Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2024-10-27 10:55 |
Overseas |
National Taiwan University of Science and Technology (Taiwan) (Overseas, Online) |
[Poster Presentation]
Validation of Adaptive TDD Slot Allocation Method for Beyond-5G Networks Musashi Hayashi (KIT), Yuzo Taenaka (NAIST), Yi-Wei Ma (NTUST), Kazuya Tsukamoto (KIT) IA2024-38 |
In 5G networks, Time Division Duplexing (TDD) is used to divide wireless resources into slots, and these slots are alloc... [more] |
IA2024-38 p.25 |
RCC, RCS, SeMI, NS, SR, RISING (Joint) |
2024-07-17 16:30 |
Hokkaido |
Hokkaido Citizens Activities Promotion Center (Hokkaido, Online) (Primary: On-site, Secondary: Online) |
Effectiveness Verification of TDD Slot Allocation Method for Dynamic Control of Base Stations in 5G Networks Musashi Hayashi (KIT), Yuzo Taenaka (NAIST), Kazuya Tsukamoto (KIT) NS2024-46 |
In recent years, the diversification of application requirements driven by IoT and similar technologies has progressed, ... [more] |
NS2024-46 pp.29-34 |
RCC, RCS, SeMI, NS, SR, RISING (Joint) |
2024-07-17 17:20 |
Hokkaido |
Hokkaido Citizens Activities Promotion Center (Hokkaido, Online) (Primary: On-site, Secondary: Online) |
A Transparent Transformation Method of Monolithic Programs to Microservices for Effecient Edge Resources Utilization Yuto Motoyama (KIT), Yuzo Taenaka (NAIST), Kazuya Tsukamoto (KIT) NS2024-48 |
In recent years, a lot of research has been conducted on edge computing. Since edge computing consists of relatively sma... [more] |
NS2024-48 pp.40-45 |
NS, NWS (Joint) |
2024-01-25 14:15 |
Hiroshima |
Higashisenda Campus, HiroshimaUniversity + Online (Hiroshima, Online) (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
Access Control Method to Prevent Session Token Abuse on OpenID Connect Junki Yuasa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2023-162 |
In recent years, the adoption of Single Sign-On (SSO) has been increasing in web services to reduce the burden of user a... [more] |
NS2023-162 pp.19-24 |
ICSS |
2023-11-17 14:20 |
Ishikawa |
IT Business Plaza Musashi and Online (Ishikawa, Online) (Primary: On-site, Secondary: Online) |
Proposal for a Test Tool Enabling Programmatic Description of Test Scenarios in OpenID Connect Junki Yuasa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) ICSS2023-66 |
Single sign-on (SSO) is a mechanism that allows users to log in to multiple web services with single-user authentication... [more] |
ICSS2023-66 pp.108-113 |
SR |
2023-11-09 10:30 |
Miyagi |
(Miyagi, Online) (Primary: On-site, Secondary: Online) |
[Invited Talk]
Network-driven Transport Control Method Harmonized with Wireless Communication Environment Kazuya Tsukamoto (Kyutech), Yuzo Taenaka (NAIST) SR2023-45 |
With the diversification of Wi-Fi nodes, from smartphones to robots and IoT devices, their applications diversify from c... [more] |
SR2023-45 p.1 |
NS |
2023-10-04 17:55 |
Hokkaido |
Hokkaidou University + Online (Hokkaido, Online) (Primary: On-site, Secondary: Online) |
Access Control Method to Prevent ID Token Abuse on OpenID Connect Junki Yuasa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2023-81 |
In recent years, there has been a rapid increase in web services that require authentication, leading to the widespread ... [more] |
NS2023-81 pp.53-58 |
NS |
2023-10-04 18:45 |
Hokkaido |
Hokkaidou University + Online (Hokkaido, Online) (Primary: On-site, Secondary: Online) |
Proposal of location data protection mechanism by TEE considering privacy zone setting Tomoya Suzuki, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2023-83 |
In recent years, there has been an increasing trend in sharing and utilizing individuals’ mobility trajectories. Among t... [more] |
NS2023-83 pp.65-70 |
IN, NS (Joint) |
2023-03-02 11:00 |
Okinawa |
Okinawa Convention Centre + Online (Okinawa, Online) (Primary: On-site, Secondary: Online) |
Resource allocation methods for efficient and fairness utilization of network and computational resources in edge cloud
-- Scalable resource allocation and network path selection -- Shota Akiyoshi (Kyutech), Yuzo Taenaka (NAIST), Kazuya Tsukamoto (Kyutech) NS2022-170 |
Cross-domain data fusion in the edge cloud is becoming a key driver to growth of the numerous and diverse applications i... [more] |
NS2022-170 pp.19-24 |
NS, NWS (Joint) |
2023-01-26 13:00 |
Yamaguchi |
Hybrid Meeting (Yamaguchi Prefecture) (Yamaguchi, Online) (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
A User Authenticity Verification Method Using Behavioral and Cognitive Biometrics for Zero Trust Access Control Mechanisms Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-153 |
In recent years, remote access to confidential data necessary for work has been rapidly increasing due to the spread of ... [more] |
NS2022-153 pp.19-24 |
IA |
2023-01-25 15:25 |
Osaka |
Osaka Umeda Campus, Kwansei Gakuin University (Osaka) (Osaka, Online) (Primary: On-site, Secondary: Online) |
Cybersecurity Analysis of Internet Banking in Developing and Developed countries, a case study of Tanzania and Japan Ndalama Festus Edward, Yuzo Taenaka, Youki Kadobayashi (NAIST) IA2022-72 |
Over the last few years, internet banking has become the primary way of accessing banking services for many bank custome... [more] |
IA2022-72 pp.28-35 |
NS, ICM, CQ, NV (Joint) |
2022-11-24 11:35 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Fukuoka, Online) (Primary: On-site, Secondary: Online) |
Design and Trial of Cyber Security Exercise for Basic CISO Skillset Tatsumi Seko, Touri Nakagawa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-104 |
Conventional security officers lack the authority and responsibility to make decisions related to management and are not... [more] |
NS2022-104 pp.23-28 |
RISING (3rd) |
2022-10-31 10:30 |
Kyoto |
Kyoto Terrsa (Day 1), and Online (Day 2, 3) (Kyoto, Online) |
[Poster Presentation]
Resource allocation method for fairness and efficient utilization of network and computational resources in edge networks Shota Akiyoshi (Kyutech), Yuzo Taenaka (NAIST), Kazuya Tsukamoto (Kyutech) |
Cross-domain data fusion is becoming a key driver of the growth of numerous and diverse applications in the IoT era. We ... [more] |
|
RISING (3rd) |
2022-10-31 14:00 |
Kyoto |
Kyoto Terrsa (Day 1), and Online (Day 2, 3) (Kyoto, Online) |
[Poster Presentation]
Experimental evaluation of the effectiveness of networked-data preprocessing in an edge network Saiga Oshima (Kyutech), Yuzo Taenaka (Naist), Kazuya Tsukamoto (Kyutech) |
In IoT, content is created by combining data from various different fields generated in the region, expanding local prod... [more] |
|
RISING (3rd) |
2022-10-31 15:00 |
Kyoto |
Kyoto Terrsa (Day 1), and Online (Day 2, 3) (Kyoto, Online) |
[Poster Presentation]
Measurement error detection by machine learning suitable for QoE based network control Yu Yamaguchi (Kyutech), Yuzo Taenaka (NAIST), Kazuya Tsukamoto (Kyutech) |
With the diversification of applications, network control based on QoE, which can uniformly evaluate application quality... [more] |
|
NS, IN, CS, NV (Joint) |
2022-09-02 13:20 |
Iwate |
MALIOS (Iwate Prefecture) + Online Meeting (Iwate, Online) (Primary: On-site, Secondary: Online) |
Data protection mechanism for RDBMS using both trust and untrust regions in TEE Masashi Yoshimura, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-71 |
With the spread of cloud computing, database services, which are basically under a heavy load are now on the cloud. As c... [more] |
NS2022-71 pp.60-65 |
NS, SR, RCS, SeMI, RCC (Joint) |
2022-07-14 13:35 |
Ishikawa |
The Kanazawa Theatre + Online (Ishikawa, Online) (Primary: On-site, Secondary: Online) |
Building a Federated Personalized Recommendation Model to Balance Similarity and Diversity Masahiro Hamada, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-46 |
With the spread of on-demand movie distribution, personalized movie recommendations that match user preferences are requ... [more] |
NS2022-46 pp.100-105 |
NS, SR, RCS, SeMI, RCC (Joint) |
2022-07-14 14:00 |
Ishikawa |
The Kanazawa Theatre + Online (Ishikawa, Online) (Primary: On-site, Secondary: Online) |
A Study of Dynamic Privacy Control Method in LDP for Preserving Temporal/Spatial Intrinsic Information Value of Trajectory Data Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-47 |
Spatiotemporal data, including people's movement trajectories and transit points, is highly valuable for various applica... [more] |
NS2022-47 pp.106-111 |
NS, IN (Joint) |
2022-03-11 10:10 |
Online |
Online (Online) |
A resource allocation method of network and computational resources in edge networks Shota Akiyoshi (Kyutech), Yuzo Taenaka (NAIST), Kazuya Tsukamoto (Kyutech) NS2021-141 |
Cross-domain data fusion is becoming a key driver to growth of the numerous and diverse applications in IoT era. We have... [more] |
NS2021-141 pp.109-114 |
CQ, ICM, NS, NV (Joint) |
2021-11-26 16:15 |
Fukuoka |
JR Hakata Stn. Hakata EkiHigashi Rental Room (Fukuoka, Online) (Primary: On-site, Secondary: Online) |
Design and prototyping of a Zero-Trust Access Control Mechanism to Verify User Authenticity Taisho Sasada, Yuto Masuda, Yuzo Taenaka, Youki Kadobayashi, Doudou Fall (NAIST) NS2021-95 |
As telework becomes more widespread, there will be more opportunities to remotely access data required for business from... [more] |
NS2021-95 pp.56-61 |