IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 81  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SIP, SP, EA, IPSJ-SLP [detail] 2024-02-29
09:30
Okinawa
(Primary: On-site, Secondary: Online)
Vocal tract length perturbation-based pseudo-speaker augmentation for automatic speaker verification
Tomoka Wakamatsu, Sayaka Shiota, Hitoshi Kiya (Tokyo Metropolitan Univ.) EA2023-61 SIP2023-108 SP2023-43
In recent years, deep neural network (DNN)-based automatic speaker verification (ASV) systems have become mainstream. Da... [more] EA2023-61 SIP2023-108 SP2023-43
pp.1-6
SIP, SP, EA, IPSJ-SLP [detail] 2024-02-29
09:50
Okinawa
(Primary: On-site, Secondary: Online)
Pseudo-speaker augmentation based on vocal tract length perturbation considering speaker variability for speaker verification
Fumika Ono, Tomoka Wakamatsu, Sayaka Shiota (TMU) EA2023-62 SIP2023-109 SP2023-44
In order to construct a reliable speaker verification system based on speaker embeddings, it is necessary to train the s... [more] EA2023-62 SIP2023-109 SP2023-44
pp.7-12
VLD, HWS, ICD 2024-03-02
12:05
Okinawa
(Primary: On-site, Secondary: Online)
A Study on formal verification of GF(2^m) arithmetic circuits including states
Kazuho Sakoda (SCU/Kobe Univ.), Yasuyoshi Uemura (SCU), Naofumi Homma (Tohoku Univ.) VLD2023-140 HWS2023-100 ICD2023-129
This paper describes a formal verification method for arithmetic circuits based on computer algebra. Conventional method... [more] VLD2023-140 HWS2023-100 ICD2023-129
pp.215-220
ICSS 2023-11-16
14:55
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
A Study on Self Destructive Tamper Resistant Software utilizing Return-Oriented Programming (Part 3)
Kazuomi Oishi (SIST) ICSS2023-55
Self destructive tamper resistant software (SDTRS) is a tamper resistance technology that can protect a program by itsel... [more] ICSS2023-55
pp.30-34
HWS, VLD 2023-03-02
15:20
Okinawa
(Primary: On-site, Secondary: Online)
Secure Cache System against On-Chip Threats
Keisuke Kamahori, Shinya Takamaeda (UTokyo) VLD2022-95 HWS2022-66
In this paper, we propose a new threat model for secure processor design that considers on-chip threats.
Also, we desi... [more]
VLD2022-95 HWS2022-66
pp.113-118
SP, IPSJ-SLP, EA, SIP [detail] 2023-03-01
15:50
Okinawa
(Primary: On-site, Secondary: Online)
The linguistic influence on speaker verification based on Self-Supervised Learning
Tomoka Wakamatsu (Tokyo Metropolitan Univ.), Atsushi Ando (NTT), Sayaka Shiota (Tokyo Metropolitan Univ.), Ryo Masumura (NTT), Hitoshi Kiya (Tokyo Metropolitan Univ.) EA2022-118 SIP2022-162 SP2022-82
In recent years, statistical models utilizing Self-Supervised Learning (SSL) have been employed in various fields
It ha... [more]
EA2022-118 SIP2022-162 SP2022-82
pp.247-252
QIT
(2nd)
2022-05-31
11:50
Online Online Passive verification protocol for thermal graph states
Kazuki Akimoto, Shunji Tsuchiya (Chuo Univ.), Ryosuke Yoshii (Sanyo-Onoda City Univ.), Yuki Takeuchi (NTT)
Graph states are entangled resource states for universal measurement-based quantum computation.
