IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 38  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2024-03-21
14:55
Okinawa OIST
(Primary: On-site, Secondary: Online)
An Examination of Privacy-Aware Malicious Activity Detection Methods Using NII-SOCS Benchmark Data
Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2023-81
Detection of malicious communications from communication logs may pose a risk of privacy infringement as it requires mon... [more] ICSS2023-81
pp.87-92
MI, MICT 2023-11-14
13:20
Fukuoka   Medical image diagnosis support system with image anonymization based on deep learning techniques
Katsuto Iwai, Ryuunosuke Kounosu (Toho Univ./AIST), Hirokazu Nosato (AIST), Yuu Nakajima (Toho Univ.) MICT2023-30 MI2023-23
When medical imaging AI models are hosted on cloud service there is a risk of sensitive medical images being leaked when... [more] MICT2023-30 MI2023-23
pp.21-24
CPSY, DC, IPSJ-ARC [detail] 2023-06-05
16:00
Ehime Nigitatsu-Kaikan
(Primary: On-site, Secondary: Online)
CPSY2023-5 DC2023-5 This paper describes the design of computer systems necessary for a smart city, focusing on the processing of data and c... [more] CPSY2023-5 DC2023-5
p.19
NLP, MSS 2023-03-17
10:40
Nagasaki
(Primary: On-site, Secondary: Online)
Machine Learning-Based Risk Evaluation of Reconstruction Attack on Query System for Handling Privacy Data
Mohd Anuaruddin Bin Ahmadon (山口大) MSS2022-96 NLP2022-141
In this paper, we proposed a method to evaluate the strength of a data privacy protection mechanism by separating the me... [more] MSS2022-96 NLP2022-141
pp.160-163
RCC, ISEC, IT, WBS 2023-03-14
17:40
Yamaguchi
(Primary: On-site, Secondary: Online)
Diversification of Personal Records using GAN
Chengxi Jiang, Tiancheng Wang, Hikaru Morita (Kanagawa Univ.) IT2022-99 ISEC2022-78 WBS2022-96 RCC2022-96
In this paper, we deal with data anonymization as a privacy protection technology.Even in an anonymized database, it is ... [more] IT2022-99 ISEC2022-78 WBS2022-96 RCC2022-96
pp.203-208
ICSS, IPSJ-SPT 2023-03-14
10:50
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Discussion about Privacy-aware Anonymization of Traffic Logs for Malicious Activity Detection
Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2022-74
The detection of malicious communications from traffic logs has an aspect of invading the privacy because of monitoring ... [more] ICSS2022-74
pp.157-162
IPSJ-SLDM, RECONF, VLD [detail] 2023-01-23
13:30
Kanagawa Raiosha, Hiyoshi Campus, Keio University
(Primary: On-site, Secondary: Online)
[Invited Talk] Can we say "No FPGA, No Smart City"? -- Let's declare if we do a smart city, we need FPGAs. --
Hiroaki Nishi (Keio Univ.) VLD2022-60 RECONF2022-83
From the perspective of a chair of standardization of technologies related to Smart City information infrastructure, we ... [more] VLD2022-60 RECONF2022-83
p.24
AI 2022-07-04
13:30
Hokkaido
(Primary: On-site, Secondary: Online)
AI2022-7 (To be available after the conference date) [more] AI2022-7
pp.37-41
ISEC 2019-05-17
11:45
Tokyo Kikai-Shinko-Kaikan Bldg. Examination of quantitative evaluation of attack method to restore the anonymized data
Takaya Yamazoe, Kazumasa Omote (Tsukuba Univ.) ISEC2019-4
With the increasing scale of data, integrated analysis of data distributed to multiple institutions is required. On the ... [more] ISEC2019-4
pp.7-13
LOIS 2019-03-07
11:20
Okinawa Miyakojima-shi Central Community Center Trend Analysis for Tourists using the Location Registration Information -- Analysis case around V-Varen Nagasaki Stadium --
Yu Ichifuji (Nagasaki Univ.), Kohei Yamasaki, Hideki Yoshii (SB), Masashi Okamoto (Cinarra) LOIS2018-59
(To be available after the conference date) [more] LOIS2018-59
pp.23-28
EMM 2018-03-05
17:05
Kagoshima Naze Community Center (Amami-Shi, Kagoshima) [Invited Talk] On Information Loss by Micro-aggregation
Hiroko Akiyama (NIT, Nagano College), Masaaki Wada (Osaka Univ.) EMM2017-89
For the purpose of measuring information loss caused by micro-aggregation, we define a new information loss index ILD b... [more] EMM2017-89
pp.61-66
VLD, DC, CPSY, RECONF, CPM, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC
(Joint) [detail]
2017-11-08
12:30
Kumamoto Kumamoto-Kenminkouryukan Parea Application of blind watermarking method for secondary use on smart community
Yuta Ohno, Akira Niwa, Hiroaki Nishi (Keio Univ.) VLD2017-58 DC2017-64
The smart community aims to enrich people's livelihood by secondary use of personal data such as home electric power and... [more] VLD2017-58 DC2017-64
pp.191-196
ICSS, IPSJ-SPT 2017-03-13
14:25
Nagasaki University of Nagasaki Feature Extraction for Identifying High Yielding Investment Programs Related Transactions in Bitcoin
Kentaroh Toyoda, Tomoaki Ohtsuki (Keio Univ.), P. Takis Mathiopoulos (UoA) ICSS2016-49
As recent research has revealed, Bitcoin is used as fraudulent activities such as HYIP (High Yield Investment Programs).... [more] ICSS2016-49
pp.31-36
ICD, CPSY 2016-12-15
10:55
Tokyo Tokyo Institute of Technology Proposal of anonymization methods for secondary use considering data properties
Yuichi Nakamura, Takahiro Hosoe, Hiroaki Nishi (Keio Univ.) ICD2016-53 CPSY2016-59
Applications for secondary use of data, which is a usage that is not same as an original purpose to obtain the data, hav... [more] ICD2016-53 CPSY2016-59
pp.13-18
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC
(Joint) [detail]
2016-03-25
13:05
Nagasaki Fukue Bunka Hall/Rodou Fukushi Center Combined Watermarking Method for Anonymized Data
Yuichi Nakamura, Hiroaki Nishi (Keio Univ.) CPSY2015-152 DC2015-106
An anonymization infrastructure for secondary use of data has been proposed. The infrastructure was proposed to publish ... [more] CPSY2015-152 DC2015-106
pp.235-240
IT, ISEC, WBS 2016-03-11
11:40
Tokyo The University of Electro-Communications k-Anonymization Techinque for Encrypted Data
Masayuki Yoshino, Hisayoshi Sato, Ken Naganuma, Yasuko Fukuzawa (Hitachi) IT2015-135 ISEC2015-94 WBS2015-118
This paper proposes k-anonymizaiton technique for encrypted data stored on cloud environment. The proposed method utiliz... [more] IT2015-135 ISEC2015-94 WBS2015-118
pp.211-217
EMM 2016-03-02
14:30
Kagoshima Yakushima Environ. and Cultural Vill. Center [Poster Presentation] A Study of Anonymity Index with Probability of Re-Identification
Hiroko Akiyama (nnct), Akira Kato, Hideki Sunahara (Keio Univ.) EMM2015-76
For making valuable information or better services for individuals and society, Bigdata is very effective.
Bigdata has ... [more]
EMM2015-76
pp.1-5
EMM 2016-03-02
14:30
Kagoshima Yakushima Environ. and Cultural Vill. Center [Poster Presentation] Data Anonymization based on TF-IDF Method Using Hierarchies Built from Attributes of Recommended Targets
Kensuke Arai (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Noboru Babaguchi (Osaka Univ.) EMM2015-81
This paper proposes a personal data anonymization method using hierarchies considering information recommendation for us... [more] EMM2015-81
pp.31-36
EMM, IT 2015-05-21
15:45
Kyoto Kyoto International Community House Data Anonymization for Information Recommendation Based on TF-IDF Method
Kensuke Arai (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Noboru Babaguchi (Osaka Univ.) IT2015-10 EMM2015-10
This paper proposes a data anonymization method considering information recommendation for users.
Attaching importance ... [more]
IT2015-10 EMM2015-10
pp.51-56
LOIS 2015-03-05
09:40
Okinawa   On a Decentralization Function for Deposited Data
Youji Fukuta (Aichi Univ. of Educ.), Yoshiaki Shiraishi (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.) LOIS2014-63
It is considered to be important that linkable anonymized data and its correspondence table between anonymous number and... [more] LOIS2014-63
pp.13-17
 Results 1 - 20 of 38  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan