Program for 2024 International Symposium on Information Theory and Its Applications
Back to ISITA2024 Top PageTime (Taipei) | Room 1 (IB101) | Room 2 (IB201) | Room 3 (IB202) | Room 4 (IB301) | IBB |
---|---|---|---|---|---|
Monday, November 11 |
|||||
09:00 am-10:00 am | Mo-AM-P: Plenary Talk 1 | ||||
10:20 am-12:00 pm | Mo-AM-1-1: Coding Theory 1 | Mo-AM-1-2: Quantum Information Theory | Mo-AM-1-3: Statistical Learning 1 | ||
02:00 pm-03:00 pm | Mo-PM-P: Plenary Talk 2 | ||||
03:30 pm-04:50 pm | Mo-PM-1-1: Quantum Insertion/Deletion Errors | Mo-PM-1-2: AI Security and Privacy | Mo-PM-1-3: Communication Theory | ||
Tuesday, November 12 |
|||||
09:00 am-10:00 am | Tu-AM-P: Plenary Talk 3 | ||||
10:20 am-12:00 pm | Tu-AM-1-1: Coding for Storage/Group Testing | Tu-AM-1-2: Information Theory and Security | Tu-AM-1-3: Statistical Learning 2 | ||
01:50 pm-02:50 pm | Tu-PM-1-1: Integrated Circuit Design for Information Theory | Tu-PM-1-2: Cryptography | Tu-PM-1-3: Signal Processing | ||
02:50 pm-03:10 pm | |||||
03:30 pm-04:50 pm | Tu-PM-2-1: Code Based Cryptography/Wiretap Coding | Tu-PM-2-2: Biometrics and Authentication | Tu-PM-2-3: Source Coding | ||
Wednesday, November 13 |
|||||
09:00 am-10:00 am | We-AM-Poster: Poster Session | ||||
10:10 am-11:50 am | We-AM-1-1: Coding Theory 2 | We-AM-1-2: Symmetric-Key Encryption | We-AM-1-3: Shannon Theory |
Monday, November 11
Monday, November 11 9:00 - 10:00
Mo-AM-P: Plenary Talk 1
Theory and Examples of One-Bit Secret Sharing
Hiroki Koga (University of Tsukuba, Japan)
Room 1 (IB101)Monday, November 11 10:20 - 12:00
Mo-AM-1-1: Coding Theory 1
Room 2 (IB201)
Chair: Tadashi Wadayama (Nagoya Institute of Technology, Japan)
- Improving Convergence Speed Of Neural Polar Decoder Using Weighted Loss Function
- BP Decoding and SGRAND for Partially Permuted Factor Graphs of Polar Codes
- Recursive Algorithm for Maximum Likelihood Decoding of Non-Binary Codes
- Probabilistic Density Evolution Analysis of IRSA
- ARQ Schemes for Broadcast Channel with Random Feedback Delay
Mo-AM-1-2: Quantum Information Theory
Room 3 (IB202)
Chair: Manabu Hagiwara (Chiba University, Japan)
- Generalized trace inequalities related to q uncertainty relations
- Entanglement detection based on the generalized Landau-Pollak uncertainty relation for (N, M)-POVMs
- On Optimal Ternary Signal Constellation Maximizing Capacity under Energy Constraints
- Property of classical reliability function for BPSK signals coded by simplex codes with SRM
- Advance Sharing with Ogawa et al.'s Ramp Quantum Secret Sharing Scheme for Prime-Dimensional Quantum Systems
Mo-AM-1-3: Statistical Learning 1
Room 4 (IB301)
Chair: Shota Saito (Gunma University, Japan)
- Out-of-Distribution Detection using Maximum Entropy Coding and Generative Networks
- Bounding Excess Minimum Risk via Rényi's Divergence
- A Bound for Learning Lossless Source Coding with Online Learning
- Bayesian Decision-Theoretic Prediction with Ensemble of Meta-Trees for Classification Problems
- Variational Bayesian Methods for a Tree-Structured Stick-Breaking Process Mixture of Gaussians by Application of the Bayes Codes for Context Tree Models
Monday, November 11 2:00 - 3:00
Mo-PM-P: Plenary Talk 2
A Journey in Information Theory: From Second-Order Rates to Common Information
Vincent Y. F. Tan (National University of Singapore, Singapore)
Room 1 (IB101)Monday, November 11 3:30 - 4:50
Mo-PM-1-1: Quantum Insertion/Deletion Errors
Room 2 (IB201)
Chair: Ryutaroh Matsumoto (Institute of Science Tokyo, Japan)
- Pure States in Quantum Deletion Error-Correction
- Decoding Algorithm Correcting Single-Insertion Plus Single-Deletion for Non-binary Quantum Codes
- Insertion Correcting Algorithm for Quantum Deletion Correcting Codes Based on Quantum Reed-Solomon Codes
- Quantum Deletion/Insertion Errors in Optical Qubits due to Synchronization Error
Mo-PM-1-2: AI Security and Privacy
Room 3 (IB202)
Chair: Hidenori Kuwakado (Kansai University, Japan)
- Generative Adversarial Networks for Imbalanced Dataset Intrusion Detection in Software-Defined Networking
- \(k^m\)-Anonymization Meets Differential Privacy under Sampling
- Simple Privacy-Preserving Federated Learning with Different Encryption Keys
- Privacy-preserving Machine Learning for Generic Data
Mo-PM-1-3: Communication Theory
Room 4 (IB301)
Chair: Shan Lu (Nagoya University, Japan)
- DPC-Coded MIMO Multiuser Communications using RIS with Discrete Phase Shifts
- Throughput Analysis of SIC-Based Two-Device Slotted ALOHA with Feedback Over Nakagami-m Fading Channels
- Modulation Scheme of Delayed Bit-Interleaved Coded Modulation for Continuous Transmission
- Golay complementary sequences of all sequence lengths
Tuesday, November 12
Tuesday, November 12 9:00 - 10:00
Tu-AM-P: Plenary Talk 3
A Journey in belief propagation: From practical LDPC decoders to near-maximum likelihood Reed-Solomon decoders
Yeong-Luh Ueng (National Tsing Hua University, Taiwan)
Room 1 (IB101)Tuesday, November 12 10:20 - 12:00
Tu-AM-1-1: Coding for Storage/Group Testing
Room 2 (IB201)
Chair: Hiroshi Kamabe (Gifu University, Japan)
- Private Information Delivery from Coded Storage against Byzantine and Eavesdropping Attacks
- Aggregable Generalized Deduplication
- One Bit-Flipping/Insertion/Deletion Correcting Code for Substrings of Binary Circular String
- On flow equivalence of the subshifts associated with the stream version of asymmetric binary systems
- Improved Quasi-Random Designs with Constant Pool Sizes for Group Testing
Tu-AM-1-2: Information Theory and Security
Room 3 (IB202)
Chair: Noboru Kunihiro (University of Tsukuba, Japan)
- Achievable Cost Region for Erasure of Distributed Information Using a Common Random Number
- Bounds for message authentication with partially leaked secret key using conditional Rényi entropy
- Constructions of a Visual Cryptography Scheme Using an Affine Resolvable BIBD
- The Space Complexity of Generating Random Tent Codes
- Complexity of Solving Hash Puzzles Using Revised Boyer Quantum Algorithm
Tu-AM-1-3: Statistical Learning 2
Room 4 (IB301)
Chair: Yuta Nakahara (Waseda University, Japan)
- An Efficient Image Segmentation Algorithm Based on Bayes Decision Theory and Its Application for Region Detection
- Adversarial Examples with Missing Perturbation Using Laser Irradiation
- Semantic Segmentation with Attention-Modulated Feature Fusion in HRNet V2
- Object Detection for Low-illumination Scenes Based on Enhanced YOLOv7 Architecture
- Enhancing Proximal Decoding for LDPC Codes through Deep Unfolding
Tuesday, November 12 1:50 - 3:10
Tu-PM-1-1: Integrated Circuit Design for Information Theory
Room 2 (IB201)
Chair: Yeong-Luh Ueng (National Tsing Hua University, Taiwan)
- Reformulated Euclidean Algorithm and Optimized (OREA) Architecture for Reed-Solomon Decoding
- Block-layered Sign-flipping Belief Propagation Decoder Architecture for Surface Codes
- Investigating the Role of D Flip-Flop as a Synchronization Circuit for Enhancing Randomness and Stabilizing Bit Distribution in RO-Based RNG on FPGA
- Integrated High-gain Broadband Low Noise Amplifier Receiver with Ultra-wideband Antenna
Tu-PM-1-2: Cryptography
Room 3 (IB202)
Chair: Yasuyuki Murakami (Osaka Electro-Communication University, Japan)
- Checkable Key Generation and its Application to Hierarchical Identity-Based Signature
- Chameleon Hashing Security Enhancement to Hierarchical Identity-Based Identification
- Fast and Secure Scalar Multiplication on Elliptic Curve GLS254
- How to Certify Deletion with Constant-Length Verification Key
Tuesday, November 12 1:50 - 2:50
Tu-PM-1-3: Signal Processing
Room 4 (IB301)
Chair: Masayoshi Ohashi (Fukuoka University, Japan)
- MZI-based Optical Circuit for MIMO Signal Detector Immune to Fabrication Errors
- Deep Unfolding-Aided Design for Optical MIMO Signal Detection Circuit
- A Prototype of Proximity Warning System on the Sea, Utilizing Received Signal Strength
Tuesday, November 12 3:30 - 4:50
Tu-PM-2-1: Code Based Cryptography/Wiretap Coding
Room 2 (IB201)
Chair: Masanori Hirotomo (Saga University, Japan)
- Encrypted Numeric Vector Computations Based on Non-Systematic QC-MDPC Code Over Prime Field
- Enhancement of Physical Layer Security based on NB LDPC Coded Modulation
- Lee Metric Code-based Signature
- Achieving Optimal Short-Blocklength Secrecy Rate Using Multi-Kernel PAC Codes for the Binary Erasure Wiretap Channel
Tu-PM-2-2: Biometrics and Authentication
Room 3 (IB202)
Chair: Yuji Suga (Internet Initiative Japan Inc., Japan)
- Proof of Origin: Creating Data Authenticity by Biometric Information
- Leakable Mnemonic Phrase: A New Orientation of Wallets Backup based on Biometric-key
- Make Seeds Expire in TOTP Authentication
- Proposal of CAPTCHA using the Munker Illusion and Prototype Implimentation
Tu-PM-2-3: Source Coding
Room 4 (IB301)
Chair: Shigeaki Kuzuoka (Wakayama University, Japan)
- An Explicit Construction of a Coded Caching Scheme with Heterogeneous Cache Sizes
- An Upper Bound of Cumulant Generating Function of Codeword Lengths in Variable-Length Lossy Source Coding Under Logarithmic Loss
- A Simple Proof of Multi-letter Converse Theorem for Distributed Lossless Source Coding
- Asymptotic Optimality of the Asymmetric Encoding-Decoding Scheme
Wednesday, November 13
Wednesday, November 13 9:00 - 10:00
We-AM-Poster: Poster Session
Room: IBB
- Rate-Compatible Polar Coding Performance for LED-Propeller Based Image Sensor Communication
- On the Hadamard-Type Matrices of Even Orders on Finite Fields
- Faster Computation of Private Key in ID-NIKS Using DLP with Distinguished Points and Montgomery Multiplication
- Distributed LT Coding of Correlated Sources for a Single-Output MAC with Erasures
- Maximal-Information Channel Optimized Scalar Quantization with Side-Information
- State-Dependent Joint Source-Channel Coding for Gilbert-Elliot Channels
- Light-Trail Based Polar Coding Scheme of Visual Optical Communication in Drone Propellers
- Secure Spectrogram Masking Based on Extended Visual Cryptography
- Efficient Secret Reconstruction Quantum Circuit for Binary Stabilizer-Based Quantum Secret Sharing
- Sequential Matrix Completion Method Based on Variational Bayesian Methods
- A Computational Method to Approximate the Von Neumann Entropy of ASK Signals
- Uniform Side Information Gain via Multilevel Lattice Codes over Integers
- Comparison of CT Numbers Using Quantum Ghost Imaging and Ordinary Imaging
- Card-Based Threshold Function Protocols with a Fewer Cards by Using Directional Cards
- Implementation of Deep Learning Using Homomorphic Encryption Library
- Improvement of Fractal Compression with Domain Block Classification Based on DCT
- Other Variations on a Card Protocol for 6-Card 3-Party Equality Function (Six-Card Trick)
- A Modulation-Level Coding Design for Downlink SCMA Systems
Wednesday, November 13 10:10 - 11:50
We-AM-1-1: Coding Theory 2
Room 2 (IB201)
Chair: Xiao-Nan Lu (Gifu University, Japan)
- Object Tracking Using Multiset Color Coding
- A Note on the Theoretical Support to Compute Dimension in Abelian Codes
- The Tight Upper Bound for the Size of Single Deletion Error Correcting Codes of Length 11
- Necessary and Sufficient Conditions for Capacity-Achieving Private Information Retrieval and Its Construction Method
- A Note on Parity Check Matrices of Private Information Retrieval Codes
We-AM-1-2: Symmetric-Key Encryption
Room 3 (IB202)
Chair: Atsushi Fujioka (Kanagawa University, Japan)
- Development of an Outsourcing Password Evaluation System using Intel SGX
- Security Analysis on End-to-End Encryption of Zoom Mail
- Formal Security Verification for Searchable Symmetric Encryption Using ProVerif
- Practical Key Management for Searchable Symmetric Encryption using Fuzzy Extractor
- Integral Attack with Bit-Based Division Property on Block Cipher LBC-3
We-AM-1-3: Shannon Theory
Room 4 (IB301)
Chair: Jun Muramatsu (NTT Corporation, Japan)
- Capacity Region for Multiple-Access Channels Employing Relay Nodes
- A New Algorithm for Computing α-Capacity
- Coding Theorems for Source Coding with Cost
- Sum Rate Computation for the Gaussian Many-Help-One Problem
- Simulation of Individual Sequences Using Training Data