Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SIP, SP, EA, IPSJ-SLP [detail] |
2024-02-29 09:30 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Vocal tract length perturbation-based pseudo-speaker augmentation for automatic speaker verification Tomoka Wakamatsu, Sayaka Shiota, Hitoshi Kiya (Tokyo Metropolitan Univ.) EA2023-61 SIP2023-108 SP2023-43 |
In recent years, deep neural network (DNN)-based automatic speaker verification (ASV) systems have become mainstream. Da... [more] |
EA2023-61 SIP2023-108 SP2023-43 pp.1-6 |
SIP, SP, EA, IPSJ-SLP [detail] |
2024-02-29 09:50 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Pseudo-speaker augmentation based on vocal tract length perturbation considering speaker variability for speaker verification Fumika Ono, Tomoka Wakamatsu, Sayaka Shiota (TMU) EA2023-62 SIP2023-109 SP2023-44 |
In order to construct a reliable speaker verification system based on speaker embeddings, it is necessary to train the s... [more] |
EA2023-62 SIP2023-109 SP2023-44 pp.7-12 |
VLD, HWS, ICD |
2024-03-02 12:05 |
Okinawa |
(Primary: On-site, Secondary: Online) |
A Study on formal verification of GF(2^m) arithmetic circuits including states Kazuho Sakoda (SCU/Kobe Univ.), Yasuyoshi Uemura (SCU), Naofumi Homma (Tohoku Univ.) VLD2023-140 HWS2023-100 ICD2023-129 |
This paper describes a formal verification method for arithmetic circuits based on computer algebra. Conventional method... [more] |
VLD2023-140 HWS2023-100 ICD2023-129 pp.215-220 |
ICSS |
2023-11-16 14:55 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
A Study on Self Destructive Tamper Resistant Software utilizing Return-Oriented Programming (Part 3) Kazuomi Oishi (SIST) ICSS2023-55 |
Self destructive tamper resistant software (SDTRS) is a tamper resistance technology that can protect a program by itsel... [more] |
ICSS2023-55 pp.30-34 |
HWS, VLD |
2023-03-02 15:20 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Secure Cache System against On-Chip Threats Keisuke Kamahori, Shinya Takamaeda (UTokyo) VLD2022-95 HWS2022-66 |
In this paper, we propose a new threat model for secure processor design that considers on-chip threats.
Also, we desi... [more] |
VLD2022-95 HWS2022-66 pp.113-118 |
SP, IPSJ-SLP, EA, SIP [detail] |
2023-03-01 15:50 |
Okinawa |
(Primary: On-site, Secondary: Online) |
The linguistic influence on speaker verification based on Self-Supervised Learning Tomoka Wakamatsu (Tokyo Metropolitan Univ.), Atsushi Ando (NTT), Sayaka Shiota (Tokyo Metropolitan Univ.), Ryo Masumura (NTT), Hitoshi Kiya (Tokyo Metropolitan Univ.) EA2022-118 SIP2022-162 SP2022-82 |
In recent years, statistical models utilizing Self-Supervised Learning (SSL) have been employed in various fields
It ha... [more] |
EA2022-118 SIP2022-162 SP2022-82 pp.247-252 |
QIT (2nd) |
2022-05-31 11:50 |
Online |
Online |
Passive verification protocol for thermal graph states Kazuki Akimoto, Shunji Tsuchiya (Chuo Univ.), Ryosuke Yoshii (Sanyo-Onoda City Univ.), Yuki Takeuchi (NTT) |
Graph states are entangled resource states for universal measurement-based quantum computation.
Although matter qubits ... [more] |
|
SS |
2022-03-07 14:30 |
Online |
Online |
Learning Assumptions for Compositional Verification of Timed Systems with Tree Queries Kotaro Niimi, Shoji Yuen (Nagoya Univ) SS2021-49 |
This paper presents an automatic assumption-learning for compositional verification of timed systems. We focus on Assume... [more] |
SS2021-49 pp.43-48 |
QIT (2nd) |
2021-12-01 14:00 |
Online |
Online |
Divide-and-conquer verification method for noisy intermediate-scale quantum computation Yuki Takeuchi, Yasuhiro Takahashi (NTT), Tomoyuki Morimae (Kyoto Univ.), Seiichiro Tani (NTT) |
Several noisy intermediate-scale quantum computations can be regarded as logarithmic-depth quantum circuits on a sparse ... [more] |
|
IE, SIP, BioX, ITE-IST, ITE-ME [detail] |
2021-06-04 10:30 |
Online |
Online |
Handwriting Verification Combining Minutiae Matching and DP Matching Nobuyuki Nishiuchi, Yuichi Yoshida (TMU), Piotr Szymkowski, Khalid Saeed (BUT) SIP2021-8 BioX2021-8 IE2021-8 |
In recent years, the use of pen tablets to sign has been increasing, and it is thought that the need for handwriting ver... [more] |
SIP2021-8 BioX2021-8 IE2021-8 pp.36-40 |
NS, ICM, CQ, NV (Joint) |
2020-11-27 11:45 |
Online |
Online |
A Proposal of Framework for Authentication Systems and Verification Method Motoshi Horii, Toshihiro Shimizu (Fujitsu Lab.), Satoshi Imai (Fujitsu) CQ2020-58 |
With the digitization of various procedures, various security incidents have been occurring frequently. To prevent the o... [more] |
CQ2020-58 pp.62-65 |
SP, EA, SIP |
2020-03-02 13:00 |
Okinawa |
Okinawa Industry Support Center (Cancelled but technical report was issued) |
Vulnerability investigation of speaker verification against black-box adversarial attacks Hiroto Kai, Sayaka Shiota, Hitoshi Kiya (TMU) EA2019-106 SIP2019-108 SP2019-55 |
Recently,vulnerability against adversarial attacks is being feared for machine learning-based systems.Adversarial attack... [more] |
EA2019-106 SIP2019-108 SP2019-55 pp.29-33 |
KBSE, SC |
2019-11-08 15:40 |
Nagano |
Shinshu University |
A Case-study for Developpment and Verification of an Embedded System Kozo Okano, Shinpei Ogata, Miki Natsume (Shinshu Univ.) KBSE2019-30 SC2019-27 |
Through a development of an embedded system and design verification, we report on the issues and workload when novice en... [more] |
KBSE2019-30 SC2019-27 pp.41-46 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 13:10 |
Kochi |
Kochi University of Technology |
A Formal Approach to Verifying Trojan-freeness of Cryptographic Circuits Based on Galois-Field Arithmetic Akira Ito, Rei Ueno, Naofumi Homma (Tohoku Univ.) ISEC2019-26 SITE2019-20 BioX2019-18 HWS2019-21 ICSS2019-24 EMM2019-29 |
This paper proposes a formal method for verifying whether Hardware Trojan (HT) exists or not (i.e., HT-freeness) in cryp... [more] |
ISEC2019-26 SITE2019-20 BioX2019-18 HWS2019-21 ICSS2019-24 EMM2019-29 pp.133-138 |
ASN, MoNA, IPSJ-MBL, IPSJ-UBI [detail] |
2019-03-04 11:15 |
Tokyo |
The University of Tokyo, Komaba Campus |
Abstraction of Emulation for Sensor IoT Devices Futoshi Hirose (JAIST), Tsubasa Yumura (NICT), Yoichi Shinoda (JAIST) ASN2018-104 |
IoT (Internet of Things) makes it easy to measure and collect a wide range of environmental information. IoT devices eq... [more] |
ASN2018-104 pp.49-54 |
SS |
2019-03-04 17:10 |
Okinawa |
|
Formal STAMP Modelling toward Safety Verification of Hybrid Systems Mitsuaki Tsuji, Toshinori Takai (NAIST), Masafumi Katahira, Naoki Ishihama (JAXA), Kazuki Kakimoto, Hajimu Iida (NAIST) SS2018-67 |
Safety-critical systems, for example, autonomous vehicles and space systems, are required to be safe and reliable. Recen... [more] |
SS2018-67 pp.91-96 |
SIP, EA, SP, MI (Joint) [detail] |
2018-03-19 13:00 |
Okinawa |
|
[Poster Presentation]
Speaker verification based on non-linear bandwidth extension considering aliasing artifacts for super-wideband applications Haruna Miyamoto, Sayaka Shiota, Hitoshi Kiya (Tokyo Metropolitan Univ.) EA2017-110 SIP2017-119 SP2017-93 |
This paper has two aims that are to propose a novel bandwidth extension (BWE) method considering aliasing artifacts, and... [more] |
EA2017-110 SIP2017-119 SP2017-93 pp.51-55 |
SIP, EA, SP, MI (Joint) [detail] |
2018-03-19 13:00 |
Okinawa |
|
[Poster Presentation]
Text-dependent voice liveness detection based on pop-noise detector considering speaker-dependent phoneme information for speaker verification Shihono Mochizuki, Sayaka Shiota, Hitoshi Kiya (Tokyo Metropolitan Univ.) EA2017-111 SIP2017-120 SP2017-94 |
This paper proposes a pop-noise (PN) detection method considering speaker-dependent phoneme information for text-depende... [more] |
EA2017-111 SIP2017-120 SP2017-94 pp.57-62 |
SS, MSS |
2018-01-18 15:05 |
Hiroshima |
|
Deadline Assignment Optimization Method Using Extended Time Petri Nets for Real-Time Multitask Distributed Systems Sharing Processors with EDF Scheduling Reon Matsuoka, Akio Nakata (Hiroshima City Univ.) MSS2017-56 SS2017-43 |
In the development of embedded software which requires high reliability satisfaction of hard requirements for both compu... [more] |
MSS2017-56 SS2017-43 pp.53-58 |
ISEC, COMP |
2017-12-21 16:40 |
Kochi |
Eikokuji Campus, Kochi University of Technology |
Implementation Difficulty of Dynamic Self-Modifying Based Self Destructive Tamper Response Kazuomi Oishi (SIST) ISEC2017-82 COMP2017-36 |
Tamper resistant software, which has sufficient resistance against analysis and attack, is a necessary and important tec... [more] |
ISEC2017-82 COMP2017-36 pp.67-74 |