Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
R |
2024-10-11 14:05 |
Kumamoto |
(Kumamoto, Online) (Primary: On-site, Secondary: Online) |
Adversarial prompt detection with prompt engineering Tasuku Sasaki, Yuji Sekiya (UTokyo) R2024-28 |
Recently, Large Language Models (LLMs) have become widely used around the world, but concerns about their safety have be... [more] |
R2024-28 pp.4-9 |
NS, IN (Joint) |
2024-03-01 14:15 |
Okinawa |
Okinawa Convention Center (Okinawa) |
Ransomware Detection using Traffic Features in SDN Ken Tanase, Kunio Akashi, Yuji Sekiya, Hiroshi Nakamura (Tokyo Univ.) NS2023-237 |
In recent years, ransomware has emerged as a significant threat to information security in organizations.
A particular... [more] |
NS2023-237 pp.385-390 |
NS |
2023-10-05 10:35 |
Hokkaido |
Hokkaidou University + Online (Hokkaido, Online) (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
A Design of stateless 5G core network with procedural processing Hiroki Watanabe, Atsuki Takata, Keiichi Shima (Softbank), Kunio Akashi, Yuji Sekiya (Univ. of Tokyo), Katsuhiro Horiba (Softbank) NS2023-87 |
In a standard 5G core network (CN; 5GC), a large number of User Equipments (UEs) are accommodated by a single Network Fu... [more] |
NS2023-87 pp.89-94 |
IN, NS (Joint) |
2023-03-02 15:00 |
Okinawa |
Okinawa Convention Centre + Online (Okinawa, Online) (Primary: On-site, Secondary: Online) |
per-UE-type Monolithic 5GC - Implementation and evaluation of per-UE SMNF Tatsuro Murata, Tomoaki Kanaya, Hiroki Watanabe, Keiichi shima, Tomoya Hasegawa, Ryoji Hirai, Hirotaka Nishino (Softbank Corp.), Kunio Akashi, Yuji Sekiya (The Univ. of Tokyo), Katsuhiro Horiba (Softbank Corp.) NS2022-193 |
The standard 5G Core Network (5GC) is designed as a distributed microservice architecture and consists of multiple Netwo... [more] |
NS2022-193 pp.151-156 |
IN, NS (Joint) |
2023-03-02 15:10 |
Okinawa |
Okinawa Convention Centre + Online (Okinawa, Online) (Primary: On-site, Secondary: Online) |
A design of data structures for stateless 5G core network Kunio Akashi (The Univ. of Tokyo), Hiroki Watanabe, Keiichi Shima, Tomoya Hasegawa, Tatsuro Murata, Tomoaki Kanaya, Ryoji Hirai, Takahiro Hirotaka (SoftBank), Seiichi Yamamoto, Takuji Iimura (The Univ. of Tokyo), Katsuhiro Horiba (SoftBank), Yuji Sekiya (The Univ. of Tokyo) IN2022-86 |
In 5G Core Network (5GC) deployment services, network functions maintain UE context information. This adds complexity to... [more] |
IN2022-86 pp.121-126 |
IN, NS (Joint) |
2023-03-03 13:30 |
Okinawa |
Okinawa Convention Centre + Online (Okinawa, Online) (Primary: On-site, Secondary: Online) |
An implementation of a stateless procedural 5G core network using Network Function based 5G core network software Hiroki Watanabe, Keiichi Shima, Tomoya Hasegawa, Tatsuro Murata, Tomoaki Kanaya, Ryoji Hirai, Takahiro Hirotaka (SoftBank), Kunio Akashi, Seiichi Yamamoto, Takuji Iimura, Yuji Sekiya (The Univ. of Tokyo), Katsuhiro Horiba (SoftBank) NS2022-242 |
In a standard 5G core network (CN;5GC), a single Network Function (NF) accommodates a large number of User Equipment (UE... [more] |
NS2022-242 pp.430-435 |
RCS, NS (Joint) |
2022-12-15 16:10 |
Aichi |
Nagoya Institute of Technology, and Online (Aichi, Online) (Primary: On-site, Secondary: Online) |
A Design of stateless 5G core network with procedural processing Hiroki Watanabe, Keiichi Shima, Tomoya Hasegawa, Tatsuro Murata, Tomoaki Kanaya, Ryoji Hirai, Takahiro Hirotaka (SoftBank), Kunio Akashi, Seiichi Yamamoto, Takuji Iimura, Yuji Sekiya (The Univ. of Tokyo), Katsuhiro Horiba (SoftBank) NS2022-139 |
In standard 5GC, a single Network Function (NF) serves a large number of User Equipments (UEs), and the context of a UE ... [more] |
NS2022-139 pp.54-59 |
IA, ICSS |
2021-06-22 09:00 |
Online |
Online (Online) |
Feature analysis of phishing website and phishing detection based on machine learning algorithms Yi Wei, Yuji Sekiya (Todai) IA2021-9 ICSS2021-9 |
Phishing is a kind of cybercrime that uses disguised websites to trick people into providing personally sensitive inform... [more] |
IA2021-9 ICSS2021-9 pp.44-49 |
IN, NS (Joint) |
2021-03-05 10:10 |
Online |
Online (Online) |
A Convolutional Autoencoder Based Method for Cyber Intrusion Detection Xinyi She, Yuji Sekiya (Tokyo Univ.) IN2020-77 |
Cyber intrusion detection systems are increasingly crucial due to the monumental growth of internet applications. Howeve... [more] |
IN2020-77 pp.138-143 |
IN, NS (Joint) |
2021-03-05 11:20 |
Online |
Online (Online) |
Proposal for LDoS attack using indirect transmission in Zigbee and a countermeasure against it Satoshi Okada, Daisuke Miyamoto, Yuji Sekiya, Hiroshi Nakamura (The University of Tokyo) NS2020-153 |
Low-Rate DoS (LDoS) attack degrades the quality of service with less traffic than typical DoS attacks. LDoS attack has a... [more] |
NS2020-153 pp.179-184 |
IA, IN (Joint) |
2020-12-15 10:50 |
Online |
Online (Online) |
Development of an Intrusion Detection System Utilizing Social Network Analysis Principles James Lu, Yuji Sekiya (Univ. of Tokyo) IA2020-29 |
As computer networks grow increasingly complex and cyberattacks become more sophisticated, better methods are needed to ... [more] |
IA2020-29 pp.18-21 |
IN, CCS (Joint) |
2020-08-03 13:50 |
Online |
Online (Online) |
A study on Mobility-Aware task offloading in edge computing for task failure minimization Ryo Nakajima, Yuji Sekiya (UT) IN2020-15 |
In recent years, with the development of the Internet of Things (IoT) and other factors, the demand for networks has inc... [more] |
IN2020-15 pp.37-42 |
CQ, CBE (Joint) |
2019-01-18 10:45 |
Tokyo |
Tokyo Metropolitan Univ. (Tokyo) |
Clustering Protocol in Wireless Sensor Networks Using Cuckoo Search and Fuzzy Algorithm Chiharu Ido, Yuji Sekiya (Tokyo Univ.) CQ2018-84 |
Wireless Sensor Networks (WSNs) is a network formed by a large number of sensor nodes where each node is equipped with a... [more] |
CQ2018-84 pp.47-52 |
NS |
2018-01-18 16:40 |
Okinawa |
Ishigakishi-Shoko-Kaikan (Okinawa) |
Resource Allocation in Wireless D2D Caching Networks as Multi-Armed Bandits Maoki Hikosaka, Yuji Sekiya (UTokyo) NS2017-153 |
[more] |
NS2017-153 pp.53-58 |
IA, IN (Joint) |
2017-12-15 13:30 |
Hiroshima |
Hiroshima City Univ. (Hiroshima) |
Investigation of Campus-wide SD-WAN with Open Source Software Ryo Nakamura, Yuji Sekiya, Tomohiro Kudo (Univ of Tokyo) IA2017-64 |
This paper reports an investigation of Software Defined WAN (SD-WAN) techniques for a campus network. Today's universiti... [more] |
IA2017-64 pp.67-72 |
ICSS |
2017-11-21 11:45 |
Oita |
Beppu International Convention Center (Oita) |
A Study of Detecting Infected Hosts by Graph Analysis of DNS Server Logs Kazunori Kamiya, Ayako Hasegawa (SC-Lab.), Yuji Sekiya, Kazuya Okada (Univ. of Tokyo) ICSS2017-47 |
[more] |
ICSS2017-47 pp.53-58 |
NS |
2017-04-20 16:15 |
Toyama |
Toyama Shoko Kaigisyo (Toyama) |
Resource Allocation in Software-Defined Device-to-Device Communications as Multi-Armed Bandits Maoki Hikosaka, Yuji Sekiya (Tokyo Univ.) NS2017-7 |
[more] |
NS2017-7 pp.37-42 |
ICSS, IPSJ-SPT |
2017-03-13 15:40 |
Nagasaki |
University of Nagasaki (Nagasaki) |
Deep Learning Approach for Detecting Malware Infected Host and Detection Performance Evaluation with HTTP Traffic Taishi Nishiyama, Atsutoshi Kumagai, Yasushi Okano, Kazunori Kamiya, Masaki Tanikawa (NTT), Kazuya Okada, Yuji Sekiya (University of Tokyo) ICSS2016-52 |
Preventive measures are generally important to stop the occurrence of a security incident caused by malware. However, it... [more] |
ICSS2016-52 pp.49-54 |
IA, IN (Joint) |
2016-12-16 13:20 |
Hiroshima |
Hiroshima city university (Hiroshima) |
A Study of Resilient Cyber Defense and Network Monitoring System with Exit Measures Koji Sato, Yuji Sekiya (Univ. of Tokyo) IN2016-82 |
Data leakage due to targeted threat is a big problem. Targeted threat are characterized by repeating various attacks aga... [more] |
IN2016-82 pp.91-96 |
IA |
2016-11-04 11:15 |
Overseas |
Taipei (Taiwan) (Overseas) |
Case-based study and Discussion of threat analysis on DNS traffic using MATATABI platform Tomohiro Ishihara, Yuji Sekiya (UTokyo) IA2016-48 |
[more] |
IA2016-48 pp.99-102 |