Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ITE-ME, ITE-IST, BioX, SIP, MI, IE [detail] |
2024-06-06 13:20 |
Niigata |
Nigata University (Ekinan-Campus "TOKIMATE") |
Enhanced Security with Random Binary Weights for Privacy-Preserving Federated Learning Hiroto Sawada, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (TMU) |
(To be available after the conference date) [more] |
|
EE, IEE-HCA |
2024-05-31 11:50 |
Tokyo |
(Primary: On-site, Secondary: Online) |
Analysis of Conducted Electromagnetic Interference in Bridgeless Flyback Rectifier Sihoon Choi, Ryosuke Ui, Shunki Hashimoto (Nagoya Univ.), Jong-won Shin (Seoul national Univ.), Yu Yonezawa, Jun Imaoka, Masayoshi Yamamoto (Nagoya Univ.) |
[more] |
|
ICM, IPSJ-IOT, IPSJ-CSEC |
2024-05-31 14:20 |
Tottori |
(Primary: On-site, Secondary: Online) |
eBPF-based application-wise packet capture: a prototype and its application Masaya Okabe, Hiroshi Tsunoda (Tohtech) |
(To be available after the conference date) [more] |
|
SAT, MICT, WBS, RCC (Joint) [detail] |
2024-05-16 17:20 |
Miyazaki |
KITEN Convention hall (Miyazaki) (Primary: On-site, Secondary: Online) |
Event-Triggered Control of Distributed Network Systems under DoS Attacks Masaki Yanai, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.) |
(To be available after the conference date) [more] |
|
CQ, CS (Joint) |
2024-05-16 14:55 |
Aichi |
(Primary: On-site, Secondary: Online) |
Force Adjustment Control in Cooperative Work between Remote Robot Systems with Force Feedback
-- Application of Reinforcement Learning -- Hitoshi Ohnishi (OUJ), Hiroya Kato, Yutaka Ishibashi (Nagoya Institute of Technology), Pingguo Huang (Gifu Shotoku Gakuen Univ.) |
(To be available after the conference date) [more] |
|
NS |
2024-05-09 14:55 |
Mie |
Sinfonia Technology Hibiki Hall Ise (Primary: On-site, Secondary: Online) |
On Ordered Proof of Transit Based on eBPF for Service Function Chaining Takanori Hara (NAIST), Masahiro Sasabe (Kansai Univ.) |
(To be available after the conference date) [more] |
|
RCS |
2024-04-25 14:20 |
Hiroshima |
(Primary: On-site, Secondary: Online) |
A Study on Adaptive Beamwidth Control Method Using Vehicular Sensor and Map Information in 5G Millimeter-Wave Vehicle Communication System Tatkumi Eboshita, Eiji Okamoto (NITech) RCS2024-2 |
Millimeter-wave bands are considered for use in 5G because of its wide bandwidth, and it is expected to become an import... [more] |
RCS2024-2 pp.7-12 |
ICD |
2024-04-12 10:45 |
Kanagawa |
(Primary: On-site, Secondary: Online) |
[Invited Talk]
Recent Developments and Challenges for NAND Flash Memory Interface Takashi Toi (KIOXIA) ICD2024-11 |
(To be available after the conference date) [more] |
ICD2024-11 p.36 |
ICD |
2024-04-12 13:50 |
Kanagawa |
(Primary: On-site, Secondary: Online) |
[Invited Lecture]
Development of a Bridge Chip for Scalable Performance and Capacity Storage Systems Shinichi Ikeda, Akira Iwata, Goichi Otomo, Tomoaki Suzuki, Hiroaki Iijima, Mikio Shiraishi, Shinya Kawakami, Masatomo Eimitsu, Yoshiki Matsuoka, Kiyohito Sato, Shigehiro Tsuchiya, Yoshinori Shigeta, Takuma Aoyama (Kioxia) ICD2024-14 |
We describe a Bridge Chip that enables a high-speed, high-capacity storage system. The proposed Bridge Chip employs a fu... [more] |
ICD2024-14 p.43 |
CCS |
2024-03-27 14:50 |
Hokkaido |
RUSUTSU RESORT |
Dependence on Complexity of Nonlinear Functions for Augmented DFA Method in Deep Learning Based on Optoelectronic Delay System Yuto Nagatsuka, Rin Nogami (Saitama Univ.), Tomoaki Niiyama, Satoshi Sunada (Kanazawa Univ.), Atsushi Uchida, Kazutaka Kanno (Saitama Univ.) CCS2023-46 |
Increasing energy costs in deep learning have led to proposals for fast and efficient optical deep learning hardware. Th... [more] |
CCS2023-46 pp.42-47 |
ICSS, IPSJ-SPT |
2024-03-21 16:10 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
One Million Routers Under Control: Vulnerabilities in DDNS of IoT Devices Kanta Okugawa (Ritsumei/NICT), Yoshiki Mori, Masaki Kubo, Takahiro Kasama (NICT), Koichi Mouri (Ritsumei), Daisuke Inoue (NICT) ICSS2023-78 |
IoT devices such as routers and webcams have dynamic DNS (DDNS) functions as one of the methods to remotely manage devic... [more] |
ICSS2023-78 pp.63-70 |
ICSS, IPSJ-SPT |
2024-03-22 10:55 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Improved signature-embedding techniques against backdoor attacks on DNN models Akira Fujimoto, Yuntao Wang, Atsuko Miyaji (OU) ICSS2023-87 |
In recent years, machine learning, particularly deep learning, has made remarkable strides, and has great impact on our ... [more] |
ICSS2023-87 pp.129-136 |
ICSS, IPSJ-SPT |
2024-03-22 12:10 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Study of the Label-Flipping Poisoning Attack on Machine-Learning Based Malicious URL Query Detection. Akira Matsunami (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2023-90 |
In recent years, there have been a large increase of cyber attacks with increasing use of web applications. A method to... [more] |
ICSS2023-90 pp.153-159 |
ICSS, IPSJ-SPT |
2024-03-22 11:20 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Development of an Outsourcing Password Evaluation System using Intel SGX Takeki Kitayama, Yuma Nishihira (Tokai Univ.), Akira Kanaoka (Toho Univ.), Yoshio Kakizaki, Toshihiro Ohigashi (Tokai Univ.) ICSS2023-93 |
Users are required to set passwords that are both complex and not included in leaked lists, with the recent increase in ... [more] |
ICSS2023-93 pp.174-179 |
ICSS, IPSJ-SPT |
2024-03-22 11:45 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Fast and Secure Scalar Multiplication for the GLS254 Binary Elliptic Curve Ryosuke Kido, Atsuko Miyaji (OU) ICSS2023-94 |
Elliptic curve cryptosystems (ECCs) are cryptographic schemes based on the discrete logarithm problem on an elliptic cur... [more] |
ICSS2023-94 pp.180-187 |
DC, CPSY, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2024-03-21 09:50 |
Nagasaki |
Ikinoshima Hall (Primary: On-site, Secondary: Online) |
Non-stop microprocessor with MTJ-based non-volatile devices Shota Nakabeppu, Nobuyuki Yamasaki (Keio Univ.) CPSY2023-39 DC2023-105 |
Today, various embedded systems, including automobiles, home appliances, robots, spacecraft, and sensor networks, suppor... [more] |
CPSY2023-39 DC2023-105 pp.7-11 |
WIT, IPSJ-AAC |
2024-03-19 12:10 |
Ibaraki |
Tsukuba University of Technology (Primary: On-site, Secondary: Online) |
A Study on the Relationship Between the Linguistic Features of Sign Language and the Accuracy of Imitation
-- Sign Language Imitation Experiment using Illustrations, Video, and HMD Learning Materials -- Tomoya Sato, Takeaki Shionome (Teikyo Univ.) WIT2023-54 |
In sign language learning using a head-mounted display (HMD), the hand-tracking function enables users to learn from a f... [more] |
WIT2023-54 pp.63-68 |
COMP |
2024-03-14 10:30 |
Tokyo |
The University of Electro-Communications |
Number of Solutions of Pentahex and Heptiamond Puzzles Toshihiro Shirakawa COMP2023-28 |
Packing puzzles, also known as plastic puzzles, have been considered difficult to calculate the total number of solution... [more] |
COMP2023-28 pp.1-5 |
IE, MVE, CQ, IMQ (Joint) [detail] |
2024-03-13 10:00 |
Okinawa |
Okinawa Sangyo Shien Center (Primary: On-site, Secondary: Online) |
Estimation of Perceived Difficulty when reading VR-based Educational Comics Using Gaze and Facial Movement, Heart Rate, and Electroencephalography Hiroyuki Ishizuka (NAIST), Kenya Sakamoto, Shizuka Shirai, Jason Orlosky (OU), Yutaro Hirao, Monica Perusquia-Hernandez (NAIST), Naoya Isoyama (OWU), Hideaki Uchiyama, Kiyoshi Kiyokawa (NAIST) IMQ2023-13 IE2023-68 MVE2023-42 |
This study explores significant biometric features that can be used to estimate subjective difficulty while reading educ... [more] |
IMQ2023-13 IE2023-68 MVE2023-42 pp.1-6 |
RCC, ISEC, IT, WBS |
2024-03-13 10:05 |
Osaka |
Osaka Univ. (Suita Campus) |
A Study of Feature Point Extraction Methods Suitable for Non-Referenced Local Watermarking in Still Images Kota Sasaki, Siyi Shang, Masazumi Kurihara, Kazuhiko Yamaguchi (UEC) IT2023-77 ISEC2023-76 WBS2023-65 RCC2023-59 |
The watermarking based on detection without original data is advantageous in practical use because it does not require a... [more] |
IT2023-77 ISEC2023-76 WBS2023-65 RCC2023-59 pp.12-19 |