ITE Technical Group Submission System
Conference Schedule
Online Proceedings
[Sign in]
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 11 of 11  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IDY, SID-JC 2023-03-17
Online online [Invited Talk] Development of transparent photoluminescence materials and their application to LEDs, security and sensing -- Novel Eu(III) complexes and their photoluminescence properties --
Hiroki Iwanaga (Toshiba)
Now, red phosphors with large photoluminescence intensity and high color purity are required for display use. And red tr... [more] IDY2023-24
IDY, IEIJ-SSL, IEICE-EID, SID-JC, IEE-EDD [detail] 2023-01-26
Online   Relationship between dot size, readability, and viewing area in Highly-Visually-Secured Depth-Fused 3D (HiViS 3D)
Kazuya Fujikawa, Haruki Mizushina (tks), Shiro Suyama (uu), Kenji Yamamoto (tks)
This paper examines the dot size of random dots in a Highly-Visually-Secured Depth-Fused 3D (HiViS 3D) display that simu... [more] IDY2023-6
AIT, ME, MMS, IEICE-IE, IEICE-ITS [detail] 2022-02-22
Online online Bit-plane oriented Detection method of Malicious Code Hidden in the Image
Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.)
With the increasing importance of cyberspace, the threat of malware has also been increasing. Malware which hides malici... [more]
IEICE-IE, IEICE-ITS, MMS, ME, AIT [detail] 2021-02-19
Online Online [Special Talk] A Note on Customer's Interest Estimation Method Using Security Camera Video Data from the Real Store -- Validation of the accuracy of an anomaly detection model using features obtained from a posture estimation model --
Yuki Honma, Ren Togo, Maiku Abe, Takahiro Ogawa, Miki Haseyama (Hokkaido Univ.)
In this paper, we propose a method for estimating customers’ interests using videos recorded by a security camera in a r... [more] MMS2021-26 ME2021-26 AIT2021-26
IEICE-SIS, IPSJ-AVM, 3DMT [detail] 2019-06-13
Nagasaki Fukue Culture Center Privacy Preserving Sparse Representation for Face Recognition in Edge and Cloud Networks
Yitu Wang, Takayuki Nakachi (NTT)
The interaction between edge and cloud servers plays an important role in fulfilling the extensive computation requireme... [more]
ME, IEICE-IE, IEICE-ITS, MMS, HI, AIT [detail] 2019-02-20
Hokkaido Hokkaido Univ. [Invited Talk] Anomaly Detection for Smart Home Based on User Behavior -- ICCE2019 Report --
Masaaki Yamauchi, Yuichi Ohsita, Masayuki Murata (Osaka Univ.), Kensuke Ueda, Yoshiaki Kato (Mitsubishi Electric)
The operations of home IoT devices by attackers can cause serious problems.
However, such attacks are difficult to dete... [more]
MMS2019-24 HI2019-24 ME2019-46 AIT2019-24
IEICE-CS, IEICE-IE, IPSJ-AVM, BCT [detail] 2018-11-30
Tokushima Tokushima University [Invited Talk] Security Technologies for Broadcasting, Content Distribution, and Integrated Broadcast-Broadband Services
Kazuto Ogawa (NHK)
Distribution environment for audio and video content has changed dramatically, such as digital broadcasting service is w... [more] BCT2018-94
AIT, IIEEJ, AS 2013-03-15
Kanagawa Keio Univ. An Experience Learning System of Security Incidents with NUI
Ryohei Tsuruoka, Mitsunori Makino (Chuo Univ.)
In this paper, We proposed a system which is possible to experience virtual security incidents first response. The propo... [more] AIT2013-108
ME, AIT, HI, IEICE-IE, IEICE-ITS [detail] 2012-02-21
Hokkaido Hokkaido Univ. Environmental invariance Evaluation using SIFT Feature of Facial Image
Tsuyoshi Makioka, Takami Satonaka (Kumamoto Prefectural College of Tec.), Tomomi Yamaguchi, Ryosuke Oda, Gou Koutaki, Keiichi Uchimura (Kumamoto Univ.)
We employ the SIFT (Scale Invariant Feature Transform) features to evaluate the effect of environmental variations on fa... [more] HI2012-28 ME2012-66 AIT2012-28
BCT, IEICE-AP 2012-02-09
Hiroshima   Evaluation of Fundamental Characteristics of Wireless Terminal Authentication Scheme Based on Radio Propagation Characteristics
Naoki Otani, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.)
There is a problem of spoofing attack to legitimate users in wireless communication. As one of the countermeasures for t... [more]
ME, IEICE-BS 2010-12-16
Tokyo Tokyo Metropolitan Univ. A Classification of Attacks against Biometric Authentication Systems
Shoko Yonezawa (Chuo Univ.), Manabu Inuma, Akira Otsuka (AIST), Hideki Imai (Chuo Univ.)
We classify the attacks against biometric authentication systems by attacker's capability and define the security agains... [more] ME2010-172
 Results 1 - 11 of 11  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format

[Return to Top Page]

[Return to ITE Web Page]

The Institute of Image Information and Television Engineers (ITE), Japan