Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
MVE, CQ, IMQ, IE (Joint) [detail] |
2025-03-06 16:20 |
Okinawa |
(Okinawa, Online) (Primary: On-site, Secondary: Online) |
Evaluation of GPU Video Encoders for Low-Latency Applications Kasidis Arunruangsirilert, Jiro Katto (Waseda Univ.) |
[more] |
|
HWS, ICD, VLD |
2025-03-07 11:40 |
Okinawa |
(Okinawa, Online) (Primary: On-site, Secondary: Online) |
Cost reduction of fine-grained power domain partitioning circuits enabling hardware trojan detection Takahiro Ishikawa, Yoshihiro Midoh, Noriyuki Miura (Osaka Univ.), Michihiro Shintani (Kyoto Inst. of Tech.), Jun Shiomi (Osaka Univ.) |
(To be available after the conference date) [more] |
|
HWS, ICD, VLD |
2025-03-07 12:05 |
Okinawa |
(Okinawa, Online) (Primary: On-site, Secondary: Online) |
Development of Hardware Trojans using Transistor Characteristics in Low Temperature Environments Ayano Takaya, Ryuichi Nakajima (Kyoto Inst. of Tech.), Jun Shiomi (Osaka Univ.), Michihiro Shintani (Kyoto Inst. of Tech.) |
(To be available after the conference date) [more] |
|
HWS, ICD, VLD |
2025-03-08 11:40 |
Okinawa |
(Okinawa, Online) (Primary: On-site, Secondary: Online) |
Hybrid and Hierarchical Detection Flow for Hardware Trojans Takafumi Oki, Rikuu Hasegawa, Kazuki Monta, Takuji Miki, Makoto Nagata (Kobe Univ.) |
(To be available after the conference date) [more] |
|
NC, MBE (Joint) |
2025-03-06 12:55 |
Tokyo |
(Tokyo, Online) (Primary: On-site, Secondary: Online) |
Bayesian Optimization of Synaptic Parameters in Spatio-Temporal Spike Pattern Detection Model Dinger Cheng, Shunta Furuichi (Univ. Tokyo), Takashi Kohno (IIS) |
(To be available after the conference date) [more] |
|
NC, NLP (Joint) |
2025-01-28 16:30 |
Osaka |
(Osaka) |
Spatially Heterogeneous Visual Feature Extractions Inspired by Biological Retinas
-- An Edge Computing System with Spike Outputs -- Tatsuya Yamada, Hiroyuki Yokota (KIT), Yuki Hayashida (MU), Shinsuke Yasukawa (KIT) NC2024-46 |
Biological visual systems efficiently extract behaviorally relevant features from the incoming light, even within the co... [more] |
NC2024-46 pp.30-35 |
VLD, RECONF |
2025-01-17 14:20 |
Kanagawa |
Yokohama Technology Campus Flagship Building (Kanagawa, Online) (Primary: On-site, Secondary: Online) |
Emulation Environment for Reconfigurable Virtual Accelerator (ReVA) with QEMU Kaoru Kayukawa, Shunya Kawai, Kazuki Yaguchi (TUAT), Yasunori Osana (Kumamoto Univ.), Takefumi Miyoshi (Wasalabo, LCC.), Hironori Nakajo (TUAT) VLD2024-96 RECONF2024-126 |
In recent years, hardware-based acceleration has become widespread in fields such as artificial intelligence (AI) and hi... [more] |
VLD2024-96 RECONF2024-126 pp.110-115 |
QIT (2nd) |
2024-11-27 09:30 |
Kagawa |
Sunport Hall Takamatsu (Kagawa) |
HEAs=BQP Hokuto Iwakiri, Keita Kanno (QunaSys) |
The Hardware Efficient Ansatz (HEA) is widely used in current practical quantum computations, such as with superconducti... [more] |
|
CCS |
2024-11-12 14:40 |
Miyagi |
Tohoku University (Miyagi) |
[Invited Talk]
Analysis and Hardware Implementation of an Extended Spatiotemporal Contextual Learning and Memory Network Based on the Hippocampus Takemori Orima, Yoshihiko Horio, Katsunori Ito (Tohoku Univ.) CCS2024-46 |
The extended spatiotemporal contextual learning and memory network, which combines the spatiotemporal learning rule and ... [more] |
CCS2024-46 pp.19-24 |
CCS |
2024-11-12 15:50 |
Miyagi |
Tohoku University (Miyagi) |
Cost-oriented adaptive concurrency control architecture toward scalable relational database applications Kota Kanno, Takao Marukame, Tetsuya Asai, Kota Ando (Hokkaido Univ.) CCS2024-47 |
There is a demand for high-performance concurrency control suitable for relational databases. Optimistic concurrency con... [more] |
CCS2024-47 pp.25-30 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2024-11-14 10:30 |
Oita |
COMPAL HALL (Oita, Online) (Primary: On-site, Secondary: Online) |
An Evaluation of Lightweight Hash for Message Authentication Code in CMOS Image Sensors Manami Hagizaki, Hiroaki Ogawa, Oyama Tatsuya, Takeshi Fujino, Okura Shunsuke (Ritsumeikan Univ.) VLD2024-68 ICD2024-86 DC2024-90 RECONF2024-98 |
In edge AI, since information acquired by sensors is classified and recognized at the edge, the integrity of data
trans... [more] |
VLD2024-68 ICD2024-86 DC2024-90 RECONF2024-98 pp.232-237 |
CS |
2024-11-07 10:40 |
Osaka |
Osaka Public University I-site Namba C1 Conference Room (Osaka) |
[Invited Lecture]
Experimental investigation of baseline functions using P4 hardware switches Kazumi Kumazoe, Kenji Kawahara, Masato Tsuru (Kyutech) CS2024-53 |
Floating cyber-physical system (F-CPS) has been proposed as a region-specific cyber-physical system (CPS), and its demon... [more] |
CS2024-53 pp.36-39 |
HWS, ICD |
2024-11-01 17:30 |
Aomori |
Hirosaki University (Aomori, Online) (Primary: On-site, Secondary: Online) |
Secret Sharing Supporting Multi-input gates on FPGA Design for Less Communication Bandwidth Network Yinfan Zhao, Makoto Ikeda (UTokyo) HWS2024-73 ICD2024-44 |
Multi-Party Computation (MPC) is a cryptographic technology that enables multiple participants to collaboratively comput... [more] |
HWS2024-73 ICD2024-44 pp.59-64 |
SIS, ITE-BCT |
2024-10-03 16:40 |
Hokkaido |
Hokusei Gakuen Univ. (Hokkaido, Online) (Primary: On-site, Secondary: Online) |
[Invited Talk]
Near-data AI Processors and Hardware-Software Co-optimization Kota Ando (Hokkaido Univ.) SIS2024-22 |
Widely spreading AI applications are highly dependent on cloud computing. Specifically, AI applications based on neural ... [more] |
SIS2024-22 p.36 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-22 14:50 |
Hokkaido |
Sapporo Convention Center (Hokkaido) |
Performance Evaluation of Improved SuperSonic Glitch PUF Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ISEC2024-26 SITE2024-23 BioX2024-36 HWS2024-26 ICSS2024-30 EMM2024-32 |
In accordance with the basic plan for science and technology in Japan, The fundamental technologies of digital social in... [more] |
ISEC2024-26 SITE2024-23 BioX2024-36 HWS2024-26 ICSS2024-30 EMM2024-32 pp.128-132 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-22 16:40 |
Hokkaido |
Sapporo Convention Center (Hokkaido) |
Defending against adversarial example attacks by a denoising autoencoder and physical random noise Yuki Rogi, Kota Yoshida, Tatsuya Oyama, Takeshi Fujino, Shunsuke Okura (Ritsumeikan Univ.) ISEC2024-38 SITE2024-35 BioX2024-48 HWS2024-38 ICSS2024-42 EMM2024-44 |
With the development of IoT technology, edge AI has attracted widespread attention. However, edge AI shows vulnerability... [more] |
ISEC2024-38 SITE2024-35 BioX2024-48 HWS2024-38 ICSS2024-42 EMM2024-44 pp.194-199 |
RCC, RCS, SeMI, NS, SR, RISING (Joint) |
2024-07-18 14:05 |
Hokkaido |
Hokkaido Citizens Activities Promotion Center (Hokkaido, Online) (Primary: On-site, Secondary: Online) |
[Invited Talk]
Hardware security for robust and transparent network systems Yuichi Hayashi (NAIST) |
Transparent communication, achieved through the integration of sensing, computation, and devices, allows for information... [more] |
|
HWS |
2024-04-19 14:10 |
Tokyo |
(Tokyo, Online) (Primary: On-site, Secondary: Online) |
[Memorial Lecture]
Hardware security and trust
-- The nice relationship between digital trust and hardware security -- Yasushi Matsumoto (JNSA) HWS2024-1 |
Describes digital trusts, a system that plays an important role in trust formation in the digital society [more] |
HWS2024-1 pp.1-2 |
HWS |
2024-04-19 16:25 |
Tokyo |
(Tokyo, Online) (Primary: On-site, Secondary: Online) |
Non-Destructive Hardware Trojan Inspection by Backside Near Infrared Imaging Junichi Sakamoto, Yohei Hori, Shinichi Kawamura (AIST), Yuichi Hayashi (NAIST), Makoto Nagata (KU) HWS2024-5 |
Hardware Trojan detection is a critical topic for maintaining the security of IC supply chain. Previous studies have rep... [more] |
HWS2024-5 pp.18-23 |
HWS |
2024-04-19 17:15 |
Tokyo |
(Tokyo, Online) (Primary: On-site, Secondary: Online) |
Supply chain security of semiconductor chips and countermeasure design technologies Makoto Nagata (Kobe Univ.), Kazuki Monta (Secafy Co., Ltd.), Yuichi Hayashi (NAIST), Naofumi Homma (Tohoku Univ.) HWS2024-7 |
This report is dedicated to the threats and countermeasures of semiconductor supply chain security, regarding the authen... [more] |
HWS2024-7 pp.30-33 |