Session Details
[B-6]Network Systems
Thu. Sep 11, 2025 9:00 AM - 12:15 PM JST
Thu. Sep 11, 2025 12:00 AM - 3:15 AM UTC
Thu. Sep 11, 2025 12:00 AM - 3:15 AM UTC
Building for General Education (A/B/C) 3F B33(Okayama University)
Chair:HIDEHARU KOJIMA(Osaka Institute of Technology), DAIKI NOBAYASHI(Kyushu Institute of Technology)
[B-6-30]量子ネットワークにおけるマルチホップ EPR ペアの保持を目的とした量子メモリの配置法
〇Satoshi Morita1, Noriaki Kamiyama1 (1. Ritsumeikan Univ .)
[B-6-31]Investigating Influence of Purification Timing on Required Purification Count in Quantum Networks
〇Hanaa Tabet Aoul1, Satoshi Morita1, Noriaki Kamiyama1 (1. Ritsumeikan university)
[B-6-32]LLM-Based Approach for Streamlining the Analysis of Network Device Documentation
〇Tatsuya Hirano1, Hiroki Inoue1 (1. NTT, Inc.)
[B-6-33]QoE Evaluation Method Using Feature Compression and Large Language Models
〇Akihiro Kimura1, Tomoki Tajimi1, Toshihiko Nakano1, Satoshi Nishiyama1, Yasuyuki Matsuoka1 (1. NTT, Inc.)
[B-6-34]Method for Creating Implementation Checklists from Specification Documents
〇Toshihiro Kikuchi1, Takayuki Fujiwara1, Hiroki Inoue1 (1. NTT, Inc.)
[B-6-35]A Study on Supporting the Identification of Requirement and Viewpoint Omissions in Development
〇Hiroki Inoue1 (1. NTT, Inc.)
Break time
[B-6-36]Light-weight Packet Sender Authentication against DDoS
〇Koji Sugisono1, Kanji Nakano1, Kaori Kurita1, Hideo Tsuchiya1, Hitoshi Irino1, Yasuyuki Matsuoka1 (1. NTT Inc.)
[B-6-37]カーネルバイパスアプリケーションに対する高速暗号化手法の検討
〇Yoshiki Kobayashi1, Takuro Yamaguchi1, Naohiro Kimura1, Yasuhiro Mochida1, Junki Ichikawa1, Hirokazu Takahashi1 (1. NTT, Inc.)
[B-6-38]A Study on Architecture for Dynamic Network Security Control Using eBPF
〇Yoshihiko Omori1 (1. NTT, Inc.)
[B-6-39]A Differential Privacy Method Using Homomorphic Encryption in Federated Learning
〇Yusaku Negoya1, Aohan Li1 (1. University of Electro-Communications)
[B-6-40]The Fastest Anonymous Communication Protocol to Defeat the Passive Colluding Attack
〇Yutaro Yoshinaka1, Junji Takemasa1, Yuki Koizumi1, Toru Hasegawa2 (1. The University of Osaka, 2. Shimane University)
[B-6-41]連合特異値分解に対するデータ再構築攻撃に関する一考察
〇Takumi Suimon1, Yuki Koizumi1, Junji Takemasa1, Toru Hasegawa2 (1. The University of Osaka, 2. Shimane University)