Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
QIT (2nd) |
2022-12-09 17:30 |
Kanagawa |
Keio Univ. (Primary: On-site, Secondary: Online) |
Advance Sharing of Quantum Shares for Classical Secrets Rina Miyajima, Ryutaroh Matsumoto (Tokyo Tech) |
Secret sharing schemes for classical secrets can be classified into classical secret sharing schemes and quantum secret ... [more] |
|
QIT (2nd) |
2021-05-25 13:40 |
Online |
Online |
Constructions of $ell$-Adic $t$-Deletion-Correcting Quantum Codes Ryutaroh Matsumoto (Tokyo Tech.), Manabu Hagiwara (Chiba Univ.) |
We propose two systematic constructions of deletion-correcting
codes for protecting quantum information.
The first one... [more] |
|
CS |
2020-11-05 14:35 |
Online |
Online + Central Community Center, Nonoichi Community Center (Primary: Online, Secondary: On-site) |
[Invited Talk]
Adversarial Attacks on Monocular Depth Estimation Koichiro Yamanaka (Nagoya Univ.), Ryutaroh Matsumoto (Tokyo Tech), Keita Takahashi, Toshiaki Fujii (Nagoya Univ.) CS2020-49 |
[more] |
CS2020-49 pp.12-17 |
IE, CS, IPSJ-AVM, ITE-BCT [detail] |
2019-12-06 10:10 |
Iwate |
Aiina Center |
Adversarial Examples for Monocular Depth Estimation Koichiro Yamanaka, Ryutaroh Matsumoto, Keita Takahashi, Toshiaki Fujii (Nagoya Univ.) CS2019-83 IE2019-63 |
Adversarial examples for classification and object recognition problems using convolutional neural net- works (CNN) have... [more] |
CS2019-83 IE2019-63 pp.91-95 |
CS, IE, IPSJ-AVM, ITE-BCT [detail] |
2018-11-30 10:20 |
Tokushima |
Tokushima University (Memorial Hall of Almuni(Engineering)) |
Introducing the Perception-Distortion Tradeoff into the Rate-Distortion Theory of General Information Sources Ryutaroh Matsumoto (Nagoya Univ.) CS2018-79 IE2018-58 |
Blau and Michaeli recently introduced a novel concept
for inverse problems of signal processing, that is,
the perc... [more] |
CS2018-79 IE2018-58 pp.67-69 |
WBS, IT, ISEC |
2018-03-08 13:00 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
Outage Capacity of a Two-User MIMO Interference Channel for Simultaneous Information and Energy Transfer Kengo Ikebata, Tomohiko Uyematsu (Tokyo Tech), Ryutaroh Matsumoto (Nagoya Univ), Tetsunao Matsuta (Tokyo Tech) IT2017-110 ISEC2017-98 WBS2017-91 |
In a two-user interference channel for simultaneous information and energy transfer, there are an ID (Information Decodi... [more] |
IT2017-110 ISEC2017-98 WBS2017-91 pp.43-48 |
ISEC, WBS, IT |
2017-03-10 14:10 |
Tokyo |
TOKAI University |
Spectrum Sensing in Cooperative with Some Secondary Users Yuki Muranaka, Ryutaroh Matsumoto, Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech) IT2016-131 ISEC2016-121 WBS2016-107 |
The cognitive radio has attracted attention as a measure to utilize the radio spectrum more efficiently in order to cope... [more] |
IT2016-131 ISEC2016-121 WBS2016-107 pp.209-214 |
ISEC, WBS, IT |
2017-03-10 14:35 |
Tokyo |
TOKAI University |
Quantum Stabilizer Codes Can Realize Access Structures Impossible by Classical Secret Sharing Ryutaroh Matsumoto (Tokyo Tech.) IT2016-132 ISEC2016-122 WBS2016-108 |
We show a simple example of a secret sharing scheme
encoding classical secret to quantum shares
that can realize an ac... [more] |
IT2016-132 ISEC2016-122 WBS2016-108 pp.215-216 |
IT, ISEC, WBS |
2016-03-10 11:05 |
Tokyo |
The University of Electro-Communications |
Bayesian Estimation of the Virus Source of an Infection in a Network Using Any Prior Distribution Ryousuke Kido, Tetsunao Matsuta, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Tech.) IT2015-104 ISEC2015-63 WBS2015-87 |
We model a phenomenon that a computer virus is spreading in a network as infection of the virus in a graph constructed o... [more] |
IT2015-104 ISEC2015-63 WBS2015-87 pp.19-24 |
IT, ISEC, WBS |
2016-03-10 14:05 |
Tokyo |
The University of Electro-Communications |
The Minimum Codelength of Multiple-Uniprior Index Coding Masaru Takahashi, Tetsunao Matsuta, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Tech) IT2015-110 ISEC2015-69 WBS2015-93 |
Index coding for sharing information via satellite communication is considered. Each receiver knows some of the messages... [more] |
IT2015-110 ISEC2015-69 WBS2015-93 pp.55-60 |
IT, ISEC, WBS |
2016-03-10 15:30 |
Tokyo |
The University of Electro-Communications |
Secrecy Rates for the Gaussian Wiretap Channel with an Energy Transfer Cooperative Jammer Tomoya Komiyama, Ryutaroh Matsumoto, Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech) IT2015-122 ISEC2015-81 WBS2015-105 |
Wireless secure communications based on the information-theoretic security are attracting much attention.
In this pape... [more] |
IT2015-122 ISEC2015-81 WBS2015-105 pp.131-136 |
RCS, IT, SIP |
2016-01-18 15:40 |
Osaka |
Kwansei Gakuin Univ. Osaka Umeda Campus |
[Invited Lecture]
Secrecy Capacity of Wiretap Channels with the Bit Error Rate Criterion Ryutaroh Matsumoto (Tokyo Tech.) IT2015-75 SIP2015-89 RCS2015-307 |
[more] |
IT2015-75 SIP2015-89 RCS2015-307 pp.161-162 |
ISEC, IT, WBS |
2015-03-02 16:00 |
Fukuoka |
The University of Kitakyushu |
Outage Capacity of a Two-User Interference Channel for Simultaneous Information and Energy Transfer Yutaka Osawa, Ryutaroh Matsumoto, Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech) IT2014-80 ISEC2014-93 WBS2014-72 |
Wireless energy transfer is attracting more attention. A two-user interference channel for simultaneous information and ... [more] |
IT2014-80 ISEC2014-93 WBS2014-72 pp.117-122 |
ISEC, IT, WBS |
2015-03-03 14:10 |
Fukuoka |
The University of Kitakyushu |
[Invited Talk]
Security of secret sharing schemes expressed in terms of the relative parameters of linear codes Jun Kurihara (KDDI R&D Labs), Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Tech.) IT2014-100 ISEC2014-113 WBS2014-92 |
[more] |
IT2014-100 ISEC2014-113 WBS2014-92 pp.239-246 |