Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICM |
2024-03-21 09:40 |
Okinawa |
Okinawa Prefectural Museum and Art Museum (Primary: On-site, Secondary: Online) |
Proposal of a Method for Calculating Similarity of Operation Logs Focusing on Co-occurrence among Operations Ryo Uchida, Misa Fukai, Ikuko Takagi, Masanobu Sakamoto, Shinji Ogawa, Haruo Oishi, Kimio Tsuchikawa (NTT) ICM2023-46 |
In recent years, the automation of business operations using RPA tools has been spreading. Although business improvement... [more] |
ICM2023-46 pp.7-12 |
ICSS, IPSJ-SPT |
2024-03-21 14:55 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
ICSS2023-75 |
With the proliferation of IoT devices, there has been an increase in security incidents targeting IoT devices. To active... [more] |
ICSS2023-75 pp.43-50 |
RCC, ISEC, IT, WBS |
2024-03-14 15:05 |
Osaka |
Osaka Univ. (Suita Campus) |
Phishing Detection Method Based on Content-Similarity in DNS Graph WenBo Zhou, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110 |
Phishing attacks, known as a prevalent form of social engineering attacks, have become one of the most significant cyber... [more] |
IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110 pp.332-336 |
IE, MVE, CQ, IMQ (Joint) [detail] |
2024-03-15 15:50 |
Okinawa |
Okinawa Sangyo Shien Center (Primary: On-site, Secondary: Online) |
Towarods Similarity-Preserving Post-Training Quantization for Lightweight Maize Disease Detection Carlos Victorino Padeiro, Tse-Wei Chen, Takahiro Komamizu, Ichiro IDE (Nagoya University) IMQ2023-90 IE2023-145 MVE2023-119 |
The traditional crop disease diagnosis process, relying on expert visual observation, is costly, time-consuming, and pro... [more] |
IMQ2023-90 IE2023-145 MVE2023-119 pp.414-419 |
SIP, SP, EA, IPSJ-SLP [detail] |
2024-02-29 15:10 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Byzantine attack detection via similarity of local updates in federated learning Kenta Ohno, Masao Yamagishi (Hosei Univ.) EA2023-86 SIP2023-133 SP2023-68 |
We propose a method to detect Byzantine attacks in federated learning, as well as a method for identifying clients repea... [more] |
EA2023-86 SIP2023-133 SP2023-68 pp.150-155 |
ITS, IE, ITE-MMS, ITE-ME, ITE-AIT [detail] |
2024-02-19 13:30 |
Hokkaido |
Hokkaido Univ. |
Characteristic analysis to improve the performance of graph-based methods in approximate nearest neighbor search Tomohiro Kanaumi, Yusuke Matsui (Univ. Tokyo) ITS2023-52 IE2023-41 |
Approximate nearest neighbor search (ANNS) is the problem of finding the nearest vector to a given query vector in a dat... [more] |
ITS2023-52 IE2023-41 pp.34-39 |
LOIS, ICM |
2024-01-26 13:10 |
Nagasaki |
Nagasaki Prefectural Art Museum (Primary: On-site, Secondary: Online) |
Study of the effectiveness of living area in personal authentication using GPS data Daisuke Toyama, Sunao Hara, Masanobu Abe (Okayama Univ.) ICM2023-38 LOIS2023-42 |
In this report, we investigate the effectiveness of the living area system by comparing the accuracy of the authenticati... [more] |
ICM2023-38 LOIS2023-42 pp.57-62 |
MSS, CAS, IPSJ-AL [detail] |
2023-11-17 14:05 |
Okinawa |
|
Facilitating Knowledge Sharing Workshop by Natural Language Processing
-- Application and Evaluation of a Smart Voice Message System in Maintenance Operations -- Riku Ogawa, Moritaro Inoue, Naoshi Uchihira (JAIST) CAS2023-78 MSS2023-48 |
In maintenance and inspection work, the utilization and sharing of tacit knowledge held by workers in the field is impor... [more] |
CAS2023-78 MSS2023-48 pp.95-100 |
LOIS, SITE, ISEC |
2023-11-09 13:55 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
ISEC2023-58 SITE2023-52 LOIS2023-16 |
With the spread of work style reforms such as remote work, communication about information security risks tends to be in... [more] |
ISEC2023-58 SITE2023-52 LOIS2023-16 pp.26-32 |
CS |
2023-11-10 09:15 |
Shizuoka |
Plaza Verde |
[Invited Lecture]
Similarity based Contents Caching and Contents Discovery
-- Toward Further Development of Information-Centric Networking -- Ryo Nakamura (Fukuoka Univ.) CS2023-73 |
In this talk, we review advancement in the research area of ICN (Information-Centric Networking) from the point of view ... [more] |
CS2023-73 pp.37-41 |
NLP, MSS |
2023-03-17 11:40 |
Nagasaki |
(Primary: On-site, Secondary: Online) |
On the Existence of Deterministic Supervisors for Bisimilarity Control of Nondeterministic Discrete Event Systems Shigemasa Takai (Osaka Univ.) MSS2022-99 NLP2022-144 |
In this paper, we consider the bisimilarity control problem
for the system and the specification modeled by nondetermin... [more] |
MSS2022-99 NLP2022-144 pp.174-177 |
IA, SITE, IPSJ-IOT [detail] |
2023-03-17 14:10 |
Gunma |
Maebashi Institute of Technology (Primary: On-site, Secondary: Online) |
A Study on Characteristic Analysis of Similarity Caching on Multi-Stage Cache Network Ryo Nakamura (Fukuoka Univ.), Noriaki Kamiyama (Ritsumeikan Univ.) SITE2022-65 IA2022-88 |
(To be available after the conference date) [more] |
SITE2022-65 IA2022-88 pp.69-76 |
IMQ, IE, MVE, CQ (Joint) [detail] |
2023-03-15 09:45 |
Okinawa |
Okinawaken Seinenkaikan (Naha-shi) (Primary: On-site, Secondary: Online) |
A Preliminary Study on Random Walk based Similar-Contents Discovery Ryo Nakamura (Fukuoka Univ.) CQ2022-80 |
As we know, the contents discovery is one of fundamental research topics in the field of communication networks such as ... [more] |
CQ2022-80 pp.1-6 |
EMM |
2023-03-02 13:00 |
Nagasaki |
Fukue culture hall (Primary: On-site, Secondary: Online) |
[Poster Presentation]
A Video Data Hiding Scheme Utilizing Characteristics of Consecutive Frames Hikaru Ando, Tetsuya Kojima, Raito Matsuzaki, Akira Tanaka (NIT, Tokyo College) EMM2022-72 |
A video data hiding scheme has been proposed by repeating the same frames to embed secret data according to the observat... [more] |
EMM2022-72 pp.30-33 |
IN, NS (Joint) |
2023-03-03 09:50 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Cache Replacement Based on Similarity in Mobile Crowd Photographing Qianyi Deng, Noriaki Kamiyama (Ritsumeikan Univ.) IN2022-104 |
In recent years, with the development of smartphones and the spread of social network services (SNS) such as Twitter and... [more] |
IN2022-104 pp.229-234 |
HIP, ITE-HI, VRPSY [detail] |
2023-02-22 15:35 |
Toyama |
(Primary: On-site, Secondary: Online) |
The relationship between the beauty of fractals and processing fluency
-- Evidence from same-different response time and masking tasks -- Hayato Goto, Yousuke Kawachi (Tohoku Univ.) HIP2022-83 |
Recent studies have focused on self-similarity (fractal property) in images and processing fluency of images as possible... [more] |
HIP2022-83 pp.37-42 |
HCS |
2023-01-22 12:35 |
Kyoto |
Kyoto Institute of Technology (Primary: On-site, Secondary: Online) |
Comparing Neural Network-Driven Algorithms that Determine Interest Similarity for People-to-people Recommendations Ana Quelhas (KIT), Natsuki Oka (MSU), Kazuaki Tanaka (KIT) HCS2022-67 |
With evolving globalization and interpersonal relationships being forged over digital mediums more and more often, the n... [more] |
HCS2022-67 pp.71-76 |
LOIS, ICM |
2023-01-19 15:00 |
Fukuoka |
Kitakyushu International Conference Center (Primary: On-site, Secondary: Online) |
Study of similarity calculation method personal authentication method using changeable granularity living areas based on GPS data Daisuke Toyama, Sunao Hara, Masanobu Abe (Okayama Univ.) ICM2022-35 LOIS2022-35 |
In this study, we study personal authentication using the living areas based on GPS data.The latitude and longitude of t... [more] |
ICM2022-35 LOIS2022-35 pp.25-30 |
QIT (2nd) |
2022-12-08 10:15 |
Kanagawa |
Keio Univ. (Primary: On-site, Secondary: Online) |
Bounds for similarity of quantum dynamics Takuya Hatomura (NTT) |
We discuss similarity of two quantum dynamics. In particular, we consider inequalities for overlap of two quantum states... [more] |
|
QIT (2nd) |
2022-12-08 18:15 |
Kanagawa |
Keio Univ. (Primary: On-site, Secondary: Online) |
Quantum Fisher kernel for mitigating the vanishing similarity issue Yudai Suzuki, Hideaki Kawaguchi, Naoki Yamamoto (Keio Univ.) |
Quantum kernel method is a machine learning model exploiting quantum computers to calculate the quantum kernels (QKs) th... [more] |
|