IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 119  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
CAS, CS 2024-03-15
14:20
Okinawa   Recoloring aware Countermeasure against Adversarial Examples
Chisei Ishida, Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2023-134 CS2023-127
Adversarial Examples(AEs) which cause artificial intelligence (AI) to make a false prediction by embedded slight perturb... [more] CAS2023-134 CS2023-127
pp.128-133
RCC, ISEC, IT, WBS 2024-03-13
09:15
Osaka Osaka Univ. (Suita Campus) Performance Evaluation of Visible Light Communication System Using Imaginary Images based Image Classifier
Masataka Naito, Tadahiro Wada, Kaiji Mukumoto (Shizuoka Univ.), Hiraku Okada (Nagoya Univ.) IT2023-78 ISEC2023-77 WBS2023-66 RCC2023-60
For visible light communication systems that utilizes machine learning-based image classifiers for information embedding... [more] IT2023-78 ISEC2023-77 WBS2023-66 RCC2023-60
pp.20-25
RCC, ISEC, IT, WBS 2024-03-14
10:20
Osaka Osaka Univ. (Suita Campus) Improving classification accuracy of imaged malware through data expansion
Kaoru Yokobori, Hiroki Tanioka, Masahiko Sano, Kenji Matsuura, Tetsushi Ueta (Tokushima Univ.) IT2023-115 ISEC2023-114 WBS2023-103 RCC2023-97
Although malware-based attacks have existed for years,
malware infections increased in 2019 and 2020.
One of the reaso... [more]
IT2023-115 ISEC2023-114 WBS2023-103 RCC2023-97
pp.259-264
PRMU, IBISML, IPSJ-CVIM 2024-03-04
09:12
Hiroshima Hiroshima Univ. Higashi-Hiroshima campus
(Primary: On-site, Secondary: Online)
Creating Adversarial Examples to Deceive Both Humans and Machine Learning Models
Ko Fujimori (Waseda Univ.), Toshiki Shibahara (NTT), Daiki Chiba (NTT Security), Mitsuaki Akiyama (NTT), Masato Uchida (Waseda Univ.) PRMU2023-65
One of the vulnerability attacks against neural networks is the generation of Adversarial Examples (AE), which induce mi... [more] PRMU2023-65
pp.82-87
PRMU, IBISML, IPSJ-CVIM 2024-03-04
09:36
Hiroshima Hiroshima Univ. Higashi-Hiroshima campus
(Primary: On-site, Secondary: Online)
Disabling Adversarial Examples through Color Information Processing
Ryo Soeda, Masato Uchida (Waseda Univ.) PRMU2023-67
Image classification using neural networks is expected to have a wide range of applications, including automated driving... [more] PRMU2023-67
pp.94-99
MI 2024-03-04
09:00
Okinawa OKINAWAKEN SEINENKAIKAN
(Primary: On-site, Secondary: Online)
Distance-informed adversarial learning for metal artifact reduction
Daisuke Shigemori, Megumi Nakao (Kyoto Univ.) MI2023-62
In this study, we propose an adversarial learning framework that utilises distance information from metal to reduce CT m... [more] MI2023-62
pp.95-98
PRMU, IBISML, IPSJ-CVIM 2024-03-04
10:52
Hiroshima Hiroshima Univ. Higashi-Hiroshima campus
(Primary: On-site, Secondary: Online)
Illust Protection against Generative AI using DnCNN
Yukiya Fukuda, Daiju Kanaoka (Kyutech), Hakaru Tamukoh (Kyutech/Research Center for Neuromorphic AI Hardware) PRMU2023-71
Although generative AI such as stable diffusion are rapidly developing, but there are concerns about problems such as un... [more] PRMU2023-71
pp.116-121
SIP, SP, EA, IPSJ-SLP [detail] 2024-02-29
10:30
Okinawa
(Primary: On-site, Secondary: Online)
Multi-task learning with age information model for highly accurate elderly speech recognition.
Shine Takumi, Kinouchi Takahiro, Wakabayashi Yukoh, Kitaoka Norihide (TUT) EA2023-64 SIP2023-111 SP2023-46
The speech recognition of the elderly is less accurate, especially in smart speaker speech recognition, due to aging-rel... [more] EA2023-64 SIP2023-111 SP2023-46
pp.19-24
SIP, SP, EA, IPSJ-SLP [detail] 2024-03-01
09:30
Okinawa
(Primary: On-site, Secondary: Online)
Black-Box Adversarial Attack for Math Formula Recognition Model
Haruto Namura, Masatomo Yoshida (Doshisha Univ.), Nicola Adami (UNIBS), Masahiro Okuda (Doshisha Univ.) EA2023-110 SIP2023-157 SP2023-92
Remarkable advances in deep learning have greatly improved the accuracy of image analysis. The progress of deep learning... [more] EA2023-110 SIP2023-157 SP2023-92
pp.289-293
SeMI, IPSJ-UBI, IPSJ-MBL 2024-02-29
15:10
Fukuoka   Evaluation Experiment of Display Camera Visible Light Communication Using Adversarial Examples on a Monocular Depth Estimation Model
Changseok Lee, Hiraku Okada (Nagoya Univ.), Tadahiro Wada (Shizuoka Univ.), Chedlia Ben Naila, Masaaki Katayama (Nagoya Univ.) SeMI2023-75
Hidden display-camera visible light communication is a method of embedding data in visual information such as images and... [more] SeMI2023-75
pp.25-30
ITS, IE, ITE-MMS, ITE-ME, ITE-AIT [detail] 2024-02-19
10:45
Hokkaido Hokkaido Univ. Brightness Adjustment based Countermeasure against Adversarial Examples
Takumi Tojo, Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ITS2023-47 IE2023-36
Recently, image classification using deep learning AI has been used for in-vehicle AI, and its accuracy and response spe... [more] ITS2023-47 IE2023-36
pp.7-12
ITS, IE, ITE-MMS, ITE-ME, ITE-AIT [detail] 2024-02-19
11:00
Hokkaido Hokkaido Univ. Improving Adversarial Robustness in Continual Learning
Koki Mukai, Soichiro Kumano (UTokyo), Nicolas Michel (UGE/CNRS/LIGM), Ling Xiao, Toshihiko Yamasaki (UTokyo) ITS2023-48 IE2023-37
The goal of continual learning is to prevent catastrophic forgetting. However, few studies have simultaneously considere... [more] ITS2023-48 IE2023-37
pp.13-18
SIP, IT, RCS 2024-01-19
13:30
Miyagi
(Primary: On-site, Secondary: Online)
[Invited Talk] Problem of Adversarial Attacks on CNN-based Image Classifiers and Countermeasures
Minoru Kuribayashi (Tohoku Univ.) IT2023-67 SIP2023-100 RCS2023-242
It is well-known that discriminative models based on deep learning techniques may cause misclassification if adversarial... [more] IT2023-67 SIP2023-100 RCS2023-242
p.204
EMM 2024-01-17
11:20
Miyagi Tohoku Univ.
(Primary: On-site, Secondary: Online)
A study on 3D model adaptation for generating patch-based adversarial perturbations
Hiroto Takiwaki (Okayama Univ.), Minoru Kuribayashi (Touhoku Univ.), Nobuo Funabiki (Okayama Univ.) EMM2023-88
The development of facial recognition technology using machine learning has made it possible to recognize individuals fr... [more] EMM2023-88
pp.44-49
MI, MICT 2023-11-14
15:20
Fukuoka   Generation of pseudo-CT images from phalanges CR images based on deep learning -- Accuracy comparison using pix2pix and CycleGAN --
Rensuke Ueno, Takaharu Yamazaki (SIT), Kazuaki Tanaka (Neomedical Corporation), Keizo Fukumoto (Saitama Jikei Hospital) MICT2023-35 MI2023-28
In this study, we perform generation to pseudo-CT images from phalanges CR images using deep learning. For the image gen... [more] MICT2023-35 MI2023-28
pp.41-44
MIKA
(3rd)
2023-10-11
14:30
Okinawa Okinawa Jichikaikan
(Primary: On-site, Secondary: Online)
[Poster Presentation] Detecting Poisoning Attacks Using Adversarial Examples in Deep Phishing Detection
Koko Nishiura, Tomotaka Kimura, Jun Cheng (Doshisha Univ.)
In recent years, the convenience of online services has greatly improved, but the number of phishing scams has skyrocket... [more]
NS, IN, CS, NV
(Joint)
2023-09-08
09:00
Miyagi Tohoku University
(Primary: On-site, Secondary: Online)
Demonstrating Data Poisoning Attacks on Machine Learning Models with Multi-Sensor Inputs
Shyam Maisuria, Yuichi Ohsita, Masayuki Murata (Osaka Univ.) IN2023-31
Data poisoning attacks pose a significant threat to the integrity and reliability of machine learning models. These atta... [more] IN2023-31
pp.8-13
RCC, ISEC, IT, WBS 2023-03-14
09:50
Yamaguchi
(Primary: On-site, Secondary: Online)
A Proposal of Visible Light Communication System using Image Classifier based on Imaginary Images
Masataka Naito, Tadahiro Wada, Kaiji Mukumoto (Shizuoka Univ.), Hiraku Okada (Nagoya Univ.) IT2022-70 ISEC2022-49 WBS2022-67 RCC2022-67
We have proposed a new method of information embedding in visible light communication by using an image classifier based... [more] IT2022-70 ISEC2022-49 WBS2022-67 RCC2022-67
pp.13-18
ICSS, IPSJ-SPT 2023-03-13
14:20
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Dynamic Analysis of Adversarial Attacks
Kentaro Goto (JPNIC), Masato Uchida (Waseda Univ.) ICSS2022-52
In this study, we propose a method for identifying the characteristics of attack methods by operating them as “samples” ... [more] ICSS2022-52
pp.25-30
MI 2023-03-07
15:12
Okinawa OKINAWA SEINENKAIKAN
(Primary: On-site, Secondary: Online)
Conversion to pseudo-CT images from phalanges CR images using adversarial generation networks
Tomoaki Ushikoshi, Takaharu Yamazaki (SIT), Kazuaki Tanaka (Neomedical), Keizo Fukumoto (Saitama Jikei Hospital) MI2022-119
In this study, we perform conversion to pseudo-CT images from phalanges CR images using adversarial generative network. ... [more] MI2022-119
pp.184-189
 Results 1 - 20 of 119  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan