| A | B | C | D | E | F | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | Category | Paper ID | Title | Registration | Pages | Video | |||||||||||||||||
2 | WICS POSTER | 2 | A machine learning-based NIDS that collects training data from within the organization and updates the discriminator periodically and automatically | Hideya Sato | 4 | ◯ | |||||||||||||||||
3 | CANDAR REGULAR | 3 | PZLAST: an ultra-fast sequence similarity search tool implemented on a MIMD processor | Hitoshi Ishikawa | 6 | ◯ | |||||||||||||||||
4 | ASON REGULAR | 5 | An Enhancement of Physical Web with Stateful BLE Beacons | Kakeru Kobayashi | 7 | ◯ | |||||||||||||||||
5 | CANDAR REGULAR | 6 | Template Protected Fingerprint Verification using Set Similarity-based Minutia Cylinder Code and MinHash | Yoshiko Yasumura | 7 | ◯ | |||||||||||||||||
6 | GCA POSTER | 8 | Augmented Triplet Network for Individual Organism and Unique Object Classification for Reliable Monitoring of Ezaoshika Deer | Yojiro Harie | 4 | ◯ | |||||||||||||||||
7 | PDAA REGUALR | 10 | Hybrid Interconnection Networks for Reducing Hardware Cost and Improving Path Diversity Based on Fat-Trees and Hypercubes | Yaodong Wang | 7 | ◯ | |||||||||||||||||
8 | SUSCW REGULAR | 11 | A Distributed Multi-group Mutual Exclusion Algorithm for Intersection Traffic Control | Hirotsugu Kakugawa | 7 | ◯ | |||||||||||||||||
9 | WICS REGUALR | 12 | Implementation and Evaluation of an Identity-Based Encryption with Security Against the KGC | Shuntaro Ema | 6 | ◯ | |||||||||||||||||
10 | WICS REGUALR | 17 | Verification of the Effectiveness to Monitor Darknet across Multiple Organizations | Katsuya Nishijima | 6 | ◯ | |||||||||||||||||
11 | WICS REGUALR | 18 | Effects of Data Sampling Interval on Accuracy of Authentication Using Wi-Fi Information Captured by Smartphone | Ryosuke Kobayashi | 6 | ◯ | |||||||||||||||||
12 | CANDAR REGULAR | 19 | Cost-Performance Evaluation of Heterogeneous Tierless Storage Management in a Public Cloud | Reika Kinoshita | 6 | ◯ | |||||||||||||||||
13 | CANDAR REGULAR | 20 | Efficient and Large Scale Pre-training Techniques for Japanese Natural Language Processing | Akihiko Kasagi | 6 | ◯ | |||||||||||||||||
14 | CANDAR REGULAR | 21 | A Construction Method of Final Exponentiation for a Specific Cyclotomic Family of Pairing-Friendly Elliptic Curves with Prime Embedding Degrees | Yuki Nanjo | 7 | ◯ | |||||||||||||||||
15 | CANDAR LONG | 22 | Efficient Final Exponentiation for Pairings on Several Curves Resistant to Special TNFS | Yuki Nanjo | 8 | ◯ | |||||||||||||||||
16 | CANDAR REGULAR | 23 | Dementia Sign Detection System Using Digital Twin | Toru Kobayashi | 7 | ◯ | |||||||||||||||||
17 | CANDAR REGULAR | 24 | A Proposal of Code Modification Problem for Web Client Programming Using JavaScript | Khaing Hsu Wai | 7 | ◯ | |||||||||||||||||
18 | WANC SHORT | 25 | An FPGA-based Power-saving Particle Filter Using Dynamic Reconfiguration | Yuta Imamura | 5 | ◯ | |||||||||||||||||
19 | WICS REGUALR | 26 | Proposal and Evaluation of a Gesture Authentication Method with Peep Resistance for Smartwatches | Mirang Park | 6 | ◯ | |||||||||||||||||
20 | CANDAR REGULAR | 27 | A Strongly Unlinkable Group Signature Scheme with Matching-Based Verifier-Local Revocation for Privacy-Enhancing Crowdsensing | Toru Nakanishi | 7 | ◯ | |||||||||||||||||
21 | CANDAR REGULAR | 28 | Evaluation of an HLS-based heterogeneous redundant design approach for functional safety systems on FPGAs | Taichi Saikai | 6 | ◯ | |||||||||||||||||
22 | CANDAR REGULAR | 29 | Implementation and Evaluation of a Ring Oscillator-based True Random Number Generator | Kotaro Hayashi | 7 | ◯ | |||||||||||||||||
23 | WICS POSTER | 30 | Consideration of the side-channel attack to SIMON implemented on Arduino Uno | Harunobu Enami | 4 | ◯ | |||||||||||||||||
24 | CANDAR REGULAR | 31 | Browser-Based Manipulation of Virtual Objects Through MVVM Architecture with Data Binding | Kentaro Nagaki | 7 | ◯ | |||||||||||||||||
25 | WANC SHORT | 32 | Recognition of Multiple Rectangular Labels for Construction Machines | Yuki Nakagawa | 5 | ◯ | |||||||||||||||||
26 | PDAA REGUALR | 33 | Tip the Balance: Improving Exploration of Balanced Crossover Operators by Adaptive Bias | Luca Manzoni | 7 | ◯ | |||||||||||||||||
27 | CANDAR LONG | 34 | Hip to Be (Latin) Square: Maximal Period Sequences from Orthogonal Cellular Automata | Luca Mariot | 9 | ◯ | |||||||||||||||||
28 | CANDAR REGULAR | 35 | Group Signatures with Designated Traceability | Hiroaki Anada | 7 | ◯ | |||||||||||||||||
29 | CANDAR REGULAR | 36 | Reducing Revocation Lists in CS-Based Revocable Group Signature Scheme Using Vector Commitment | Kouhei Sugimoto | 7 | ◯ | |||||||||||||||||
30 | WICS REGUALR | 37 | Applying The Attacks Tracer on Advanced Persistent Threats to Real Networks | Yuya Tajima | 6 | ◯ | |||||||||||||||||
31 | PDAA REGUALR | 38 | Classification Models in Genetic Algorithms for Commonality Optimization in Passive Crash Safety | Nguyen Anh Vu Doan | 7 | ◯ | |||||||||||||||||
32 | WANC SHORT | 39 | Arranging resource amount after automatic GPU offloading | Yoji Yamato | 5 | ◯ | |||||||||||||||||
33 | CANDAR LONG | 40 | Accelerate CNN Models via Filter Pruning and Sparse Tensor Core | Pangfeng Liu | 9 | ◯ | |||||||||||||||||
34 | WICS REGUALR | 42 | Consideration of the side-channel attack to SPECK implemented on Arduino Uno | Masaki Nakanose | 7 | ◯ | |||||||||||||||||
35 | CANDAR REGULAR | 43 | An asynchronous P system with a DPLL algorithm for solving a satisfiability problem | Takuya Noguchi | 7 | ◯ | |||||||||||||||||
36 | CANDAR REGULAR | 45 | Visual Studio Code Extension and Auto-completion for Mizar Language | Hiroto Taniguchi | 7 | ◯ | |||||||||||||||||
37 | CANDAR LONG | 46 | Solving the sparse QUBO on multiple GPUs for Simulating a Quantum Annealer | Koji Nakano | 10 | ◯ | |||||||||||||||||
38 | WICS REGUALR | 48 | A Practical Parallel Computation in a Scalable Multiparty Private Set Intersection | Seitaro Mishima | 7 | ◯ | |||||||||||||||||
39 | GCA REGULAR | 49 | Instillation Checking Using Long Short-Term Memories for Ophthalmology Patients | Tomohiro Ishigami | 7 | ◯ | |||||||||||||||||
40 | GCA REGULAR | 51 | Detecting DDoS Attacks on SDN Data Plane with Machine Learning | Ranyelson Carvalho | 7 | ◯ | |||||||||||||||||
41 | PDAA REGUALR | 56 | Commutativity of Composition of some Elementary Cellular Automata with Essentially 2-Neighborhood Local Functions on Monoids | Toshikazu Ishida | 7 | ◯ | |||||||||||||||||
42 | ASON REGULAR | 57 | A Lightweight Interactive Graph Processing Library for Edge Computing in Smart Society | Jun Zhou | 7 | ◯ | |||||||||||||||||
43 | WICS REGUALR | 60 | Cheating Detectable Secret Sharing Scheme from Multiplicative Homomorphic Authentication Function | Kaichi Sato | 7 | ◯ | |||||||||||||||||
44 | CANDAR LONG | 61 | An Intrusion Detection system for imbalanced dataset based on Deep Learning | Mariama Mbow | 10 | ◯ | |||||||||||||||||
45 | PDAA REGUALR | 64 | Petri Net based Mathematical Programming for Optimal Resource Assignment Problems with Multiple Resource Requirements | Tomoya Uchihara | 6 | ◯ | |||||||||||||||||
46 | WICS REGUALR | 65 | KAKOI: A New Tool to Make Simple and Secure Build Cyber Ranges Using Public Cloud | Tomoya Terashima | 7 | ◯ | |||||||||||||||||
47 | CANDAR LONG | 66 | Efficient Multi-Party Contact Tracing | De Goyon Mathieu | 9 | ◯ | |||||||||||||||||
48 | CANDAR REGULAR | 67 | M-KUBOS/PYNQ Cluster for multi-access edge computing | Takumi Inage | 7 | ◯ | |||||||||||||||||
49 | SUSCW REGULAR | 68 | Speeding Up of CGRAs by Reshaping and Stochastic FMA | Tomoya Akabe | 6 | ◯ | |||||||||||||||||
50 | CANDAR REGULAR | 69 | Area-efficient Binary and Ternary CNN Accelerator using Random-forest-based Approximation | Kaisei Kimura | 7 | ◯ | |||||||||||||||||
51 | CANDAR LONG | 70 | Trajectory Anonymization through Laplace Noise Addition in Latent Space | Yuiko Sakuma | 9 | ◯ | |||||||||||||||||
52 | WANC POSTER | 71 | Distributed Rewarding for Browser-Based P2P Video Streaming with Ethereum Blockchain | Yunqi Ma | 3 | ◯ | |||||||||||||||||
53 | CSA REGULAR | 72 | Performance Study of Kotlin and Java Program Considering Bytecode Instructions and JVM JIT Compiler | Atsuya Sonoyama | 7 | ◯ | |||||||||||||||||
54 | GCA REGULAR | 73 | Acceleration of Deflate Encoding and Decoding with GPU implementations | Daisuke Takafuji | 7 | ◯ | |||||||||||||||||
55 | GCA REGULAR | 74 | GANs with Suppressed Mode Collapse Using Intrinsic Rewards | Toi Tsuneda | 6 | ◯ | |||||||||||||||||
56 | CANDAR REGULAR | 75 | Semi-Uniform Deployment of Mobile Robots in Perfect \ell-ary Trees | Masahiro Shibata | 7 | ◯ | |||||||||||||||||
57 | WANC SHORT | 78 | Real-time execution based on fluid scheduling by using IPC control scheme | Atsushi Santo | 5 | ◯ | |||||||||||||||||
58 | CANDAR REGULAR | 80 | On the Performance of Hidden Markov Model Spectrum Opportunity Forecast on Limited Observed Channel Activity | Rodrigo Feitosa Bezerra | 7 | ◯ | |||||||||||||||||
59 | CSA REGULAR | 81 | Mitigating Process Variations with Cooperative Tuning for Performance and Power through a Simple DSL | Yuan He | 7 | ◯ | |||||||||||||||||
60 | CANDAR LONG | 82 | Low-Latency High-Bandwidth Interconnection Networks by Selective Packet Compression | Naoya Niwa | 9 | ◯ | |||||||||||||||||
61 | WANC SHORT | 85 | Development of the Estimation Model for Intentions to Move Based on Gaze and Face Information with 1DCNN-LSTM and Evaluation of Electric Wheelchair Driving | Sho Higa | 5 | ◯ | |||||||||||||||||
62 | CANDAR REGULAR | 86 | A State Transfer Method That Adapts to Network Bandwidth Variations in Geographic State Machine Replication | Tairi Chiba | 7 | ◯ | |||||||||||||||||
63 | SUSCW POSTER | 87 | Evaluation of the effect of ICT in education on the academic literacy of high school students | Yoshiomi Otsuka | 4 | ◯ | |||||||||||||||||
64 | ASON POSTER | 89 | Porting Caching Functions to Named Data Networking Forwarding Daemon (NFD) | Takuya Mizushiro | 4 | ◯ | |||||||||||||||||
65 | WICS REGUALR | 90 | Improvement of Hybrid NIDS Using Deep Learning for Practical Use | Kentaro Takeshita | 7 | ◯ | |||||||||||||||||
66 | PDAA REGUALR | 92 | An asynchronous P system with branch and bound for solving the subset sum problem | Kosei Nagao | 7 | ◯ | |||||||||||||||||
67 | WANC SHORT | 96 | Single and Ensemble CNN Models with Out-Category Penalty in Cifar10 | Yuta Suzuki | 4 | ◯ | |||||||||||||||||
68 | PDAA POSTER | 98 | A Proposal of Dynamic Job Scheduling Algorithm Considering CPU Core Utilization for User-PC Computing System | ARIEL KAMOYEDJI | 4 | ◯ | |||||||||||||||||
69 | WICS REGUALR | 99 | FirmPot: A Framework for Intelligent-Interaction Honeypots Using Firmware of IoT Devices | Moeka Yamamoto | 7 | ◯ | |||||||||||||||||
70 | ASON REGULAR | 100 | Switching Method of Media Access Control for Improving Fairness of Throughput between WLAN systems under Adjacent Channel Interference | Hiroyasu Obata | 7 | ◯ | |||||||||||||||||
71 | ASON REGULAR | 101 | Performance Evaluation of Information Floating with Limited Expiration Time in Terms of Information Reception Time and Error Diffusion Rate | Yuko Ikeda | 7 | ◯ | |||||||||||||||||
72 | SUSCW POSTER | 102 | Speech Signal Processing Using Consonant-Vowel Location Detection | Shusuke Nakazato | 4 | ◯ | |||||||||||||||||
73 | GCA POSTER | 104 | Hierarchical Multi-Building And Multi-Floor Indoor Localization Based On Recurrent Neural Networks | Abdalla Elesawi | 4 | ◯ | |||||||||||||||||
74 | WICS REGUALR | 105 | Evaluation of implementability in a malware detection mechanism using processor information | Mutsuki Deguchi | 7 | ◯ | |||||||||||||||||
75 | WANC SHORT | 106 | Detection for Transient Patterns with Unpredictable Duration using Chebyshev Inequality and Dynamic Binning | Thanapol Phungtua-eng | 5 | ◯ | |||||||||||||||||
76 | ASON REGULAR | 107 | A Link State Routing Method for CCN with Blockchain | Shuichi Tokunaga | 7 | ◯ | |||||||||||||||||
77 | WANC POSTER | 108 | Supporting Music Arrangement, Ringer Assignment, and Score Preparation for Musicbell Ensembles | Keita Ushida | 3 | ◯ | |||||||||||||||||
78 | WANC SHORT | 110 | Transparent Relational Database Caching Based on Storage Engines Using In-memory Database | Motoshi Miyamoto | 5 | ◯ | |||||||||||||||||
79 | ASON POSTER | 112 | Developing a sensor network around a car driver | Haruka Yoshimoto | 4 | ◯ | |||||||||||||||||
80 | LHAM REGULAR | 113 | Empirical parameter tuning of task-based tiled QR factorization using quantum annealing | Tomohiro Suzuki | 6 | ◯ | |||||||||||||||||
81 | GCA REGULAR | 115 | Adversarial attack detection on node classification by autoencoder-based analysis of hidden layers in graph convolutional networks | Kenta Shimada | 7 | ◯ | |||||||||||||||||
82 | WANC POSTER | 117 | Loss Function of GAN to Make a Clear Judgment | Kuniyasu Imade | 3 | ◯ | |||||||||||||||||
83 | SUSCW POSTER | 118 | Weight Least Square Filter For Improving the Quality of Depth Map on FPGA | Renzhi Mao | 4 | ◯ | |||||||||||||||||
84 | SUSCW POSTER | 119 | An Implementation of a World Grid Square Codes Generator on a RISC-V Processor | Rei Watanabe | 4 | ◯ | |||||||||||||||||
85 | ASON REGULAR | 120 | A Performance Evaluation of Vehicular Swarm Intelligence for Seamless Route Guidance using Opportunistic Networking | Akihiro Fujihara | 7 | ◯ | |||||||||||||||||
86 | ASON REGULAR | 121 | Adaptive Network Coding Broadcasting based on Node Mobility in Mobile Ad-hoc Networks | Masami Yoshida | 6 | ◯ | |||||||||||||||||
87 | GCA REGULAR | 122 | Heuristic extraction of co-occurrence patterns for effective construction of graph-based interpretable decision sets | Kota Matsuyama | 7 | ◯ | |||||||||||||||||
88 | SUSCW REGULAR | 123 | Analysis of Resistance Distribution and Voltage Drop in Chips with Inductive Coupling Wireless Communication Interface | HIDETO KAYASHIMA | 5 | ◯ | |||||||||||||||||
89 | CSA REGULAR | 124 | Automatic executable code generation for DNN accelerator ReNA | Yuta Masuda | 7 | ◯ | |||||||||||||||||
90 | ASON POSTER | 127 | Feasibility Investigations of Access-Point Transmission Power Optimization Method under Co-use of Channel Bonding and Non Channel Bonding in Wireless Local-Area Network | Fatema Akhter | 4 | ◯ | |||||||||||||||||
91 | WICS REGUALR | 128 | A New Higher Order Differential of Enocoro-128v2 | Naoki Shibayama | 6 | ◯ | |||||||||||||||||
92 | ASON REGULAR | 129 | Improvement of Sound Classification Method on Smartphone for Hammering Test Using 5G Network | Tsubasa Fukumura | 6 | ◯ | |||||||||||||||||
93 | WICS POSTER | 130 | Data augmentation of JavaScript dataset using DCGAN and random seed | Ngoc Minh Phung | 4 | ◯ | |||||||||||||||||
94 | WICS REGUALR | 132 | Non-interactive Lattice-based Multisignatures | Kittiphon Phalakarn | 7 | ◯ | |||||||||||||||||
95 | WANC POSTER | 133 | Observation of Method Invocation in Application Runtime in Android for CPU Clock Rate Adjustment | Kota Kumakura | 3 | ◯ | |||||||||||||||||
96 | WICS REGUALR | 134 | Function for Tracing Diffusion of Classified Information to Support Multiple VMs with KVM | Kohei Otani | 7 | ◯ | |||||||||||||||||
97 | ASON REGULAR | 136 | Efficient RPL Tree Construction Using Passive Link Quality Estimation | Hiroto Fujita | 7 | ◯ | |||||||||||||||||
98 | LHAM REGULAR | 138 | A memory bank conflict prevention mechanism for SYCL on SX-Aurora TSUBASA | Hiroyuki Takizawa | 6 | ◯ | |||||||||||||||||
99 | LHAM POSTER | 139 | Cross-Reference Simulation by Code-To-Code Adapter (CoToCoA) Library for the Study of Multi-Scale Physics in Planetary Magnetospheres | Yuto Katoh | 4 | ◯ | |||||||||||||||||
100 | ASON REGULAR | 140 | On the Suppression of Loops with Long Hops During Scatternet Configuration in Bluetooth MANETs | Haruki Ishizaki | 7 | ◯ |