Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IN, IA (Joint) |
2024-12-20 13:30 |
Hyogo |
KIITO |
Graph Reduction Method Combining Sampling and Crawling with High Connectivity Sora Satoh, Tsuyoshi Yamashita, Kunitake Kaneko (Keio Univ.) |
(To be available after the conference date) [more] |
|
NS, RCS (Joint) |
2024-12-19 18:40 |
Hokkaido |
Hakodate Arena + Online (Primary: On-site, Secondary: Online) |
MEC Architecture Supporting Application Service Policy Management with 5GC Takumi Ishihara (Keio Univ./SB), Hiroki Watanabe (SB), Katsuhiro Horiba (SB (at that time)), Keisuke Uehara (Keio Univ.) |
(To be available after the conference date) [more] |
|
WBS, ITS, RCC |
2024-12-04 12:40 |
Kagoshima |
Kagoshima Prefectural Culture Center (Primary: On-site, Secondary: Online) |
[Invited Lecture]
Challenges and prospects of communication technology supporting electric power infrastructure Daiji Kawashima, Rinzou Yamaoka, Hiroaki Yamaguchi, Yuta Hiramatsu (Kyushu Electric Power Transmission and Distribution) WBS2024-37 ITS2024-18 RCC2024-42 |
The transmission and distribution companies build, maintain, and operate their own communication networks for power cont... [more] |
WBS2024-37 ITS2024-18 RCC2024-42 p.38 |
SRW, SeMI (Joint) |
2024-11-29 13:25 |
Tokyo |
Tokyo Univ. of Science Katsushika Campus (Primary: On-site, Secondary: Online) |
Blockchain system with adaptive hash aggregation to handle fluctuating registration times in multi-LiDAR sensor network Kensei Hirai, Kuon Akiyama, Ryoichi Shinkuma, Gabriele Trovato (SIT) SRW2024-43 SeMI2024-55 |
As urbanization and technological innovation progress, building sustainable smart cities is becoming crucial. The use of... [more] |
SRW2024-43 SeMI2024-55 pp.72-75 |
SITE, LOIS, ISEC |
2024-11-15 13:05 |
Fukuoka |
|
A Study on Plaintext Prediction for a Lightweight Block Cipher Midori Using Neural Network Eiki Furutsu, Shunsuke Araki (Kyutech) ISEC2024-81 SITE2024-78 LOIS2024-45 |
Midori is a lightweight block cipher designed for low power consumption.
Since many analysis papers have been published... [more] |
ISEC2024-81 SITE2024-78 LOIS2024-45 pp.126-133 |
RISING (3rd) |
2024-11-12 10:15 |
Hokkaido |
Kaderu 2・7 (Sapporo) |
[Poster Presentation]
Continuous Detection of Identity Theft based on Features of Traffic Patterns Ryosuke Tanaka, Manato Fujimoto, Shingo Ata (Osaka Metropolitan Univ.) |
In cyberspace, identity theft, which others pretent to be the legitimate user, has become a problem. Traditional authent... [more] |
|
IA |
2024-10-26 14:45 |
Overseas |
National Taiwan University of Science and Technology (Taiwan) |
CVE-Learn: Cybersecurity Study throughout the CVE Datasets for Learning Model-Based Processing Chidchanok Choksuchat, Sorawit Khumnaewnak, Touchai Angchuan, Nattawut Wichit, Sinchai Kamolphiwong (PSU) IA2024-29 |
In our previous study, we gathered a dataset of daily Common Vulnerabilities and Exposures (CVEs) by scanning over 4,000... [more] |
IA2024-29 pp.8-11 |
IA |
2024-09-06 09:40 |
Hokkaido |
Hokkaido Univ. (Primary: On-site, Secondary: Online) |
Different Wireless Sensor Networks Collaborating to Verify Sensor Data Reliability Haoting Zhang, Hiroshi Yamamoto (Ritsumeikan Univ.) IA2024-18 |
Smart cities use new technologies like IoT and AI to improve urban infrastructure, facilities, and operations. This make... [more] |
IA2024-18 pp.36-41 |
RCC, RCS, SeMI, NS, SR, RISING (Joint) |
2024-07-18 09:00 |
Hokkaido |
Hokkaido Citizens Activities Promotion Center (Primary: On-site, Secondary: Online) |
Analysis of Hybrid Cyber Attacks in State Estimation of Power Networks Yuta Kajinishi, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.) RCC2024-24 |
In this paper, we discuss hybrid cyber attacks in state estimation of power networks from the viewpoint of security indi... [more] |
RCC2024-24 pp.35-38 |
RCS, SR, SRW (Joint) |
2024-03-13 10:25 |
Tokyo |
The University of Tokyo (Hongo Campus), and online (Primary: On-site, Secondary: Online) |
[Short Paper]
A Study on the use of Advanced Cryptography in Sensor Network Takuya Kurihara, Keiichiro Mori, Kazuto Yano, Toshikazu Sakano (ATR) SR2023-87 |
Post-quantum cryptography (PQC) is a technology necessary to ensure security in the era of quantum computers. However, P... [more] |
SR2023-87 pp.1-3 |
RCS, SR, SRW (Joint) |
2024-03-14 16:15 |
Tokyo |
The University of Tokyo (Hongo Campus), and online (Primary: On-site, Secondary: Online) |
[Invited Talk]
Research and Development for Practical Applications and Value Creation
-- Radar Imaging/Object Recognition and Space-Air-Ground Integrated Network -- Masayuki Ariyoshi (NEC/Tohoku Univ) RCS2023-279 SR2023-102 SRW2023-66 |
It is the aim for many researchers to overcome the death valley and to achieve practical application of their research a... [more] |
RCS2023-279 SR2023-102 SRW2023-66 p.128(RCS), p.60(SR), p.93(SRW) |
IA, SITE, IPSJ-IOT [detail] |
2024-03-12 10:20 |
Okinawa |
Miyakojima City Future Creation Center (Primary: On-site, Secondary: Online) |
Supporting Collaborative Learning through the Integration of Knowledge Constructive Jigsaw Method in a University Class on Network Security Masaki Maruyama (Tsukuba Gakuin Univ.) SITE2023-71 IA2023-77 |
In this study, an approach to support collaborative learning was implemented in a class on computer systems, incorporati... [more] |
SITE2023-71 IA2023-77 pp.18-21 |
IA, SITE, IPSJ-IOT [detail] |
2024-03-12 13:45 |
Okinawa |
Miyakojima City Future Creation Center (Primary: On-site, Secondary: Online) |
Dynamic control of redundancy factor k in the byzantine-resilient structured overlay network ByzSkip Toyokazu Akiyama (Kyoto Sangyo Univ.), Yuuichi Teranishi (NICT), Kota Abe (Osaka Metropolitan Univ.) SITE2023-74 IA2023-80 |
While key-order preserving structured overlay networks (KOPSONs) with Byzantine Fault Tolerance (BFT) are expected to ha... [more] |
SITE2023-74 IA2023-80 pp.36-42 |
VLD, HWS, ICD |
2024-03-02 09:20 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Countermeasure on AI Hardware against Adversarial Examples Kosuke Hamaguchi, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2023-134 HWS2023-94 ICD2023-123 |
The demand for edge AI, in which artificial intelligence (AI) is directly embedded in devices, is increasing, and the se... [more] |
VLD2023-134 HWS2023-94 ICD2023-123 pp.184-189 |
IA |
2024-01-25 16:40 |
Tokyo |
Kwansei Gakuin Univiversity, Marunouchi Campus (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Cross-Layer Security Design Considerations for the Latest In-Vehicle Network Architecture Toyokazu Akiyama (Kyoto Sangyo Univ.) IA2023-72 |
The architecture of the in-vehicle network is changing dramatically with the introduction of automotive ethernet and the... [more] |
IA2023-72 pp.65-69 |
NS, RCS (Joint) |
2023-12-14 16:00 |
Fukuoka |
Kyushu Institute of Technology Tobata campus, and Online (Primary: On-site, Secondary: Online) |
Evaluation of HttpRequest anomaly detection model using fastText and convolutional autoencoder Haruta Yamada, Ryoichi Kawahara (Toyo Univ.) NS2023-133 |
With the advent of the Internet and its close connection to people's lives, web applications are becoming increasingly i... [more] |
NS2023-133 pp.42-47 |
LOIS, SITE, ISEC |
2023-11-10 10:45 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
NTP Tunneling Threat Model Verification and Countermeasure Shinjisangeru Sugasawa, Hisayoshi Kunimune, Shigeaki Tanimoto (CIT) ISEC2023-64 SITE2023-58 LOIS2023-22 |
Fraudulent covert communication methods are techniques used by attackers to avoid detection of malicious communication b... [more] |
ISEC2023-64 SITE2023-58 LOIS2023-22 pp.66-71 |
IN, ICTSSL, IEE-SMF |
2023-10-19 09:00 |
Fukuoka |
Fukuoka University |
Effects and Investigate Attack Messages on the IoT-ZTN System Yudai Sakurai, Osamu Mizuno (Kogakuin Univ.) IN2023-32 |
There are many cyber-attacks targeting the IoT system. Cyber-attacks can occur not only from external networks in conven... [more] |
IN2023-32 pp.1-4 |
PN |
2023-08-29 15:40 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
A Jitter-Constrained High-Speed Multilayer Combined-Path Design Algorithm for Center-Based Security Analysis Ryuta Murakami, Takashi Kurimoto, Satoru Okamoto, Naoaki Yamanaka (Keio Univ.) PN2023-24 |
In order to realize a highly reliable network infrastructure in the Beyond 5G era, we have proposed the“Reconfigurable I... [more] |
PN2023-24 pp.40-46 |
CCS, IN (Joint) |
2023-08-03 10:51 |
Hokkaido |
Banya-no-yu |
Preprocessing Study for Detecting Out-of-Distribution Image Data with Bayesian Neural Network Koki Minagawa, Taisei Saito, Sena Kojima, Tetsuya Asai (Hokkaido Univ.) CCS2023-19 |
Out-of-distribution (OOD) data ditection is a critical issue in ensuring the security of machine learning models.
In th... [more] |
CCS2023-19 pp.13-18 |