|
|
All Technical Committee Conferences (Searched in: Recent 10 Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IBISML |
2023-09-08 13:50 |
Osaka |
Osaka Metropolitan University (Nakamozu Campus) (Osaka, Online) (Primary: On-site, Secondary: Online) |
Active Testing for Machine Learning Model Using Level Set Estimation Takuma Ochiai, Keiichiro Seno, Kota Matsui (Nagoya Univ.), Satoshi Hara (Osaka Univ.) IBISML2023-29 |
In this study, we propose a method for estimating the test loss in binary classification model with minimal labeling of ... [more] |
IBISML2023-29 pp.22-26 |
BioX |
2021-10-14 13:35 |
Online |
Online (Online) |
[Invited Talk]
"Explanation" in Machine Learning Satoshi Hara (Osaka Univ.) BioX2021-43 |
(To be available after the conference date) [more] |
BioX2021-43 pp.3-6 |
IE, SIP, BioX, ITE-IST, ITE-ME [detail] |
2021-06-03 15:15 |
Online |
Online (Online) |
A Study of Anomaly Detection for Renal Tubules by U-Net Emi Haneda, Yuya Honda, Hiroka Furuya, Satoshi Hara, Shigehiro Karashima, Hidetaka Nambo (Kanazawa Univ.) SIP2021-2 BioX2021-2 IE2021-2 |
In this study, we applied deep learning segmentation to renal biopsy pathology specimen images and attempted to classify... [more] |
SIP2021-2 BioX2021-2 IE2021-2 pp.6-9 |
ICSS, IPSJ-SPT |
2021-03-01 14:55 |
Online |
Online (Online) |
Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox Takahiro Inoue (YNU), Satoshi Hara (YNU/FUJISOFT), Hironobu Sakaki, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-41 |
Malware that infects vulnerable IoT devices is becoming more sophisticated. Unlike legacy IoT malware, cases of persiste... [more] |
ICSS2020-41 pp.90-95 |
ICSS, IPSJ-SPT |
2020-03-02 16:00 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Okinawa) (Cancelled but technical report was issued) |
An analysis of IoT malware infection pattern based on Internet-wide scan and darknet observation Shun Morishita, Kota Ogawa (YNU), Satoshi Hara (YNU/FSI), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2019-81 |
While IoT malware such as Mirai have been targeting Telnet services, there are still many devices that are still running... [more] |
ICSS2019-81 pp.79-84 |
ICSS, IPSJ-SPT |
2019-03-07 14:20 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center (Okinawa) |
How to build malware sandbox using real IoT devices Jia Xiong, Tatsuya Tamai, Kazuki Tamiya (Yokohama National Univ.), Satoshi Hara (Yokohama National Univ./Fujisoft), Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2018-69 |
In spite of their increasing importance in the battle against evolving IoT threats, construction of IoT malware sandboxe... [more] |
ICSS2018-69 pp.7-12 |
NC, IBISML, IPSJ-BIO, IPSJ-MPS [detail] |
2018-06-13 16:15 |
Okinawa |
Okinawa Institute of Science and Technology (Okinawa) |
Enumeration of Distinct Support Vectors for Model Selection Kentaro Kanamori (Hokaido Univ.), Satoshi Hara (Osaka Univ.), Masakazu Ishihata (NTT), Hiroki Arimura (Hokaido Univ.) IBISML2018-12 |
In ordinary machine learning problems, the learning algorithm outputs a single model that optimizes its learning objecti... [more] |
IBISML2018-12 pp.81-88 |
SS |
2017-03-09 11:50 |
Okinawa |
(Okinawa) |
Equivalence Checking for Methods in Java and Its Applications Kozo Okano (Shinshu Univ.), Satoshi Harauchi (Mitsubishi Electric Corp.), Shinpei Ogata (Shinshu Univ.), Toshifusa Sekizawa (Nihon Univ.), Takeshi Obara (Shinshu Univ.) SS2016-65 |
A programmer sometimes implements both of equals method and hashCode method in a class of Java. The programmer should ob... [more] |
SS2016-65 pp.31-36 |
KBSE, SS, IPSJ-SE [detail] |
2016-07-13 10:20 |
Hokkaido |
(Hokkaido) |
A Method to Revise Message Ordering in Sequence Diagram Kozo Okano (Shinshu Univ.), Satoshi Harauchi (Mitsubishi Electric Corp.), Yosuke Tajima, Shinpei Ogata (Shinshu Univ.) SS2016-2 KBSE2016-8 |
For software specification, a lot of methods have been proposed in order to localize defects and to fix
defects automat... [more] |
SS2016-2 KBSE2016-8 pp.7-12 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|