Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-21 14:30 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
A poisoning-resilient LDP schema using oblivious transfer and Hadamard transform Masahiro Shimizu, Hiroaki Kikuchi (Meiji Univ.) ICSS2023-80 |
In recent years, Local Differential Privacy (LDP) has been actively used to collect and utilize users’ usage history from... [more] |
ICSS2023-80 pp.79-86 |
ICSS, IPSJ-SPT |
2024-03-22 11:20 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Evaluation of Feature Inference Risk from Explainable AI metrics LIME and Shapley Values Ryotaro Toma, Hiroaki Kikuchi (Meiji Univ.) ICSS2023-88 |
Explainability has gained attention to ensure fairness and transparency in machine learning models, providing users with... [more] |
ICSS2023-88 pp.137-144 |
ISEC |
2022-05-18 13:25 |
Online |
Online |
[Invited Talk]
Vulnerability Exploiting SMS Push Notifications (from AsiaJCIS 2021) Rina Shibayama, Hiroaki Kikuchi (Meiji Univ.) ISEC2022-1 |
[more] |
ISEC2022-1 pp.1-2 |
ICSS, IPSJ-SPT |
2021-03-01 11:05 |
Online |
Online |
A proposal of model for scale and frequency of cyber incidents based on organizational attributes Kazuki Ikegami, Hiroaki Kikuchi (Meiji Univ.) ICSS2020-30 |
[more] |
ICSS2020-30 pp.25-30 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 11:10 |
Kochi |
Kochi University of Technology |
Empirical Evaluation on Face-Detection Prevention Technologies Kazuki Eto, Kazushi Waki, Takafumi Mori, Hiroaki Kikuchi (Meiji Univ.) ISEC2019-20 SITE2019-14 BioX2019-12 HWS2019-15 ICSS2019-18 EMM2019-23 |
(To be available after the conference date) [more] |
ISEC2019-20 SITE2019-14 BioX2019-12 HWS2019-15 ICSS2019-18 EMM2019-23 pp.93-98 |
ISEC |
2019-05-17 16:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Risk of Re-identification from Payment Card Histories in Multiple Domains (from AINA 2018) Satoshi Ito, Reo Harada, Hiroaki Kikuchi (Meiji Univ.) ISEC2019-9 |
De-identification is the process of modifying a data set to prevent the identification of individual people from the dat... [more] |
ISEC2019-9 pp.45-46 |
ICSS |
2015-03-03 17:05 |
Okinawa |
Meio Univiersity |
A Study on CAPTCHA System Using Differential Awkwardness-Objects Michitomo Yamguchi (Meiji Univ.), Takeshi Okamoto (Tsukuba Univ. of Tech.), Hiroaki Kikuchi (Meiji Univ.) ICSS2014-72 |
CAPTCHAs have been accepted as a technique which prevents unauthorized access by bots. Several researchers point out tha... [more] |
ICSS2014-72 pp.55-60 |
ISEC, LOIS |
2013-11-28 16:05 |
Miyagi |
Tohoku Univ. |
[Invited Talk]
On the Privacy Issues in Lifelog and Privacy-Preserving Data Mining Hiroaki Kikuchi (Meiji Univ.) ISEC2013-64 LOIS2013-30 |
[more] |
ISEC2013-64 LOIS2013-30 pp.35-38 |
ICSS |
2013-11-12 14:35 |
Fukuoka |
Nishijin Plaza |
On the Risk of DNS Cache Vulnerability "Ghost Domain Name" Hiroaki Kikuchi (Meiji Univ.), Tomohiro Arimizu (Tokai Univ.) ICSS2013-58 |
[more] |
ICSS2013-58 pp.9-12 |
IBISML |
2013-07-18 15:10 |
Tokyo |
Nishiwaseda Campus (Waseda univ.) |
Privacy-preserving Online Logistic Regression Based on Homomorphic Encryption Shuang Wu, Junpei Kawamoto (Univ. of Tsukuba), Hiroaki Kikuchi (Meiji Univ.), Jun Sakuma (Univ. of Tsukuba) IBISML2013-10 |
Preserve the privacy of personal information when conducting statistical analysis has attracted much attention in machin... [more] |
IBISML2013-10 pp.67-74 |
SSS |
2012-11-22 14:20 |
Tokyo |
|
On fail-safeness of user authentication schemes Hiroaki Kikuchi (Tokai Univ.) SSS2012-19 |
This paper studies the relation between a user authentication and the risk of failure. [more] |
SSS2012-19 pp.11-15 |
ICSS |
2012-11-22 16:25 |
Hiroshima |
Miyajima Mori-no-Yado |
Implementation and Evaluation of Privacy-Preserving Epidemic Analysis System Tomoki Sato, Hiroaki Kikuchi (Tokai Univ.), Jun Sakuma (UT) ICSS2012-55 |
This paper studies privacy issues about epidemiological study. Epidemiological study needs to preserve the privacy of su... [more] |
ICSS2012-55 pp.61-66 |
ICSS |
2009-05-15 16:40 |
Hyogo |
Kobe University |
Private List Matching Protocol and its Application Hiroaki Kikuchi, Daisuke Kagawa (Tokai Univ.) ICSS2009-7 |
We may collaborate with someone with common preference in particular fields, e.g.,
sharing, exchange useful information... [more] |
ICSS2009-7 pp.33-36 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 10:20 |
Hokkaido |
Future University-Hakodate |
Orthogonal expansion of port-scan packets Tomohiro Kobori, Hiroaki Kikuchi (Tokai Univ.), Masato Terada (Hitachi) |
Observation of port-scan packets performed over the Internet is involved with so many parameters including time,
port ... [more] |
ISEC2007-51 pp.43-49 |
IT, ISEC, WBS |
2007-03-16 08:55 |
Gunma |
Gunma Univ. (Kiryu Campus) |
On a Secure Function Evaluation for Comparator Networks Koji Chida (NTT), Hiroaki Kikuchi (Tokai Univ.), Gembu Morohashi, Keiichi Hirota (NTT) |
[more] |
IT2006-94 ISEC2006-149 WBS2006-91 pp.53-58 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 10:45 |
Okayama |
Okayama Univ. |
Macro and Micro Analysis on Vulnerability Scanning Activities via Distributed Observation over the Internet Naoya Fukuno, Tomohiro Kobori, Hiroaki Kikuchi (Tokai Univ.), Masato Terada (Hitach), Norihisa Doi (Chuo Univ.) |
Computer virus and worms perform randomly spyware and port-scanning to nd a vulnerability in the
Internet. The fractio... [more] |
ISEC2006-49 pp.69-74 |
ISEC, IPSJ-CSEC |
2004-07-20 15:10 |
Tokushima |
Tokushima Univ. |
A report on 3rd annual PKI R&D workshop Satoshi Koga (Kyushu Univ.), Hiroaki Kikuchi (Tokai Univ.) |
This paper reports the 3rd annual PKI R&D workshop, held on April 12-14, 2004 at NIST. (URL:http://middleware.internet2.... [more] |
ISEC2004-36 pp.159-164 |