IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 1233  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IT 2024-08-07
10:30
Okayama Okayama University, Tsushima campus
(Primary: On-site, Secondary: Online)
Revisiting the Lossy Signature Scheme Based on DSDL Problem
Tihang Wijaya, Bagus Santoso (UEC)
 [more]
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2024-07-22
14:50
Hokkaido Sapporo Convention Center Performance Evaluation of Improved SuperSonic Glitch PUF
Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ISEC2024-26 SITE2024-23 BioX2024-36 HWS2024-26 ICSS2024-30 EMM2024-32
In accordance with the basic plan for science and technology in Japan, The fundamental technologies of digital social in... [more] ISEC2024-26 SITE2024-23 BioX2024-36 HWS2024-26 ICSS2024-30 EMM2024-32
pp.128-132
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2024-07-22
17:30
Hokkaido Sapporo Convention Center Security Analysis of a Contactless Dial Lock Authentication System
Kaiya Yokokura, Bo Wu, Kiminori Sato (TUT) ISEC2024-36 SITE2024-33 BioX2024-46 HWS2024-36 ICSS2024-40 EMM2024-42
Currently, knowledge-based authentication methods such as PIN codes, passwords, and patterns are widely used in many asp... [more] ISEC2024-36 SITE2024-33 BioX2024-46 HWS2024-36 ICSS2024-40 EMM2024-42
pp.182-187
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2024-07-22
16:40
Hokkaido Sapporo Convention Center Defending against adversarial example attacks by a denoising autoencoder and physical random noise
Yuki Rogi, Kota Yoshida, Tatsuya Oyama, Takeshi Fujino, Shunsuke Okura (Ritsumeikan Univ.) ISEC2024-38 SITE2024-35 BioX2024-48 HWS2024-38 ICSS2024-42 EMM2024-44
With the development of IoT technology, edge AI has attracted widespread attention. However, edge AI shows vulnerability... [more] ISEC2024-38 SITE2024-35 BioX2024-48 HWS2024-38 ICSS2024-42 EMM2024-44
pp.194-199
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2024-07-23
09:40
Hokkaido Sapporo Convention Center A Study on Detection Method of Aged Microcontrollers Using Side-Channel Information
Yuki Kaneko (Tohoku Univ.), Yuichi Hayashi (NAIST), Naofumi Homma (Tohoku Univ.) ISEC2024-50 SITE2024-47 BioX2024-60 HWS2024-50 ICSS2024-54 EMM2024-56
This paper describes a basic study on detection method of aged microcontrollers using side-channel information. [more] ISEC2024-50 SITE2024-47 BioX2024-60 HWS2024-50 ICSS2024-54 EMM2024-56
pp.272-277
VLD, CAS, SIP, MSS 2024-07-18
14:00
Aomori
(Primary: On-site, Secondary: Online)
Measurement of Leakage based Strong PUF Operating at Ultra Low Voltage Using a Leakage Control Approach
Shunkichi Hata, Kimiyoshi Usami (SIT) CAS2024-8 VLD2024-8 SIP2024-25 MSS2024-8
Low voltage operation becomes issues to be addressed when PUF (Physically Unclonable Function) is mounted on devices tha... [more] CAS2024-8 VLD2024-8 SIP2024-25 MSS2024-8
pp.41-46
RCC, RCS, SeMI, NS, SR, RISING
(Joint)
2024-07-18
09:00
Hokkaido Hokkaido Citizens Activities Promotion Center
(Primary: On-site, Secondary: Online)
Analysis of Hybrid Cyber Attacks in State Estimation of Power Networks
Yuta Kajinishi, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.) RCC2024-24
In this paper, we discuss hybrid cyber attacks in state estimation of power networks from the viewpoint of security indi... [more] RCC2024-24
pp.35-38
RCC, RCS, SeMI, NS, SR, RISING
(Joint)
2024-07-18
16:20
Hokkaido Hokkaido Citizens Activities Promotion Center
(Primary: On-site, Secondary: Online)
Physical Layer Security Based on Dynamic Frozen Bit Design for Polar-Coded OFDM Systems
Yuto Hama (Yokohama Nat. Univ.) RCS2024-104
In general, physical layer security in wiretap channels requires that the channel of the eavesdropper is degraded relati... [more] RCS2024-104
pp.101-106
EMCJ, IEE-EMC, IEE-SPC 2024-06-28
16:20
Hokkaido Hotel Suncity Calculation of Target Attenuation of Transfer Function to Suppress Side-Channel Information Leakage from Cryptographic IC -- Study Based on Simulated Switching Current Source --
Masaki Himuro, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) EMCJ2024-19
Side-channel attacks (SCAs) recover the secret key for cryptography by analyzing the switching noises generated by crypt... [more] EMCJ2024-19
pp.65-70
RCS 2024-06-20
14:15
Okinawa
(Primary: On-site, Secondary: Online)
Study on Physical-Layer Encrypted Relay Transmission Method Using Group Key for Distributed Terminal Cooperative Communication
Keita Ito, Eiji Okamoto (NITech) RCS2024-62
Multiple-input multiple-output (MIMO) techniques are commonly used to improve frequency efficiency and channel capacity.... [more] RCS2024-62
pp.203-208
IA, ICSS 2024-06-17
16:00
Okayama Okayama University
(Primary: On-site, Secondary: Online)
[Invited Talk] Basic SecCap: Practical Security Education Based on Inter-University Collaboration
Tokumi Yokohira (Okayama Univ.), Hideaki Sone (Tohoku Univ.), Hideki Sunahara (Keio Univ.), Satoru Izumi (Tohoku Unvi./NIT, Sendai College), Miyuki Hirose (Kyutech/TDU), Daiya Kato (Keio Univ.) IA2024-6 ICSS2024-6
In order to provide practical education on IT technologies, the Ministry of Education, Culture, Sports, Science and Tech... [more] IA2024-6 ICSS2024-6
p.35
SAT, MICT, WBS, RCC
(Joint) [detail]
2024-05-17
11:15
Miyazaki KITEN Convention hall (Miyazaki)
(Primary: On-site, Secondary: Online)
[Invited Lecture] The Overview of SparkLink Technology and its Enabled Vision of Smart City
Wang Junyi, Yang Weijia, Ken Kamiryu, Yasuhiro Kondo (AZAPA) WBS2024-12 RCC2024-12
Bluetooth and Wi-Fi are the Near Field Communication technologies most commonly used by consumers today. However, there ... [more] WBS2024-12 RCC2024-12
pp.56-59
ISEC 2024-05-15
13:25
Tokyo Kikai-Shinko-Kaikan Bldg. Detection of Adversarial Example Attacks in Deep Learning Focusing on Data Manifolds and Inner Product Signs in Classifiers
Hiroki Hisashige, Hajime Tasaki, Mao Fujita, Jinhui Chao (Chuo Univ.) ISEC2024-2
Adversarial example attacks against Deep Learning are known to lead misclassification by adding invisible perturbations ... [more] ISEC2024-2
pp.7-12
HWS 2024-04-19
14:10
Tokyo
(Primary: On-site, Secondary: Online)
[Memorial Lecture] Hardware security and trust -- The nice relationship between digital trust and hardware security --
Yasushi Matsumoto (JNSA) HWS2024-1
Describes digital trusts, a system that plays an important role in trust formation in the digital society [more] HWS2024-1
pp.1-2
ICD 2024-04-11
10:45
Kanagawa
(Primary: On-site, Secondary: Online)
[Invited Lecture] An SPN Strong PUF with SRAM-based Entropy Source Featuring Both 100-Bit Output Space and Modeling Attack Resilience
Kunyang Liu (Kyoto Univ.), Yichen Tang (Lenovo), Shufan Xu, Kiichi Niitsu (Kyoto Univ.), Hirofumi Shinohara (Waseda Univ.) ICD2024-2
Strong physically unclonable function (Strong PUF) is a hardware-security circuit that generates response outputs corres... [more] ICD2024-2
p.7
CCS 2024-03-27
16:50
Hokkaido RUSUTSU RESORT JPEG Compression Quality Setting Considering Image Quality and Information Loss for Correlated Steganography
Mariiko Aikawa, Sumiko Miyata (SIT), Kaito Hosono, Hirotsugu Kinoshita (KU) CCS2023-50
As more and more confidential information, including personal information, is transmitted and received over the Internet... [more] CCS2023-50
pp.64-69
ICM 2024-03-22
09:10
Okinawa Okinawa Prefectural Museum and Art Museum
(Primary: On-site, Secondary: Online)
Proposal of an implication relationship estimation method for information security related regulatory documents
Kouki Nakanishi, Tkakani ikuko, Sakamoto Masanobu, Ohishi Haruo (NTT) ICM2023-51
In recent years, internal controls regarding information security have become increasingly important from the perspectiv... [more] ICM2023-51
pp.35-40
ICSS, IPSJ-SPT 2024-03-21
14:55
Okinawa OIST
(Primary: On-site, Secondary: Online)
ICSS2023-75 With the proliferation of IoT devices, there has been an increase in security incidents targeting IoT devices. To active... [more] ICSS2023-75
pp.43-50
ICSS, IPSJ-SPT 2024-03-22
08:30
Okinawa OIST
(Primary: On-site, Secondary: Online)
Proposal of Moving Target Defense Approach on Reliability in Web Services
Mamoru Saita (Keio Univ.), Shunsuke Hashimoto (Univ. of Hyogo), Atsuo Inomata (Osaka Univ.), Hiroyuki Inoue (Kyoto Sangyo Univ.) ICSS2023-82
Although modern Web services are built on a high level of security and reliability, the static properties of networks re... [more] ICSS2023-82
pp.93-99
ICSS, IPSJ-SPT 2024-03-22
12:10
Okinawa OIST
(Primary: On-site, Secondary: Online)
Study of the Label-Flipping Poisoning Attack on Machine-Learning Based Malicious URL Query Detection.
Akira Matsunami (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2023-90
In recent years, there have been a large increase of cyber attacks with increasing use of web applications. A method to... [more] ICSS2023-90
pp.153-159
 Results 1 - 20 of 1233  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan