IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 340  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SIP 2022-08-26
14:26
Okinawa Nobumoto Ohama Memorial Hall (Ishigaki Island)
(Primary: On-site, Secondary: Online)
Generation method of Adversarial Examples using XAI
Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) SIP2022-72
(To be available after the conference date) [more] SIP2022-72
pp.115-120
NS, SR, RCS, SeMI, RCC
(Joint)
2022-07-14
11:10
Ishikawa The Kanazawa Theatre + Online
(Primary: On-site, Secondary: Online)
Construction of IoT System Based on Zero Trust Networks
Yudai Sakurai, Eishin Nagaoka, Osamu Mizuno (Kogakuin Univ) NS2022-41
With increasing of IoT devices, the number of cyber-attacks targeting IoT systems is also increasing. Cyber-attacks can ... [more] NS2022-41
pp.71-76
CQ, CS
(Joint)
2022-05-12
14:20
Fukui Fukui (Fuku Pref.)
(Primary: On-site, Secondary: Online)
Distributed Network Intrusion Detection System Using Federated Learning
Yuya Tsuru, Tomoya Kawakami, Tatsuhito Hasegawa (Univ. of Fukui) CQ2022-5
A network-based intrusion detection system (NIDS) monitors a network and detects unauthorized traffic. Currently, a vari... [more] CQ2022-5
pp.20-25
VLD, HWS [detail] 2022-03-08
10:20
Online Online Evaluation of leakage-based LR-PUF's resistance to machine learning attacks
Tomoaki Oikawa, Kimiyoshi Usami (SIT) VLD2021-93 HWS2021-70
One of the LSI individual identification technologies is PUF (Physically Unclonable Function), which utilizes the physic... [more] VLD2021-93 HWS2021-70
pp.93-98
IA, SITE, IPSJ-IOT [detail] 2022-03-08
13:55
Kyoto Kyoto University, Yoshida Campus
(Primary: On-site, Secondary: Online)
An Examination about Management of IP Address Assignment with IPoE in a Campus Network
Kenji Ohira (Osaka Univ.) SITE2021-58 IA2021-71
When an information security incident occurs, an investigation is started using the IP address as a starting point, but ... [more] SITE2021-58 IA2021-71
pp.75-78
AI 2022-02-28
15:00
Miyazaki Youth Hostel Sunflower MIYAZAKI
(Primary: On-site, Secondary: Online)
Basic Study for Backdoor Attack based on Invisible Trigger
Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) AI2021-21
A backdoor attack is a threat to deep neural networks (DNN). In an attack on a DNN for the purpose of image classificati... [more] AI2021-21
pp.53-58
RCS, NS
(Joint)
2021-12-17
10:35
Nara Nara-ken Bunka Kaikan and Online
(Primary: On-site, Secondary: Online)
Proposal of Network Digital Replica
kyota hattori, tomohiro korikawa, chikako takasaki, hidenari oowada, masafumi shimizu, naoki takaya (NTT) NS2021-104
Future network infrastructures will need to provide network services safely and rapidly under complex conditions such as... [more] NS2021-104
pp.41-46
CQ, ICM, NS, NV
(Joint)
2021-11-26
11:15
Fukuoka JR Hakata Stn. Hakata EkiHigashi Rental Room
(Primary: On-site, Secondary: Online)
[Invited Talk] Security Technology for SDN-Based New Generation Network
Satoru Izumi (NIT, Sendai) NS2021-90 CQ2021-72 ICM2021-25
Internet of Things (IoT) society in which various devices such as laptop, smart phone, tablet, home appliances, vehicle,... [more] NS2021-90 CQ2021-72 ICM2021-25
p.36(NS), p.41(CQ), p.19(ICM)
RISING
(3rd)
2021-11-16
09:30
Tokyo
(Primary: On-site, Secondary: Online)
On Attack Pattern Classification in IoT Networks for Network Intrusion Detection Systems
Jesse Atuhurra, Takanori Hara (NAIST), Yuanyu Zhang (Xidian Univ.), Shoji Kasahara (NAIST)
With the proliferation of IoT devices, IoT security problems arise. To protect heterogeneous connected devices in IoT ne... [more]
RISING
(3rd)
2021-11-16
11:30
Tokyo
(Primary: On-site, Secondary: Online)
Throughput Prediction by Radio Environment Correlation Recognition Using Crowd Sensing and Federated Learning
Satoshi Nakaniida, Takeo Fujii (UEC)
We propose an approach using federated learning for predicting Wi-Fi and LTE transmission control protocol (TCP) through... [more]
SR 2021-11-05
11:15
Online Online Throughput Prediction by Radio Environment Correlation Recognition Using Crowd Sensing and Federated Learning
Satoshi Nakaniida, Takeo Fujii (UEC) SR2021-53
We propose an approach using federated learning for predicting Wi-Fi and LTE transmission control protocol (TCP) through... [more] SR2021-53
pp.72-78
IA 2021-10-15
16:50
Online Online Malware Traffic Detection at Certain Time Using IP Flow Information
Seiya Komatsu, Yusei Katsura, Masatoshi Kakiuchi, Ismail Arai, Kazutoshi Fujikawa (NAIST) IA2021-27
The damage caused by the activities of malware such as botnets and ransomware has become a social problem. In order to d... [more] IA2021-27
pp.6-11
ICM 2021-07-15
16:40
Online Online [Special Talk] Report on IEEE International Conference on Network Softwarization (NetSoft) 2021
Kohei Shiomoto (TCU) ICM2021-14
International Conference on Network Softwarization (NetSoft) is a flagship conference aiming at addressing the “Softwari... [more] ICM2021-14
pp.22-27
SIP, CAS, VLD, MSS 2021-07-06
12:05
Online Online Sensor Scheduling-Based Detection of False Data Injection Attacks in Power System State Estimation
Sho Obata, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.) CAS2021-14 VLD2021-14 SIP2021-24 MSS2021-14
In state estimation of steady-state power networks, a cyber attack that cannot be detected from the residual (i.e., the ... [more] CAS2021-14 VLD2021-14 SIP2021-24 MSS2021-14
pp.70-74
IA, ICSS 2021-06-21
16:25
Online Online [Invited Talk] An Authentication Scheme for WLAN Physical Layer
Miyuki Hirose (KIT) IA2021-8 ICSS2021-8
Security has traditionally been implemented at the higher, logical layers of communication networks, rather than at the ... [more] IA2021-8 ICSS2021-8
p.43
WBS, IT, ISEC 2021-03-05
14:20
Online Online Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts
Nami Ashizawa, Naoto Yanai, Jason Paul Cruz (Osaka Univ.), Singo Okamura (NITNC) IT2020-156 ISEC2020-86 WBS2020-75
Ethereum smart contracts are programs that run on the Ethereum blockchain, and many smart contract vulnerabilities have ... [more] IT2020-156 ISEC2020-86 WBS2020-75
pp.273-280
IN, NS
(Joint)
2021-03-05
10:10
Online Online A Convolutional Autoencoder Based Method for Cyber Intrusion Detection
Xinyi She, Yuji Sekiya (Tokyo Univ.) IN2020-77
Cyber intrusion detection systems are increasingly crucial due to the monumental growth of internet applications. Howeve... [more] IN2020-77
pp.138-143
IN, NS
(Joint)
2021-03-05
13:40
Online Online Computational Complexity Reduction by Dynamic Clustering in Network Scan Scheduling
Takuya Kurihara, Kazuto Yano, Yoshinori Suzuki (ATR) NS2020-157
In recent years, some users have required network scans for security or business.
On the other hand, since the number o... [more]
NS2020-157
pp.203-207
ICSS, IPSJ-SPT 2021-03-02
16:25
Online Online Security Evaluation of PUF utilizing Unrolled Architecture
Yusuke Nozaki, Kensaku Asahi, Masaya Yoshikawa (Meijo Univ.) ICSS2020-53
To improve the security of LSI circuit, physically unclonable functions (PUF) have been attracted attention. The glitch ... [more] ICSS2020-53
pp.160-165
MSS, SS 2021-01-27
13:25
Online Online Distributed State Estimation for Linear Singular Systems and Its Application to Sensor Networks
Kei Isono, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.) MSS2020-37 SS2020-22
The sensor attack detection problem is one of the important problems in cybersecurity and control theory. An attack to a... [more] MSS2020-37 SS2020-22
pp.49-53
 Results 1 - 20 of 340  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan