Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IDY, SID-JC |
2023-03-17 16:40 |
Online |
online |
[Invited Talk]
Development of transparent photoluminescence materials and their application to LEDs, security and sensing
-- Novel Eu(III) complexes and their photoluminescence properties -- Hiroki Iwanaga (Toshiba) |
Now, red phosphors with large photoluminescence intensity and high color purity are required for display use. And red tr... [more] |
IDY2023-24 pp.49-53 |
IDY, IEIJ-SSL, IEICE-EID, SID-JC, IEE-EDD [detail] |
2023-01-26 15:25 |
Online |
|
Relationship between dot size, readability, and viewing area in Highly-Visually-Secured Depth-Fused 3D (HiViS 3D) Kazuya Fujikawa, Haruki Mizushina (tks), Shiro Suyama (uu), Kenji Yamamoto (tks) |
This paper examines the dot size of random dots in a Highly-Visually-Secured Depth-Fused 3D (HiViS 3D) display that simu... [more] |
IDY2023-6 pp.25-28 |
AIT, ME, MMS, IEICE-IE, IEICE-ITS [detail] |
2022-02-22 11:55 |
Online |
online |
Bit-plane oriented Detection method of Malicious Code Hidden in the Image Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) |
With the increasing importance of cyberspace, the threat of malware has also been increasing. Malware which hides malici... [more] |
|
IEICE-IE, IEICE-ITS, MMS, ME, AIT [detail] |
2021-02-19 15:20 |
Online |
Online |
[Special Talk]
A Note on Customer's Interest Estimation Method Using Security Camera Video Data from the Real Store
-- Validation of the accuracy of an anomaly detection model using features obtained from a posture estimation model -- Yuki Honma, Ren Togo, Maiku Abe, Takahiro Ogawa, Miki Haseyama (Hokkaido Univ.) |
In this paper, we propose a method for estimating customers’ interests using videos recorded by a security camera in a r... [more] |
MMS2021-26 ME2021-26 AIT2021-26 pp.193-198 |
IEICE-SIS, IPSJ-AVM, 3DMT [detail] |
2019-06-13 13:35 |
Nagasaki |
Fukue Culture Center |
Privacy Preserving Sparse Representation for Face Recognition in Edge and Cloud Networks Yitu Wang, Takayuki Nakachi (NTT) |
The interaction between edge and cloud servers plays an important role in fulfilling the extensive computation requireme... [more] |
|
ME, IEICE-IE, IEICE-ITS, MMS, HI, AIT [detail] |
2019-02-20 16:00 |
Hokkaido |
Hokkaido Univ. |
[Invited Talk]
Anomaly Detection for Smart Home Based on User Behavior
-- ICCE2019 Report -- Masaaki Yamauchi, Yuichi Ohsita, Masayuki Murata (Osaka Univ.), Kensuke Ueda, Yoshiaki Kato (Mitsubishi Electric) |
The operations of home IoT devices by attackers can cause serious problems.
However, such attacks are difficult to dete... [more] |
MMS2019-24 HI2019-24 ME2019-46 AIT2019-24 pp.249-254 |
IEICE-CS, IEICE-IE, IPSJ-AVM, BCT [detail] |
2018-11-30 09:20 |
Tokushima |
Tokushima University |
[Invited Talk]
Security Technologies for Broadcasting, Content Distribution, and Integrated Broadcast-Broadband Services Kazuto Ogawa (NHK) |
Distribution environment for audio and video content has changed dramatically, such as digital broadcasting service is w... [more] |
BCT2018-94 pp.63-66 |
AIT, IIEEJ, AS |
2013-03-15 16:50 |
Kanagawa |
Keio Univ. |
An Experience Learning System of Security Incidents with NUI Ryohei Tsuruoka, Mitsunori Makino (Chuo Univ.) |
In this paper, We proposed a system which is possible to experience virtual security incidents first response. The propo... [more] |
AIT2013-108 pp.239-242 |
ME, AIT, HI, IEICE-IE, IEICE-ITS [detail] |
2012-02-21 12:00 |
Hokkaido |
Hokkaido Univ. |
Environmental invariance Evaluation using SIFT Feature of Facial Image Tsuyoshi Makioka, Takami Satonaka (Kumamoto Prefectural College of Tec.), Tomomi Yamaguchi, Ryosuke Oda, Gou Koutaki, Keiichi Uchimura (Kumamoto Univ.) |
We employ the SIFT (Scale Invariant Feature Transform) features to evaluate the effect of environmental variations on fa... [more] |
HI2012-28 ME2012-66 AIT2012-28 pp.293-298 |
BCT, IEICE-AP |
2012-02-09 10:20 |
Hiroshima |
|
Evaluation of Fundamental Characteristics of Wireless Terminal Authentication Scheme Based on Radio Propagation Characteristics Naoki Otani, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) |
There is a problem of spoofing attack to legitimate users in wireless communication. As one of the countermeasures for t... [more] |
|
ME, IEICE-BS |
2010-12-16 16:30 |
Tokyo |
Tokyo Metropolitan Univ. |
A Classification of Attacks against Biometric Authentication Systems Shoko Yonezawa (Chuo Univ.), Manabu Inuma, Akira Otsuka (AIST), Hideki Imai (Chuo Univ.) |
We classify the attacks against biometric authentication systems by attacker's capability and define the security agains... [more] |
ME2010-172 pp.37-40 |