Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2023-03-14 17:40 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Diversification of Personal Records using GAN Chengxi Jiang, Tiancheng Wang, Hikaru Morita (Kanagawa Univ.) IT2022-99 ISEC2022-78 WBS2022-96 RCC2022-96 |
In this paper, we deal with data anonymization as a privacy protection technology.Even in an anonymized database, it is ... [more] |
IT2022-99 ISEC2022-78 WBS2022-96 RCC2022-96 pp.203-208 |
RCC, ISEC, IT, WBS |
2023-03-15 11:00 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Garbled Circuit Construction Method Using Linked List of Hash Functions Guangjian Liu, Tiancheng Wang, Hikaru Morita (Kanagawa Univ.) IT2022-114 ISEC2022-93 WBS2022-111 RCC2022-111 |
[more] |
IT2022-114 ISEC2022-93 WBS2022-111 RCC2022-111 pp.290-296 |
IT, ISEC, RCC, WBS |
2022-03-11 16:25 |
Online |
Online |
An Efficient Method for Constructing Garbled Circuits Using Linked Lists Guangjian Liu, Hikaru Morita (Graduate School of Kanagawa Univ) IT2021-131 ISEC2021-96 WBS2021-99 RCC2021-106 |
Since the proposal of the Garbled Circuit by Yao, a number of construction methods for secret circuits have been propose... [more] |
IT2021-131 ISEC2021-96 WBS2021-99 RCC2021-106 pp.281-284 |
WBS, IT, ISEC |
2021-03-05 10:15 |
Online |
Online |
A Proposal for Causal Inference with Subjective Evaluation Daichi Ikeda, Hikaru Morita (Graduate School of Kanagawa Univ.) IT2020-146 ISEC2020-76 WBS2020-65 |
Machine learning techniques such as deep learning are often used for identification and personal matching in information... [more] |
IT2020-146 ISEC2020-76 WBS2020-65 pp.208-212 |
ISEC, IT, WBS |
2020-03-11 12:10 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
A Construction Method of Garbled Circuits for ZDD Takayuki Masui, Hikaru Morita (Graduate Schoool, Kanagawa Univ) IT2019-114 ISEC2019-110 WBS2019-63 |
Kruger et al proposed a new method to construct Garbled Circuits for BDD, which gives a compression expression of logic... [more] |
IT2019-114 ISEC2019-110 WBS2019-63 pp.167-170 |
IT, ISEC, WBS |
2019-03-07 13:40 |
Tokyo |
University of Electro-Communications |
Steganography for character strings by using deep learning Takayuki Masui (Kanagawa Univ.), Taiki Shigeta (Graduate School, Kanagawa Univ.), Hikaru Morita (Kanagawa Univ.) IT2018-82 ISEC2018-88 WBS2018-83 |
[more] |
IT2018-82 ISEC2018-88 WBS2018-83 pp.45-49 |
IT, ISEC, WBS |
2019-03-07 14:05 |
Tokyo |
University of Electro-Communications |
Steganography for images by using deep learning Taiki Shigeta, Hikaru Morita (Graduate Schoool, Kanagawa Univ) IT2018-83 ISEC2018-89 WBS2018-84 |
[more] |
IT2018-83 ISEC2018-89 WBS2018-84 pp.51-55 |
IT, ISEC, WBS |
2019-03-08 11:15 |
Tokyo |
University of Electro-Communications |
A document-management scheme by using Git and Blockchain methods Daichi Ikeda, Taiki Shigeta, Hikaru Morita (Kanagawa Univ.) IT2018-106 ISEC2018-112 WBS2018-107 |
[more] |
IT2018-106 ISEC2018-112 WBS2018-107 pp.187-191 |
WBS, IT, ISEC |
2018-03-08 10:50 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
Digital watermark using deep-learning classification Mashu Sakai, Taiki Shigeta, Hikaru Morita (Kanagawa Univ.) IT2017-121 ISEC2017-109 WBS2017-102 |
Digital watermarking is a technique of embedding information in an original image without being noticed or disclosed to ... [more] |
IT2017-121 ISEC2017-109 WBS2017-102 pp.103-106 |
ITS, WBS, RCC |
2017-12-14 13:30 |
Okinawa |
Tiruru/Okinawa Jichikaikan |
[Poster Presentation]
On Adaptive FIR Filter Based PAPR Reduction Scheme without Side Information Hikaru Morita, Teruyuki Miyajima, Yoshiki Sugitani (Ibaraki Univ.) WBS2017-56 ITS2017-33 RCC2017-72 |
In this paper, we consider an adaptive FIR filter based PAPR reduction scheme for OFDM system. In the transmitter, to re... [more] |
WBS2017-56 ITS2017-33 RCC2017-72 pp.117-122 |
LOIS, ISEC, SITE |
2015-11-06 17:10 |
Kanagawa |
Kanagawa Univ. |
Postpaid electronic money to keep privacy and its implementation Tatshuhiko Sukegawa, Mashu Sakai, Hikaru Morita (Kanagawa Univ.) ISEC2015-48 SITE2015-35 LOIS2015-42 |
Postpaid electronic money schemes are provided by credit-card companies.
In these schemes, after electronic money is us... [more] |
ISEC2015-48 SITE2015-35 LOIS2015-42 pp.81-86 |
LOIS, ISEC, SITE |
2015-11-07 11:20 |
Kanagawa |
Kanagawa Univ. |
A dynamic filtering method to reduce DDoS packets by using access tokens Ryota Suzuki, Hikaru Morita (Kanagawa Univ.) ISEC2015-53 SITE2015-40 LOIS2015-47 |
The flow controls on packets in transmission channel are general measures against DDoS (Distributed Denial of Service) a... [more] |
ISEC2015-53 SITE2015-40 LOIS2015-47 pp.111-116 |
ISEC, IT, WBS |
2011-03-04 11:15 |
Osaka |
Osaka University |
Improved POSH scheme using hash chains among sensors Tetsuomi Hasegawa, Hikaru Morita (Kanagawa Univ.), Satoru Kanno (NTT SOFT), Shoji Okuno (Kanagawa Univ.) IT2010-97 ISEC2010-101 WBS2010-76 |
In wireless sensor networks, WSNs, it is important to evaluate resistance against adversary. Posh
scheme was proposed ... [more] |
IT2010-97 ISEC2010-101 WBS2010-76 pp.185-190 |