more] |
ISEC2024-53 SITE2024-50 BioX2024-63 HWS2024-53 ICSS2024-57 EMM2024-59 pp.291-298 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-23 10:05 |
Hokkaido |
Sapporo Convention Center |
Toward semantic identification method for patch modification using LLM Reika Arakawa, Yo Kanemoto, Mitsuaki Akiyama (NTT) ISEC2024-54 SITE2024-51 BioX2024-64 HWS2024-54 ICSS2024-58 EMM2024-60 |
(To be available after the conference date) [more] |
ISEC2024-54 SITE2024-51 BioX2024-64 HWS2024-54 ICSS2024-58 EMM2024-60 pp.299-306 |
ICSS, IPSJ-SPT |
2024-03-21 14:55 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
ICSS2023-75 |
With the proliferation of IoT devices, there has been an increase in security incidents targeting IoT devices. To active... [more] |
ICSS2023-75 pp.43-50 |
PRMU, IBISML, IPSJ-CVIM |
2024-03-04 09:12 |
Hiroshima |
Hiroshima Univ. Higashi-Hiroshima campus (Primary: On-site, Secondary: Online) |
Creating Adversarial Examples to Deceive Both Humans and Machine Learning Models Ko Fujimori (Waseda Univ.), Toshiki Shibahara (NTT), Daiki Chiba (NTT Security), Mitsuaki Akiyama (NTT), Masato Uchida (Waseda Univ.) PRMU2023-65 |
One of the vulnerability attacks against neural networks is the generation of Adversarial Examples (AE), which induce mi... [more] |
PRMU2023-65 pp.82-87 |
IA, ICSS |
2023-06-21 09:30 |
Saga |
Saga Univ. (Primary: On-site, Secondary: Online) |
A Precise Approach of Software Vulnerability Detection Using Set Similarity Calculation Algorithm Reika Arakawa, Yo Kanemoto, Eitaro Shioji, Mitsuaki Akiyama (NTT) IA2023-7 ICSS2023-7 |
(To be available after the conference date) [more] |
IA2023-7 ICSS2023-7 pp.32-39 |
ICSS, IPSJ-SPT |
2023-03-13 15:00 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
ICSS2022-58 |
(To be available after the conference date) [more] |
ICSS2022-58 pp.61-66 |
ICSS, IPSJ-SPT |
2023-03-13 15:20 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
ICSS2022-59 |
(To be available after the conference date) [more] |
ICSS2022-59 pp.67-72 |
ICSS, IPSJ-SPT |
2023-03-14 10:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Port-aware IPv6 Scanning and Large-scale Security Surveys Tatsuya Takemura, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama (NTT) ICSS2022-73 |
(To be available after the conference date) [more] |
ICSS2022-73 pp.151-156 |
SITE, IPSJ-CE |
2022-12-04 15:05 |
Fukuoka |
(Primary: On-site, Secondary: Online) |
[Invited Talk]
** Please fill in this blank. ** Mitsuaki Akiyama (NTT Social Informatics Laboratories) |
[more] |
|
CCS |
2022-11-18 10:30 |
Mie |
(Primary: On-site, Secondary: Online) |
Analysis of Homophily Effects on Information Diffusion on Social Networks Satoshi Furutani (NTT/TMU), Toshiki Shibahara, Mitsuaki Akiyama (NTT), Masaki Aida (TMU) CCS2022-55 |
Modeling the information diffusion process on networks is an important issue for analyzing information diffusion pattern... [more] |
CCS2022-55 pp.61-66 |
ICSS |
2022-11-07 15:25 |
Hokkaido |
Hokkaido Jichiro Kaikan (Primary: On-site, Secondary: Online) |
Analysis of Environmental Sensitivity of Persistent IoT Malware using Sandboxes with File Systems from Various IoT Devices Takahiro Inoue (YNU), Eizo Okada, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2022-45 |
(To be available after the conference date) [more] |
ICSS2022-45 pp.43-48 |
ICSS, IPSJ-SPT |
2022-03-08 10:00 |
Online |
Online |
Input predictive attack by keyboard acoustic emanations using BERT and its countermeasures Masahiro Iida (Teikyo Univ.), Mitsuaki Akiyama (NTT), Masaki Kamizono (DTCY), Takahiro Kasama (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Kyoto Sangyo Univ.), Atsuo Inomata (Osaka Univ.) ICSS2021-67 |
The Keyboard Acoustic Emanations has been proposed to estimate the input key from keystroke sounds as a kind of side-cha... [more] |
ICSS2021-67 pp.49-54 |
ICSS, IPSJ-SPT |
2021-03-01 09:10 |
Online |
Online |
On the Privacy Risk of Exposure Notification Framework: Assessment and Countermeasures Kazuki Nomoto (Waseda Univ.), Mitsuaki Akiyama (NTT), Masashi Eto (NICT), Atsuo Inomata (Osaka Univ.), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-34 |
The Exposure Notification Framework uses the Bluetooth Low Energy (BLE) signal generated by a smartphone to determine cl... [more] |
ICSS2020-34 pp.49-54 |
ICSS, IPSJ-SPT |
2021-03-01 14:55 |
Online |
Online |
Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox Takahiro Inoue (YNU), Satoshi Hara (YNU/FUJISOFT), Hironobu Sakaki, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-41 |
Malware that infects vulnerable IoT devices is becoming more sophisticated. Unlike legacy IoT malware, cases of persiste... [more] |
ICSS2020-41 pp.90-95 |
ICSS, IPSJ-SPT |
2021-03-02 14:05 |
Online |
Online |
Developing an Interactive Analysis System for Voice Assistant Apps Atsuko Natatsuka (Waseda Univ.), Ryo Iijima (Waseda Univ./NICT), Takuya Watanabe, Mitsuaki Akiyama (NTT), Tetsuya Sakai (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-48 |
In Voice Assistant Services, official or third-party Voice Assistant Apps (VA apps) are provided. Since a VA app works a... [more] |
ICSS2020-48 pp.132-137 |
ICSS, IPSJ-SPT |
2021-03-02 09:10 |
Online |
Online |
A Study on the Adoption of Link Preview by the Phishing Sites Norihito Omori (Waseda Univ.), Satoshi Furutani, Takuya Watanabe, Toshiki Shibahara, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.) ICSS2020-54 |
Search engines are not the only means of accessing online content. The distribution of malicious content has become mor... [more] |
ICSS2020-54 pp.166-171 |
ICSS, IPSJ-SPT |
2020-03-02 13:30 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
ICSS2019-74 |
(To be available after the conference date) [more] |
ICSS2019-74 pp.37-42 |
ICSS, IPSJ-SPT |
2019-03-07 16:15 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Analyzing Deceptive Internationalized Domain Names Daiki Chiba, Ayako Akiyama Hasegawa, Takashi Koide (NTT), Yuta Sawabe, Shigeki Goto (Waseda Univ.), Mitsuaki Akiyama (NTT) ICSS2018-76 |
Internationalized domain names (IDNs) are abused to create domain names visually similar to those of legitimate brands. ... [more] |
ICSS2018-76 pp.47-52 |
ICSS, IPSJ-SPT |
2018-03-08 09:45 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Automatically Collecting User-initiated Web-based Attacks Takashi Koide, Daiki Chiba, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT) ICSS2017-66 |
Recently, web content uses social engineering techniques to lure victims into clicking on them, originating malware down... [more] |
ICSS2017-66 pp.91-96 |
ICSS, IPSJ-SPT |
2018-03-08 10:10 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
An Empirical Analysis of Online Advertising Fraud by analyzing User Activities Observed in the Ad Network Fumihiro Kanei, Daiki Chiba, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT) ICSS2017-67 |
With the growth of online advertising market, it has become the target of abuse, such as ad fraud by adware and bots. To... [more] |
ICSS2017-67 pp.97-102 |