IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 24  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
BioX 2021-10-14
Online Online [Invited Talk] "Explanation" in Machine Learning
Satoshi Hara (Osaka Univ.) BioX2021-43
(To be available after the conference date) [more] BioX2021-43
IE, SIP, BioX, ITE-IST, ITE-ME [detail] 2021-06-03
Online Online A Study of Anomaly Detection for Renal Tubules by U-Net
Emi Haneda, Yuya Honda, Hiroka Furuya, Satoshi Hara, Shigehiro Karashima, Hidetaka Nambo (Kanazawa Univ.) SIP2021-2 BioX2021-2 IE2021-2
In this study, we applied deep learning segmentation to renal biopsy pathology specimen images and attempted to classify... [more] SIP2021-2 BioX2021-2 IE2021-2
ICSS, IPSJ-SPT 2021-03-01
Online Online Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox
Takahiro Inoue (YNU), Satoshi Hara (YNU/FUJISOFT), Hironobu Sakaki, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-41
Malware that infects vulnerable IoT devices is becoming more sophisticated. Unlike legacy IoT malware, cases of persiste... [more] ICSS2020-41
ICSS, IPSJ-SPT 2020-03-02
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
An analysis of IoT malware infection pattern based on Internet-wide scan and darknet observation
Shun Morishita, Kota Ogawa (YNU), Satoshi Hara (YNU/FSI), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2019-81
While IoT malware such as Mirai have been targeting Telnet services, there are still many devices that are still running... [more] ICSS2019-81
ICSS, IPSJ-SPT 2019-03-07
Okinawa NICT Okinawa Electromagnetic Technology Center How to build malware sandbox using real IoT devices
Jia Xiong, Tatsuya Tamai, Kazuki Tamiya (Yokohama National Univ.), Satoshi Hara (Yokohama National Univ./Fujisoft), Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2018-69
In spite of their increasing importance in the battle against evolving IoT threats, construction of IoT malware sandboxe... [more] ICSS2018-69
NC, IBISML, IPSJ-BIO, IPSJ-MPS [detail] 2018-06-13
Okinawa Okinawa Institute of Science and Technology Enumeration of Distinct Support Vectors for Model Selection
Kentaro Kanamori (Hokaido Univ.), Satoshi Hara (Osaka Univ.), Masakazu Ishihata (NTT), Hiroki Arimura (Hokaido Univ.) IBISML2018-12
In ordinary machine learning problems, the learning algorithm outputs a single model that optimizes its learning objecti... [more] IBISML2018-12
SS 2017-03-09
Okinawa   Equivalence Checking for Methods in Java and Its Applications
Kozo Okano (Shinshu Univ.), Satoshi Harauchi (Mitsubishi Electric Corp.), Shinpei Ogata (Shinshu Univ.), Toshifusa Sekizawa (Nihon Univ.), Takeshi Obara (Shinshu Univ.) SS2016-65
A programmer sometimes implements both of equals method and hashCode method in a class of Java. The programmer should ob... [more] SS2016-65
KBSE, SS, IPSJ-SE [detail] 2016-07-13
Hokkaido   A Method to Revise Message Ordering in Sequence Diagram
Kozo Okano (Shinshu Univ.), Satoshi Harauchi (Mitsubishi Electric Corp.), Yosuke Tajima, Shinpei Ogata (Shinshu Univ.) SS2016-2 KBSE2016-8
For software specification, a lot of methods have been proposed in order to localize defects and to fix
defects automat... [more]
SS2016-2 KBSE2016-8
IPSJ-SLDM, CPSY, RECONF, VLD [detail] 2014-01-29
Kanagawa Hiyoshi Campus, Keio University Evaluation of parallelization for multiple-precision Cyclic Vector Multiplication Algorithm using CUDA
Satoshi Haramura, Hiroto Kagotani, Yasuyuki Nogami, Yuji Sugiyama (Okayama Univ.) VLD2013-120 CPSY2013-91 RECONF2013-74
 [more] VLD2013-120 CPSY2013-91 RECONF2013-74
- 2013-11-19
Tokyo Waseda Univ. [Poster Presentation] Quantum state data mining
Takafumi Ono, Ryo Okamoto, Shigeki Takeuchi (Hokkaido Univ.), Satoshi Hara, Takashi Washio (Osaka Univ.)
LOIS 2013-03-07
Okinawa   Investigation of Information Sharing System which tweets Behavior of Information Security
Satoshi Hara, Hiroki Miura (Univ. of Electro-Comm), Yoshiaki Seki (NTT), Hirohiko Suwa (Univ. of Electro-Comm) LOIS2012-85
 [more] LOIS2012-85
LOIS 2013-03-07
Okinawa   Implementation of Information Sharing System which tweets Behavior of Information Security
Hiroki Miura, Satoshi Hara (Univ. of Electro-Comm.), Yoshiaki Seki (NTT), Hirohiko Suwa (Univ. of Electro-Comm.) LOIS2012-86
In this paper We implement Securitter that the information-sharing system
using Twitter which improves information sec... [more]
IBISML 2012-11-07
Tokyo Bunkyo School Building, Tokyo Campus, Tsukuba Univ. Structure Learning for Anomaly Localization
Satoshi Hara, Takashi Washio (Osaka Univ.) IBISML2012-36
In this paper, we propose a graphical model learning algorithm for an anomaly localization. We introduce a new regulariz... [more] IBISML2012-36
OPE, OME 2011-11-18
Tokyo Kikai-Shinko-Kaikan Bldg. Fabrication of Microdisk Lasers by using n-type Thiophene/Phenylene Co-oligomers AC5-CF3 and Organic Electroluminescence Spectra of multi-layers
Fumio Sasaki, Yoshizo Kawaguchi, Hiroyuki Mochizuki, Masahiko Mori, Satoshi Haraichi (AIST), Takeshi Yamao, Shu Hotta (Kyoto Inst. of Tech.) OME2011-61 OPE2011-136
 [more] OME2011-61 OPE2011-136
ISEC, LOIS 2011-11-15
Osaka Osaka Electro-Communication University A Method to Find Vulnerable Cryptographic Algorithms in SSH Protocol
Satoshi Hara (UEC), Kenichiro Muto, Sakae Chikara, Yoshiaki Seki (NTT) ISEC2011-52 LOIS2011-46
Secure Shell (SSH), a network protocol for secure data communication between two networked computers that connects via a... [more] ISEC2011-52 LOIS2011-46
IBISML 2011-11-09
Nara Nara Womens Univ. Learning a Graphical Structure with Clusters
Satoshi Hara, Takashi Washio (Osaka Univ.) IBISML2011-45
In this paper, we propose an estimation technique of a graphical model with some unknown clusters. We introduce a new re... [more] IBISML2011-45
TL 2011-06-24
Tokyo Kikai-Shinko-Kaikan Bldg. Quantifying Document Quality of Development-related Documents by Using Text Analysis Technologies
Satoshi Haraguchi (ISC-J), Yoshifumi Sakamoto, Takeo Nakada, Hironori Takeuchi, Shiho Ogino (IBM Japan) TL2011-5
Development-related documents, such as requirement specifications, design specifications, or test specifications, are of... [more] TL2011-5
IBISML 2011-03-29
Osaka Nakanoshima Center, Osaka Univ. Learning an Invariant Substructure of Multiple Graphical Gaussian Models
Satoshi Hara, Takashi Washio (Osaka Univ.) IBISML2010-129
Dependency structure among variables is closely tied to an underlying data generating process. Therefore, learning a dep... [more] IBISML2010-129
Ibaraki Kashima Space Research Center (NICT) Verification of design method by trial model for an ultra-lightweight large deployable antenna reflector composed of a tendon reinforced support structure.
Satoshi Harada, Kiyoshi Kobayashi, Kohei Ohata (NTT), Hiroyuki Ohmine, Takahiko Noda (Mitsubishi Electric) SAT2007-61
NTT has been investigating an ultra-lightweight and large onboard antenna reflector, which is 20m in diameter and less t... [more] SAT2007-61
DE 2007-07-04
Miyagi Akiu hot springs (Sendai) Proposal of an E-mail transmission and reception range management method in RMX
Satoshi Harada, Sang-Gyu Shin, Motomichi Toyama (Keio Univ) DE2007-109
In late years a social request of personal information protection rises.
So in a company, infomation system need mecha... [more]
 Results 1 - 20 of 24  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)

[Return to Top Page]

[Return to IEICE Web Page]

The Institute of Electronics, Information and Communication Engineers (IEICE), Japan