Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2023-03-14 17:40 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Diversification of Personal Records using GAN Chengxi Jiang, Tiancheng Wang, Hikaru Morita (Kanagawa Univ.) IT2022-99 ISEC2022-78 WBS2022-96 RCC2022-96 |
In this paper, we deal with data anonymization as a privacy protection technology.Even in an anonymized database, it is ... [more] |
IT2022-99 ISEC2022-78 WBS2022-96 RCC2022-96 pp.203-208 |
SR |
2018-10-31 10:25 |
Overseas |
Mandarin Hotel, Bangkok, Thailand |
[Poster Presentation]
Spatial Spectrum Sharing among Micro Operators considering Distribution on Measurement-based Spectrum Database Hirofumi Nakajo, Yuya Aoki, Keita Katagiri, Takeo Fujii (UEC) SR2018-78 |
This paper proposes probabilistic protection of micro cells using measurement-based spectrum database. In the 5th genera... [more] |
SR2018-78 pp.45-46 |
AI |
2018-02-17 14:40 |
Tokyo |
|
Commercial Transaction of Digital Data and Intellectual Property
-- The Protection of Digital Data by Copyright law and its Limitation -- Makoto Koike (MK Microwave) AI2017-28 |
The progress in the internet of things, big data and artificial intelligence are the engines of the ongoing fourth indus... [more] |
AI2017-28 pp.61-65 |
CS, NS, IN (Joint) |
2014-09-12 13:25 |
Miyagi |
Tohoku Univ. Research Institute of Electrical Communication 2gokan |
Detection of Malicious Database Queries based on Matching with HTTP Requests Yuichi Sudo, Takahiro Hamada, Yuichi Murata, Hideo Kitazume (NTT) IN2014-65 |
If an attacker takes over a Web server by vulnerability attack or fraud login and so on, the attacker can control the se... [more] |
IN2014-65 pp.99-104 |
RCC, ASN, NS, RCS, SR (Joint) |
2014-07-31 10:50 |
Kyoto |
Kyoto Terrsa |
[Poster Presentation]
An Interference Constraint Method Using Measurement-based Radio Environment Database Koya Sato, Takeo Fujii (Univ. of Electro-Communications) RCC2014-35 NS2014-55 RCS2014-107 SR2014-36 ASN2014-54 |
In spectrum sharing, radio environment cognition techniques have been discussed because secondary users are allowed acce... [more] |
RCC2014-35 NS2014-55 RCS2014-107 SR2014-36 ASN2014-54 pp.69-74(RCC), pp.47-52(NS), pp.101-106(RCS), pp.89-94(SR), pp.77-82(ASN) |
SR |
2014-01-23 10:00 |
Miyagi |
Tohoku Univ. |
Development of the Advanced Radio Propagation Database based on Measurement for Cognitive Radio Masayuki Kitamura, Yuya Ohue, Kei Inage, Takeo Fujii (UEC) SR2013-75 |
In order to realize a frequency sharing by cognitive radio, Secondary User (SU) needs to cooperate with the database as ... [more] |
SR2013-75 pp.1-6 |
SR |
2012-01-27 11:15 |
Kagoshima |
Kagoshima |
Spatial Measurement Based Radio Environment Database Using Spectrum Sensing in Cognitive Radio Hasan Rajib Imam, Kei Inage, Mai Ohta, Takeo Fujii (UEC) SR2011-95 |
In this paper, the authors propose a radio environment database (RED: radio environment database) to provide the estimat... [more] |
SR2011-95 pp.107-112 |
SSS |
2011-12-22 17:10 |
Tokyo |
|
Study of characteristics of information for safety and the development of accident information database Toshikazu Taniguchi (Meiji Univ), Shigeo Umezaki (JNIOSH), Masao Mukaidono (Meiji Univ) SSS2011-24 |
Currently, Japan's industrial accident databases are central to the measures to the attention of workers. However, if th... [more] |
SSS2011-24 pp.25-28 |
ITE-ME, EMM, IE, LOIS, IEE-CMN [detail] |
2011-09-20 15:40 |
Ehime |
|
Quantization of Facial Feature for producing Cryptographic Key for Privacy Protection on Facial Image Retrieval System Tomohiko Fujita, Takuya Funatomi, Yoshitaka Morimura, Michihiko Minoh (Kyoto Univ.) LOIS2011-21 IE2011-54 EMM2011-32 |
For achieving the privacy protection on the facial image retrieval system, we consider the method that produces cryptogr... [more] |
LOIS2011-21 IE2011-54 EMM2011-32 pp.35-40 |
SR |
2011-04-22 10:45 |
Shimane |
Matsue Terrsa |
An Adaptive Secondary MAC Protocol over 802.11 Wireless LAN with Database Takayuki Suzuki, Takeo Fujii (UEC), Osamu Takyu, Yohtaro Umeda (TUS) SR2011-11 |
In this paper, we have proposed a MAC protocol for secondary system overlaying to the primary wireless LAN (PU: Primary ... [more] |
SR2011-11 pp.65-70 |
MSS |
2009-01-29 17:25 |
Kanagawa |
Kanagawa Industrial Promotion Center |
Design and Implementation of Secret Sharing Distributed Database System Shota Minakami, Toshiyuki Miyamoto (Osaka Univ.) CST2008-50 |
In recent years, database security has attracted attention due to
frequent occurrence of individual information leak.
... [more] |
CST2008-50 pp.51-56 |