ABCDEFGHIJKLMNOPQRSTUVWXYZ
1
CATEGORYPAPER IDTITLEPAGESREGISTRATIONPARTICIPATIONProceedings
2
CANDAR LONG3Dimension-Extended Dragonfly: A More Flexible Interconnection Network Aimed at Reducing Hardware Cost8Wangon-site
3
CANDAR LONG12Dual Diagonal Mesh: An Optimal Memory Cube Network Under Geometric Constraints9Odaon-site
4
CANDAR LONG17Accelerate Inference of CNN Models on CPU via Column Combining Based on Simulated Annealing10Liuon-site
5
CANDAR LONG18Flexibility and Privacy: A Multi-Head Federated Continual Learning Framework for Dynamic Edge Environments10Chenon-site
6
CANDAR LONG28Solving the N-Queens Puzzle by a QUBO Model with Quadratic Size9Tsukiyamaon-site
7
CANDAR LONG37Efficient GPU-Accelerated Bulk Evaluation of the Boys Function for Quantum Chemistry10Tsujion-site
8
CANDAR LONG56A New Approach to Disabling SSL/TLS: Man-in-the-Middle Attacks are still Effective9Kimuraon-site
9
CANDAR LONG66A Non-stop Fault-Tolerant Real-Time System-on-Chip/System-in-Package10Nakabeppuon-site
10
CANDAR LONG77Multi-Objective Optimization of Controller Placement in Distributed ONOS Networks10Kangon-site
11
CANDAR REGULAR8Poisoning Attacks against Network Intrusion Detection Systems Using Shapley values to Identify Trends in Poisoning Data7Hasegawaremote
12
CANDAR REGULAR10Pseudo-Random Number Generation by Staggered Sampling of LFSR7Ichikawaon-site
13
CANDAR REGULAR16Zero-Knowledge Proofs of Connectivity for Labeled Directed Graphs Using Bilinear-Map Accumulator7Yoshiokaon-site
14
CANDAR REGULAR20Quantum Computer Architecture for Quantum Error Correction with Distributing Process to Multiple Temperature Layers7Ukaion-site
15
CANDAR REGULAR23Security Risk Visualization for Open-Source Software based on Vulnerabilities, Repositories, and Dependencies7Yanoon-site
16
CANDAR REGULAR33SMOG - An Explicitly Composable Memory Benchmark Suite for Heterogeneous Memory7Grapentinon-site
17
CANDAR REGULAR35An Auto-tuning of Mixed-precision Computation by Specifying Multiple Regions7RENon-site
18
CANDAR REGULAR36Encryption Invalidation Attacks: Is your Wi-Fi encryption really working?7Inoueon-site
19
CANDAR REGULAR38eSilo: Making Silo Secure with SGX6Fukuyamaon-site
20
CANDAR REGULAR40Evaluation of Effectiveness of MAC Systems Based on LSM for Protecting IoT Devices7Mikiremote
21
CANDAR REGULAR41Parallel Implementation of Vision Transformer on a Multi-FPGA Cluster7Iizukaon-site
22
CANDAR REGULAR42Issuer-Revocable Issuer-Hiding Attribute-Based Credentials Using an Accumulator7Begumremote
23
CANDAR REGULAR43A Cryptanalysis against the Cheating Detectable Secret Sharing from NISS 20197Kanekoon-site
24
CANDAR REGULAR60Accountable Ring Signatures from Symmetric-Key Primitives7Anadaon-site
25
CANDAR REGULAR65An Accurate Positioning Geocast Protocol for Safety Message Dissemination in VANETs7Bordimon-site
26
CANDAR REGULAR68Exploiting Unlabeled RSSI Fingerprints in Multi-Building and Multi-Floor Indoor Localization through Deep Semi-Supervised Learning Based on Mean Teacher6Liremote
27
CANDAR REGULAR73Efficient and High-Speed CGRA Accelerator for Cryptographic Applications7SANGon-site
28
CANDAR REGULAR75An Incremental Algorithm for $(2-\epsilon)$-Approximate Steiner Tree Requiring $O(n)$ Update Time7Raikwarremote
29
CANDAR REGULAR80Distributed MQTT Brokers Infrastructure with Network Transparent Hardware Broker7Toyoharaon-site
30
CANDAR REGULAR87SEM: A Simple Yet Efficient Model-agnostic Local Training Mechanism to Tackle Data Sparsity and Scarcity in Federated Learning7THAO NGUYENon-site
31
ASON REGULAR112A study for environmental adaptation of IoT devices6Yamatoremote
32
ASON REGULAR114Measuring driver's emotion6Luoon-site
33
ASON REGULAR115Method for Detecting DoH Communications from Non-Encrypted Information at a Middlebox7Takanashion-site
34
CSA REGULAR32Fairly Decentralizing a Hybrid Concurrency Control Protocol for Real-time Database Systems7Nguyenon-site
35
CSA REGULAR53Acceleration of Sociality-Aware Message Routing in Opportunistic Networks7ZHANGon-site
36
CSA REGULAR79A Design of Multithreaded RISC-V Processor for Real-Time System7Nojirion-site
37
CSA REGULAR108Improving Raft Performance with Bulk Transfers7Yamashitaon-site
38
GCA REGULAR21Semantic Search of Japanese Sentences Using Distributed Representations6Ueharaon-site
39
GCA REGULAR55Detecting EDoS Attacks in Cloud Environments Using Machine Learning and Metaheuristic Algorithms7Bordimon-site
40
GCA REGULAR101Stage-Wise and Hierarchical Training of Linked Deep Neural Networks for Large-Scale Multi-Building and Multi-Floor Indoor Localization Based on Wi-Fi Fingerprinting6Liremote
41
GCA REGULAR135A GPU-Based Parallel Implementation of the GWO Algorithm: Application to the Solution of Large-Scale Nonlinear Equation Systems7Silvaremote
42
PDAA REGULAR19A self-stabilizing distributed algorithm for the 1-MIS problem under the distance-3 model7Kakugawaon-site
43
PDAA REGULAR29Asynchronous Complete Visibility Algorithm for Luminous Robots on Grid7Kimon-site
44
PDAA REGULAR39A Method for Automatic Generation of 3D Background Models Using Fractal Models and Genetic Algorithms7Watanabeon-site
45
PDAA REGULAR47On Dynamics of Basic Network Creation Games with Non-Uniform Communication Interest7Yamauchion-site
46
PDAA REGULAR54Multiplication of Local Formulae and Commutativity of CAs with Essentially 3-Neighborhood Local Functions over Monoid $\mathbb{N}$7Ishidaon-site
47
PDAA REGULAR89The Popular Matching Problem in a (3, 3)−Hypergraph with One-sided Preferences7Singhremote
48
PDAA REGULAR107On Implementation of Brownian Circuits by Swarm Agents7Kimuraon-site
49
PDAA REGULAR113An asynchronous P system for solving the minimum Steiner tree with branch and bound7Uenoon-site
50
SUSCW REGULAR51Performance Improvement of Federated Learning Server using Smart NIC7Shibaharaon-site
51
SUSCW REGULAR62Polynomial-Time Cloudlet Placement Scheme with an Improved Approximation Ratio7WANGon-site
52
SUSCW REGULAR63Online Assignment of Reservations to Parking Lots for Smart Cities under the i.i.d. Model7DUon-site
53
SUSCW REGULAR69Design of Decoded Instruction Cache6Magaraon-site
54
SUSCW REGULAR94A Multitenant Single-Page Application for Programming Education5Wangon-site
55
SUSCW REGULAR95Browser-based Java Development Environment for Programming Education6Liangon-site
56
SUSCW REGULAR103An implementation of an Instruction Contorolled Cache Replacement Policy on a RISC-V Processor7Takayamaon-site
57
WICS REGULAR6Verification of IoT Malware Match Rate Using Signatures Created Based on Processor Information7Matunakaremote
58
WICS REGULAR7Single-Hardware Method to Detect Malicious Communications and Malware on Resource-Constrained IoT Devices7Sudoremote
59
WICS REGULAR9Improved Vulnerability Handling Framework to Automatically Fix Vulnerable Web Applications5Funaokaon-site
60
WICS REGULAR27Analyzing Post-injection Attacker Activities in IoT Devices: A Comprehensive Log Analysis Approach6Kobayashion-site
61
WICS REGULAR31Prevention Method for Stack Buffer Overflow Attack in TA Command Calls in OP-TEE5Kuzunoremote
62
WICS REGULAR45Real-Time Defense System using eBPF for Machine Learning-Based Ransomware Detection Method7Higuchiremote
63
WICS REGULAR50Automated Extraction for Vulnerability Management on PSIRT: A Case Study of Automotive Industry7Kasuyaremote
64
WICS REGULAR67Impact of Anonymity Indicator “PFDOC Entropy l-Diversity” on Medical Data Utility7Kitamuraon-site
65
WICS REGULAR72A Proposal of Solving NTRU Equation Using Matrix Representation Instead of Recursive Operation5Ishidaon-site
66
WICS REGULAR74An integrated secured vehicular ad-hoc network leveraging Kerberos authentication and Blockchain technology7Rahayuon-site
67
WICS REGULAR81An implementation of ELiPS-based Ciphertext-Policy Attribute-Based Encryption7Hoang Anhon-site
68
WICS REGULAR88A Smart Contract Based Blockchain Approach Integrated with Elliptic Curve Cryptography for Secure Email Application7HOSSAINon-site
69
WICS REGULAR98Emergency Button: Evacuation of Crypto Asset When Key Loss7Matsuzakion-site
70
WICS REGULAR102Introduction of Finger-softness Feature into Writer erification Based on Finger-writing of Simple Symbol6Fukudaon-site
71
WICS REGULAR120On the Practical Dependency of Fresh Randomness in AES S-box with Second-Order TI6Tsukaharaon-site
72
WICS REGULAR121Supporting multiple OS types on estimation of system call hook point by virtual machine monitor7Satoon-site
73
WANC SHORT4Low-cost implementation of a bicycle assistance embedded system using TensorFlow Lite5Nakamotoon-site
74
WANC SHORT15Dimensionality Reduction Using VAE for Deep Reinforcement Learning of Autonomous Driving5Ueharaon-site
75
WANC SHORT25A Serverless Signaling Scheme for WebRTC Using Bluetooth LE5Hashibeon-site
76
WANC SHORT52DODA: A Decentralized Online Dating Application5KUWABARAon-site
77
WANC SHORT61Stochastic Resonance Assisted Successive Interference Cancellation Receiver Using Lower Resolution ADC5Tomidaon-site
78
WANC SHORT83Rank Attack Avoidance Method based on Neighbor Node Rank Variation in RPL Network5Yoshidaon-site
79
WANC SHORT92Extraction of Subjective Information from Generative AI Models5Kobayashion-site
80
WANC SHORT96A Cost-aware Generation Method of Disposable Random Value Exploiting Parallel S-box Implementation for Tamper Resistant AES Design5KOYANAGIon-site
81
WANC SHORT116Proxy-based transaction acceleration for NewSQL5Watanabeon-site
82
WANC SHORT124Accelerating Key-Value Store with Layer-2 Transparent Proxy Cache using DPDK5Aobaon-site
83
WANC SHORT130Priority-MPTCP: A Novel Multipath Data Transfer Method for V2V Communication5Yamamotoon-site
84
WANC SHORT133Throughput Fairness Improvement between TCP BBR and CUBIC TCP by Expiring with Frequency Control5Otsukaon-site
85
ASON POSTER131A Dynamic Method for Forming Vehicle Platoons and Its Evaluations in Urban Areas4Inoueon-site
86
CSA POSTER93A Deep Neural Network Translator for Edge Site Implementation4Dianaon-site
87
GCA POSTER126Efficient Cryptographic Processing Using On-Chip GPUs in System-on-Chip Architectures4TAKEDAon-site
88
PDAA POSTER59Implementation of the Home Automation System by Using FPGA Platform4Panon-site
89
SUSCW POSTER119Motivation Survey and Influence Factor Analysis of Old People to Improve Digital Literacy4Caion-site
90
WANC POSTER97Bicycle-based collision prevention system using iPhone with LiDAR3Eguchion-site
91
WANC POSTER100Data Augmentation with Pseudo-Infrared Night-Vision Image Conversion for Improved Nighttime Object Detection3Ishizuon-site
92
WANC POSTER106Simulation-based Analysis of Power Side-Channel Leakage at Different Sampling Intervals2Miuraon-site
93
WANC POSTER111Surveillance Routing with a Minimum Number of Drones2Morion-site
94
WANC POSTER125Adaptive Thread Type Selection on the Java Virtual Machine3Rosaon-site
95
WANC POSTER128Performance Evaluation and Improvement of HTTP/3 Considering TLS3Yamaguchion-site
96
97
NCSS POSTER137Baby-Holding Posture Determination System using Pose Estimation3Matsunagaon-site
98
NCSS Oral: WICS139Experiments on ROP Attack with Various Instruction Set Architectures6Takion-site
99
NCSS Oral: CSA140A Scheme Reducing Task Drops for Data Dependent Tasks on Mixed Criticality Systems7Naguraremote
100
NCSS Oral: CSA141Effectiveness of utilizing meta attributes in anomaly detection using crowdsourcing4Tamanoon-site