IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 376  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IN, IA
(Joint)
2024-12-20
13:30
Hyogo KIITO Graph Reduction Method Combining Sampling and Crawling with High Connectivity
Sora Satoh, Tsuyoshi Yamashita, Kunitake Kaneko (Keio Univ.)
(To be available after the conference date) [more]
NS, RCS
(Joint)
2024-12-19
18:40
Hokkaido Hakodate Arena + Online
(Primary: On-site, Secondary: Online)
MEC Architecture Supporting Application Service Policy Management with 5GC
Takumi Ishihara (Keio Univ./SB), Hiroki Watanabe (SB), Katsuhiro Horiba (SB (at that time)), Keisuke Uehara (Keio Univ.)
(To be available after the conference date) [more]
WBS, ITS, RCC 2024-12-04
12:40
Kagoshima Kagoshima Prefectural Culture Center
(Primary: On-site, Secondary: Online)
[Invited Lecture] Challenges and prospects of communication technology supporting electric power infrastructure
Daiji Kawashima, Rinzou Yamaoka, Hiroaki Yamaguchi, Yuta Hiramatsu (Kyushu Electric Power Transmission and Distribution) WBS2024-37 ITS2024-18 RCC2024-42
The transmission and distribution companies build, maintain, and operate their own communication networks for power cont... [more] WBS2024-37 ITS2024-18 RCC2024-42
p.38
SRW, SeMI
(Joint)
2024-11-29
13:25
Tokyo Tokyo Univ. of Science Katsushika Campus
(Primary: On-site, Secondary: Online)
Blockchain system with adaptive hash aggregation to handle fluctuating registration times in multi-LiDAR sensor network
Kensei Hirai, Kuon Akiyama, Ryoichi Shinkuma, Gabriele Trovato (SIT) SRW2024-43 SeMI2024-55
As urbanization and technological innovation progress, building sustainable smart cities is becoming crucial. The use of... [more] SRW2024-43 SeMI2024-55
pp.72-75
SITE, LOIS, ISEC 2024-11-15
13:05
Fukuoka   A Study on Plaintext Prediction for a Lightweight Block Cipher Midori Using Neural Network
Eiki Furutsu, Shunsuke Araki (Kyutech) ISEC2024-81 SITE2024-78 LOIS2024-45
Midori is a lightweight block cipher designed for low power consumption.
Since many analysis papers have been published... [more]
ISEC2024-81 SITE2024-78 LOIS2024-45
pp.126-133
RISING
(3rd)
2024-11-12
10:15
Hokkaido Kaderu 2・7 (Sapporo) [Poster Presentation] Continuous Detection of Identity Theft based on Features of Traffic Patterns
Ryosuke Tanaka, Manato Fujimoto, Shingo Ata (Osaka Metropolitan Univ.)
In cyberspace, identity theft, which others pretent to be the legitimate user, has become a problem. Traditional authent... [more]
IA 2024-10-26
14:45
Overseas National Taiwan University of Science and Technology (Taiwan) CVE-Learn: Cybersecurity Study throughout the CVE Datasets for Learning Model-Based Processing
Chidchanok Choksuchat, Sorawit Khumnaewnak, Touchai Angchuan, Nattawut Wichit, Sinchai Kamolphiwong (PSU) IA2024-29
In our previous study, we gathered a dataset of daily Common Vulnerabilities and Exposures (CVEs) by scanning over 4,000... [more] IA2024-29
pp.8-11
IA 2024-09-06
09:40
Hokkaido Hokkaido Univ.
(Primary: On-site, Secondary: Online)
Different Wireless Sensor Networks Collaborating to Verify Sensor Data Reliability
Haoting Zhang, Hiroshi Yamamoto (Ritsumeikan Univ.) IA2024-18
Smart cities use new technologies like IoT and AI to improve urban infrastructure, facilities, and operations. This make... [more] IA2024-18
pp.36-41
RCC, RCS, SeMI, NS, SR, RISING
(Joint)
2024-07-18
09:00
Hokkaido Hokkaido Citizens Activities Promotion Center
(Primary: On-site, Secondary: Online)
Analysis of Hybrid Cyber Attacks in State Estimation of Power Networks
Yuta Kajinishi, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.) RCC2024-24
In this paper, we discuss hybrid cyber attacks in state estimation of power networks from the viewpoint of security indi... [more] RCC2024-24
pp.35-38
RCS, SR, SRW
(Joint)
2024-03-13
10:25
Tokyo The University of Tokyo (Hongo Campus), and online
(Primary: On-site, Secondary: Online)
[Short Paper] A Study on the use of Advanced Cryptography in Sensor Network
Takuya Kurihara, Keiichiro Mori, Kazuto Yano, Toshikazu Sakano (ATR) SR2023-87
Post-quantum cryptography (PQC) is a technology necessary to ensure security in the era of quantum computers. However, P... [more] SR2023-87
pp.1-3
RCS, SR, SRW
(Joint)
2024-03-14
16:15
Tokyo The University of Tokyo (Hongo Campus), and online
(Primary: On-site, Secondary: Online)
[Invited Talk] Research and Development for Practical Applications and Value Creation -- Radar Imaging/Object Recognition and Space-Air-Ground Integrated Network --
Masayuki Ariyoshi (NEC/Tohoku Univ) RCS2023-279 SR2023-102 SRW2023-66
It is the aim for many researchers to overcome the death valley and to achieve practical application of their research a... [more] RCS2023-279 SR2023-102 SRW2023-66
p.128(RCS), p.60(SR), p.93(SRW)
IA, SITE, IPSJ-IOT [detail] 2024-03-12
10:20
Okinawa Miyakojima City Future Creation Center
(Primary: On-site, Secondary: Online)
Supporting Collaborative Learning through the Integration of Knowledge Constructive Jigsaw Method in a University Class on Network Security
Masaki Maruyama (Tsukuba Gakuin Univ.) SITE2023-71 IA2023-77
In this study, an approach to support collaborative learning was implemented in a class on computer systems, incorporati... [more] SITE2023-71 IA2023-77
pp.18-21
IA, SITE, IPSJ-IOT [detail] 2024-03-12
13:45
Okinawa Miyakojima City Future Creation Center
(Primary: On-site, Secondary: Online)
Dynamic control of redundancy factor k in the byzantine-resilient structured overlay network ByzSkip
Toyokazu Akiyama (Kyoto Sangyo Univ.), Yuuichi Teranishi (NICT), Kota Abe (Osaka Metropolitan Univ.) SITE2023-74 IA2023-80
While key-order preserving structured overlay networks (KOPSONs) with Byzantine Fault Tolerance (BFT) are expected to ha... [more] SITE2023-74 IA2023-80
pp.36-42
VLD, HWS, ICD 2024-03-02
09:20
Okinawa
(Primary: On-site, Secondary: Online)
Countermeasure on AI Hardware against Adversarial Examples
Kosuke Hamaguchi, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2023-134 HWS2023-94 ICD2023-123
The demand for edge AI, in which artificial intelligence (AI) is directly embedded in devices, is increasing, and the se... [more] VLD2023-134 HWS2023-94 ICD2023-123
pp.184-189
IA 2024-01-25
16:40
Tokyo Kwansei Gakuin Univiversity, Marunouchi Campus
(Primary: On-site, Secondary: Online)
[Poster Presentation] Cross-Layer Security Design Considerations for the Latest In-Vehicle Network Architecture
Toyokazu Akiyama (Kyoto Sangyo Univ.) IA2023-72
The architecture of the in-vehicle network is changing dramatically with the introduction of automotive ethernet and the... [more] IA2023-72
pp.65-69
NS, RCS
(Joint)
2023-12-14
16:00
Fukuoka Kyushu Institute of Technology Tobata campus, and Online
(Primary: On-site, Secondary: Online)
Evaluation of HttpRequest anomaly detection model using fastText and convolutional autoencoder
Haruta Yamada, Ryoichi Kawahara (Toyo Univ.) NS2023-133
With the advent of the Internet and its close connection to people's lives, web applications are becoming increasingly i... [more] NS2023-133
pp.42-47
LOIS, SITE, ISEC 2023-11-10
10:45
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
NTP Tunneling Threat Model Verification and Countermeasure
Shinjisangeru Sugasawa, Hisayoshi Kunimune, Shigeaki Tanimoto (CIT) ISEC2023-64 SITE2023-58 LOIS2023-22
Fraudulent covert communication methods are techniques used by attackers to avoid detection of malicious communication b... [more] ISEC2023-64 SITE2023-58 LOIS2023-22
pp.66-71
IN, ICTSSL, IEE-SMF 2023-10-19
09:00
Fukuoka Fukuoka University Effects and Investigate Attack Messages on the IoT-ZTN System
Yudai Sakurai, Osamu Mizuno (Kogakuin Univ.) IN2023-32
There are many cyber-attacks targeting the IoT system. Cyber-attacks can occur not only from external networks in conven... [more] IN2023-32
pp.1-4
PN 2023-08-29
15:40
Hokkaido
(Primary: On-site, Secondary: Online)
A Jitter-Constrained High-Speed Multilayer Combined-Path Design Algorithm for Center-Based Security Analysis
Ryuta Murakami, Takashi Kurimoto, Satoru Okamoto, Naoaki Yamanaka (Keio Univ.) PN2023-24
In order to realize a highly reliable network infrastructure in the Beyond 5G era, we have proposed the“Reconfigurable I... [more] PN2023-24
pp.40-46
CCS, IN
(Joint)
2023-08-03
10:51
Hokkaido Banya-no-yu Preprocessing Study for Detecting Out-of-Distribution Image Data with Bayesian Neural Network
Koki Minagawa, Taisei Saito, Sena Kojima, Tetsuya Asai (Hokkaido Univ.) CCS2023-19
Out-of-distribution (OOD) data ditection is a critical issue in ensuring the security of machine learning models.
In th... [more]
CCS2023-19
pp.13-18
 Results 1 - 20 of 376  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan