Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SIS, ITE-BCT |
2022-10-13 13:55 |
Aomori |
Hachinohe Institute of Technology (Primary: On-site, Secondary: Online) |
An 8K image perceptual scramble scheme for JPEG XS standard Takayuki Nakachi (Univ. of the Ryukyus), Hiroyuki Kimiyama (Daido), Mitsuru Murayama (KAIST) SIS2022-11 |
In this report, we propose a scrambled image compression algorithm for the JPEG XS standard. The JPEG XS is a low-delay,... [more] |
SIS2022-11 pp.1-6 |
NS, SR, RCS, SeMI, RCC (Joint) |
2022-07-14 14:00 |
Ishikawa |
The Kanazawa Theatre + Online (Primary: On-site, Secondary: Online) |
A Study of Dynamic Privacy Control Method in LDP for Preserving Temporal/Spatial Intrinsic Information Value of Trajectory Data Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-47 |
Spatiotemporal data, including people's movement trajectories and transit points, is highly valuable for various applica... [more] |
NS2022-47 pp.106-111 |
NC, IBISML, IPSJ-BIO, IPSJ-MPS [detail] |
2022-06-27 14:50 |
Okinawa |
(Primary: On-site, Secondary: Online) |
AI knowledge forgetting based on the importance of model parameters Tomoya Yamashita, Masanori Yamada (NTT) NC2022-3 IBISML2022-3 |
The accuracy of Deep Learning has been greatly improved by the progress of research in computer technology and Deep Lear... [more] |
NC2022-3 IBISML2022-3 pp.14-19 |
SITE, IPSJ-EIP |
2022-06-09 15:20 |
Tokyo |
(Primary: On-site, Secondary: Online) |
A Study on the Role of Data-Related Legislation in Digital Strategy Naonori Kato (KDDI RI/NFI), Kyoko Mori (KDDI RI/Hitotsubashi Uni.), Yosuke Murakami, Minoru Kouzu (KDDI RI) SITE2022-7 |
On May 3, 2022, the European Commission published the details of the establishment of the European Health Data Space (EH... [more] |
SITE2022-7 pp.40-45 |
CQ, CS (Joint) |
2022-05-12 14:20 |
Fukui |
Fukui (Fuku Pref.) (Primary: On-site, Secondary: Online) |
Distributed Network Intrusion Detection System Using Federated Learning Yuya Tsuru, Tomoya Kawakami, Tatsuhito Hasegawa (Univ. of Fukui) CQ2022-5 |
A network-based intrusion detection system (NIDS) monitors a network and detects unauthorized traffic. Currently, a vari... [more] |
CQ2022-5 pp.20-25 |
MSS, NLP |
2022-03-29 15:45 |
Online |
Online |
Proposal of work end time estimation technology using PC operation logs Rina Yamamoto, Yoshiyuki Sakamaki, Tadanobu Tsunoda, Junpei Yamaguchi, Hisashi Kojima (Fujitsu Ltd.) MSS2021-80 NLP2021-151 |
In conventional working style in offices, employees communicated each other in break time of work. However, it’s difficu... [more] |
MSS2021-80 NLP2021-151 pp.133-138 |
EMM |
2022-03-07 13:20 |
Online |
(Primary: Online, Secondary: On-site) (Primary: Online, Secondary: On-site) |
[Poster Presentation]
Privacy considered human flow measurement system using depth images Masahiro Sudo, Michiharu Niimi (KIT) EMM2021-93 |
Measuring human flow, which count number of people or their flow line who exist any space or room is beneficial to think... [more] |
EMM2021-93 pp.7-12 |
RCS, SR, NS, SeMI, RCC (Joint) |
2021-07-16 10:55 |
Online |
Online |
A Study on Decentralized Machine Learning with Differential Privacy based on Input Perturbation Masakazu Okamoto, Koya Sato, Keiichi Iwamura (Tokyo Univ. of Science) SR2021-34 |
Distributed machine learning eliminates the need for users to disclose their data to the out of the terminal since train... [more] |
SR2021-34 pp.67-72 |
RCS, SR, NS, SeMI, RCC (Joint) |
2021-07-16 13:25 |
Online |
Online |
An Evaluation of Learning Accuracy in Federated Learning with Local Differential Privacy Yuta Kakizaki, Koya Sato, Keiichi Iwamura (Tokyo Univ. of Science) SR2021-37 |
In federated learning, where each device learns cooperatively without disclosing the training data, the privacy level ca... [more] |
SR2021-37 pp.87-93 |
EMM |
2021-03-04 14:00 |
Online |
Online |
[Poster Presentation]
A study of face detection and its privacy protection in photos taken by wide-angle surveillance camera Koki Nakai, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.), Sohei Fujii, Hiroyuki Ishihara (Systems nakashima) EMM2020-69 |
In this paper, we propose a privacy protection system that detects human faces from images taken by a wide-angle camera,... [more] |
EMM2020-69 pp.13-18 |
IN, NS (Joint) |
2021-03-05 09:30 |
Online |
Online |
A Study on Privacy Protection Leveraging Name Encryption with Multiple Encryption Keys Toru Hasegawa, Shota Yamada, Yuki Koizumi (Osaka Univ.) IN2020-75 |
Information Centric Networking (ICN) is a promising Internet architecture wherein destinations are specified by data nam... [more] |
IN2020-75 pp.126-131 |
ICSS, IPSJ-SPT |
2021-03-01 09:35 |
Online |
Online |
A Method for Reconstructing Hidden Background Image in Tele-conference with Virtual Background Satoki Tsuji, Ryusei Ishikawa (Ritsumeikan Univ.), Masashi Eto (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Hiroshima City Univ.) ICSS2020-35 |
Interpersonal communications through video chat software has become essential since a remote work is now encouraged. Whe... [more] |
ICSS2020-35 pp.55-60 |
ICSS |
2020-11-26 16:25 |
Online |
Online |
A Study on Anonymous Identifiers and its Applications Kazuomi Oishi (SIST) ICSS2020-25 |
As computer network spreads, identifiers with anonymity is required for privacy protection. IPv6 temporary addresses are... [more] |
ICSS2020-25 pp.32-37 |
SIS, ITE-BCT |
2020-10-01 13:00 |
Online |
Online |
Evaluation of linear dimensionality reduction methods considering visual information protection for privacy-preserving machine learning Masaki Kitayama, Nobutaka Ono, Hitoshi Kiya (Tokyo Metro. Univ.) SIS2020-13 |
In this paper, linear dimensionality reduction methods are evaluated in terms of difficulty in estimating the visual inf... [more] |
SIS2020-13 pp.17-22 |
CS, IN, NS, NV (Joint) |
2020-09-11 15:35 |
Online |
Online |
A Study on Privacy Protection in Virtual IoT Platforms Shigemori Kazuki, Mukai Hiroaki, Yokotani Tetsuya (KIT) CS2020-45 |
[more] |
CS2020-45 pp.53-56 |
ITE-HI, IE, ITS, ITE-MMS, ITE-ME, ITE-AIT [detail] |
2020-02-27 14:00 |
Hokkaido |
Hokkaido Univ. (Cancelled but technical report was issued) |
An Image Transformation Network for Privacy-Preserving Deep Neural Networks Hiroki Ito, Yuma Kinoshita, Hitoshi Kiya (Tokyo Metro. Univ.) ITS2019-37 IE2019-75 |
We propose an image transformation network to generate visually-protected images for privacy-preserving deep neural netw... [more] |
ITS2019-37 IE2019-75 pp.195-200 |
NLC, IPSJ-NL, SP, IPSJ-SLP (Joint) [detail] |
2019-12-06 13:55 |
Tokyo |
NHK Science & Technology Research Labs. |
[Poster Presentation]
Synthetic speech-based sound masking for privacy protection when speaking to smartphones in public space Takahiro Tsugui, Shinji Takaki, Kei Hashimoto, Keiichiro Oura, Yoshihiko Nankaku, Keiichi Tokuda (Nagoya Inst. of Tech.) SP2019-38 |
In this paper, we propose a synthetic speech-based sound masking method that protects the privacy when speaking to smart... [more] |
SP2019-38 pp.55-60 |
KBSE, SC |
2019-11-08 12:00 |
Nagano |
Shinshu University |
A support method of the coordination with protection of web tracking and usefulness in Web browsing Satomi Rachi, hajime Iwata (KAIT) KBSE2019-25 SC2019-22 |
Web service provider demands user identification not to depend on personal information for the advertisements optimizati... [more] |
KBSE2019-25 SC2019-22 pp.13-18 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 14:10 |
Kochi |
Kochi University of Technology |
Anonymous Public-Key Certificates based on Elliptic Curve Kazuomi Oishi (SIST) ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56 |
Anonymous public-key certificates can guarantee anonymity of the certificate users and are useful for applications in wh... [more] |
ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56 pp.347-352 |
PRMU, BioX |
2019-03-17 10:00 |
Tokyo |
|
A Person Re-Identification Method and Top-View System with Privacy Protection Peng Li, Kouichi Oku, Haiyuan Wu (Wakayama Univ.) BioX2018-33 PRMU2018-137 |
In this paper, we propose a novel feature descriptor called Color Cumulative Energy (CCE) that be can used for extractin... [more] |
BioX2018-33 PRMU2018-137 pp.25-30 |