IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 544  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICD 2024-04-11
10:45
Kanagawa
(Primary: On-site, Secondary: Online)
[Invited Lecture] An SPN Strong PUF with SRAM-based Entropy Source Featuring Both 100-Bit Output Space and Modeling Attack Resilience
Kunyang Liu (Kyoto Univ.), Yichen Tang (Lenovo), Shufan Xu, Kiichi Niitsu (Kyoto Univ.), Hirofumi Shinohara (Waseda Univ.)
(To be available after the conference date) [more]
CCS 2024-03-27
16:50
Hokkaido RUSUTSU RESORT JPEG Compression Quality Setting Considering Image Quality and Information Loss for Correlated Steganography
Mariiko Aikawa, Sumiko Miyata (SIT), Kaito Hosono, Hirotsugu Kinoshita (KU) CCS2023-50
As more and more confidential information, including personal information, is transmitted and received over the Internet... [more] CCS2023-50
pp.64-69
ICM 2024-03-22
09:10
Okinawa Okinawa Prefectural Museum and Art Museum
(Primary: On-site, Secondary: Online)
Proposal of an implication relationship estimation method for information security related regulatory documents
Kouki Nakanishi, Tkakani ikuko, Sakamoto Masanobu, Ohishi Haruo (NTT) ICM2023-51
In recent years, internal controls regarding information security have become increasingly important from the perspectiv... [more] ICM2023-51
pp.35-40
ICSS, IPSJ-SPT 2024-03-21
14:55
Okinawa OIST
(Primary: On-site, Secondary: Online)
ICSS2023-75 With the proliferation of IoT devices, there has been an increase in security incidents targeting IoT devices. To active... [more] ICSS2023-75
pp.43-50
ICSS, IPSJ-SPT 2024-03-22
08:30
Okinawa OIST
(Primary: On-site, Secondary: Online)
Proposal of Moving Target Defense Approach on Reliability in Web Services
Mamoru Saita (Keio Univ.), Shunsuke Hashimoto (Univ. of Hyogo), Atsuo Inomata (Osaka Univ.), Hiroyuki Inoue (Kyoto Sangyo Univ.) ICSS2023-82
Although modern Web services are built on a high level of security and reliability, the static properties of networks re... [more] ICSS2023-82
pp.93-99
RCC, ISEC, IT, WBS 2024-03-13
- 2024-03-14
Osaka Osaka Univ. (Suita Campus) Secrity Oriented Design of Polar-Coded OFDM on Selective Fading Channels
Yuki Kuraya, Hideki Ochiai (YNU) IT2023-124 ISEC2023-123 WBS2023-112 RCC2023-106
We introduce a physical layer security scheme based on a polar-coded OFDM system in wireless communication. Our approach... [more] IT2023-124 ISEC2023-123 WBS2023-112 RCC2023-106
pp.306-311
SS 2024-03-09
11:25
Okinawa
(Primary: On-site, Secondary: Online)
Developing Conversational Agents Using GPT-4 for Application in Information Security Education
Atsuya Tsuda, Kazutaka Matsuzaki (Chuo Univ.) SS2023-80
In this paper, we report on the development of an interactive agent using a large language model, aimed at being introdu... [more] SS2023-80
pp.186-189
PRMU, IBISML, IPSJ-CVIM 2024-03-04
09:36
Hiroshima Hiroshima Univ. Higashi-Hiroshima campus
(Primary: On-site, Secondary: Online)
Disabling Adversarial Examples through Color Information Processing
Ryo Soeda, Masato Uchida (Waseda Univ.) PRMU2023-67
Image classification using neural networks is expected to have a wide range of applications, including automated driving... [more] PRMU2023-67
pp.94-99
ET 2024-03-03
12:40
Miyazaki Miyazaki University Development of a Wireless LAN Visualization System with a Focus on Information Security for Secondary Education
Kazuaki Yoshihara (Kindai Univ.) ET2023-68
In junior high technology classes and high school information classes, learning about information security is a compulso... [more] ET2023-68
pp.100-103
SIP, IT, RCS 2024-01-18
17:35
Miyagi
(Primary: On-site, Secondary: Online)
A Study on Decoding Performance Improvement by Using Non-binary LDPC Codes in Outer Channel Coding-Concatenated Chaos Coded Modulation
Ryo Tozawa, Seiya Yamashita, Eiji Okamoto (NITech), Horiike Naoto, Tetsuya Yamamoto (Panasonic) IT2023-55 SIP2023-88 RCS2023-230
With the rapid expansion of the Internet of Things (IoT) in recent years, the need to improve the confidentiality of wir... [more] IT2023-55 SIP2023-88 RCS2023-230
pp.133-138
ICM, NS, CQ, NV
(Joint)
2023-11-21
13:15
Ehime Ehime Prefecture Gender Equality Center
(Primary: On-site, Secondary: Online)
[Encouragement Talk] Security Evaluation of Low-latency Cipher based on Improved Simon against Deep Learning Analysis using Profiled Power Consumption
Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NS2023-114
Society 5.0 aims to solve problems in social systems through the intercommunication of small devices. On the other hand,... [more] NS2023-114
pp.20-25
ICM, NS, CQ, NV
(Joint)
2023-11-22
09:50
Ehime Ehime Prefecture Gender Equality Center
(Primary: On-site, Secondary: Online)
A survey on suitable hook points for outbound packet monitoring using eBPF
Masaya Okabe, Hiroshi Tsunoda (Tohtech) ICM2023-27
The use of VPNs and similar technologies has made it difficult to define network boundaries, and traditional boundary se... [more] ICM2023-27
pp.26-31
ICSS 2023-11-16
13:00
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Implementation of Dynamic Secure Network for Traffic and Logistics with Supermassive and Supervarious Mobilities, and A Study on Its Large-scale Demonstration
Masaru Takeuchi, Toshiaki Saisho, Junji Shikata (JDC), Toshio Sato, Kazue Sako, Jiro Katto, Takuro Sato (WU) ICSS2023-51
In the era of Beyond 5G/6G, effective use of space-time is expected by cooperative operation of a large number and varie... [more] ICSS2023-51
pp.1-6
ICSS 2023-11-16
15:20
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Attack Verification and Evaluation of Incremental Fault Analysis against AES Encryption Processing Device
Miran Tamagawa, Yuichi Futa (TUT), Takehiko Mieno (AVASYS), Hiroyuki Okazaki (Shinshu University) ICSS2023-56
In recent years,there has been a growing concern about the impact of fault analysis attack,which use hardware failures a... [more] ICSS2023-56
pp.35-41
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2023-11-16
13:20
Kumamoto Civic Auditorium Sears Home Yume Hall
(Primary: On-site, Secondary: Online)
Tamper Resistance Evaluation on FPGA for Low-Latency Cipher Sonic
Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52
Industry 5.0 promotes smart factories for system optimization by utilizing IoT and AI in the industrial field. The smart... [more] VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52
pp.101-105
LOIS, SITE, ISEC 2023-11-09
10:50
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
[Invited Talk] Security Technologies to Improve Content-Distribution and Broadcasting Services
Kazuto Ogawa (NICT) ISEC2023-54 SITE2023-48 LOIS2023-12
Nowadays, technologies for information security have become essential in the world cyber-space.
PC users know their val... [more]
ISEC2023-54 SITE2023-48 LOIS2023-12
p.1
LOIS, SITE, ISEC 2023-11-10
10:45
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
NTP Tunneling Threat Model Verification and Countermeasure
Shinjisangeru Sugasawa, Hisayoshi Kunimune, Shigeaki Tanimoto (CIT) ISEC2023-64 SITE2023-58 LOIS2023-22
Fraudulent covert communication methods are techniques used by attackers to avoid detection of malicious communication b... [more] ISEC2023-64 SITE2023-58 LOIS2023-22
pp.66-71
SR 2023-11-10
11:10
Miyagi
(Primary: On-site, Secondary: Online)
[Short Paper] Model Sharing and Learning for Visually Secure Deep Joint Source Channel Coding
Yuyang Fu, Katsuya Suto (UEC) SR2023-59
Research and development of Deep Joint Source Channel Coding (DeepJSCC) technology, which is a data-driven design of inf... [more] SR2023-59
pp.64-66
IN, ICTSSL, IEE-SMF 2023-10-20
14:40
Fukuoka Fukuoka University A Study on Applying Digital Twin-Assisted Security Platform for Cyber-Physical Systems to Supply Chain
Keizo Sugiyama (KDDI Research) ICTSSL2023-32
The convergence of cyberspace and physical space is becoming more significant towards Beyond 5G. The impact of attacks, ... [more] ICTSSL2023-32
pp.42-46
BioX 2023-10-12
14:45
Okinawa Nobumoto Ohama Memorial Hall A Study on Federated Learning System for Highly Accurate Biometric Authentication
Yusei Suzuki, Yosuke Kaga (Hitachi) BioX2023-58
With the development of machine learning on large-scale datasets, the accuracy of biometric authentication has significa... [more] BioX2023-58
pp.2-7
 Results 1 - 20 of 544  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan