IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 155 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SIS, ITE-BCT 2022-10-13
13:55
Aomori Hachinohe Institute of Technology
(Primary: On-site, Secondary: Online)
An 8K image perceptual scramble scheme for JPEG XS standard
Takayuki Nakachi (Univ. of the Ryukyus), Hiroyuki Kimiyama (Daido), Mitsuru Murayama (KAIST) SIS2022-11
In this report, we propose a scrambled image compression algorithm for the JPEG XS standard. The JPEG XS is a low-delay,... [more] SIS2022-11
pp.1-6
NS, SR, RCS, SeMI, RCC
(Joint)
2022-07-14
14:00
Ishikawa The Kanazawa Theatre + Online
(Primary: On-site, Secondary: Online)
A Study of Dynamic Privacy Control Method in LDP for Preserving Temporal/Spatial Intrinsic Information Value of Trajectory Data
Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-47
Spatiotemporal data, including people's movement trajectories and transit points, is highly valuable for various applica... [more] NS2022-47
pp.106-111
NC, IBISML, IPSJ-BIO, IPSJ-MPS [detail] 2022-06-27
14:50
Okinawa
(Primary: On-site, Secondary: Online)
AI knowledge forgetting based on the importance of model parameters
Tomoya Yamashita, Masanori Yamada (NTT) NC2022-3 IBISML2022-3
The accuracy of Deep Learning has been greatly improved by the progress of research in computer technology and Deep Lear... [more] NC2022-3 IBISML2022-3
pp.14-19
SITE, IPSJ-EIP 2022-06-09
15:20
Tokyo
(Primary: On-site, Secondary: Online)
A Study on the Role of Data-Related Legislation in Digital Strategy
Naonori Kato (KDDI RI/NFI), Kyoko Mori (KDDI RI/Hitotsubashi Uni.), Yosuke Murakami, Minoru Kouzu (KDDI RI) SITE2022-7
On May 3, 2022, the European Commission published the details of the establishment of the European Health Data Space (EH... [more] SITE2022-7
pp.40-45
CQ, CS
(Joint)
2022-05-12
14:20
Fukui Fukui (Fuku Pref.)
(Primary: On-site, Secondary: Online)
Distributed Network Intrusion Detection System Using Federated Learning
Yuya Tsuru, Tomoya Kawakami, Tatsuhito Hasegawa (Univ. of Fukui) CQ2022-5
A network-based intrusion detection system (NIDS) monitors a network and detects unauthorized traffic. Currently, a vari... [more] CQ2022-5
pp.20-25
MSS, NLP 2022-03-29
15:45
Online Online Proposal of work end time estimation technology using PC operation logs
Rina Yamamoto, Yoshiyuki Sakamaki, Tadanobu Tsunoda, Junpei Yamaguchi, Hisashi Kojima (Fujitsu Ltd.) MSS2021-80 NLP2021-151
In conventional working style in offices, employees communicated each other in break time of work. However, it’s difficu... [more] MSS2021-80 NLP2021-151
pp.133-138
EMM 2022-03-07
13:20
Online (Primary: Online, Secondary: On-site)
(Primary: Online, Secondary: On-site)
[Poster Presentation] Privacy considered human flow measurement system using depth images
Masahiro Sudo, Michiharu Niimi (KIT) EMM2021-93
Measuring human flow, which count number of people or their flow line who exist any space or room is beneficial to think... [more] EMM2021-93
pp.7-12
RCS, SR, NS, SeMI, RCC
(Joint)
2021-07-16
10:55
Online Online A Study on Decentralized Machine Learning with Differential Privacy based on Input Perturbation
Masakazu Okamoto, Koya Sato, Keiichi Iwamura (Tokyo Univ. of Science) SR2021-34
Distributed machine learning eliminates the need for users to disclose their data to the out of the terminal since train... [more] SR2021-34
pp.67-72
RCS, SR, NS, SeMI, RCC
(Joint)
2021-07-16
13:25
Online Online An Evaluation of Learning Accuracy in Federated Learning with Local Differential Privacy
Yuta Kakizaki, Koya Sato, Keiichi Iwamura (Tokyo Univ. of Science) SR2021-37
In federated learning, where each device learns cooperatively without disclosing the training data, the privacy level ca... [more] SR2021-37
pp.87-93
EMM 2021-03-04
14:00
Online Online [Poster Presentation] A study of face detection and its privacy protection in photos taken by wide-angle surveillance camera
Koki Nakai, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.), Sohei Fujii, Hiroyuki Ishihara (Systems nakashima) EMM2020-69
In this paper, we propose a privacy protection system that detects human faces from images taken by a wide-angle camera,... [more] EMM2020-69
pp.13-18
IN, NS
(Joint)
2021-03-05
09:30
Online Online A Study on Privacy Protection Leveraging Name Encryption with Multiple Encryption Keys
Toru Hasegawa, Shota Yamada, Yuki Koizumi (Osaka Univ.) IN2020-75
Information Centric Networking (ICN) is a promising Internet architecture wherein destinations are specified by data nam... [more] IN2020-75
pp.126-131
ICSS, IPSJ-SPT 2021-03-01
09:35
Online Online A Method for Reconstructing Hidden Background Image in Tele-conference with Virtual Background
Satoki Tsuji, Ryusei Ishikawa (Ritsumeikan Univ.), Masashi Eto (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Hiroshima City Univ.) ICSS2020-35
Interpersonal communications through video chat software has become essential since a remote work is now encouraged. Whe... [more] ICSS2020-35
pp.55-60
ICSS 2020-11-26
16:25
Online Online A Study on Anonymous Identifiers and its Applications
Kazuomi Oishi (SIST) ICSS2020-25
As computer network spreads, identifiers with anonymity is required for privacy protection. IPv6 temporary addresses are... [more] ICSS2020-25
pp.32-37
SIS, ITE-BCT 2020-10-01
13:00
Online Online Evaluation of linear dimensionality reduction methods considering visual information protection for privacy-preserving machine learning
Masaki Kitayama, Nobutaka Ono, Hitoshi Kiya (Tokyo Metro. Univ.) SIS2020-13
In this paper, linear dimensionality reduction methods are evaluated in terms of difficulty in estimating the visual inf... [more] SIS2020-13
pp.17-22
CS, IN, NS, NV
(Joint)
2020-09-11
15:35
Online Online A Study on Privacy Protection in Virtual IoT Platforms
Shigemori Kazuki, Mukai Hiroaki, Yokotani Tetsuya (KIT) CS2020-45
 [more] CS2020-45
pp.53-56
ITE-HI, IE, ITS, ITE-MMS, ITE-ME, ITE-AIT [detail] 2020-02-27
14:00
Hokkaido Hokkaido Univ.
(Cancelled but technical report was issued)
An Image Transformation Network for Privacy-Preserving Deep Neural Networks
Hiroki Ito, Yuma Kinoshita, Hitoshi Kiya (Tokyo Metro. Univ.) ITS2019-37 IE2019-75
We propose an image transformation network to generate visually-protected images for privacy-preserving deep neural netw... [more] ITS2019-37 IE2019-75
pp.195-200
NLC, IPSJ-NL, SP, IPSJ-SLP
(Joint) [detail]
2019-12-06
13:55
Tokyo NHK Science & Technology Research Labs. [Poster Presentation] Synthetic speech-based sound masking for privacy protection when speaking to smartphones in public space
Takahiro Tsugui, Shinji Takaki, Kei Hashimoto, Keiichiro Oura, Yoshihiko Nankaku, Keiichi Tokuda (Nagoya Inst. of Tech.) SP2019-38
In this paper, we propose a synthetic speech-based sound masking method that protects the privacy when speaking to smart... [more] SP2019-38
pp.55-60
KBSE, SC 2019-11-08
12:00
Nagano Shinshu University A support method of the coordination with protection of web tracking and usefulness in Web browsing
Satomi Rachi, hajime Iwata (KAIT) KBSE2019-25 SC2019-22
Web service provider demands user identification not to depend on personal information for the advertisements optimizati... [more] KBSE2019-25 SC2019-22
pp.13-18
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
14:10
Kochi Kochi University of Technology Anonymous Public-Key Certificates based on Elliptic Curve
Kazuomi Oishi (SIST) ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56
Anonymous public-key certificates can guarantee anonymity of the certificate users and are useful for applications in wh... [more] ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56
pp.347-352
PRMU, BioX 2019-03-17
10:00
Tokyo   A Person Re-Identification Method and Top-View System with Privacy Protection
Peng Li, Kouichi Oku, Haiyuan Wu (Wakayama Univ.) BioX2018-33 PRMU2018-137
In this paper, we propose a novel feature descriptor called Color Cumulative Energy (CCE) that be can used for extractin... [more] BioX2018-33 PRMU2018-137
pp.25-30
 Results 21 - 40 of 155 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan