• Lunch will be provided during the poster sessions and after the award ceremony.
  • Each oral presentation will have a duration of 25 minutes, including a 5-minute Q&A session.
  • The presenters should ensure they have properly connected their laptop or notebook PC for the presentation to the LCD projector via HDMI during the break time before their assigned session.
  • The poster board dimensions are W1200 x H2100 x D30, as specified on
  • Instructions for online presentations will be provided one week prior to the symposium.
  • You need to join the CANDAR 2023 slack channel for the details of Zoom presentation.

November 28 (Tuesday)

  • 16:00-17:00 : Registration (Small Hall)

November 29 (Wednesday)

JST(UTC+9) 601 501 401
9:20-10:05 Keynote 1
10:05-10:20 Break
10:20-12:00 PDAA1 TrackC1
12:00-13:10 Poster 1 with Lunch (Small Hall)
13:10-13:55 PDAA Keynote
13:55-14:10 Break
14:10-15:25 PDAA2 TrackC2/GCA1 TrackD1
15:25-15:40 Break
15:40-16:55 PDAA3/TrackA1 GCA2 TrackD2
  • 17:30- Reception (Small Hall, included in the registration fee)

November 30 (Thursday)

JST(UTC+9) 601 501 401
9:20-10:05 Keynote2
10:05-10:20 Break
10:20-12:00 SUSCW1 TrackA2 TrackD3
12:00-13:10 Poster 2 with Lunch (Small Hall)
13:10-13:55 SUSCW Keynote
13:55-14:10 Break
14:10-15:25 SUSCW2 WANC1 WICS1
15:25-15:40 Break
15:40-16:55 TrackB1 WANC2 WICS2

December 1 (Friday)

JST(UTC+9) 601 501 401
9:15-10:30 WANC3 TrackB2 WICS3
10:30-10:45 Break
10:45-12:00 WANC4/CSA1 TrackB3 WICS4
12:00-12:15 Award Ceremony   
12:15-13:10 Lunch (Small Hall)
13:10-13:55 CSA Keynote
13:55-14:10 Break
14:10-15:25 CSA2 WANC5 WICS5
15:25-15:40 Break
15:40-16:55 CSA3 ASON WICS6


  • Chair: Hirotsugu Kakugawa, Ryukoku University
  • 75, An Incremental Algorithm for $(2-\epsilon)$-Approximate Steiner Tree Requiring $O(n)$ Update Time, Hemraj Raikwar and Sushanta Karmakar(remote)


  • Chair: Susumu Matsumae, Saga University
  • 33, SMOG - An Explicitly Composable Memory Benchmark Suite for Heterogeneous Memory, Andreas Grapentin, Felix Eberhardt and Andreas Polze
  • 35, Auto-tuning Mixed-precision Computation by Specifying Multiple Regions, Xuanzhengbo Ren, Masatoshi Kawai, Tetsuya Hoshino, Takahiro Katagiri and Toru Nagai
  • 28, Solving the N-Queens Puzzle by a QUBO Model with Quadratic Size, Shunsuke Tsukiyama, Koji Nakano, Yasuaki Ito, Takashi Yazane, Junko Yano, Takumi Kato, Shiro Ozaki, Rie Mori and Ryota Katsuki
  • 37, Efficient GPU-Accelerated Bulk Evaluation of the Boys Function for Quantum Chemistry, Satoki Tsuji, Yasuaki Ito, Koji Nakano and Akihiko Kasagi

Track B1

  • Chair: Michihiro Koibuchi, NII
  • 41, Parallel Implementation of Vision Transformer on a Multi-FPGA Cluster, Yasuyu Fukushima, Kensuke Iizuka and Hideharu Amano
  • 66, A Non-stop Fault-Tolerant Real-Time System-on-Chip/System-in-Package, Shota Nakabeppu, Nobuyuki Yamasaki, Kenta Suzuki, Keizo Hiraga and Kazuhiro Bessho
  • 73, Efficient and High-Speed CGRA Accelerator for Cryptographic Applications, Vu Trung Duong Le, Hoai Luan Pham, Thi Hong Tran, Thi Sang Duong and Yasuhiko Nakashima

Track B2

  • Chair: Eitaro Kohno, Hiroshima City University,
  • 77, Multi-Objective Optimization of Controller Placement in Distributed ONOS Networks, Kang Xingyuan, Keichi Takahashi, Chawanat Nakasan, Kohei Ichikawa and Hajimu Iida
  • 80 Distributed MQTT Brokers Infrastructure with Network Transparent Hardware Broker, Tokimasa Toyohara and Hiroaki Nishi
  • 65 An Accurate Positioning Geocast Protocol for Safety Message Dissemination in VANETs, Paulo V G Farias and Jacir L Bordim

Track B3

  • Chair: Truong Thao Nguyen, AIST,
  • 12, Dual Diagonal Mesh: An Optimal Memory Cube Network Under Geometric Constraints, Masashi Oda, Kai Keida and Ryota Yasudo
  • 3, Dimension-Extended Dragonfly: A More Flexible Interconnection Network Aimed at Reducing Hardware Cost, Yaodong Wang and Yamin Li (remote)
  • 20, Quantum Computer Architecture for Quantum Error Correction with Distributing Process to Multiple Temperature Layers, Ryuji Ukai, Chihiro Yoshimura and Hiroyuki Mizuno


  • Chair: Akihiko Kasagi, Fujitsu Ltd.
  • 10, Pseudo-Random Number Generation by Staggered Sampling of LFSR, Shuichi Ichikawa
  • 87, SEM: A Simple Yet Efficient Model-agnostic Local Training Mechanism to Tackle Data Sparsity and Scarcity in Federated Learning, Quang Ha Pham, Nang Hung Nguyen, Tanh Hung Nguyen, Huy Hieu Pham, Phi Le Nguyen and Truong Thao Nguyen
  • 17, Accelerate Inference of CNN Models on CPU via Column Combining Based on Simulated Annealing, Chien-Hung Lin, Ding-Yong Hong, Pangfeng Liu and Jan-Jan Wu
  • 68, Exploiting Unlabeled RSSI Fingerprints in Multi-Building and Multi-Floor Indoor Localization through Deep Semi-Supervised Learning Based on Mean Teacher, Sihao Li, Zhe Tang, Kyeong Soo Kim and Jeremy Smith(remote)


  • Chair: Hiroyuki Sato, The University of Tokyo
  • 18, Flexibility and Privacy: A Multi-Head Federated Continual Learning Framework for Dynamic Edge Environments, Chunlu Chen, Kevin I-Kai Wang, Peng Li and Kouichi Sakurai


  • Chair: Satoshi Obana, Hosei University
  • 56, A New Approach to Disabling SSL/TLS: Man-in-the-Middle Attacks are still Effective, Keiichiro Kimura, Yoshiaki Shiraishi and Masakatu Morii
  • 36, Encryption Invalidation Attacks: Is your Wi-Fi encryption really working?, Taketo Inoue, Kosuke Kuriyama, Yoshiaki Shiraishi and Masakatu Morii
  • 60, Accountable Ring Signatures from Symmetric-Key Primitives, Hiroaki Anada, Masayuki Fukumitsu and Shingo Hasegawa


  • Chair: Hiroaki Anada, Aomori University
  • 42, Issuer-Revocable Issuer-Hiding Attribute-Based Credentials Using an Accumulator, Nasima Begum and Toru Nakanishi(remote)
  • 16, Zero-Knowledge Proofs of Connectivity for Labeled Directed Graphs Using Bilinear-Map Accumulator, Takuma Yoshioka, Toru Nakanishi and Teruaki Kitasuka
  • 43, A Cryptanalysis against the Cheating Detectable Secret Sharing from NISS 2019, Kiminori Kaneko and Satoshi Obana


  • Chair: Masaya Sato, Okayama Prefectural University
  • 8, Poisoning Attacks against Network Intrusion Detection Systems Using Shapley Values to Identify Trends in Poisoning Data, Tomohiro Hasegawa and Ryotaro Kobayashi(remote)
  • 40, Evaluation of Effectiveness of MAC Systems Based on LSM for Protecting IoT Devices, Masato Miki, Toshihiro Yamauchi and Satoru Kobayashi(remote)
  • 23, Security Risk Visualization for Open-Source Software based on Vulnerabilities, Repositories, and Dependencies, Tomohiko Yano and Hiroki Kuzuno
  • 38, eSilo: Making Silo Secure with SGX, Masahide Fukuyama, Masahiro Tanaka, Ryota Ogino and Hideyuki Kawashima


  • Chair: Tomoyuki Ohta, Hiroshima City University
  • 114, Measuring driver's emotion, Jinshan Luo, Yuki Okaniwa, Yuko Hiramatsu, Atsushi Ito and Madoka Hasegawa
  • 115, Method for Detecting DoH Communications from Non-Encrypted Information at a Middlebox, Yuya Takanashi and Shigetomo Kimura
  • 112, A study for environmental adaptation of IoT devices, Yoji Yamato(remote)


  • Chair: Hayato Yamaki, The University of Electro-Communications
  • 141, Effectiveness of utilizing meta attributes in anomaly detection using crowdsourcing, Tatsuki Tamano, Ryuya Itano, Honoka Tanitsu and Takahiro Koita


  • Chair: Shoichi Hirasawa, National Institute of Informatics
  • 108, Improving Raft Performance with Bulk Transfers, Aoi Yamashita, Masahiro Tanaka, Yutaro Bessho, Yasuhiro Fujiwara and Hideyuki Kawashima
  • 32, Fairly Decentralizing a Hybrid Concurrency Control Protocol for Real-time Database Systems, Tung Nguyen and Hideyuki Kawashima
  • 53, Acceleration of Sociality-Aware Message Routing in Opportunistic Networks, Yuwei Zhang and Satoshi Fujita


  • Chair: Shoichi Hirasawa, National Institute of Informatics
  • 79, A Design of Multithreaded RISC-V Processor for Real-Time System, Yuta Nojiri and Nobuyuki Yamasaki
  • 140, A Scheme Reducing Task Drops for Data Dependent Tasks on Mixed Criticality Systems, Reo Nagura and Nobuyuki Yamasaki(remote)
  • 152, A Design Scheme for Highly Efficient Mixed-Criticality Systems Using IPC Control, Kosuke Yashima and Nobuyuki Yamasaki(remote)


  • Chair: Jacir L. Bordim, University of Brasilia
  • 101, Stage-Wise and Hierarchical Training of Linked Deep Neural Networks for Large-Scale Multi-Building and Multi-Floor Indoor Localization Based on Wi-Fi Fingerprinting, Sihao Li, Kyeong Soo Kim, Zhe Tang and Jeremy Smith(remote)
  • 135, A GPU-Based Parallel Implementation of the GWO Algorithm: Application to the Solution of Large-Scale Nonlinear Equation Systems, Bruno Silva and Luiz Guerreiro Lopes(remote)


  • Chair: Yasuaki Ito, Hiroshima University
  • 21, Semantic Search of Japanese Sentences Using Distributed Representations, Kenshin Tsumuraya, Minoru Uehara and Yoshihiro Adachi
  • 55, Detecting EDoS Attacks in Cloud Environments Using Machine Learning and Metaheuristic Algorithms, Alessandro Cordeiro de Lima, Jacir L Bordim and Eduardo A P Alchieri
  • 149, Improving the Accuracy of Virtual Try-On with Real-World Dataset Using Genetic Algorithm, Kosei Takaki, Taiyo Sato, Takumi Ikenaga and Shudai Ishikawa


  • Chair: Sayaka Kamei, Hiroshima University
  • 113, An asynchronous P system for solving the minimum Steiner tree with branch and bound, Reo Ueno and Akihiro Fujiwara
  • 19, A self-stabilizing distributed algorithm for the 1-MIS problem under the distance-3 model, Hirotsugu Kakugawa, Sayaka Kamei, Masahiro Shibata and Fukuhito Ooshita
  • 29, Asynchronous Complete Visibility Algorithm for Luminous Robots on Grid, Yonghwan Kim, Yoshiaki Katayama and Koichi Wada
  • 107, On Implementation of Brownian Circuits by Swarm Agents, Masahiro Kimura, Teijiro Isokawa, Ferdinand Peper, Sho Nakade, Jia Lee and Naotake Kamiura


  • Chair: Yonghwan Kim, Nagoya Institute of Technology
  • 39, A Method for Automatic Generation of 3D Background Models Using Fractal Models and Genetic Algorithms, Kaito Watanabe, Hirotaka Nakayama, Atsushi Shiraki, Tomoyoshi Ito, Katsumi Hirata and Naoto Hoshikawa
  • 54, Multiplication of Local Formulae and Commutativity of CAs with Essentially 3-Neighborhood Local Functions over Monoid $\mathbb{N}$, Toshikazu Ishida and Shuichi Inokuchi
  • 47, On Dynamics of Basic Network Creation Games with Non-Uniform Communication Interest, Maxime Dresler, Sanai Mansour, Safaa Talhaoui, Yukiko Yamauchi and Sebastien Tixeuil


  • Chair: Hirotsugu Kakugawa, Ryukoku University
  • 89, The Popular Matching Problem in a (3, 3)−Hypergraph with One-sided Preferences, Yashdeep Singh and Sushanta Karmakar(remote)


  • Chair:Hideharu Amano, Keio University
  • 62, Polynomial-Time Cloudlet Placement Scheme with an Improved Approximation Ratio, Chuankai Wang and Satoshi Fujita
  • 63, Online Assignment of Reservations to Parking Lots for Smart Cities under the i.i.d. Model, Yuhang Du and Satoshi Fujita
  • 94, A Multitenant Single-Page Application for Programming Education, Ruoxuan Wang and Minoru Uehara
  • 95, Browser-based Java Development Environment for Programming Education, Yibao Liang and Minoru Uehara


  • Minoru Uehara, Toyo University
  • 51, Performance Improvement of Federated Learning Server using Smart NIC, Naoki Shibahara, Michihiro Koibuchi and Hiroki Matsutani
  • 69, Design of Decoded Instruction Cache, Takero Magara and Nobuyuki Yamasaki
  • 103, An implementation of an Instruction Contorolled Cache Replacement Policy on a RISC-V Processor, Riku Takayama and Jubee Tada


  • Chair: Daiki Miyahara, The University of Electro-Communications
  • 31, Prevention Method for Stack Buffer Overflow Attack in TA Command Calls in OP-TEE, Kaito Shiba, Hiroki Kuzuno and Toshihiro Yamauchi(remote)
  • 27, Analyzing Post-injection Attacker Activities in IoT Devices: A Comprehensive Log Analysis Approach, Hervet Victor, Satoru Kobayashi and Toshihiro Yamauchi
  • 121, Supporting multiple OS types on estimation of system call hook point by virtual machine monitor, Masaya Sato, Taku Omori, Toshihiro Yamauchi and Hideo Taniguchi


  • Chair: Satoru Kobayashi, Okayama University
  • 6, Verification of IoT Malware Match Rate Using Signatures Created Based on Processor Information, Yutaro Matunaka, Ryotaro Kobayashi and Masahiko Kato(remote)
  • 7, Single-Hardware Method to Detect Malicious Communications and Malware on Resource-Constrained IoT Devices, Taku Sudo, Ryotaro Kobayashi and Masahiko Kato(remote)
  • 45, Real-Time Defense System using eBPF for Machine Learning-Based Ransomware Detection Method, Kosuke Higuchi and Ryotaro Kobayashi(remote)


  • Chair: Toru Nakanishi, Hiroshima University
  • 67, Impact of Anonymity Indicator “PFDOC Entropy l-Diversity” on Medical Data Utility, Kenta Kitamura, Mhd Irvan and Rie Shigetomi Yamaguchi
  • 72, A Proposal of Solving NTRU Equation Using Matrix Representation Instead of Recursive Operation, Tetsuro Ishida, Kazuma Ikesaka, Md Arshad Ali, Yasuyuki Nogami and Yuta Kodera
  • 74, An integrated secured vehicular ad-hoc network leveraging Kerberos authentication and Blockchain technology, Maya Rahayu, Md. Arshad Ali, Samsul Huda, Yuta Kodera and Yasuyuki Nogami


  • Chair: Toru Nakanishi, Hiroshima University
  • 81, An implementation of ELiPS-based Ciphertext-Policy Attribute-Based Encryption, Le Hoang Anh, Yuta Kawada, Samsul Huda, Md. Arshad Ali, Yuta Kodera and Yasuyuki Nogami
  • 88, A Smart Contract Based Blockchain Approach Integrated with Elliptic Curve Cryptography for Secure Email Application, Md. Biplob Hossain, Md. Arshad Ali, Samsul Huda, Yuta Kodera and Yasuyuki Nogami
  • 98, Emergency Button: Evacuation of Crypto Asset When Key Loss, Natsume Matsuzaki, Masayuki Fukumitsu and Yoshihiro Kita


  • Chair: Natsume Matsuzaki, University of Nagasaki
  • 102, Introduction of Finger-softness Feature into Writer Verification Based on Finger-writing of Simple Symbol, Takumi Fukuda and Isao Nakanishi
  • 9, Improved Vulnerability Handling Framework to Automatically Fix Vulnerable Web Applications, Yuki Funaoka and Hiroshi Koide WICS
  • 139, Experiments on ROP Attack with Various Instruction Set Architectures, Yuma Taki, Masayuki Fukumitsu and Yumura Tsubasa


  • Chair: Samsul Huda, Okayama University
  • 50, Automated Extraction for Vulnerability Management on PSIRT: A Case Study of Automotive Industry, Momoka Kasuya, Nobuyoshi Morita, Hiroki Yamazaki and Kazuo Sakiyama(remote)
  • 120 On the Practical Dependency of Fresh Randomness in AES S-box with Second-Order TI, Maki Tsukahara, Haruka Hirata, Mingyu Yang, Daiki Miyahara, Yang Li, Yuko Hara-Azumi and Kazuo Sakiyama
  • 144 Empirical Hardness of AES Cipher, Kanat Alimanov, Martin Lukac and Shinobu Nagayama


  • Chair: Saneyasu Yamaguchi, Kogakuin University
  • 52, DODA: A Decentralized Online Dating Application, Nobuaki Kuwabara and Satoshi Fujita
  • 143, Consideration of Shortening Search Time for Circulation Algorithm Operation in Disaster-Affected Areas, Yugo Urano
  • 83, Rank Attack Avoidance Method based on Neighbor Node Rank Variation in RPL Network, Masami Yoshida, Ryota Uchida and Taku Noguchi


  • Chair: Takashi Yokota, Utsunomiya University
  • 92, Extraction of Subjective Information from Generative AI Models, Atsuya Kobayashi and Saneyasu Yamaguchi
  • 116, Proxy-based transaction acceleration for NewSQL, Yutaka Watanabe, Ryota Kawashima and Hiroshi Matsuo
  • 25, A Serverless Signaling Scheme for WebRTC Using Bluetooth LE, Takuto Hashibe, Makoto Murakoshi, Teruaki Kitasuka and Toru Nakanishi


  • Chair: Hiroshi Matsuo, Nagoya Institute of Technology
  • 61, Stochastic Resonance Assisted Successive Interference Cancellation Receiver for Multilevel Modulated Signals, Yuta Tomida, Hiroyuki Hatano, Kosuke Sanada and Kazuo Mori
  • 130, Priority-MPTCP: A Novel Multipath Data Transfer Method for V2V Communication, Junya Yamamoto, Hirotake Abe, Kenta Yamasawa and Kazuhiko Kato
  • 133, Improving TCP Fairness by Expiring TCP BBR Considering Frequency, Reo Otsuka and Saneyasu Yamaguchi


  • Chair: Hayato Yamaki, The University of Electro-Communications
  • 96, A Cost-aware Generation Method of Disposable Random Value Exploiting Parallel S-box Implementation for Tamper Resistant AES Design, Yui Koyanagi and Tomoaki Ukezono
  • 124, Accelerating Key-Value Store with Layer-2 Transparent Proxy Cache using DPDK, Hayato Aoba, Ryota Kawashima and Hiroshi Matsuo


  • Chair: Shuichi Ichikawa, Toyohashi University of Technology
  • 4, Low-cost implementation of a bicycle assistance embedded system using TensorFlow Lite, Yudai Katto and Yukikazu Nakamoto
  • 15, Dimensionality Reduction Using VAE for Deep Reinforcement Learning of Autonomous Driving, Yuta Uehara and Susumu Matsumae

Poster 1

  • 126,Efficient Cryptographic Processing Using On-Chip GPUs in System-on-Chip Architectures,Hiromasa Takeda, Eiji Sugino and Hiroyuki Sato (GCA)
  • 59,Implementation of the Home Automation System by Using FPGA Platform,Shan-Cheng Pan, Wei-Der Chang and Cheng-En Chung (PDAA)
  • 137,Baby-Holding Posture Determination System using Pose Estimation,Yuki Matsunaga, Nobuhiko Yamaguchi, Koki Nakano, Osamu Fukuda, Hiroshi Okumura, Wen Liang Yeoh, Tamami Satoh, Rika Nakano and Asuka Sakamoto (NCSS)
  • 142,A Multi-Port All-to-All Communication on Two-Level Fully Connected Network Topology,Kien Trung Pham and Michihiro Koibuchi
  • 145,Various QUBO Formulations of the Graph Isomorphism Problem and Related Problems,Daisuke Takafuji, Koji Nakano, Yasuaki Ito, Takashi Yazane, Junko Yano, Takumi Kato, Shiro Ozaki, Rie Mori and Ryota Katsuki (NCSS)
  • 146,A GPU Implementation of the Two-Electron Repulsion Integral Evaluation,Haruto Fujii, Satoki Tsuji, Yasuaki Ito and Koji Nakano (NCSS)
  • 148,Efficient Quantum Circuit Generation for Quantum Amplitude Estimation,Hiroshi Fujita and Akihiko Kasagi (NCSS)
  • 150,The Impact of Collective Communication on Random and Non-Random Shortcut Topologies,Ke Cui and Michihiro Koibuchi (NCSS)
  • 151,Benchmarking Multi-agent Reinforcement Learning-based Access Control using Real-world IoT Traffic,Le Tien Thanh, Yusheng Ji, Hong Linh Truong and John C.S. Lui (NCSS)

Poster 2

  • 131,A Dynamic Method for Forming Vehicle Platoons and Its Evaluations in Urban Areas,Koya Mitsuhira, Shinji Inoue and Tomoyuki Ohta (ASON)
  • 93,A Deep Neural Network Translator for Edge Site Implementation,Mery Diana, Masato Kiyama, Motoki Amagasaki, Masayoshi Ito and Yuki Morishita (CSA)
  • 119,Motivation Survey and Influence Factor Analysis of Old People to Improve Digital Literacy,Mingqi Cai and Hiroyuki Kose (SUSCW)
  • 100,Data Augmentation with Pseudo-Infrared Night-Vision Image Conversion for Improved Nighttime Object Detection,Ryoma Ishizu, Hironori Kitakaze and Ryo Matsumura (WANC)
  • 106,Simulation-based Analysis of Power Side-Channel Leakage at Different Sampling Intervals,Yuto Miura, Hiroki Nishikawa, Xiangbo Kong and Hiroyuki Tomiyama (WANC)
  • 111,Surveillance Routing with a Minimum Number of Drones,Kaito Mori, Mao Nishira, Hiroki Nishikawa and Hiroyuki Tomiyama (WANC)
  • 125,Adaptive Thread Type Selection on the Java Virtual Machine,Andrea Rosà, Matteo Basso, Leonardo Bohnhoff and Walter Binder (WANC)
  • 128,Performance Evaluation and Improvement of HTTP/3 Considering TLS,Ryuichi Niitsu and Saneyasu Yamaguchi (WANC)
  • 97,Bicycle-based collision prevention system using iPhone with LiDAR,Makoto Eguchi, Nobuhiko Yamaguchi, Osamu Fukuda, Hiroshi Okumura and Wen Liang Yeoh (WANC)
  • 147,Hardware Implementation for Real-Time Homography Transformations,Ikko Uehara, Chikatoshi Yamada and Shuichi Ichikawa (NCSS)