Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-21 14:55 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
An Examination of Privacy-Aware Malicious Activity Detection Methods Using NII-SOCS Benchmark Data Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2023-81 |
Detection of malicious communications from communication logs may pose a risk of privacy infringement as it requires mon... [more] |
ICSS2023-81 pp.87-92 |
IA, ICSS |
2023-06-21 10:55 |
Saga |
Saga Univ. (Primary: On-site, Secondary: Online) |
A Consideration of Privacy Preserved IoT Data Inquiry System using DoT Hayato Sagara (Hokkaido Univ.), Yong Jin (Tokyo Tech), Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ.) IA2023-10 ICSS2023-10 |
Recently, with the increase of Internet of Things (IoT) devices, the number of cyber-attacks against IoT devices has als... [more] |
IA2023-10 ICSS2023-10 pp.56-61 |
NLP, MSS |
2023-03-17 10:40 |
Nagasaki |
(Primary: On-site, Secondary: Online) |
Machine Learning-Based Risk Evaluation of Reconstruction Attack on Query System for Handling Privacy Data Mohd Anuaruddin Bin Ahmadon (山口大) MSS2022-96 NLP2022-141 |
In this paper, we proposed a method to evaluate the strength of a data privacy protection mechanism by separating the me... [more] |
MSS2022-96 NLP2022-141 pp.160-163 |
ISEC |
2019-05-17 11:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Examination of quantitative evaluation of attack method to restore the anonymized data Takaya Yamazoe, Kazumasa Omote (Tsukuba Univ.) ISEC2019-4 |
With the increasing scale of data, integrated analysis of data distributed to multiple institutions is required. On the ... [more] |
ISEC2019-4 pp.7-13 |
ISEC |
2019-05-17 16:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Risk of Re-identification from Payment Card Histories in Multiple Domains (from AINA 2018) Satoshi Ito, Reo Harada, Hiroaki Kikuchi (Meiji Univ.) ISEC2019-9 |
De-identification is the process of modifying a data set to prevent the identification of individual people from the dat... [more] |
ISEC2019-9 pp.45-46 |
NS, IN (Joint) |
2018-03-01 10:50 |
Miyazaki |
Phoenix Seagaia Resort |
Light-Weight Mechanism for Authorized Pseudonym/Key Allocation Yusuke Fukushima, Ved Kafle, Hiroaki Harai (NICT) IN2017-102 |
Authorized pseudonym-based communication helps to mitigate tracking risks of message sender and receiver as well as prov... [more] |
IN2017-102 pp.75-80 |
IBISML |
2017-11-09 13:00 |
Tokyo |
Univ. of Tokyo |
Fast Computation of Lower Bounds for Privacy Evaluations, Based on Binary Decision Diagrams Shogo Takeuchi (Univ. of Tokyo), Kosuke Kusano, Jun Sakuma (Univ. of Tsukuba), Koji Tsuda (Univ. of Tokyo) IBISML2017-60 |
An input value estimation is a privacy issue in a service provides information by personal information. It is necessary ... [more] |
IBISML2017-60 pp.193-200 |
IN, MoNA, CNR (Joint) |
2016-11-17 09:50 |
Kagoshima |
Kirishima-kanko Hotel |
Privacy Control Enabled by Social-Network Based Virtualized Networks Kazuki Takagi, Ryoichi Shinkuma (Kyoto Univ) MoNA2016-23 |
The recent commercial success of social networking services (SNSs) has encouraged people to share their privacy sensitiv... [more] |
MoNA2016-23 pp.7-10 |
IBISML |
2015-11-27 14:00 |
Ibaraki |
Epochal Tsukuba |
[Poster Presentation]
Secure Approximation Guarantee for Private Empirical Risk Minimization with Homomorphic Encryption Toshiyuki Takada, Hiroyuki Hanada (NIT), Jun Sakuma (Univ.Tsukuba), Ichiro takeuchi (NIT) IBISML2015-86 |
Privacy concern has been increasingly important in many machine learning problems. In this paper, we study empirical ris... [more] |
IBISML2015-86 pp.249-256 |