IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 727  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SAT, MICT, WBS, RCC
(Joint) [detail]
2024-05-16
17:20
Miyazaki KITEN Convention hall (Miyazaki)
(Primary: On-site, Secondary: Online)
Event-Triggered Control of Distributed Network Systems under DoS Attacks
Masaki Yanai, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.)
(To be available after the conference date) [more]
ICSS, IPSJ-SPT 2024-03-21
16:10
Okinawa OIST
(Primary: On-site, Secondary: Online)
One Million Routers Under Control: Vulnerabilities in DDNS of IoT Devices
Kanta Okugawa (Ritsumei/NICT), Yoshiki Mori, Masaki Kubo, Takahiro Kasama (NICT), Koichi Mouri (Ritsumei), Daisuke Inoue (NICT) ICSS2023-78
IoT devices such as routers and webcams have dynamic DNS (DDNS) functions as one of the methods to remotely manage devic... [more] ICSS2023-78
pp.63-70
ICSS, IPSJ-SPT 2024-03-22
10:55
Okinawa OIST
(Primary: On-site, Secondary: Online)
Improved signature-embedding techniques against backdoor attacks on DNN models
Akira Fujimoto, Yuntao Wang, Atsuko Miyaji (OU) ICSS2023-87
In recent years, machine learning, particularly deep learning, has made remarkable strides, and has great impact on our ... [more] ICSS2023-87
pp.129-136
ICSS, IPSJ-SPT 2024-03-22
12:10
Okinawa OIST
(Primary: On-site, Secondary: Online)
Study of the Label-Flipping Poisoning Attack on Machine-Learning Based Malicious URL Query Detection.
Akira Matsunami (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2023-90
In recent years, there have been a large increase of cyber attacks with increasing use of web applications. A method to... [more] ICSS2023-90
pp.153-159
ICSS, IPSJ-SPT 2024-03-22
11:20
Okinawa OIST
(Primary: On-site, Secondary: Online)
Development of an Outsourcing Password Evaluation System using Intel SGX
Takeki Kitayama, Yuma Nishihira (Tokai Univ.), Akira Kanaoka (Toho Univ.), Yoshio Kakizaki, Toshihiro Ohigashi (Tokai Univ.) ICSS2023-93
Users are required to set passwords that are both complex and not included in leaked lists, with the recent increase in ... [more] ICSS2023-93
pp.174-179
ICSS, IPSJ-SPT 2024-03-22
11:45
Okinawa OIST
(Primary: On-site, Secondary: Online)
Fast and Secure Scalar Multiplication for the GLS254 Binary Elliptic Curve
Ryosuke Kido, Atsuko Miyaji (OU) ICSS2023-94
Elliptic curve cryptosystems (ECCs) are cryptographic schemes based on the discrete logarithm problem on an elliptic cur... [more] ICSS2023-94
pp.180-187
RCC, ISEC, IT, WBS 2024-03-13
10:05
Osaka Osaka Univ. (Suita Campus) A Study of Feature Point Extraction Methods Suitable for Non-Referenced Local Watermarking in Still Images
Kota Sasaki, Siyi Shang, Masazumi Kurihara, Kazuhiko Yamaguchi (UEC) IT2023-77 ISEC2023-76 WBS2023-65 RCC2023-59
The watermarking based on detection without original data is advantageous in practical use because it does not require a... [more] IT2023-77 ISEC2023-76 WBS2023-65 RCC2023-59
pp.12-19
RCC, ISEC, IT, WBS 2024-03-13
11:10
Osaka Osaka Univ. (Suita Campus) Revisiting the Soundness of 5-Pass Identification Scheme
Daigo Kuroki, Kaoru Takemure, Bagus Santoso (UEC) IT2023-82 ISEC2023-81 WBS2023-70 RCC2023-64
We observe that mostly, the security of 5-pass identification schemes
have only been analyzed in a emph{rough} way as f... [more]
IT2023-82 ISEC2023-81 WBS2023-70 RCC2023-64
pp.44-51
LOIS 2024-03-14
13:40
Okinawa Okinawa Pref Danjyo-Kyoudou-Sankaku Center
(Primary: On-site, Secondary: Online)
LOIS2023-64 Targeted attacks on specific organizations have become a significant issue due to their sophistication and the extensive... [more] LOIS2023-64
pp.96-101
RCC, ISEC, IT, WBS 2024-03-14
09:05
Osaka Osaka Univ. (Suita Campus) Partial Key Exposure Attacks on UOV-like Signatures
Yuki Seto, Hiroki Furue, Atsushi Takayasu (UTokyo) IT2023-104 ISEC2023-103 WBS2023-92 RCC2023-86
NIST is currently working on the standardization of post-quantum cryptography (PQC). Forty signature schemes were submit... [more] IT2023-104 ISEC2023-103 WBS2023-92 RCC2023-86
pp.189-196
RCC, ISEC, IT, WBS 2024-03-14
09:30
Osaka Osaka Univ. (Suita Campus) Security Analysis of Backdoored Classic McEliece in a Multi-User Setting
Dai Miura, Hyungrok Jo, Shingo Sato, Junji Shikata (Yokohama National Univ.) IT2023-105 ISEC2023-104 WBS2023-93 RCC2023-87
Several attacks have been proposed for the Classic McEliece cryptosystem, which is one of the 4th round candidates of th... [more] IT2023-105 ISEC2023-104 WBS2023-93 RCC2023-87
pp.197-204
RCC, ISEC, IT, WBS 2024-03-14
16:35
Osaka Osaka Univ. (Suita Campus) Integral Attack with Bit-Based Division Property on Block Cipher LBC
Naoki Shibayama, Yasutaka Igarashi (Tokyo Univ. of Science) IT2023-131 ISEC2023-130 WBS2023-119 RCC2023-113
LBC is a block cipher proposed by Kapalova et al. in 2023. The block size is 64-bit, the secret key size is 80-bit, and ... [more] IT2023-131 ISEC2023-130 WBS2023-119 RCC2023-113
pp.350-357
PRMU, IBISML, IPSJ-CVIM 2024-03-04
10:40
Hiroshima Hiroshima Univ. Higashi-Hiroshima campus
(Primary: On-site, Secondary: Online)
Poisoning Attack on Fairness of Fair Classification Algorithm through Threshold Control
Dai Shengtian, Akimoto Youhei (Univ. of Tsukuba/RIKEN), Jun Sakuma (Tokyo Tech./RIKEN), Fukuchi Kazuto (Univ. of Tsukuba/RIKEN) IBISML2023-47
The ethical issues of artificial intelligence have become more severe as machine learning is widely used in several fiel... [more] IBISML2023-47
pp.49-56
EMM 2024-03-03
10:00
Overseas Day1:JEJU TECHNOPARK, Day2:JEJU Business Agency [Poster Presentation] Estimation of scaling rate and rotation angle using pilot signal for image watermarking -- Estimation using radon transform --
Rinka Kawano, Masaki Kawamura (Yamaguchi Univ.) EMM2023-94
To construct a robust watermarking method against geometric attacks, conventional methods extract watermarks and correct... [more] EMM2023-94
pp.28-33
SIP, SP, EA, IPSJ-SLP [detail] 2024-02-29
15:10
Okinawa
(Primary: On-site, Secondary: Online)
Byzantine attack detection via similarity of local updates in federated learning
Kenta Ohno, Masao Yamagishi (Hosei Univ.) EA2023-86 SIP2023-133 SP2023-68
We propose a method to detect Byzantine attacks in federated learning, as well as a method for identifying clients repea... [more] EA2023-86 SIP2023-133 SP2023-68
pp.150-155
SIP, SP, EA, IPSJ-SLP [detail] 2024-03-01
09:30
Okinawa
(Primary: On-site, Secondary: Online)
Black-Box Adversarial Attack for Math Formula Recognition Model
Haruto Namura, Masatomo Yoshida (Doshisha Univ.), Nicola Adami (UNIBS), Masahiro Okuda (Doshisha Univ.) EA2023-110 SIP2023-157 SP2023-92
Remarkable advances in deep learning have greatly improved the accuracy of image analysis. The progress of deep learning... [more] EA2023-110 SIP2023-157 SP2023-92
pp.289-293
NS, IN
(Joint)
2024-02-29
10:45
Okinawa Okinawa Convention Center Proposal of a Data Leakage Attack against a Vertical Federated Learning System based on Knowledge Distillation
Takumi Suimon, Yuki Koizumi, Junji Takemasa, Toru Hasegawa (Osaka Univ.) NS2023-187
Vertical federated learning is a method for participants who have data with the same samples but different features to c... [more] NS2023-187
pp.90-95
NS, IN
(Joint)
2024-03-01
11:10
Okinawa Okinawa Convention Center Blockchain-based malicious node detection and defense method for potential-based routing
Kanato Otsu (Osaka Univ.), Naomi Kuze (Wakayama Univ.) NS2023-200
In recent years, the scale and complexity in networks have grown such as the Internet of Things (IoT).
For controlling... [more]
NS2023-200
pp.166-171
VLD, HWS, ICD 2024-02-29
15:55
Okinawa
(Primary: On-site, Secondary: Online)
[Memorial Lecture] Modeling of Tamper Resistance to Electromagnetic Side-channel Attacks on Voltage-scaled Circuits
Kazuki Minamiguchi, Yoshihiro Midoh, Noriyuki Miura, Jun Shiomi (Osaka Univ.) VLD2023-117 HWS2023-77 ICD2023-106
The threat of information leakage by Side-Channel Attacks (SCAs) using ElectroMagnetic (EM) leakage is becoming more and... [more] VLD2023-117 HWS2023-77 ICD2023-106
p.99
VLD, HWS, ICD 2024-03-01
10:50
Okinawa
(Primary: On-site, Secondary: Online)
Pseudo-random Number Generator Design Robust against Fault Injection Attacks
Sota Kado, Mingyu Yang, Yuko Hara (Tokyo Tech) VLD2023-123 HWS2023-83 ICD2023-112
Fault Injection Attacks (FIA) using physical methods are a significant threat for embedded devices to process various ap... [more] VLD2023-123 HWS2023-83 ICD2023-112
pp.125-130
 Results 1 - 20 of 727  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan