IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 58  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
NS, IN, CS, NV
(Joint)
2022-09-02
13:20
Iwate MALIOS (Iwate Prefecture) + Online Meeting
(Primary: On-site, Secondary: Online)
Partial data protection mechanism for RDBMS using both trust and untrust regions in TEE
Masashi Yoshimura, Yuzo Taenaka, Youki Kadobayashi (NAIST)
 [more]
NS, SR, RCS, SeMI, RCC
(Joint)
2022-07-14
13:35
Ishikawa The Kanazawa Theatre + Online
(Primary: On-site, Secondary: Online)
Building a Federated Personalized Recommendation Model to Balance Similarity and Diversity
Masahiro Hamada, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-46
With the spread of on-demand movie distribution, personalized movie recommendations that match user preferences are requ... [more] NS2022-46
pp.100-105
NS, SR, RCS, SeMI, RCC
(Joint)
2022-07-14
14:00
Ishikawa The Kanazawa Theatre + Online
(Primary: On-site, Secondary: Online)
A Study of Dynamic Privacy Control Method in LDP for Preserving Temporal/Spatial Intrinsic Information Value of Trajectory Data
Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-47
Spatiotemporal data, including people's movement trajectories and transit points, is highly valuable for various applica... [more] NS2022-47
pp.106-111
CQ, ICM, NS, NV
(Joint)
2021-11-26
16:15
Fukuoka JR Hakata Stn. Hakata EkiHigashi Rental Room
(Primary: On-site, Secondary: Online)
Design and prototyping of a Zero-Trust Access Control Mechanism to Verify User Authenticity
Taisho Sasada, Yuto Masuda, Yuzo Taenaka, Youki Kadobayashi, Doudou Fall (NAIST) NS2021-95
As telework becomes more widespread, there will be more opportunities to remotely access data required for business from... [more] NS2021-95
pp.56-61
LOIS, ISEC, SITE 2020-11-06
14:40
Online Online Considering the variation of the noise-addition amount in local differential privacy with user trajectory adjacency
Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi, Doudou Fall (NAIST) ISEC2020-39 SITE2020-36 LOIS2020-19
The detection of clusters in densely populated areas by contact tracing is urgent, because these locations are trajector... [more] ISEC2020-39 SITE2020-36 LOIS2020-19
pp.45-50
IA 2019-11-15
13:40
Tokyo Kwansei Gakuin University, Tokyo Marunouchi Campus (Sapia Tower) Towards creating a defense mechanism of IP camera: Recognizing potential risks through firmware backdooring
Yves-Roland Douha, Shun Yonamine, Yuzo Taenaka, Youki Kadobayashi (NAIST) IA2019-42
Internet of Things (IoT) is an emerging and promising technology allowing users to interact with physical items through ... [more] IA2019-42
pp.85-90
ICTSSL, IN 2019-10-17
15:15
Oita   A proposal for Hashing Recursive Query and Expansion Negative Cache against Non-Existent Domaion
Shoretsu Takasuka, Yuzo Taenaka, Youki Kadobayashi (NAIST)
 [more]
ET 2019-01-26
11:00
Osaka Umeda Campus, Kansai University WebSec: Development and Evaluation of game exercise tool for security training
Tan Omiya (NAIST), Balázs Barna (Corvinus University of Budapest), Youki Kadobayashi (NAIST) ET2018-79
Security standards clearly state that it is necessary to implement security education for employees. However, there are ... [more] ET2018-79
pp.13-18
IA, IN
(Joint)
2018-12-14
15:05
Hiroshima Hiroshima Univ. A Structured Overlay Network Based on a Proximity-aware Distributed Line Graph
Youki Shiraishi (NAIST), Akiko Manada (Shonan Inst. of Tech.), Yuzo Taenaka, Youki Kadobayashi (NAIST) IA2018-51
A distributed line graph (DLG) is a technique for designing a structured overlay network based on an arbitrary regular g... [more] IA2018-51
pp.71-77
AP 2018-08-23
11:05
Saitama Nippon Inst. of Tech. Experimental Analysis: A possibility of estimating TV white space spectrum sensing using altitude information by low-cost SDR devices
Fatou Williams, Youki Kadobayashi (NAIST) AP2018-69
Accurate detection of TV White Space in the VHF and UHF frequency bands is important in realizing the potential of its t... [more] AP2018-69
pp.13-18
MoNA 2018-01-18
13:10
Kyoto Campus Plaza Kyoto MoNA2017-41 5G mobile communication networks (5G) are expected to provide a wide range of new emerging services through flexible com... [more] MoNA2017-41
pp.1-6
ICSS 2017-11-20
15:40
Oita Beppu International Convention Center Educational Tools to Learn Concrete Control Measures Corresponding to Threats of Cyber Attacks
Tan Omiya, Daisuke Miyamoto, Youki Kadobayashi (NAIST) ICSS2017-40
Recently, the threats of cyber attacks have increased. There is the need to understand information security measures to ... [more] ICSS2017-40
pp.11-16
IA 2017-10-13
16:30
Tokyo Fukutake Hall, The University of Tokyo Testbed for Security Analysis of the DNS64 IPv6 Transition Technology in Virtual Environment
Gabor Lencse, Youki Kadobayashi (NAIST) IA2017-22
In this paper, we demonstrate the feasibility of building a virtual network with several virtual Linux hosts for testing... [more] IA2017-22
pp.19-24
IA 2017-08-28
14:35
Tokyo IIJ Seminar Room Survey of IPv6 transition technologies for security analysis
Gabor Lencse, Youki Kadobayashi (NAIST) IA2017-15
Due to the depletion of the public IPv4 address pool, the transition to IPv6 became inevitable. However, the transition ... [more] IA2017-15
pp.19-24
IA, IPSJ-IOT, SITE [detail] 2015-03-06
09:50
Fukushima   Proposal and evaluation of the circular migration method using a differential virtual disk
Naoya Sawada, Kazuya Okada, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi (NAIST) SITE2014-72 IA2014-104
In recent years, "Follow The Sun" and "Follow the Moon" type data centers have been studied. To realize both of these ty... [more] SITE2014-72 IA2014-104
pp.137-142
ICSS 2015-03-03
13:00
Okinawa Meio Univiersity A detection system which uses DNS traffic features to detect domains which are related to botnets
Wataru Tsuda, Youki Kadobayashi, Takeshi Okuda, Hiroaki Hazeyama (NAIST) ICSS2014-63
 [more] ICSS2014-63
pp.1-6
ICSS 2015-03-03
16:40
Okinawa Meio Univiersity Implementation and evaluation of Drive by Download Attack detection using the features of the obfuscation
Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama (NAIST), Takuji Iimura (UT), Youki Kadobayashi (NAIST) ICSS2014-71
Drive-by download attacks usually redirect a user to a malicious webpage where vulnerabilities in a browser or in browse... [more] ICSS2014-71
pp.49-54
ICSS 2014-11-28
10:45
Miyagi Tohoku Gakuin University (Tagajo Campus) A Study of Drive by Download Attack detection using the features of the obfuscation
Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama, Youki Kadobayashi (NAIST) ICSS2014-60
Drive-by download attacks usually redirect a user to a malicious webpage where vulnerabilities in the browser or its plu... [more] ICSS2014-60
pp.55-60
ICSS 2014-11-28
11:35
Miyagi Tohoku Gakuin University (Tagajo Campus) Detecting infected hosts with machine learning analysis of DNS responses
Wataru Tsuda, Youki Kadobayashi, Hirotaka Fujiwara, Suguru Yamaguchi (NAIST) ICSS2014-62
In recent years, we face cyber attacks such as illegal money transfer via net-banking, spam mail and DDoS attacks caused... [more] ICSS2014-62
pp.67-72
ICSS, IPSJ-SPT 2014-03-28
10:15
Okinawa Meio Univiersity MATATABI: Multi-layer Threat Analysis Platform with Hadoop
Hajime Tazaki (Univ. of Tokyo), Kazuya Okada (NAIST), Yuji Sekiya (Univ. of Tokyo), Youki Kadobayashi (NAIST) ICSS2013-77
Threat detections and analyses are indispensable processes in today’s cyberspace, but current state of the arts are stil... [more] ICSS2013-77
pp.113-118
 Results 1 - 20 of 58  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan