default search action
11th CANDAR 2023: Matsue, Japan
- Eleventh International Symposium on Computing and Networking, CANDAR 2023, Matsue, Japan, November 28 - Dec. 1, 2023. IEEE 2023, ISBN 979-8-3503-0670-5
- Chunlu Chen, Kevin I-Kai Wang, Peng Li, Kouichi Sakurai:
Flexibility and Privacy: A Multi-Head Federated Continual Learning Framework for Dynamic Edge Environments. 1-10 - Keiichiro Kimura, Yoshiaki Shiraishi, Masakatu Morii:
A New Approach to Disabling SSL/TLS: Man-in-the-Middle Attacks are still Effective. 11-19 - Chien-Hung Lin, Ding-Yong Hong, Pangfeng Liu, Jan-Jan Wu:
Accelerate Inference of CNN Models on CPU via Column Combining Based on Simulated Annealing. 20-29 - Shota Nakabeppu, Nobuyuki Yamasaki, Kenta Suzuki, Keizo Hiraga, Kazuhiro Bessho:
A Non-stop Fault-Tolerant Real-Time System-on-Chip/System-in-Package. 30-39 - Masashi Oda, Kai Keida, Ryota Yasudo:
Dual Diagonal Mesh: An Optimal Memory Cube Network Under Geometric Constraints. 40-48 - Satoki Tsuji, Yasuaki Ito, Koji Nakano, Akihiko Kasagi:
Efficient GPU-Accelerated Bulk Evaluation of the Boys Function for Quantum Chemistry. 49-58 - Shunsuke Tsukiyama, Koji Nakano, Yasuaki Ito, Takashi Yazane, Junko Yano, Takumi Kato, Shiro Ozaki, Rie Mori, Ryota Katsuki:
Solving the N-Queens Puzzle by a QUBO Model with Quadratic Size. 59-67 - Yaodong Wang, Yamin Li:
Dimension-Extended Dragonfly: A More Flexible Interconnection Network Aimed at Reducing Hardware Cost. 68-75 - Xingyuan Kang, Keichi Takahashi, Chawanat Nakasan, Kohei Ichikawa, Hajimu Iida:
Multi-Objective Optimization of Controller Placement in Distributed ONOS Networks. 76-85 - Hiroaki Anada, Masayuki Fukumitsu, Shingo Hasegawa:
Accountable Ring Signatures from Symmetric-Key Primitives. 86-92 - Nasima Begum, Toru Nakanishi:
Issuer-Revocable Issuer-Hiding Attribute-Based Credentials Using an Accumulator. 93-99 - Yasuyu Fukushima, Kensuke Iizuka, Hideharu Amano:
Parallel Implementation of Vision Transformer on a Multi-FPGA Cluster. 100-106 - Masahide Fukuyama, Masahiro Tanaka, Ryota Ogino, Hideyuki Kawashima:
eSilo: Making Silo Secure with SGX. 107-112 - Andreas Grapentin, Felix Eberhardt, Andreas Polze:
SMOG - An Explicitly Composable Memory Benchmark Suite for Heterogeneous Memory. 113-119 - Quang-Ha Pham, Nang Hung Nguyen, Thanh Hung Nguyen, Huy Hieu Pham, Phi Le Nguyen, Truong Thao Nguyen:
SEM: A Simple Yet Efficient Model-agnostic Local Training Mechanism to Tackle Data Sparsity and Scarcity in Federated Learning. 120-126 - Tomohiro Hasegawa, Ryotaro Kobayashi:
Poisoning Attacks against Network Intrusion Detection Systems Using Shapley Values to Identify Trends in Poisoning Data. 127-133 - Shuichi Ichikawa:
Pseudo-Random Number Generation by Staggered Sampling of LFSR. 134-140 - Taketo Inoue, Kosuke Kuriyama, Yoshiaki Shiraishi, Masakatu Morii:
Encryption Invalidation Attacks: Is your Wi-Fi encryption really working? 141-147 - Kiminori Kaneko, Satoshi Obana:
A Cryptanalysis against the Cheating Detectable Secret Sharing from NISS 2019. 148-154 - Sihao Li, Zhe Tang, Kyeong Soo Kim, Jeremy S. Smith:
Exploiting Unlabeled RSSI Fingerprints in Multi-Building and Multi-Floor Indoor Localization through Deep Semi-Supervised Learning Based on Mean Teacher. 155-160 - Masato Miki, Toshihiro Yamauchi, Satoru Kobayashi:
Evaluation of Effectiveness of MAC Systems Based on LSM for Protecting IoT Devices. 161-167 - Hemraj Raikwar, Sushanta Karmakar:
An Incremental Algorithm for (2-ε)-Approximate Steiner Tree Requiring O(n) Update Time. 168-174 - Xuanzhengbo Ren, Masatoshi Kawai, Tetsuya Hoshino, Takahiro Katagiri, Toru Nagai:
Auto-tuning Mixed-precision Computation by Specifying Multiple Regions. 175-181 - Tokimasa Toyohara, Hiroaki Nishi:
Distributed MQTT Brokers Infrastructure with Network Transparent Hardware Broker. 182-188 - Vu Trung Duong Le, Hoai Luan Pham, Thi Hong Tran, Thi Sang Duong, Yasuhiko Nakashima:
Efficient and High-Speed CGRA Accelerator for Cryptographic Applications. 189-195 - Ryuji Ukai, Chihiro Yoshimura, Hiroyuki Mizuno:
Quantum Computer Architecture for Quantum Error Correction with Distributing Process to Multiple Temperature Layers. 196-202 - Paulo V. G. Farias, Jacir Luiz Bordim:
An Accurate Positioning Geocast Protocol for Safety Message Dissemination in VANETs. 203-209 - Tomohiko Yano, Hiroki Kuzuno:
Security Risk Visualization for Open-Source Software based on Vulnerabilities, Repositories, and Dependencies. 210-216 - Takuma Yoshioka, Toru Nakanishi, Teruaki Kitasuka:
Zero-Knowledge Proofs of Connectivity for Labeled Directed Graphs Using Bilinear-Map Accumulator. 626-632
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.