Program (tentative)

  • The program is tentative, subject to change.
  • Each oral presentation will have a duration of 25 minutes, including a 5-minute Q&A session.
  • The presenters should ensure they have properly connected their laptop or notebook PC for the presentation to the LCD projector via HDMI during the break time before their assigned session.
  • The poster size is A0.
  • The paper titles on this Web page are copied from EasyChair. Even if the titles are changed in the final manuscripts, they are not updated here. The updated titles will appear in the CANDAR proceedings published by IEEE CPS.
  • A light meal, such as rice balls and sandwiches will be provided during the poster sessions.

November 25 (Tue)

  • Registration: 17:00-18:00

November 26 (Wed)

  • Registration: 9:10-16:00
  • Reception: 19:00- (Not included in the registration fee. Ticket must be purchased to join)
Time Room A Room B Room C
9:20-9:30 Hall, Opening
9:30-10:30 Hall, Keynote1
10:30-10:45 Break
10:45-12:00 TrackD1 TrackB1 TrackA1
12:00-13:00 Poster(CSA,NCSS)+Lunch
13:00-13:10 Break
13:10-14:50 TrackD2 TrackB2 TrackA2
14:50-15:10 Break
15:10-16:50 TrackC CSA1 PDAA1

November 27 (Thu)

  • Registration: 9:10-16:00
  • Banquet: 19:00- (Not included in the registration fee. Ticket must be purchased to join)
Time Room A Room B Room C
9:30-10:30 Hall, Keynote2
10:30-10:45 Break
10:45-12:00 WICS1 CSA2 PDAA2
12:00-13:00 Poster(GCA,PDAA)+Lunch
13:00-13:10 Break
13:10-14:50 WICS2 WANC1/GCA1 PDAA3
14:50-15:10 Break
15:10-16:50 WICS3 WANC2 GCA2

November 28 (Fri)

  • Registration: 9:10-13:30
Time Room A Room B Room C
9:30-10:30 Hall, Keynote3
10:30-10:45 Break
10:45-12:00 WICS4 WANC3 GCA3
12:00-13:00 Poster(WANC)+Lunch
13:00-13:10 Break
13:10-14:25 WICS5 WANC4
14:30-15:00 Award Ceremony

Oral Sessions

TrackA1

  • Chair: Junya Nakamura (Toyohashi University of Technology)
  • (23) A self-stabilizing algorithm for the dynamic total domination problem, Sayaka Kamei, Masahiro Shibata, Fukuhito Ooshita and Hirotsugu Kakugawa
  • (55) Happy vertex game, Hiroshi Eto, Akiko Fujimoto, Hironori Kiya, Ruka Matsushita, Eiji Miyano, Yuto Murao and Toshiki Saitoh
  • (56) Ultra Low Latency Spiking Locally Competitive Algorithm for Spatio-temporal Data and Hierarchical Networks, Takumi Kuwahara, Reon Oshio, Taiga Hirano, Mutsumi Kimura and Yasuhiko Nakashima

TrackA2

  • Chair: Daisuke Takafuji (Shunan University)
  • (21) Computing Embeddings and Isomorphisms of Finite Semigroups, Attila Egri-Nagy, James East, Andrew Francis and James Mitchell
  • (47) Optimizing Pipeline Parallelism for Deep Learning with Activation Checkpointing, Ming-Yen Chiang, Tzu-Hsien Tsai, Ding-Yong Hong, Pangfeng Liu and Jan-Jan Wu
  • (35) Fully GPU-Accelerated Full Configuration Interaction for Exact Molecular Ground-state Energy Calculation, Hong Gao, Yasuaki Ito, Koji Nakano, Satoshi Imamura, Akihiko Kasagi and Satoki Tsuji“
  • (68) GPU Acceleration of RI-RMP2 Correlation Energy Computation, Kanta Suzuki, Yasuaki Ito, Nobuya Yokogawa, Satoki Tsuji, Koji Nakano, Victor Parque and Akihiko Kasagi

TrackB1

  • Chair: Eitaro Kohno (Notre Dame Seishin University)
  • (9) Leveraging Knowledge Graphs for Semantic-Aware Feed Generation in Bluesky Social Network, Wanli Zhao and Satoshi Fujita
  • (19) Real-Time 6DoF Immersive Video Streaming System Based on MPEG-DASH, Chi-Hsun Chiang, Nien-Chen Lin, Chi-Heng Lan, Chun-Feng Lin, Yi-Yin Chen and Chung-Yi Wang
  • (83) Lift: Byzantine-Tolerant Hub Sampling Protocol, Mohamed Amine Legheraba, Nour Rachdi, Maria Potop-Butucaru and Sebastien Tixeuil

TrackB2

  • Chair: Takatsugu Ono (Kyushu University)
  • (22) Energy-Efficient Hardware Acceleration of Whisper ASR on a CGLA, Takuto Ando, Yu Eto, Ayumu Takeuchi and Yasuhiko Nakashima
  • (66) HPQEA: A Scalable and High-Performance Quantum Emulator with High-Bandwidth Memory for Diverse Algorithms Support, Van Duy Tran, Tuan Hai Vu, Vu Trung Duong Le, Hoai Luan Pham, Cao Doanh Bui and Yasuhiko Nakashima
  • (67) MMzk: 384-bit Low-Resource Montgomery Multiplier on FPGA for zk-SNARK, Hikaru Okamoto, Vu Trung Duong Le, Hoai Luan Pham, Van Tinh Nguyen and Yasuhiko Nakashima
  • (74) iRMTvisor: A Real-Time Hypervisor with IPC Control Scheme, Haruka Sanuki and Nobuyuki Yamasaki

TrackC

  • (77) FashionistAI: A Platform-Independent AI-Powered Fashion Coordination System, Fahim Khan, Hiroki Kinugawa and Ken Sakamura
  • (46) Music Genre Classification Using Multi-Group Self-Attention with Diversity Regularization, Pei-Chun Chang, Chang-Hsing Lee, Yong-Sheng Chen and Jau-Ling Shih
  • (63) Mutual Recommendation of Sake and Dishes using Contrastive Learning-based Embeddings on LLM-generated Descriptive Texts, Souta Matsuda and Tomonobu Ozaki
  • (64) Multi-Interest Sequential Recommendation Based on Prompt-Oriented BERT, Yuruo Su, Shuai Jiang, Sayaka Kamei and Yasuhiko Morimoto

TrackD1

  • Chair: Le Vu Trung Duong (Nara Institute of Science and Technology)
  • (32) Reducing Key Size for Multi-Message Authentication Code with Arbitration, Hiromu Fujino and Satoshi Obana
  • (43) Linked-Data based Verifiable Credentials for Selective Disclosure with Efficient Verification, Riku Miyake, Toru Nakanishi, Teruaki Kitasuka and Zhuotao Lian
  • (61) Improving Homomorphic Evaluation of Bivariate Functions in BFV via Tree-Based BSGS with Lazy Relinearization, Zhongqi Wang, Haru Fujita, Shintaro Narisada and Takashi Nishide

TrackD2

  • Chair: Hiroki Kuzuno (Kobe University)
  • (50) Experimental Evaluations of Fault Sensitivity Imbalance for Masked AES Using t-Test and Entropy, Haruka Hirata, Koki Furuno, Daiki Miyahara, Mitsugu Iwamoto, Kazuo Sakiyama and Yang Li
  • (14) Staged LLM-Based Original Entry Point Identification Using Disassembled Code, Kohei Arai and Ryotaro Kobayashi
  • (39) Detecting Illicit Drug Trade on SNS through Image Classification and Real-time Monitoring, Tetta Hayashi and Ryo Nojima
  • (53) Malicious rApps for Eavesdropping and Data Exfiltration in O-RAN Non-RT RIC, Ting-Jia Wu, Cheng-Feng Hung, Wei-Hong Dai and Shin-Ming Cheng

CSA1

  • Chair: Hideyuki Kawashima (Keio U)
  • (96) A Practical Approach for Optimizing Routes and Injection Timing of Packets for Rapid Collective Communication, Takashi Yokota, Kanemitsu Ootsu and Takuma Kitamoto
  • (10) Managing multiple IO-intensive applications in storage systems, Kazuichi Oe and Kento Aida
  • (78) Seamless Self-healing in WebAssembly Container Orchestration with Runtime-netral Checkpointing, Katsuya Matsubara, Yuzuki Saito, Daigo Fujii and Yuki Nakata
  • (38) Random Trace Shifting by OSs for Side-Channel-Resilient Execution of Legacy Program Binaries, Soma Kato

CSA2

  • Chair: Michihiro Koibuchi (National Institute of Informatics)
  • (11) Performance Evaluation of Load Distribution System based on Diffusion Equation for Asymmetric Network Model, Ryo Enkita, Chisa Takano, Hiroyasu Obata, Yasuhiro Ohishi and Masaki Aida
  • (116) Bringing Algebraic Hierarchical Decompositions to Concatenative Functional Languages, Attila Egri-Nagy
  • (60) EKF-Based Fusion of Wi-Fi/LiDAR/IMU for Indoor Localization and Navigation, Zeyi Li, Zhe Tang, Kyeong Soo Kim, Sihao Li and Jeremy S. Smith

GCA1

  • Chair: Satoki Tsuji (Hiroshima University)
  • (76) SHIELD-SDN: Security Handling of Intrusions and Exploits through Learning and Detection in SDN, Ranyelson Carvalho, Jacir Bordim and Eduardo Alchieri

GCA2

  • Chair: Victor Parque (Hiroshima University)
  • (24) Three-Stage CLIP-Based Approach for Rebar Rust Classification in Precast Concrete Products, Toshiaki Kawagoshi and Naoto Hoshikawa
  • (27) Emotion and Genre-Based Music Recommendation System, Yuecheng Yao and Katunobu Itou
  • (105) Acoustic Signal-Based Binary Classification for Brick Wall Inspection by Hammering Test, Nishchal Acharya, Prabhat Kc, Sajan Maharjan, Prabhat Bhatta, Masafumi Koike, Masako Saito, Katsuhiko Hibino and Atsushi Ito
  • (107) Automatic Monument Detection: Leveraging Deep Learning for Cultural Heritage Applications, Santosh Giri, Jebish Purbey, Sunil Adhikari, Atsushi Ito, Baburam Dawadi, Sushant Chalise and Sanjivan Satyal

GCA3

  • Chair: Jacir L. Bordim (University of Brasilia)
  • (25) GPU implementation of binary and non-binary LDPC decoding, Mark Mizzi and Johann A. Briffa
  • (131) A GPU Implementation of the Second- and Third-Order Møller-Plesset Perturbation Theory, Satoki Tsuji, Yasuaki Ito, Nobuya Yokogawa, Kanta Suzuki, Koji Nakano, Victor Parque and Akihiko Kasagi
  • (123) Impact of Environmental Factors on LoRa 2.4 GHz Time of Flight Ranging Outdoors, Yiqing Zhou, Xule Zhou, Zecan Cheng, Chenao Lu, Junhan Chen, Jiahong Pan, Yizhuo Liu, Sihao Li and Kyeong Soo Kim

PDAA1

  • Chair: Keiichi Kaneko (Tokyo University of Agriculture and Technology)
  • (115) Crash-tolerant perpetual exploration of myopic luminous robots with fewer colors on rings, Fukuhito Ooshita, Hirotsugu Kakugawa, Sayaka Kamei and Masahiro Shibata
  • (133) Limits of Fault-Tolerant Observation: Impossibility of Gathering in the (4,2)-Defected View Model, Andrea Aliberti, Yonghwan Kim and Yoshiaki Katayama
  • (26) A Method for Accelerating Node Influence Computation in Social Networks Focusing on the Largest Strongly Connected Component, Li Xiaoyan and Saito Kazumi
  • (136) Exploring Diverse Cloud Bursting Policies Using Pareto Conditioned Networks, Yoshiki Noguchi, Chonho Lee, Keichi Takahashi and Susumu Date

PDAA2

  • Chair: Shigeru Ninagawa (Kanazawa Institute of Technology)
  • (95) Cellular Automata Denoising Framework for Salt-and-Pepper Noise Considering Directional Structure and Local Homogeneity, Gil-Tak Kong and Un-Sook Choi
  • (1) I see what you do: The HumAct algorithm for live human action recognition and applications, Hannes Fassold
  • (146) Error Correction Methods of Low-precision Analog Matrix Processors for High-precision Matrix Multiplications, Shoichi Hirasawa and Michihiro Koibuchi

PDAA3

  • Chair: Akihiko Kasagi (Fujitsu Ltd.)
  • (8) An Algorithm Portfolio Approach for Parameter Tuning in Coherent Ising Machines, Tatsuro Hanyu, Takahiro Katagiri, Daichi Mukunoki and Tetsuya Hoshino
  • (16) Multi-color ordering method for minimizing number of colors in quadratic unconstrained binary optimization formulation, Tomohiro Suzuki
  • (28) Transfer-Based Strategies for Multi-Target Quantum Optimization, Tuan Hai Vu, Cao Doanh Bui, Vu Trung Duong Le, Hoa Luan Pham and Yasuhiko Nakashima
  • (112) A QUBO-based approach to the Generalized Quadratic Assignment Problem, Yutaro Nakahara, Shunsuke Tsukiyama, Koji Nakano, Yasuaki Ito, Victor Parque, Takashi Yazane, Takumi Kato and Kanto Teranishi

WICS1

  • Chair: Samsul Huda (Okayama University)
  • (3) Enabling Dynamic XSS Attack Detection with Realtime and Fast Response Based on Improved Transformer Learning Model, Somchart Fugkeaw, Kittipat Wattanasuwan, Atikan Mangkala and Panat Kitchon
  • (18) Proposal of Remaining Vulnerability Detection Method for Software Development Environment, Kazuki Oe, Hiroki Kuzuno, Keiichiro Kimura, Makoto Takita and Yoshiaki Shiraishi
  • (72) vkFlow: Automated Identification of Vulnerable Kernel Function Related to System Call, Hiroki Kuzuno and Toshihiro Yamauchi

WICS2

  • Chair: Lihua Wang (National Institute of Information and Communications Technology (NICT))
  • (81) Designated Confirmer Sanitizable Signature suitable for Audit Log, Haruki Hirose and Yuichi Komano
  • (102) Integral Characteristics of Piccolo derived by Bit-based Division Property, Naoki Shibayama and Yasutaka Igarashi
  • (54) Improved Threshold Fully Homomorphic Encryption with Dynamic Role-based Share Refresh, Yixuan He, Yuta Kodera and Yasuyuki Nogami
  • (140) Short Revocable Group Signatures with Compact Revocation Lists from SPS-EQ (preliminary version), Yuka Yonezawa, Toru Nakanishi, Teruaki Kitasuka and Zhuotao Lian

WICS3

  • Chair: Satoshi Obana (Hosei University)
  • (108) ZAPx: Extending OWASP ZAP for Enhanced Web Vulnerability Detection and AI-Powered Remediation, Somchart Fugkeaw, Kittipat Tangtanawirut, Archawit Changtor, Pakapon Rattanasrisuk and Thanabordee Maneerat
  • (48) Decoder-free Audio Watermarking via Visual Cryptography in Time-Frequency Domain, Yuuki Tachioka
  • (31) zk-STARKs in Action: Real-Time and Post-Quantum Verification for Banking Transactions, Thanh Hai To, Vu Trung Duong Le, Van Tinh Nguyen, Van Tuan Luu, Pham Hoai Luan and Yasuhiko Nakashima

WICS4

  • Chair: Samsul Huda (Okayama University)
  • (34) Redactable Signature for Data Anonymization, Shuhei Deno, Ryo Nojima and Lihua Wang
  • (87) Improving Malware Detection Accuracy with Instruction Sequential Features Using AMH, Chihiro Toyoshima, Ryotaro Kobayashi and Masahiko Kato
  • (88) Server Load‑Aware False‑Positive Reduction in an FPGA‑Based Machine‑Learning Network Intrusion Prevention System, Yuma Ito and Ryotaro Kobayashi
  • (90) Penetration Testing Without Port Scanning Using EPSS-Based Vulnerability Lists in Port-Scan Countermeasure Environments, Kosei Okumura and Ryotaro Kobayashi

WICS5

  • Chair: Toru Nakanishi (Hiroshima University)
  • (109) Robust Flick-Based Continuous Authentication via CTGAN-Generated Touch Features, Thanh Phong Do and Yasushi Yamazaki
  • (119) Proposal of an Identity Verification System Using Trusted Execution Environment in the Japan's Digital Authentication App, Tomoki Yasui and Hidenobu Watanabe
  • (130) Player Authentication in Fighting Games using Controller Operation Dynamics, Takeshi Kawamoto, Maharage Nisansala Sevwandi Perera, Franziska Zimmer, Ryosuke Kobayashi, Mhd Irvan and Rie Shigetomi Yamaguchi

WANC1

  • Chair: Shuichi Ichikawa (Toyohashi University of Technology)
  • (73) Pseudo-SMT Processor with Context Cache, Moyo Yanagi and Nobuyuki Yamasaki
  • (129) Performance Evaluation of CNN using RISC-V Vector Extension for Embedded System, Manato Okawara, Kanemitsu Ootsu, Takuma Kitamoto and Takashi Yokota
  • (142) Research on instruction scheduling for extended VLIW based on RISC-V compression instruction set, Yoshiki Yamauchi and Takahiro Sasaki

WANC2

  • Chair: Kanemitsu Ootsu (Utsunomiya University)
  • (51) Proposal and Evaluation of CYPHONIC with QUIC Datagram Mode, Taichi Mushika, Ayano Naito and Hidekazu Suzuki
  • (134) Improvement of Speed of Service Identification based on SNIs in Network Element, Ryo Asaoka, Akihiro Nakao, Masato Oguchi and Saneyasu Yamaguchi
  • (111) A Viability Analysis of IPFS as a Decentralized Storage Solution to IoT, Sopharith Phan and Jigang Liu

WANC3

  • Chiar: Takashi MICHIKAWA (RIKEN)
  • (91) Measurement of Baseball Spin Rate Using a Smartphone Camera, Ryota Yamamoto and Susumu Matsumae
  • (97) Leaf Area Estimation of Tomato Plants Using a Monocular Depth Estimation Mode, Qianlong Liao, Nobuhiko Yamaguchi, Hiroshi Okumura, Tsubasa Nozoe, Munehiro Tanaka and Kalpani Abeysinghe
  • (128) A Novel GNSS Satellite and Pseudorange Selection Method for Robust Positioning in Urban Canyons, Koki Hotta, Hiroyuki Hatano, Kosuke Sanada and Kazuo Mori

WANC4

  • Chair: Takashi Yokota (Utsunomiya University)
  • (33) Paper writing support system using basic design sheet and Gemini Principal Investigator, Susumu Sawai and Yoshiki Ikegami
  • (121) Anomaly Detection in HPC Systems using Time Difference Analysis of Reconstructed Data, Seiya Yaguchi and Ryusuke Egawa
  • (122) Consistent Video Compression using H.266/VVC based on Spatio-Temporal Color Gradients, Kotaro Oikawa, Zhe Sun, Takashi Michikawa, Shin Yoshizawa, Shigeho Noda, Ruggero Micheletto and Hideo Yokota

Poster Sessions

CSA Poster

  • (125) Design of a matrix multiplier using a compressed ternary format, Ryo Nakanowatari and Jubee Tada
  • (126) Design and Implementation of a Dynamic Cache Profiler, Yuki Tada, Takuo Niinuma and Jubee Tada

GCA Poster

  • (98) Emotion Analysis for Chinese Text Using an OpenAI Embedding Model, Mingyang Zhang, Yoshihiro Adachi, Minoru Uehara and Junwu Zhu
  • (110) Performance Estimation Using Both Source and Assembly Code for Data Layout Optimization on GPU, Shintaro Yamamoto and Kazuhiko Ohno
  • (118) On implicit gradient regularization in neural-ordinary-differential-equation control, Alexander Vasilyev

PDAA Poster

  • (36) Pairwise Disjoint Paths Routing in Bicubes, Yitong Wang and Keiichi Kaneko
  • (40) Flying Register in a Three-State Face-Centered Cubic Cellular Automaton, Shigeru Ninagawa
  • (101) Co-Optimization of Models and Hardware for Neural Network Inference in Variable-Parallelism Processor, Yu Inoue, Atsushi Hori, Alexandre Schmid, Takao Marukame, Tetsuya Asai and Kota Ando
  • (106) An asynchronous P system with branch and bound for solving N-puzzle, Naoya Kamakura and Akihiro Fujiwara

WANC Poster

  • (6) A flexible FPGA implementation of GNSS signal acquisition circuit using high level synthesis, Naoki Fujieda, Rei Yokoyama and Takuji Ebinuma
  • (49) Outdoor Positioning Method for Tourism Apps Using BLE Beacon and GNSS, Sho Kato, Madoka Hasegawa, Naoya Tsuruta and Atsushi Ito
  • (69) Exploring Shared Reservation Stations for Embedded Processors, Kazuki Kogure and Nobuyuki Yamasaki”
  • (103) Prediction of plasma drug concentration of lenvatinib using missing data imputation, Kosei Kishimoto, Nobuhiko Yamaguchi, Sakiko Kimura, Masatomo Miura, Osamu Fukuda and Wen Liang Yeoh
  • (113) JVProf: Locating Vectorization Candidates in JVM Applications, Andrea Rosà, Joy Albertini, Júnior Löff and Walter Binder
  • (117) Consideration of Network Anomaly Detection Models using Machine Learning, Souma Kai and Chikatoshi Yamada

NCSS Poster

  • (139) A Case Study on Extending Rules of Games, Takahiro Imano and Minoru Uehara
  • (141) Introspective Self-Dialogue: Iterative APR with CoT and Error Logs, Keisuke Kitamura, So Onishi, Akihito Kohiga and Takahiro Koita
  • (143) HUBO Formulation For Task Allocation Optimization in Hybrid Optical-Electrical Networks, Yaxuan Zhao, Shunsuke Tsukiyama, Koji Nakano, Michihiro Koibuchi, Victor Parque and Yasuaki Ito
  • (144) Evaluating the Efficiency of Hailo-8 for YOLOv10-Based Object Detection in Edge Environments, Phyo Min Myat and Yasunori Osana
  • (145) Developing a generator for CUDA C files to reduce synchronization overhead (preliminary version), Daisuke Takafuji