Although matter qubits ... [more]

SS 2022-03-07
14:30
Online Online Learning Assumptions for Compositional Verification of Timed Systems with Tree Queries
Kotaro Niimi, Shoji Yuen (Nagoya Univ) SS2021-49
This paper presents an automatic assumption-learning for compositional verification of timed systems. We focus on Assume... [more] SS2021-49
pp.43-48
QIT
(2nd)
2021-12-01
14:00
Online Online Divide-and-conquer verification method for noisy intermediate-scale quantum computation
Yuki Takeuchi, Yasuhiro Takahashi (NTT), Tomoyuki Morimae (Kyoto Univ.), Seiichiro Tani (NTT)
Several noisy intermediate-scale quantum computations can be regarded as logarithmic-depth quantum circuits on a sparse ... [more]
IE, SIP, BioX, ITE-IST, ITE-ME [detail] 2021-06-04
10:30
Online Online Handwriting Verification Combining Minutiae Matching and DP Matching
Nobuyuki Nishiuchi, Yuichi Yoshida (TMU), Piotr Szymkowski, Khalid Saeed (BUT) SIP2021-8 BioX2021-8 IE2021-8
In recent years, the use of pen tablets to sign has been increasing, and it is thought that the need for handwriting ver... [more] SIP2021-8 BioX2021-8 IE2021-8
pp.36-40
NS, ICM, CQ, NV
(Joint)
2020-11-27
11:45
Online Online A Proposal of Framework for Authentication Systems and Verification Method
Motoshi Horii, Toshihiro Shimizu (Fujitsu Lab.), Satoshi Imai (Fujitsu) CQ2020-58
With the digitization of various procedures, various security incidents have been occurring frequently. To prevent the o... [more] CQ2020-58
pp.62-65
SP, EA, SIP 2020-03-02
13:00
Okinawa Okinawa Industry Support Center
(Cancelled but technical report was issued)
Vulnerability investigation of speaker verification against black-box adversarial attacks
Hiroto Kai, Sayaka Shiota, Hitoshi Kiya (TMU) EA2019-106 SIP2019-108 SP2019-55
Recently,vulnerability against adversarial attacks is being feared for machine learning-based systems.Adversarial attack... [more] EA2019-106 SIP2019-108 SP2019-55
pp.29-33
KBSE, SC 2019-11-08
15:40
Nagano Shinshu University A Case-study for Developpment and Verification of an Embedded System
Kozo Okano, Shinpei Ogata, Miki Natsume (Shinshu Univ.) KBSE2019-30 SC2019-27
Through a development of an embedded system and design verification, we report on the issues and workload when novice en... [more] KBSE2019-30 SC2019-27
pp.41-46
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
13:10
Kochi Kochi University of Technology A Formal Approach to Verifying Trojan-freeness of Cryptographic Circuits Based on Galois-Field Arithmetic
Akira Ito, Rei Ueno, Naofumi Homma (Tohoku Univ.) ISEC2019-26 SITE2019-20 BioX2019-18 HWS2019-21 ICSS2019-24 EMM2019-29
This paper proposes a formal method for verifying whether Hardware Trojan (HT) exists or not (i.e., HT-freeness) in cryp... [more] ISEC2019-26 SITE2019-20 BioX2019-18 HWS2019-21 ICSS2019-24 EMM2019-29
pp.133-138
ASN, MoNA, IPSJ-MBL, IPSJ-UBI [detail] 2019-03-04
11:15
Tokyo The University of Tokyo, Komaba Campus Abstraction of Emulation for Sensor IoT Devices
Futoshi Hirose (JAIST), Tsubasa Yumura (NICT), Yoichi Shinoda (JAIST) ASN2018-104
IoT (Internet of Things) makes it easy to measure and collect a wide range of environmental information. IoT devices eq... [more] ASN2018-104
pp.49-54
SS 2019-03-04
17:10
Okinawa   Formal STAMP Modelling toward Safety Verification of Hybrid Systems
Mitsuaki Tsuji, Toshinori Takai (NAIST), Masafumi Katahira, Naoki Ishihama (JAXA), Kazuki Kakimoto, Hajimu Iida (NAIST) SS2018-67
Safety-critical systems, for example, autonomous vehicles and space systems, are required to be safe and reliable. Recen... [more] SS2018-67
pp.91-96
SIP, EA, SP, MI
(Joint) [detail]
2018-03-19
13:00
Okinawa   [Poster Presentation] Speaker verification based on non-linear bandwidth extension considering aliasing artifacts for super-wideband applications
Haruna Miyamoto, Sayaka Shiota, Hitoshi Kiya (Tokyo Metropolitan Univ.) EA2017-110 SIP2017-119 SP2017-93
This paper has two aims that are to propose a novel bandwidth extension (BWE) method considering aliasing artifacts, and... [more] EA2017-110 SIP2017-119 SP2017-93
pp.51-55
SIP, EA, SP, MI
(Joint) [detail]
2018-03-19
13:00
Okinawa   [Poster Presentation] Text-dependent voice liveness detection based on pop-noise detector considering speaker-dependent phoneme information for speaker verification
Shihono Mochizuki, Sayaka Shiota, Hitoshi Kiya (Tokyo Metropolitan Univ.) EA2017-111 SIP2017-120 SP2017-94
This paper proposes a pop-noise (PN) detection method considering speaker-dependent phoneme information for text-depende... [more] EA2017-111 SIP2017-120 SP2017-94
pp.57-62
SS, MSS 2018-01-18
15:05
Hiroshima   Deadline Assignment Optimization Method Using Extended Time Petri Nets for Real-Time Multitask Distributed Systems Sharing Processors with EDF Scheduling
Reon Matsuoka, Akio Nakata (Hiroshima City Univ.) MSS2017-56 SS2017-43
In the development of embedded software which requires high reliability satisfaction of hard requirements for both compu... [more] MSS2017-56 SS2017-43
pp.53-58
ISEC, COMP 2017-12-21
16:40
Kochi Eikokuji Campus, Kochi University of Technology Implementation Difficulty of Dynamic Self-Modifying Based Self Destructive Tamper Response
Kazuomi Oishi (SIST) ISEC2017-82 COMP2017-36
Tamper resistant software, which has sufficient resistance against analysis and attack, is a necessary and important tec... [more] ISEC2017-82 COMP2017-36
pp.67-74
 Results 1 - 20 of 81  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan