Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
DC, CPSY, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2024-03-22 15:45 |
Nagasaki |
Ikinoshima Hall (Primary: On-site, Secondary: Online) |
Software Vulnerability Risk Growth Model for CVSS 4 Metrics Sora Okada, Takashi Minohara, Masaya Shimakawa (Takushoku Univ.) CPSY2023-47 DC2023-113 |
Information system administrators must pay attention to system vulnerability information and take appropriate measures a... [more] |
CPSY2023-47 DC2023-113 pp.53-58 |
MI |
2024-03-04 09:36 |
Okinawa |
OKINAWAKEN SEINENKAIKAN (Primary: On-site, Secondary: Online) |
[Short Paper]
Overfitting Prevention for PET Image Reconstruction using Early Stopping of Deep Image Prior based on Unbiased Risk Estimator Kaito Matsumura, Hidekata Hontani (NIT), Muneyuki Sakata (TMIG), Yuichi Kimura (KDU), Tatsuya Yokota (NIT) MI2023-65 |
In recent years, methods for PET image reconstruction using Deep Image Prior (DIP) have been actively studied. In PET im... [more] |
MI2023-65 pp.106-108 |
ET |
2024-03-03 14:35 |
Miyazaki |
Miyazaki University |
Development of Worker Digital Twin Generation and Visualization Function for Accident Prediction Training in Outbound Training Kaito Minohara, Toshiki Muguruma, Yusuke Kometani, Naka Gotoda, Saerom Lee, Ryo Kanda (Kagawa Univ.), Shotaro Irie, Toru Harai (Shinnihon Co.) ET2023-72 |
In the construction industry, completing a construction project within a limited timeframe while complying with labor la... [more] |
ET2023-72 pp.121-128 |
NS, NWS (Joint) |
2024-01-25 13:25 |
Hiroshima |
Higashisenda Campus, HiroshimaUniversity + Online (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
An Evaluation of Routing Algorithm Consideration Data Importance Based on Combination of SDN and DTN Haruhiko Sakamoto (NIT, Sendai.), Hitoshi Kamei (Kagawa Univ.), Takaki Nakamura (Tohoku Univ.), Satoru Izumi (NIT, Sendai.) NS2023-160 |
Resident information stored in public organizations such as city halls and medical information stored in medical facilit... [more] |
NS2023-160 pp.7-12 |
QIT (2nd) |
2023-12-17 17:30 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Numerical computation of Bayesian Nagaoka-Hayashi bound for three-parameter qubit -state estimation Zhao Kehan, Suzuki Jun (UEC) |
In this work, we study parameter estimation about a three-parameter qubit-state model under the Bayesian setting. Recent... [more] |
|
R |
2023-12-07 15:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg (Primary: On-site, Secondary: Online) |
Dependability/Risk-related Measures for Safety-related Systems conforming to Functional Safety
-- Formulation of MTTFF, Dangerous Failure Rate λ and Restoration Rate μ -- Ko Kawashima (ORIENTAL MOTOR), Yoshinobu Sato (Institute of Healthcare Quality ImprovementInstitute of Healthca) R2023-53 |
When the overall system does not comply with the independence requirements between the demand and the reliability charac... [more] |
R2023-53 pp.18-23 |
MRIS, ITE-MMS |
2023-12-08 09:55 |
Ehime |
Ehime Univ. (CITE) (Primary: On-site, Secondary: Online) |
Current-induced motion of connected skyrmions while maintaining mutual distance in notched nanowire Syuta Honda, Taichi Nishitani, Hiroyoshi Itoh (Kansai Univ.), Tomokatsu Ohsawa (NIT, Numazu College) MRIS2023-28 |
In a racetrack memory, which uses magnetic skyrmions as information carriers, maintaining the distance between the skyrm... [more] |
MRIS2023-28 pp.36-41 |
ICSS |
2023-11-16 13:50 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Device identification and attribute values consideration with browser fingerprint Takashi Tsukazaki, Yuichi Futa (TUT), Hiroyuki Okazaki (Shinshu Univ.), Hikofumi Suzuki (NII) ICSS2023-53 |
Browser fingerprinting is to identify website users by collecting information about device. Browser fingerprinting is us... [more] |
ICSS2023-53 pp.15-21 |
R |
2023-09-28 14:20 |
Fukuoka |
(Primary: On-site, Secondary: Online) |
Copula models based on left-truncated and competing risks data
-- Likelihood inference based on field studies -- Takeshi Emura (ISM), Hirofumi Michimae (Kitasato Univ.) R2023-39 |
In the collection method of failure data (field life data) in field tests, unobserved failure occurs before the collecti... [more] |
R2023-39 pp.12-15 |
NS, IN, CS, NV (Joint) |
2023-09-08 10:20 |
Miyagi |
Tohoku University (Primary: On-site, Secondary: Online) |
A Proposal of Routing Method Considering Data Importance Based on Combination of SDN and DTN Haruhiko Sakamoto (NIT, Sendai College), Hitoshi Kamei (Kagawa Univ.), Takaki Nakamura (Tohoku Univ.), Satoru Izumi (NIT, Sendai College) NS2023-59 |
Risk aware Data Replication (RDR), which stores data in nearby safe server s in the same city, is expected as a method t... [more] |
NS2023-59 pp.43-46 |
CPSY, DC, IPSJ-ARC [detail] |
2023-08-03 09:00 |
Hokkaido |
Hakodate Arena (Primary: On-site, Secondary: Online) |
Proposal of Data Protection Features using Peak Shift Method of Drive Failure Risk Takaki Nakamura (Tohoku Univ.), Hitoshi Kamei (Kagawa Univ.) CPSY2023-8 DC2023-8 |
We propose a peak shift method for data protection that considers time-series changes in drive failure risk and the risk... [more] |
CPSY2023-8 DC2023-8 pp.1-6 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 16:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Analysis of effective attribute values on risk-based authentication with browser fingerprint Takashi Tsukazaki, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) ISEC2023-19 SITE2023-13 BioX2023-22 HWS2023-19 ICSS2023-16 EMM2023-19 |
Browser fingerprinting is to identify website users by collecting information about device. Browser fingerprint is used ... [more] |
ISEC2023-19 SITE2023-13 BioX2023-22 HWS2023-19 ICSS2023-16 EMM2023-19 pp.30-36 |
MSS, CAS, SIP, VLD |
2023-07-06 13:00 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
[Panel Discussion]
Democratization of Researches in Circuits and Systems fields and Initiatives in Technical Groups Makoto Ikeda (The Univ. of Tokyo), Yasutoshi Aibara (OVT), Shigetoshi Nakatake (The Univ. of Kitakyushu), Takayuki Nakachi (Univ. of Ryukyus), Shingo Yamaguchi (Yamaguchi Univ.) CAS2023-7 VLD2023-7 SIP2023-23 MSS2023-7 |
Open Access initiatives, which allow access and use of research results funded by public research funds not only by the ... [more] |
CAS2023-7 VLD2023-7 SIP2023-23 MSS2023-7 pp.34-36 |
ISEC |
2023-05-17 10:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On the Risk Assessment Method against ML-specific Attacks for ML system developers
-- A Damage Assessment Method for ML system developers -- Jun Yajima, Maki Inui, Kentarou Tsuji (Fujitsu Ltd.), Nobukazu Yoshioka (Waseda Univ.) ISEC2023-4 |
To develop machine learning (ML) systems that are secure againstML-specific attacks, to conduct threat assessment to fin... [more] |
ISEC2023-4 pp.25-32 |
EMCJ |
2023-04-21 13:55 |
Ishikawa |
Kanazawa University (Primary: On-site, Secondary: Online) |
Characteristics Estimation of 60 GHz Exposure Equipment for Investigation of Effects of Local Exposure to Millimeter-waves on Thermal Physiology and Cellular Functions Kaito Sugimura, Sakura Tsuruga, Takashi Hikage (Hokkaido Univ.), Hiroshi Masuda, Tatsuya Ishitake (Kurume Univ.), Kun Li (Kagawa Univ.), Akiko Nagai (Aichi Gakuin Univ.) EMCJ2023-2 |
We have developed a novel local exposure system to obtain knowledge on thermal physiological responses and changes in ce... [more] |
EMCJ2023-2 pp.5-8 |
DC, CPSY, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2023-03-24 09:00 |
Kagoshima |
Amagi Town Disaster Prevention Center (Tokunoshima) (Primary: On-site, Secondary: Online) |
A preliminary study on time-dependency of cyber security vulnerability assessment Takashi Minohara, Naohiro Kubota (Takushoku Univ.) CPSY2022-42 DC2022-101 |
Information system administrators must pay attention to system vulnerability information and take appropriate measures a... [more] |
CPSY2022-42 DC2022-101 pp.49-54 |
RCC, ISEC, IT, WBS |
2023-03-14 10:30 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
[Invited Talk]
Information-Theoretic Analyses for Two Problems Taking Security into Consideration
-- Parameter Estimation Problem under Local Differential Privacy, and Privacy-Utility Tradeoff Problem -- Shota Saito (Gunma Univ.) IT2022-71 ISEC2022-50 WBS2022-68 RCC2022-68 |
This lecture surveys the following two problems: 1) parameter estimation problem under $(epsilon, delta)$-local differen... [more] |
IT2022-71 ISEC2022-50 WBS2022-68 RCC2022-68 pp.19-24 |
PRMU, IBISML, IPSJ-CVIM [detail] |
2023-03-03 16:25 |
Hokkaido |
Future University Hakodate (Primary: On-site, Secondary: Online) |
Fast Identification of Possible Model Parameter Update for Low-Rank Update of Training Data Hiroyuki Hanada, Noriaki Hashimoto (RIKEN), Kouichi Taji, Ichiro Takeuchi (Nagoya Univ.) PRMU2022-123 IBISML2022-130 |
Machine learning methods often require re-training the training dataset with low-rank modifications (small number of ins... [more] |
PRMU2022-123 IBISML2022-130 pp.347-354 |
EMCJ |
2023-01-27 10:00 |
Okayama |
WASHU BLUE RESORT (Primary: On-site, Secondary: Online) |
Performance Evaluation of 60 GHz Exposure Set-up for Study of Changes in Thermal Physiology and Cellular Mechanisms Induced by Localized Millimeter-wave Exposure Kohei Yamamoto, Takashi Hikage (Hokkaido Univ.), Hiroshi Masuda, Tatsuya Ishitake (Kurume Univ.), Kun Li (Kagawa Univ.), Akiko Nagai (Aichi Gakuin Univ.) EMCJ2022-75 |
We have developed a novel exposure system to obtain knowledge on thermal physiological responses and changes in cellular... [more] |
EMCJ2022-75 pp.17-20 |
R |
2022-12-15 14:30 |
Online |
Online |
Metric for Dependability/Risk and Functional Safety Ko Kawashima (ORIENTAL MOTOR), Yoshinobu Sato (Institute of Healthcare Quality Improvement, Tokyo Healthcare Fo) R2022-44 |
The risk due to malfunctioning of safety functions performed by electrical/electronic/programmable electronic safety-rel... [more] |
R2022-44 pp.1-6 |