IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 15 of 15  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2020-03-02
16:20
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Mirai may detect that you talk to smart speaker -- On privacy violation by attackers who compromised home router --
Shoya Okuda, Tatsuya Tamai, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2019-82
In this study, we analyze the traffic of four popular smart speakers to assess the risk of privacy invasion by attackers... [more] ICSS2019-82
pp.85-90
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
14:15
Hokkaido San-Refure Hakodate Evaluation of a Classification Table for Invasion of Privacy in SNSs Using Normalized Rank Method
Shimon Machida (SOKENDAI), Tomoko Kajiyama (Aoyama Gakuin Univ.), Shigeru Shimada (AIIT), Isao Echizen (NII) ISEC2014-23 SITE2014-18 ICSS2014-27 EMM2014-23
By posting a message to Social Networking Service(SNS) unintentionally, the message, including personal information, is ... [more] ISEC2014-23 SITE2014-18 ICSS2014-27 EMM2014-23
pp.145-148
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
15:20
Hokkaido San-Refure Hakodate Privacy Invasion and the Concept of the "Digital Person" -- Understanding Based on Information Ethics and Goffman's Dramaturgy Theory --
Takushi Otani (Kibi International Univ.) ISEC2014-28 SITE2014-23 ICSS2014-32 EMM2014-28
This article explores the harm caused by the misuses of the “digital person,” which is the aggregated personal data from... [more] ISEC2014-28 SITE2014-23 ICSS2014-32 EMM2014-28
pp.205-212
DE 2014-06-21
18:05
Tokyo Ricoh IT Solutions Protection service of invasion of privacy by a wearable camera -- Development of the function of determining learning privacy infringement pattern from analysis of SNS content --
Ikuhide Nara (SCSK), Shigeru Shimada (AIIT) DE2014-21
Opinion to fear the invasion of privacy by wearable camera like Google Glass is getting increasingly, the convenience mi... [more] DE2014-21
pp.91-96
EMM 2014-03-07
15:00
Ishikawa JAIST [Poster Presentation] Prototype Implementation of Adaptive Disclosure Controls by Detecting Sensitive Data Leaks
Shimon Machida (SOKENDAI), Tomoko Kajiyama (Aoyama Gakuin Univ.), Shigeru Shimada (AIIT), Isao Echizen (NII) EMM2013-108
By posting a message to Social Networking Service(SNS) unintentionally, the message, including personal information, is ... [more] EMM2013-108
pp.51-56
HCS 2013-11-09
10:50
Osaka Osaka Univ. (Toyonaka) Factor Analysis of Privacy Invasion caused by Wearable Camera based on SNS Emotion Analysis
Ikuhide Nara, Satomi Takada, Miki Takata, Shigefumi Omoto, Takuya Kishimoto, Ziyin Zhou, Shigeru Shimada (AIIT) HCS2013-53
Opinion to fear the invasion of privacy by the camera of wearable computer equipment is getting increasingly, the conven... [more] HCS2013-53
pp.19-24
IE, EMM, LOIS, IEE-CMN, ITE-ME [detail] 2013-09-12
15:40
Kumamoto   Access Control by Detecting Privacy Leaks on Digital Private Documents
Shimon Machida (GUAS), Shigeru Shimada (AIIT), Isao Echizen (NII) LOIS2013-15 IE2013-36 EMM2013-58
Recently, many people are enjoying Social Networking Services using mobile devices such as Smartphones, Posting messages... [more] LOIS2013-15 IE2013-36 EMM2013-58
pp.31-36
EMM 2013-03-07
14:00
Kyoto   Protection of privacy in JPEG files using Robust Reversible Information Hiding against Re-encoding
Fuyuki Masutani, Michiharu Niimi, Hideki Noda (Kyushu Inst. of Tech.) EMM2012-108
The privacy of unknown person may be included in the digital images unintentionally taken as a sight. The action of the ... [more] EMM2012-108
pp.7-12
EMM 2013-01-29
13:30
Miyagi Tohoku Univ. Evaluation of privacy visor to prevent face recognition from camera image
Takayuki Yamada (NII), Seiichi Gohshi (Kogakuin University), Isao Echizen (NII) EMM2012-92
A method is proposed for preventing privacy invasion through unintentional capture of facial images. Prevention methods ... [more] EMM2012-92
pp.7-12
DE 2012-12-13
10:00
Kyoto Campus Plaza Kyoto Time Series Analysis Regarding SNS data for Detecting Privacy Communitys
Yang Song, Takayuki Koyama, Shimon Machida, Shigeru Shimada (AIIT) DE2012-28
Recently, people can easily post to the SNS. Because of this, privacy invasion caused by careless posting is increasing.... [more] DE2012-28
pp.81-86
ICSS 2012-11-22
11:35
Hiroshima Miyajima Mori-no-Yado An analytical study for sensor service provider to keep their use's security
Takamichi Aso, Atsuhiro Goto (IISEC) ICSS2012-47
Sensor service attracts huge attention now. It is easy to image that sensor service providers would utilize public cloud... [more] ICSS2012-47
pp.13-18
EMM, IE, LOIS, ITE-ME, IEE-CMN [detail] 2012-08-28
10:15
Yamaguchi   Factor Analysis Regarding Privacy Invasion of SNS Posting Photos
Satomi Takada, Takayuki Koyama, Shimon Machida, Yang Song, Shigeru Shimada (AIIT) LOIS2012-24 IE2012-56 EMM2012-47
Recently, problems of invasion of privacy due to post images to the SNS has been increasing gradually. We analyzed these... [more] LOIS2012-24 IE2012-56 EMM2012-47
pp.69-74
EMM 2012-03-16
11:45
Osaka   Protection of privacy in JPEG images using reversible information hiding
Fuyuki Masutani, Michiharu Niimi, Hideki Noda (KIT) EMM2011-69
The privacy of unknown person may be included in the digital images unintentionally taken as a sight. The action of the ... [more] EMM2011-69
pp.31-36
EMM 2011-11-15
14:15
Miyagi   A Preserving Scheme of Latent Privacy contained in User Participatory Scenery Service
Shigeru Shimada (AIIT) EMM2011-53
Although we have developed new scenery systems which are utilizing user generated contents (UGC), privacy preserving obj... [more] EMM2011-53
pp.77-82
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-01
11:20
Aomori Hirosaki University Limit of "Control Theory" of Privacy -- Presentation of Identity and Context Dependency of Privacy --
Takushi Otani (Kibi International Univ.) ISEC2010-12 SITE2010-8 ICSS2010-18
The concept of Privacy has enlarged with changes in technology and society. After the 1960s, when modern information tec... [more] ISEC2010-12 SITE2010-8 ICSS2010-18
pp.13-19
 Results 1 - 15 of 15  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan