Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM |
2022-03-07 14:15 |
Online |
(Primary: Online, Secondary: On-site) (Primary: Online, Secondary: On-site) |
[Poster Presentation]
Development of XR-based Earthquake Experience Application for Enhancing Self-efficacy Soma Nomoto, Kazuhiro Kono (Kansai Univ.) EMM2021-96 |
This paper develops an earthquake experience application using XR (Extended Reality) technology. Our application enables... [more] |
EMM2021-96 pp.23-28 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-20 10:30 |
Online |
Online |
Development of an AI Literacy Learning Tool Using Minecraft Suika Kishimoto, Kazuhiro Kono (Kansai Univ.) ISEC2021-31 SITE2021-25 BioX2021-32 HWS2021-31 ICSS2021-36 EMM2021-36 |
AI literacy education is one of the essential educational fields. There are various educational services for improving l... [more] |
ISEC2021-31 SITE2021-25 BioX2021-32 HWS2021-31 ICSS2021-36 EMM2021-36 pp.131-135 |
EMM |
2021-03-04 14:45 |
Online |
Online |
[Poster Presentation]
Improvement of Video Forgery Detection Using Generative Adversarial Networks Yutaro Osako (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Noboru Babaguchi (Osaka Univ.) EMM2020-72 |
Our work aims to detect tampered objects in the spatial domain of videos with high accuracy. We target videos, including... [more] |
EMM2020-72 pp.28-33 |
EA, ASJ-H, EMM |
2020-11-20 09:00 |
Online |
Online |
[Poster Presentation]
Development of VR-based Learning System for Disaster Prevention/Mitigation Focusing on Expression of Interaction Soma Nomoto, Kazuhiro Kono (Kansai Univ.) EA2020-31 EMM2020-46 |
This paper develops a learning system for disaster prevention/mitigation using virtual reality to realize effective disa... [more] |
EA2020-31 EMM2020-46 pp.54-57 |
EMM |
2020-03-05 16:45 |
Okinawa |
(Cancelled but technical report was issued) |
[Poster Presentation]
Video Forgery Detection Using Generative Adversarial Networks Shoken Ohshiro (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Noboru Babaguchi (Osaka Univ.) EMM2019-122 |
The purpose of our work is to detect the regions of tampered objects in the spatial domain of videos by passive approach... [more] |
EMM2019-122 pp.107-112 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 11:45 |
Kochi |
Kochi University of Technology |
A Study on Suppression of Inappropriate Use of Illegal Contents Based on Conformity Caused by Normative Influence Hiroki Yamaguchi, Kazuhiro Kono (Kansai Univ.) ISEC2019-47 SITE2019-41 BioX2019-39 HWS2019-42 ICSS2019-45 EMM2019-50 |
Copyright infringement by illegal contents uploaded on the Internet has become a social issue. However, it is hard to su... [more] |
ISEC2019-47 SITE2019-41 BioX2019-39 HWS2019-42 ICSS2019-45 EMM2019-50 pp.305-310 |
EMM |
2019-03-13 15:15 |
Okinawa |
TBD |
[Poster Presentation]
A Consideration on Spatio-Temporal Feature Learning for Video Forgery Detection Shoken Ohshiro (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Noboru Babaguchi (Osaka Univ.) EMM2018-104 |
The purpose of our work is to detect objects tampered in the spatial domain of videos including dynamic scenes such as a... [more] |
EMM2018-104 pp.67-72 |
EA, ASJ-H, EMM, IPSJ-MUS [detail] |
2018-11-21 13:30 |
Ishikawa |
Hotel Koshuen |
[Poster Presentation]
Video Forgery Detection Using Spatio-Temporal Convolutional Neural Network Shoken Ohshiro (Osaka Univ), Kazuhiro Kono (Kainsai Univ), Noboru Babaguchi (Osaka Univ) EA2018-71 EMM2018-71 |
It is easy to tamper with videos due to the improvement of video editing technology.We need to develop forgery detection... [more] |
EA2018-71 EMM2018-71 pp.49-52 |
SSS |
2018-08-14 14:10 |
Kyoto |
|
A Study on Measures to Prevent College Students from Viewing Illegally Uploaded Videos
-- Focused on The Fraud Triangle Theory and The Situational Crime Prevention Theory -- Kazuhiro Kono (Kansai Univ.) SSS2018-15 |
In this paper, we consider a method for suppressing the viewing of illegally uploaded videos them by using the fraud tri... [more] |
SSS2018-15 pp.9-12 |
EMM |
2018-03-05 14:35 |
Kagoshima |
Naze Community Center (Amami-Shi, Kagoshima) |
[Poster Presentation]
Video Forgery Detection Considering Spatio-Temporal Consistency Takaaki Yoshida (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Noboru Babaguchi (Osaka Univ.) EMM2017-81 |
This paper proposes a video forgery detection method in dynamic scenes such as dynamic background or dynamic perspective... [more] |
EMM2017-81 pp.23-28 |
EMM |
2017-03-06 14:30 |
Okinawa |
Miyakojima Marin Terminal Building (Okinawa) |
[Poster Presentation]
User Authentication Using Heart Rate Sequences during Walking toward Continuous Authentication Takaaki Yoshida (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Babaguchi Noboru (Osaka Univ.) EMM2016-90 |
[more] |
EMM2016-90 pp.25-30 |
IT, EMM |
2016-05-19 15:35 |
Hokkaido |
Otaru Economic Center |
Multimodal User Authentication Focusing on Long-term Heart Rate Sequences from Wearable Devices Takaaki Yoshida (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Babaguchi Noboru (Osaka Univ.) IT2016-9 EMM2016-9 |
This paper proposes a multimodal authentication system for smartphones
by using two sequences of different measurement ... [more] |
IT2016-9 EMM2016-9 pp.49-54 |
EMM |
2016-03-02 14:30 |
Kagoshima |
Yakushima Environ. and Cultural Vill. Center |
[Poster Presentation]
Video Forgery Detection Using a Time Series Model in Dynamic Scenes Shigeki Karita (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Noboru Babaguchi (Osaka Univ.) EMM2015-80 |
This paper proposes a robust video forgery detection method in dynamic scenes such as dynamic background or camera jitte... [more] |
EMM2015-80 pp.25-30 |
EMM |
2016-03-02 14:30 |
Kagoshima |
Yakushima Environ. and Cultural Vill. Center |
[Poster Presentation]
Data Anonymization based on TF-IDF Method Using Hierarchies Built from Attributes of Recommended Targets Kensuke Arai (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Noboru Babaguchi (Osaka Univ.) EMM2015-81 |
This paper proposes a personal data anonymization method using hierarchies considering information recommendation for us... [more] |
EMM2015-81 pp.31-36 |
EMM, IT |
2015-05-21 15:45 |
Kyoto |
Kyoto International Community House |
Data Anonymization for Information Recommendation Based on TF-IDF Method Kensuke Arai (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Noboru Babaguchi (Osaka Univ.) IT2015-10 EMM2015-10 |
This paper proposes a data anonymization method considering information recommendation for users.
Attaching importance ... [more] |
IT2015-10 EMM2015-10 pp.51-56 |
EMM |
2015-03-12 16:00 |
Okinawa |
|
[Poster Presentation]
Generation Methods of Secret Sharing QR Codes Masaki Kuramoto (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Yoshimichi Ito (Osaka Electro-Communication Univ.), Noboru Babaguchi (Osaka Univ.) EMM2014-92 |
This paper proposes methods for generating a set of multiple QR codes, in which each QR code contains a share of secret ... [more] |
EMM2014-92 pp.91-96 |
EMM |
2015-03-12 16:00 |
Okinawa |
|
[Poster Presentation]
Usability Evaluation of Multi-Touch Actions Considering the Structure of Hand-Fingers and Its Constraints on Movement Kumi Nakamura (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Yoshimichi Ito (OECU), Noboru Babaguchi (Osaka Univ.) EMM2014-93 |
In this paper, we evaluate the usability of multi-touch actions, which are actions using several fingers, in order to f... [more] |
EMM2014-93 pp.97-102 |
SSS |
2015-02-23 16:20 |
Osaka |
|
A Study on Information Security from a Viewpoint of International Safety Standards Kazuhiro Kono (Kansai Univ.) SSS2014-29 |
In this paper, we investigate international safety standards from a viewpoint of information security and consider infor... [more] |
SSS2014-29 pp.21-24 |
SSS |
2015-02-23 17:00 |
Osaka |
|
A Study on Improvement of User's Consciousness for Security
-- Extraction of Security Risk in the Future Considered from Present Security Incidents and Iconization of Terms and Conditions of Use -- Sosuke Matsusaka, Naoki Nakagawa, Kazuhiro Kono (Kansai Univ.) SSS2014-30 |
This paper describes two researches for improving user's consciousness for security. First, we extract future security r... [more] |
SSS2014-30 pp.25-28 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 13:25 |
Hokkaido |
San-Refure Hakodate |
Authentication for mobile devices using behavioral biometrics with adaptive templates Shigeki Karita, Kumi Nakamura (Osaka Univ.), Kazuhiro Kono (Kansai Univ), Yoshimichi Ito (Osaka Electro-Communication Univ.), Noboru Babaguchi (Osaka Univ.) ISEC2014-21 SITE2014-16 ICSS2014-25 EMM2014-21 |
This paper proposes a template renewal method for improving authentication accuracy in biometric authentication with beh... [more] |
ISEC2014-21 SITE2014-16 ICSS2014-25 EMM2014-21 pp.133-138 |