Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ITE-ME, ITE-IST, BioX, SIP, MI, IE [detail] |
2024-06-06 13:20 |
Niigata |
Nigata University (Ekinan-Campus "TOKIMATE") |
Enhanced Security with Random Binary Weights for Privacy-Preserving Federated Learning Hiroto Sawada, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (TMU) |
(To be available after the conference date) [more] |
|
CNR, BioX |
2024-02-29 15:00 |
Tokyo |
NHK Science & Technology Research Laboratories (Primary: On-site, Secondary: Online) |
Implementation and Evaluation of Privacy-Preserving Image Transformation Methods for Person Re-identification Junpei Yamaguchi, Hajime Nada, Yumo Ouchi, Narishige Abe (Fujitsu) BioX2023-73 CNR2023-40 |
Advances in machine learning have enabled high-accuracy tracking of individuals using surveillance cameras, making the d... [more] |
BioX2023-73 CNR2023-40 pp.18-23 |
EMM |
2024-01-16 15:25 |
Miyagi |
Tohoku Univ. (Primary: On-site, Secondary: Online) |
[Invited Talk]
Federated Learning with Enhanced Privacy Protection in AI Lihua Wang (NICT) EMM2023-83 |
Federated learning is a crucial methodology in artificial intelligence where multiple organizations collaborate to perfo... [more] |
EMM2023-83 p.19 |
RISING (3rd) |
2023-10-31 10:45 |
Hokkaido |
Kaderu 2・7 (Sapporo) |
[Poster Presentation]
Performance Analysis of Cognitive Radio Networks With Location Privacy Preservation Ryutaro Kobuchi (Osaka Univ.), Tatsuaki Kimura (Doshisha Univ.), Tetsuya Takine (Osaka Univ.) |
With the rapid increase in demand for wireless communication services, dynamic spectrum sharing in cognitive radio netwo... [more] |
|
AI |
2023-09-12 14:35 |
Hokkaido |
|
Proposal of effective location information privacy protection method using measurement equipment error Riho Isawa, Yuichi Sei, Yasuyuki Tahara, Akihiko Ahsuga (UEC) AI2023-15 |
In recent years, systems that publicly share statistical data based on people's location information, such as congestion... [more] |
AI2023-15 pp.77-82 |
IN, NS (Joint) |
2023-03-03 10:10 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Access Control Method with Privacy Preservation in NDN Yuma Fukagawa, Noriaki Kamiyama (Ritsumeikan Univ.) NS2022-221 |
Information-Centric Networking (ICN), which transfers Interest by the name of content without using name resolution and ... [more] |
NS2022-221 pp.310-315 |
EMM |
2023-03-02 16:00 |
Nagasaki |
Fukue culture hall (Primary: On-site, Secondary: Online) |
[Invited Talk]
Image transformation with random numbers for reliable AI Hitoshi Kiya (TMU) EMM2022-87 |
The combined use of deep neural networks (DNNs) and images transformed with random sequences has given a new insight for... [more] |
EMM2022-87 pp.107-109 |
ISEC, SITE, LOIS |
2022-11-18 16:55 |
Online |
Online |
Reducing Authentication Data Size in Decentralized Blacklistable Anonymous Credential System Using DualRing Atsuki Iriboshi, Toru Nakanishi, Katsunobu Imai (Hiroshima Univ.) ISEC2022-44 SITE2022-48 LOIS2022-28 |
For privacy protection, blacklistable anonymous credential systems have been proposed, where a user is authenticated wit... [more] |
ISEC2022-44 SITE2022-48 LOIS2022-28 pp.85-91 |
BioX |
2022-10-03 15:15 |
Okinawa |
|
[Invited Talk]
Sensing Technologies for Social Safety Naoyuki Takada (SECOM) BioX2022-58 |
In 1966, the first online security system outfitted in Japan was developed and commercialized by SECOM. It used sensors ... [more] |
BioX2022-58 p.19 |
IT, EMM |
2022-05-18 14:20 |
Gifu |
Gifu University (Primary: On-site, Secondary: Online) |
[Invited Talk]
Decentralized Federated Learning: Fundamentals, Research Trends and Open Issues in Wireless Channels Koya Sato (UEC) IT2022-14 EMM2022-14 |
The expansion of machine learning applications has raised novel concerns, such as data privacy and communication costs. ... [more] |
IT2022-14 EMM2022-14 p.73 |
EMM |
2022-03-07 13:20 |
Online |
(Primary: Online, Secondary: On-site) (Primary: Online, Secondary: On-site) |
[Poster Presentation]
Privacy considered human flow measurement system using depth images Masahiro Sudo, Michiharu Niimi (KIT) EMM2021-93 |
Measuring human flow, which count number of people or their flow line who exist any space or room is beneficial to think... [more] |
EMM2021-93 pp.7-12 |
NS |
2021-05-13 14:25 |
Online |
Online |
A Study on Privacy Concerns by Single-Word Search Query Leakage from Web Browsers through Domain Name System Katsuki Isobe, Daishi Kondo, Hideki Tode (OPU) NS2021-18 |
Some web browsers used in some specific computers have a specification that a single-word search query (a word that cont... [more] |
NS2021-18 pp.20-25 |
IN, ICTSSL, NWS |
2020-10-22 15:25 |
Online |
Online |
[Invited Talk]
Secure Data Utilization using Multi-Party Computation Takao Takenouchi (Digital Garage) IN2020-32 |
It is becoming more and more important to distribute and utilize data between organizations to provide better services a... [more] |
IN2020-32 pp.12-17 |
NS, IN (Joint) |
2020-03-06 09:10 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
A k-anonymity based Scheme for Private Location-related Content Retrieval in NDN Kentaro Kita, Yuki Koizumi, Toru Hasegawa (Osaka Univ.) IN2019-108 |
We have proposed a location-based forwarding scheme for Named Data Networking, in which consumers retrieve content from ... [more] |
IN2019-108 pp.177-182 |
SIS |
2019-12-12 14:35 |
Okayama |
Okayama University of Science |
A Dimensionality Reduction Method with Random Sampling for Privacy-Preserving Machine Learning Ayana Kawamura, Kenta Iida, Hitoshi Kiya (Tokyo Metro. Univ.) SIS2019-26 |
In this paper, we propose a dimensionality reduction method with random sampling for privacy-preserving machine learning... [more] |
SIS2019-26 pp.17-21 |
SITE |
2019-12-06 15:15 |
Kanagawa |
|
Privacy of retirees Yoshinaga Nobuyuki (Yamaguchi Prefectural Univ.) SITE2019-85 |
The purpose of this paper is to make a fine-grained concept regarding the treatment of the network account assigned to u... [more] |
SITE2019-85 pp.35-39 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 14:10 |
Kochi |
Kochi University of Technology |
Anonymous Public-Key Certificates based on Elliptic Curve Kazuomi Oishi (SIST) ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56 |
Anonymous public-key certificates can guarantee anonymity of the certificate users and are useful for applications in wh... [more] |
ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56 pp.347-352 |
IT |
2018-12-18 15:50 |
Fukushima |
Spa Resort Hawaiians |
[Invited Talk]
Secure Delegated Quantum Computation Takeshi Koshiba (Waseda Univ.) IT2018-33 |
In this manuscript, we take secure delegated quantum computation (SDQC).
First, we explain the basics of measurement-ba... [more] |
IT2018-33 pp.13-18 |
MoNA, IN, CNR (Joint) [detail] |
2018-11-16 09:30 |
Saga |
Karatsu Civic Exchange Plaza |
Prevention of Unintended Appearance in Photos through Detection of Taking Photo Behavior by Photographer Yuhi Kaihoko, Manami Kanamaru, Yoshihiro Nagano, Phan Xuan Tan, Eiji Kamioka (SIT) MoNA2018-34 CNR2018-31 |
Currently, taking pictures and posting them on Social Networks (SNS) are everyday acts of human. Thus, the privacy has b... [more] |
MoNA2018-34 CNR2018-31 pp.69-74(MoNA), pp.75-80(CNR) |
SC |
2018-06-02 09:25 |
Fukushima |
UBIC 3D Theater, University of Aizu |
Simultaneous recognition of human activities and locations based on sensor array Shoichi Ichimura, Qiangfu Zhao (Univ. of Aizu) SC2018-11 |
In recent years, smart homes for senior care have attracted great attention in Japan. But a smart home has a privacy iss... [more] |
SC2018-11 pp.59-64 |