Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS |
2021-05-13 14:25 |
Kyoto |
Kyoto Univ. Rakuyu kaikan (Primary: On-site, Secondary: Online) |
A Study on Privacy Concerns by Single-Word Search Query Leakage from Web Browsers through Domain Name System Katsuki Isobe, Daishi Kondo, Hideki Tode (OPU) |
(To be available after the conference date) [more] |
|
EMM |
2021-03-04 14:00 |
Online |
Online |
[Poster Presentation]
A study of face detection and its privacy protection in photos taken by wide-angle surveillance camera Koki Nakai, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.), Sohei Fujii, Hiroyuki Ishihara (Systems nakashima) EMM2020-69 |
In this paper, we propose a privacy protection system that detects human faces from images taken by a wide-angle camera,... [more] |
EMM2020-69 pp.13-18 |
WBS, IT, ISEC |
2021-03-04 15:45 |
Online |
Online |
Upper and Lower Bounds on the Capacity of Private Information Retrieval Allowing Information Leakage from Queries with Different Limits for Each Database Naoto Toyoda, Tetsunao Matsuta, Uyematsu Tomohiko (Tokyo Tech) IT2020-133 ISEC2020-63 WBS2020-52 |
In this paper, we consider the private information retrieval using multiple databases with multiple messages in the case... [more] |
IT2020-133 ISEC2020-63 WBS2020-52 pp.128-133 |
IN, NS (Joint) |
2021-03-05 09:30 |
Online |
Online |
A Study on Privacy Protection Leveraging Name Encryption with Multiple Encryption Keys Toru Hasegawa, Shota Yamada, Yuki Koizumi (Osaka Univ.) IN2020-75 |
Information Centric Networking (ICN) is a promising Internet architecture wherein destinations are specified by data nam... [more] |
IN2020-75 pp.126-131 |
BioX, CNR |
2021-03-02 15:30 |
Online |
Online |
Visual place recognition from eye reflection Yuki Ohshima, Kyosuke Maeda, Yusuke Edamoto, Atsushi Nakazawa (Kyoto Univ.) BioX2020-48 CNR2020-21 |
The cornea in the human eye reflects incoming environmental light, which means we can obtain information about the surro... [more] |
BioX2020-48 CNR2020-21 pp.44-49 |
ICSS, IPSJ-SPT |
2021-03-01 09:35 |
Online |
Online |
A Method for Reconstructing Hidden Background Image in Tele-conference with Virtual Background Satoki Tsuji, Ryusei Ishikawa (Ritsumeikan Univ.), Masashi Eto (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Hiroshima City Univ.) ICSS2020-35 |
Interpersonal communications through video chat software has become essential since a remote work is now encouraged. Whe... [more] |
ICSS2020-35 pp.55-60 |
ICSS, IPSJ-SPT |
2021-03-02 14:05 |
Online |
Online |
Developing an Interactive Analysis System for Voice Assistant Apps Atsuko Natatsuka (Waseda Univ.), Ryo Iijima (Waseda Univ./NICT), Takuya Watanabe, Mitsuaki Akiyama (NTT), Tetsuya Sakai (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-48 |
In Voice Assistant Services, official or third-party Voice Assistant Apps (VA apps) are provided. Since a VA app works a... [more] |
ICSS2020-48 pp.132-137 |
CQ (2nd) |
2021-01-21 11:05 |
Online |
Online |
[Invited Lecture]
Hot Topics in Forwarding and Privacy in Information-Centric Networking Yuki Koizumi, Toru Hasegawa (Osaka Univ.) |
Information-Centric Networking (ICN), where communication is based on named content objects instead of named hosts, is ... [more] |
|
QIT (2nd) |
2020-12-10 17:30 |
Online |
Online |
Quantum anonymous senser which hides positions of magnetic fields Hiroto Kasai (Univ of Tsukuba/AIST), Yuki Takeuchi (NTT), Hideaki Hakoshima, Yuichiro Matsuzaki (AIST), Yasuhiro Tokura (Univ of Tsukuba) |
A lot of attention has been paid to a quantum sensing network for detecting magnetic fields in different positions.
Her... [more] |
|
ICSS |
2020-11-26 16:25 |
Online |
Online |
A Study on Anonymous Identifiers and its Applications Kazuomi Oishi (SIST) ICSS2020-25 |
As computer network spreads, identifiers with anonymity is required for privacy protection. IPv6 temporary addresses are... [more] |
ICSS2020-25 pp.32-37 |
LOIS, ISEC, SITE |
2020-11-06 14:40 |
Online |
Online |
Considering the variation of the noise-addition amount in local differential privacy with user trajectory adjacency Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi, Doudou Fall (NAIST) ISEC2020-39 SITE2020-36 LOIS2020-19 |
The detection of clusters in densely populated areas by contact tracing is urgent, because these locations are trajector... [more] |
ISEC2020-39 SITE2020-36 LOIS2020-19 pp.45-50 |
IN, ICTSSL, NWS |
2020-10-22 15:25 |
Online |
Online |
[Invited Talk]
Secure Data Utilization using Multi-Party Computation Takao Takenouchi (Digital Garage) IN2020-32 |
It is becoming more and more important to distribute and utilize data between organizations to provide better services a... [more] |
IN2020-32 pp.12-17 |
SIS, ITE-BCT |
2020-10-01 13:00 |
Online |
Online |
Evaluation of linear dimensionality reduction methods considering visual information protection for privacy-preserving machine learning Masaki Kitayama, Nobutaka Ono, Hitoshi Kiya (Tokyo Metro. Univ.) SIS2020-13 |
In this paper, linear dimensionality reduction methods are evaluated in terms of difficulty in estimating the visual inf... [more] |
SIS2020-13 pp.17-22 |
CS, IN, NS, NV (Joint) |
2020-09-11 15:35 |
Online |
Online |
A Study on Privacy Protection in Virtual IoT Platforms Shigemori Kazuki, Mukai Hiroaki, Yokotani Tetsuya (KIT) CS2020-45 |
[more] |
CS2020-45 pp.53-56 |
SITE, IPSJ-EIP [detail] |
2020-06-04 15:35 |
Online |
Online |
[Invited Talk]
"Resurrection" of deceased from the data
-- Postmortem identity -- Akiko Orita (KGU) SITE2020-8 |
(To be available after the conference date) [more] |
SITE2020-8 pp.45-47 |
ISEC, IT, WBS |
2020-03-10 13:50 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
A Statistical Decision-Theoretic Approach for Measuring Privacy Risk in Information Disclosure Problem Alisa Miyashita, Akira Kamatsuka (Waseda Univ.), Takahiro Yoshida (Yokohama College of Commerce), Toshiyasu Matsushima (Waseda Univ.) IT2019-104 ISEC2019-100 WBS2019-53 |
In this paper, we deal with the problem of database statistics publishing with privacy and utility guarantees. While var... [more] |
IT2019-104 ISEC2019-100 WBS2019-53 pp.95-100 |
NS, IN (Joint) |
2020-03-06 09:50 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
Privacy-preserving Recommendation based on Provider Coordination Daiki Himi, Taiju Mikoshi, Katsunori Oyama, Toshihiro Nishizono (Nihon Univ.) NS2019-215 |
This paper proposes a privacy preserving information recommendation method based on cooperation among providers. IDs of ... [more] |
NS2019-215 pp.205-210 |
NS, IN (Joint) |
2020-03-06 09:10 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
A k-anonymity based Scheme for Private Location-related Content Retrieval in NDN Kentaro Kita, Yuki Koizumi, Toru Hasegawa (Osaka Univ.) IN2019-108 |
We have proposed a location-based forwarding scheme for Named Data Networking, in which consumers retrieve content from ... [more] |
IN2019-108 pp.177-182 |
NS, IN (Joint) |
2020-03-06 09:30 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
A Study on Vulnerability of Data Name Encryption in ICN Networks against Frequency Attacks Nagahiro Enatsu, Yuki Koizumi, Toru Hasegawa (Osaka Univ.) IN2019-109 |
A Study on Vulnerability of Data Name Encryption in ICN Networks
against Frequency Attacks [more] |
IN2019-109 pp.183-188 |
ICSS, IPSJ-SPT |
2020-03-02 16:20 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Mirai may detect that you talk to smart speaker
-- On privacy violation by attackers who compromised home router -- Shoya Okuda, Tatsuya Tamai, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2019-82 |
In this study, we analyze the traffic of four popular smart speakers to assess the risk of privacy invasion by attackers... [more] |
ICSS2019-82 pp.85-90 |