IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 355  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICTSSL 2023-05-18
16:05
Niigata
(Primary: On-site, Secondary: Online)
[Invited Talk] From Multidimensional Mobile Communication To Multidimensional Network
Masakazu Sengoku (Jigyo) ICTSSL2023-7
In the 1990s, an international symposium on multidimensional mobile communications started in Japan. The multi-dimension... [more] ICTSSL2023-7
pp.35-40
NS 2023-05-11
16:50
Tokyo Shinjuku Campus, Kogakuin University + Online
(Primary: On-site, Secondary: Online)
[Invited Talk] SINET6, an academic science information network connecting the whole Japan with 400-Gbps high-speed link.
takashi kurimoto, koji sasayama, osamu akashi, urushidani shigeo (NII) NS2023-14
This paper describes the architectural design, services, and operation and monitoring functions of Science Information N... [more] NS2023-14
pp.20-25
RCC, ISEC, IT, WBS 2023-03-15
09:30
Yamaguchi
(Primary: On-site, Secondary: Online)
Networks anomaly detection by VAE based on features extracted by CNN
Higashihata Kazuki (Osaka Prefecture Univ.), Aoki Shigeki, Miyamoto Takao (Osaka Metropolitan Univ.) IT2022-111 ISEC2022-90 WBS2022-108 RCC2022-108
Anomaly-based IDS, one of the intrusion detection systems (IDS), can detect unknown anomalies, but there is a problem of... [more] IT2022-111 ISEC2022-90 WBS2022-108 RCC2022-108
pp.269-276
IN, NS
(Joint)
2023-03-03
09:50
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
Cyber-Attack Detection Method for Closed Network -- A study of the detection technique of network-bridged equipment --
Nobuyuki Nakamura (OKI) IN2022-100
Cyber-Attacks in closed network occur recently. As closed network is not connected to the internet and may contain equip... [more] IN2022-100
pp.205-210
PN 2023-03-02
12:00
Okinawa
(Primary: On-site, Secondary: Online)
Conceptual Demonstration of the Reconfigurable Probe over US-Japan Experimantal Network in SC22
Satoru Okamoto, Naoaki Yamanaka (Keio Univ.) PN2022-59
Towards the realization of a secure Beyond 5G infrastructure network, we have proposed the "Reconfigurable In-network Se... [more] PN2022-59
pp.90-95
HWS, VLD 2023-03-04
13:55
Okinawa
(Primary: On-site, Secondary: Online)
*
Masaru Mashiba, Kazuki Monta (Kobe Univ.), Takaaki Okidono (SCU), Takuzi Miki, Nagata Makoto (Kobe Univ.) VLD2022-121 HWS2022-92
With the development of IoT, security is becoming increasingly important. Confidential information and other information... [more] VLD2022-121 HWS2022-92
pp.267-272
IE, ITS, ITE-MMS, ITE-ME, ITE-AIT [detail] 2023-02-22
10:15
Hokkaido Hokkaido Univ. Generation Method of Targeted Adversarial Examples using Gradient Information for the Target Class of the Image
Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ITS2022-61 IE2022-78
With the advancement of AI technology, the vulnerability of AI system is pointed out. The adversarial examples (AE), whi... [more] ITS2022-61 IE2022-78
pp.107-111
MBE, MICT, IEE-MBE [detail] 2023-01-17
10:40
Saga   Potential problems that will arise for hospital LANs
Eisuke Hanada (Saga Univ.), Takato Kudou (Oita Univ.) MICT2022-46 MBE2022-46
Hospital Information Systems (HIS) have been introduced in almost all large hospitals. In addition to this, IP networks ... [more] MICT2022-46 MBE2022-46
pp.17-21
IN, IA
(Joint)
2022-12-13
09:50
Hiroshima Higashi-Senda campus, Hiroshima Univ.
(Primary: On-site, Secondary: Online)
A Study on Obfuscation of Node Centrality in Large-Scale Networks
Hiroki Kawamura, Takeaki Iwata, Ryotaro Matsuo, Hiroyuki Ohsaki (Kwansei Gakuin Univ.) IA2022-55
Node centrality (e.g., degree centrality, eigenvector centrality, betweenness centrality), which is determined by the ne... [more] IA2022-55
pp.40-46
IN, IA
(Joint)
2022-12-13
15:50
Hiroshima Higashi-Senda campus, Hiroshima Univ.
(Primary: On-site, Secondary: Online)
Verification of Environmental Differences in Latency caused by Dynamic Access Control Based on Users' Reliability
Atsushi Shinoda (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) IA2022-66
Nowadays, environment has changed with increasing of telecommuting, and information security risks are rising in enterpr... [more] IA2022-66
pp.91-98
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2022-11-29
15:05
Kumamoto  
(Primary: On-site, Secondary: Online)
Evaluation of power delivery networks in secure semiconductor systems
Masaru Mashiba, Kazuki Monta (Kobe Univ.), Takaaki Okidono (SCU), Takuzi Miki, Makoto Nagata (Kobe Univ.) VLD2022-33 ICD2022-50 DC2022-49 RECONF2022-56
With the development of the IoT, hardware security is becoming increasingly important. Physical attacks on cryptoprocess... [more] VLD2022-33 ICD2022-50 DC2022-49 RECONF2022-56
pp.82-86
ICTSSL, IN, NWS, IEE-SMF 2022-10-27
14:30
Nagano Shinshu University
(Primary: On-site, Secondary: Online)
Proposal for an Electronic Medicine Notebook System Using Blockchain Technology
Takumi Kusano, Koichi Gyoda (SIT) ICTSSL2022-18
In Japan, a medicine notebook is used to keep a record of medication history as part of the personal health information ... [more] ICTSSL2022-18
pp.6-11
HWS, ICD 2022-10-25
10:25
Shiga
(Primary: On-site, Secondary: Online)
A Study on Profiling Side-channel Analysis against AES-CTR
Katsumi Ebina, Rei Ueno, Naohumi Homma (Tohoku Univ) HWS2022-31 ICD2022-23
This paper describes profiling Side-Channel Analysis for AES counter mode.
AES-CTR is a mode in which an internally sto... [more]
HWS2022-31 ICD2022-23
pp.6-11
HWS, ICD 2022-10-25
17:05
Shiga
(Primary: On-site, Secondary: Online)
How to Identify the Physical Direction of CAN Message Transmission
Yosuke Maekawa, Camille Gay (TOYOTA/YNU), Tsutomu Matsumoto (YNU) HWS2022-43 ICD2022-35
The impact of cyber-attacks on automobiles is becoming more serious as vehicles become more connected and multi-function... [more] HWS2022-43 ICD2022-35
pp.76-81
R 2022-10-07
14:50
Fukuoka
(Primary: On-site, Secondary: Online)
A Note on A Transformer Encoder-Based Malware Classification Using API Calls
Chen Li (Kyutech), Junjun Zheng (Osaka Univ.) R2022-36
Malware is a major security threat to computer systems and significantly impacts system reliability. Recurrent neural ne... [more] R2022-36
pp.25-30
SIP 2022-08-26
14:26
Okinawa Nobumoto Ohama Memorial Hall (Ishigaki Island)
(Primary: On-site, Secondary: Online)
Generation method of Adversarial Examples using XAI
Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) SIP2022-72
With the advancement of AI technology, AI can be applied to various fields. Therefore the accountability for the decisio... [more] SIP2022-72
pp.115-120
NS, SR, RCS, SeMI, RCC
(Joint)
2022-07-14
11:10
Ishikawa The Kanazawa Theatre + Online
(Primary: On-site, Secondary: Online)
Construction of IoT System Based on Zero Trust Networks
Yudai Sakurai, Eishin Nagaoka, Osamu Mizuno (Kogakuin Univ) NS2022-41
With increasing of IoT devices, the number of cyber-attacks targeting IoT systems is also increasing. Cyber-attacks can ... [more] NS2022-41
pp.71-76
CQ, CS
(Joint)
2022-05-12
14:20
Fukui Fukui (Fuku Pref.)
(Primary: On-site, Secondary: Online)
Distributed Network Intrusion Detection System Using Federated Learning
Yuya Tsuru, Tomoya Kawakami, Tatsuhito Hasegawa (Univ. of Fukui) CQ2022-5
A network-based intrusion detection system (NIDS) monitors a network and detects unauthorized traffic. Currently, a vari... [more] CQ2022-5
pp.20-25
VLD, HWS [detail] 2022-03-08
10:20
Online Online Evaluation of leakage-based LR-PUF's resistance to machine learning attacks
Tomoaki Oikawa, Kimiyoshi Usami (SIT) VLD2021-93 HWS2021-70
One of the LSI individual identification technologies is PUF (Physically Unclonable Function), which utilizes the physic... [more] VLD2021-93 HWS2021-70
pp.93-98
IA, SITE, IPSJ-IOT [detail] 2022-03-08
13:55
Kyoto Kyoto University, Yoshida Campus
(Primary: On-site, Secondary: Online)
An Examination about Management of IP Address Assignment with IPoE in a Campus Network
Kenji Ohira (Osaka Univ.) SITE2021-58 IA2021-71
When an information security incident occurs, an investigation is started using the IP address as a starting point, but ... [more] SITE2021-58 IA2021-71
pp.75-78
 Results 1 - 20 of 355  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan