IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 2647  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
CCS 2024-03-27
16:50
Hokkaido RUSUTSU RESORT JPEG Compression Quality Setting Considering Image Quality and Information Loss for Correlated Steganography
Mariiko Aikawa, Sumiko Miyata (SIT), Kaito Hosono, Hirotsugu Kinoshita (KU) CCS2023-50
As more and more confidential information, including personal information, is transmitted and received over the Internet... [more] CCS2023-50
pp.64-69
ICSS, IPSJ-SPT 2024-03-21
11:45
Okinawa OIST
(Primary: On-site, Secondary: Online)
Security Analysis on End-to-End Encryption of Zoom Mail
Shogo Shiraki, Takanori Isobe (Univ.Hyogo) ICSS2023-71
Zoom Mail, an email service offered by Zoom Video Communications, incorporates an end-to-end encryption (E2EE) scheme, t... [more] ICSS2023-71
pp.17-24
ICM 2024-03-22
16:50
Okinawa Okinawa Prefectural Museum and Art Museum
(Primary: On-site, Secondary: Online)
A Proposal for System Monitoring, Operations, and Maintenance Utilizing the Integration of Graph Databases and AI
Masashi Sugimoto, Ryuya Hasegawa, Ryo Sasaki, Tetsushi Endo, Kenta Oonoki (NTT CW) ICM2023-66
We have developed numerous operational systems supporting Japan's telecommunication networks. The monitoring, operation,... [more] ICM2023-66
pp.113-118
ICSS, IPSJ-SPT 2024-03-22
10:55
Okinawa OIST
(Primary: On-site, Secondary: Online)
Discovery of a Vulnerable Structure of SIMON Variants
Hayato Watanabe (Tokai Univ.), Ryoma Ito (NICT), Toshihiro Ohigashi (Tokai Univ.) ICSS2023-92
In SCIS 2024, Watanabe et al. applied a deep learning-based output prediction attack to SIMON variants, which are varian... [more] ICSS2023-92
pp.166-173
CAS, CS 2024-03-14
16:20
Okinawa   An Approximate Solution Using K-Shortest Path and Reinforcement Learning for a Load Balancing Problem in Communication Networks
Himeno Takahashi, Norihiko Shinomiya (Soka Univ.) CAS2023-123 CS2023-116
In recent years, the amount of data traffic in information and communication networks has been increasing and the risk o... [more] CAS2023-123 CS2023-116
pp.70-73
SIS 2024-03-14
14:50
Kanagawa Kanagawa Institute of Technology
(Primary: On-site, Secondary: Online)
Improvement of Detection Accuracy for Detection of Calcification Regions in Dental Panoramic Radiographs Using LVAT
Naoki Ikeda, Sei Takano, Mitsuji Muneyasu, Soh Yoshida, Akira Asano (Kansai Univ.), Nanae Dewake, Nobuo Yoshinari (Matsumoto Dental Univ.), Keiichi Uchida (Matsumoto Dental Univ. Hospital) SIS2023-50
Carotid arteries on dental panoramic radiographs may show areas of calcification, a sign of vascular disease. The sudden... [more] SIS2023-50
pp.27-32
RCC, ISEC, IT, WBS 2024-03-13
- 2024-03-14
Osaka Osaka Univ. (Suita Campus) [Invited Talk] Cryptographic Research Based on Algebraic Curve Computation
Katsuyuki Takashima (Waseda Univ.) IT2023-116 ISEC2023-115 WBS2023-104 RCC2023-98
We have a wide range of cryptographic primitives based on elliptic curves, i.e., widely deployed public key cryptosystem... [more] IT2023-116 ISEC2023-115 WBS2023-104 RCC2023-98
p.265
RCC, ISEC, IT, WBS 2024-03-13
- 2024-03-14
Osaka Osaka Univ. (Suita Campus) Proxy Re-encryption based on LPN
Haruki Fujimoto, Shingo Sato, Junji Shikata (YNU) IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70
We propose a proxy re-encryption (PRE) scheme based on the Learning Parity with Noise (LPN) problem using error-correcti... [more] IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70
pp.79-86
RCC, ISEC, IT, WBS 2024-03-13
- 2024-03-14
Osaka Osaka Univ. (Suita Campus) Reconstruction of Boyer quantum algorithm and its application to hash puzzles
Chris Idota, Yuichi Kaji (Nagoya Univ.) IT2023-132 ISEC2023-131 WBS2023-120 RCC2023-114
This study investigates the computational complexity of solving hash puzzles using quantum algorithms. A hash puzzle is ... [more] IT2023-132 ISEC2023-131 WBS2023-120 RCC2023-114
pp.358-365
RCC, ISEC, IT, WBS 2024-03-13
- 2024-03-14
Osaka Osaka Univ. (Suita Campus) A generalization of ISD algorithm for Syndrome Decoding Problem
Asuka Wakasugi (EAGLYS), Tada Mitsuru (Chiba Univ.) IT2023-106 ISEC2023-105 WBS2023-94 RCC2023-88
The Information Set Decoding (ISD) algorithm is the best-known decoding algorithm for the syndrome decoding problem, whi... [more] IT2023-106 ISEC2023-105 WBS2023-94 RCC2023-88
pp.205-211
RCC, ISEC, IT, WBS 2024-03-13
- 2024-03-14
Osaka Osaka Univ. (Suita Campus) Security Analysis of Backdoored Classic McEliece in a Multi-User Setting
Dai Miura, Hyungrok Jo, Shingo Sato, Junji Shikata (Yokohama National Univ.) IT2023-105 ISEC2023-104 WBS2023-93 RCC2023-87
Several attacks have been proposed for the Classic McEliece cryptosystem, which is one of the 4th round candidates of th... [more] IT2023-105 ISEC2023-104 WBS2023-93 RCC2023-87
pp.197-204
RCC, ISEC, IT, WBS 2024-03-13
- 2024-03-14
Osaka Osaka Univ. (Suita Campus) Phishing Detection Method Based on Machine Learning Using DNS Graph
Yuki Ishida, Syota Nihei, Junko Sato, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of Information Sciences) IT2023-129 ISEC2023-128 WBS2023-117 RCC2023-111
Recently, phishing scams have been on the rise, the need for effective defense methods against this phishing scams.
A b... [more]
IT2023-129 ISEC2023-128 WBS2023-117 RCC2023-111
pp.337-342
RCS, SR, SRW
(Joint)
2024-03-13
10:25
Tokyo The University of Tokyo (Hongo Campus), and online
(Primary: On-site, Secondary: Online)
[Short Paper] A Study on the use of Advanced Cryptography in Sensor Network
Takuya Kurihara, Keiichiro Mori, Kazuto Yano, Toshikazu Sakano (ATR) SR2023-87
Post-quantum cryptography (PQC) is a technology necessary to ensure security in the era of quantum computers. However, P... [more] SR2023-87
pp.1-3
IE, MVE, CQ, IMQ
(Joint) [detail]
2024-03-13
15:40
Okinawa Okinawa Sangyo Shien Center
(Primary: On-site, Secondary: Online)
A Study of an Automated Photography System for a Three-Dimensional Archive of Food Appearance
Sakiho Horibe, Hiromi Nakamura (UTokyo), Yuichi Hiroi (Cluster), Fabre Émilie, Masanori Yoshihira, Jun Rekimoto (UTokyo) IMQ2023-33 IE2023-88 MVE2023-62
This study investigates a system that improves 3D reconstruction using Neural Radiance Fields (NeRF) by integrating a ro... [more] IMQ2023-33 IE2023-88 MVE2023-62
pp.114-119
NLP, MSS 2024-03-14
11:15
Misc. Kikai-Shinko-Kaikan Bldg. Parallelization of a Search Algorithm for Regular Graphs with Minimum Average Shortest Path Length
Taku Hirayama, Tsuyoshi Migita, Norikazu Takahashi (Okayama Univ.) MSS2023-89 NLP2023-141
Computer networks in data centers are modeled as regular graphs, and the average shortest path length (ASPL) of such a g... [more] MSS2023-89 NLP2023-141
pp.87-92
IE, MVE, CQ, IMQ
(Joint) [detail]
2024-03-13
14:30
Okinawa Okinawa Sangyo Shien Center
(Primary: On-site, Secondary: Online)
Study on Evaluating the Effectiveness of Graph Summarization for Sampling Graphs
Ryotaro Matsuo, Ryo Nakamura (Fukuoka Univ.) CQ2023-75
In recent years, a compact graph representation called {em summary graph} has been extensively studied. This representa... [more] CQ2023-75
pp.26-31
IE, MVE, CQ, IMQ
(Joint) [detail]
2024-03-13
14:50
Okinawa Okinawa Sangyo Shien Center
(Primary: On-site, Secondary: Online)
Evaluating the Ranking Performance of Transferable Influencer Identification Methods with a Focus on Follower Counts of Influencers
Kota Tahara, Sho Tsugawa (UT) CQ2023-76
Identifying influencers on social media who can spread information to many other users is one of the important research ... [more] CQ2023-76
pp.32-37
IE, MVE, CQ, IMQ
(Joint) [detail]
2024-03-14
13:15
Okinawa Okinawa Sangyo Shien Center
(Primary: On-site, Secondary: Online)
[Invited Talk] R&D of Efficient Support of Prevention and Recovery of/from Frailty Using Multisensory ICT -- Approaches with Virtual Spaces --
Yutaka Ishibashi (NITech) CQ2023-81
The demand for medical care and nursing care will increase rapidly after 2025, when the baby boomers will be 75 years ol... [more] CQ2023-81
pp.62-66
IE, MVE, CQ, IMQ
(Joint) [detail]
2024-03-14
15:20
Okinawa Okinawa Sangyo Shien Center
(Primary: On-site, Secondary: Online)
Efficient regularizer for 4D light field image denoising based on graph-learning
Rino Yoshida (TUS), Kazuya Kodama (NII), Gene Cheung (York Univ.), Takayuki Hamamoto (TUS) IMQ2023-56 IE2023-111 MVE2023-85
Advanced 3D visual media as promising technology often require 4D light fields composed of dense multi-view images for a... [more] IMQ2023-56 IE2023-111 MVE2023-85
pp.235-240
IE, MVE, CQ, IMQ
(Joint) [detail]
2024-03-15
09:50
Okinawa Okinawa Sangyo Shien Center
(Primary: On-site, Secondary: Online)
IMQ2023-68 IE2023-123 MVE2023-97 We propose a simultaneous method of multimodal graph signal denoising and graph learning. Since sensor networks distribu... [more] IMQ2023-68 IE2023-123 MVE2023-97
pp.301-306
 Results 1 - 20 of 2647  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan