Abstract is missing.
- Flexibility and Privacy: A Multi-Head Federated Continual Learning Framework for Dynamic Edge EnvironmentsChunlu Chen, Kevin I-Kai Wang, Peng Li 0017, Kouichi Sakurai. 1-10 [doi]
- A New Approach to Disabling SSL/TLS: Man-in-the-Middle Attacks are still EffectiveKeiichiro Kimura, Yoshiaki Shiraishi, Masakatu Morii. 11-19 [doi]
- Accelerate Inference of CNN Models on CPU via Column Combining Based on Simulated AnnealingChien-Hung Lin, Ding-Yong Hong, Pangfeng Liu, Jan-Jan Wu. 20-29 [doi]
- A Non-stop Fault-Tolerant Real-Time System-on-Chip/System-in-PackageShota Nakabeppu, Nobuyuki Yamasaki, Kenta Suzuki, Keizo Hiraga, Kazuhiro Bessho. 30-39 [doi]
- Dual Diagonal Mesh: An Optimal Memory Cube Network Under Geometric ConstraintsMasashi Oda, Kai Keida, Ryota Yasudo. 40-48 [doi]
- Efficient GPU-Accelerated Bulk Evaluation of the Boys Function for Quantum ChemistrySatoki Tsuji, Yasuaki Ito, Koji Nakano, Akihiko Kasagi. 49-58 [doi]
- Solving the N-Queens Puzzle by a QUBO Model with Quadratic SizeShunsuke Tsukiyama, Koji Nakano, Yasuaki Ito, Takashi Yazane, Junko Yano, Takumi Kato, Shiro Ozaki, Rie Mori, Ryota Katsuki. 59-67 [doi]
- Dimension-Extended Dragonfly: A More Flexible Interconnection Network Aimed at Reducing Hardware CostYaodong Wang, Yamin Li. 68-75 [doi]
- Multi-Objective Optimization of Controller Placement in Distributed ONOS NetworksXingyuan Kang, Keichi Takahashi, Chawanat Nakasan, Kohei Ichikawa, Hajimu Iida. 76-85 [doi]
- Accountable Ring Signatures from Symmetric-Key PrimitivesHiroaki Anada, Masayuki Fukumitsu, Shingo Hasegawa. 86-92 [doi]
- Issuer-Revocable Issuer-Hiding Attribute-Based Credentials Using an AccumulatorNasima Begum, Toru Nakanishi 0001. 93-99 [doi]
- Parallel Implementation of Vision Transformer on a Multi-FPGA ClusterYasuyu Fukushima, Kensuke Iizuka, Hideharu Amano. 100-106 [doi]
- eSilo: Making Silo Secure with SGXMasahide Fukuyama, Masahiro Tanaka, Ryota Ogino, Hideyuki Kawashima. 107-112 [doi]
- SMOG - An Explicitly Composable Memory Benchmark Suite for Heterogeneous MemoryAndreas Grapentin, Felix Eberhardt, Andreas Polze. 113-119 [doi]
- SEM: A Simple Yet Efficient Model-agnostic Local Training Mechanism to Tackle Data Sparsity and Scarcity in Federated LearningQuang-Ha Pham, Nang Hung Nguyen, Thanh-Hung Nguyen, Huy Hieu Pham 0001, Phi-Le Nguyen, Truong Thao Nguyen. 120-126 [doi]
- Poisoning Attacks against Network Intrusion Detection Systems Using Shapley Values to Identify Trends in Poisoning DataTomohiro Hasegawa, Ryotaro Kobayashi. 127-133 [doi]
- Pseudo-Random Number Generation by Staggered Sampling of LFSRShuichi Ichikawa. 134-140 [doi]
- Encryption Invalidation Attacks: Is your Wi-Fi encryption really working?Taketo Inoue, Kosuke Kuriyama, Yoshiaki Shiraishi, Masakatu Morii. 141-147 [doi]
- A Cryptanalysis against the Cheating Detectable Secret Sharing from NISS 2019Kiminori Kaneko, Satoshi Obana. 148-154 [doi]
- Exploiting Unlabeled RSSI Fingerprints in Multi-Building and Multi-Floor Indoor Localization through Deep Semi-Supervised Learning Based on Mean TeacherSihao Li, Zhe Tang, Kyeong Soo Kim, Jeremy S. Smith. 155-160 [doi]
- Evaluation of Effectiveness of MAC Systems Based on LSM for Protecting IoT DevicesMasato Miki, Toshihiro Yamauchi, Satoru Kobayashi. 161-167 [doi]
- An Incremental Algorithm for (2-ε)-Approximate Steiner Tree Requiring O(n) Update TimeHemraj Raikwar, Sushanta Karmakar. 168-174 [doi]
- Auto-tuning Mixed-precision Computation by Specifying Multiple RegionsXuanzhengbo Ren, Masatoshi Kawai, Tetsuya Hoshino, Takahiro Katagiri, Toru Nagai. 175-181 [doi]
- Distributed MQTT Brokers Infrastructure with Network Transparent Hardware BrokerTokimasa Toyohara, Hiroaki Nishi. 182-188 [doi]
- Efficient and High-Speed CGRA Accelerator for Cryptographic ApplicationsVu Trung Duong Le, Hoai Luan Pham, Thi Hong Tran, Thi Sang Duong, Yasuhiko Nakashima. 189-195 [doi]
- Quantum Computer Architecture for Quantum Error Correction with Distributing Process to Multiple Temperature LayersRyuji Ukai, Chihiro Yoshimura, Hiroyuki Mizuno. 196-202 [doi]
- An Accurate Positioning Geocast Protocol for Safety Message Dissemination in VANETsPaulo V. G. Farias, Jacir Luiz Bordim. 203-209 [doi]
- Security Risk Visualization for Open-Source Software based on Vulnerabilities, Repositories, and DependenciesTomohiko Yano, Hiroki Kuzuno. 210-216 [doi]
- Zero-Knowledge Proofs of Connectivity for Labeled Directed Graphs Using Bilinear-Map AccumulatorTakuma Yoshioka, Toru Nakanishi 0001, Teruaki Kitasuka. 626-632 [doi]