Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2020-03-02 16:20 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Mirai may detect that you talk to smart speaker
-- On privacy violation by attackers who compromised home router -- Shoya Okuda, Tatsuya Tamai, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2019-82 |
In this study, we analyze the traffic of four popular smart speakers to assess the risk of privacy invasion by attackers... [more] |
ICSS2019-82 pp.85-90 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 14:15 |
Hokkaido |
San-Refure Hakodate |
Evaluation of a Classification Table for Invasion of Privacy in SNSs Using Normalized Rank Method Shimon Machida (SOKENDAI), Tomoko Kajiyama (Aoyama Gakuin Univ.), Shigeru Shimada (AIIT), Isao Echizen (NII) ISEC2014-23 SITE2014-18 ICSS2014-27 EMM2014-23 |
By posting a message to Social Networking Service(SNS) unintentionally, the message, including personal information, is ... [more] |
ISEC2014-23 SITE2014-18 ICSS2014-27 EMM2014-23 pp.145-148 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 15:20 |
Hokkaido |
San-Refure Hakodate |
Privacy Invasion and the Concept of the "Digital Person"
-- Understanding Based on Information Ethics and Goffman's Dramaturgy Theory -- Takushi Otani (Kibi International Univ.) ISEC2014-28 SITE2014-23 ICSS2014-32 EMM2014-28 |
This article explores the harm caused by the misuses of the “digital person,” which is the aggregated personal data from... [more] |
ISEC2014-28 SITE2014-23 ICSS2014-32 EMM2014-28 pp.205-212 |
DE |
2014-06-21 18:05 |
Tokyo |
Ricoh IT Solutions |
Protection service of invasion of privacy by a wearable camera
-- Development of the function of determining learning privacy infringement pattern from analysis of SNS content -- Ikuhide Nara (SCSK), Shigeru Shimada (AIIT) DE2014-21 |
Opinion to fear the invasion of privacy by wearable camera like Google Glass is getting increasingly, the convenience mi... [more] |
DE2014-21 pp.91-96 |
EMM |
2014-03-07 15:00 |
Ishikawa |
JAIST |
[Poster Presentation]
Prototype Implementation of Adaptive Disclosure Controls by Detecting Sensitive Data Leaks Shimon Machida (SOKENDAI), Tomoko Kajiyama (Aoyama Gakuin Univ.), Shigeru Shimada (AIIT), Isao Echizen (NII) EMM2013-108 |
By posting a message to Social Networking Service(SNS) unintentionally, the message, including personal information, is ... [more] |
EMM2013-108 pp.51-56 |
HCS |
2013-11-09 10:50 |
Osaka |
Osaka Univ. (Toyonaka) |
Factor Analysis of Privacy Invasion caused by Wearable Camera based on SNS Emotion Analysis Ikuhide Nara, Satomi Takada, Miki Takata, Shigefumi Omoto, Takuya Kishimoto, Ziyin Zhou, Shigeru Shimada (AIIT) HCS2013-53 |
Opinion to fear the invasion of privacy by the camera of wearable computer equipment is getting increasingly, the conven... [more] |
HCS2013-53 pp.19-24 |
IE, EMM, LOIS, IEE-CMN, ITE-ME [detail] |
2013-09-12 15:40 |
Kumamoto |
|
Access Control by Detecting Privacy Leaks on Digital Private Documents Shimon Machida (GUAS), Shigeru Shimada (AIIT), Isao Echizen (NII) LOIS2013-15 IE2013-36 EMM2013-58 |
Recently, many people are enjoying Social Networking Services using mobile devices such as Smartphones, Posting messages... [more] |
LOIS2013-15 IE2013-36 EMM2013-58 pp.31-36 |
EMM |
2013-03-07 14:00 |
Kyoto |
|
Protection of privacy in JPEG files using Robust Reversible Information Hiding against Re-encoding Fuyuki Masutani, Michiharu Niimi, Hideki Noda (Kyushu Inst. of Tech.) EMM2012-108 |
The privacy of unknown person may be included in the digital images unintentionally taken as a sight. The action of the ... [more] |
EMM2012-108 pp.7-12 |
EMM |
2013-01-29 13:30 |
Miyagi |
Tohoku Univ. |
Evaluation of privacy visor to prevent face recognition from camera image Takayuki Yamada (NII), Seiichi Gohshi (Kogakuin University), Isao Echizen (NII) EMM2012-92 |
A method is proposed for preventing privacy invasion through unintentional capture of facial images. Prevention methods ... [more] |
EMM2012-92 pp.7-12 |
DE |
2012-12-13 10:00 |
Kyoto |
Campus Plaza Kyoto |
Time Series Analysis Regarding SNS data for Detecting Privacy Communitys Yang Song, Takayuki Koyama, Shimon Machida, Shigeru Shimada (AIIT) DE2012-28 |
Recently, people can easily post to the SNS. Because of this, privacy invasion caused by careless posting is increasing.... [more] |
DE2012-28 pp.81-86 |
ICSS |
2012-11-22 11:35 |
Hiroshima |
Miyajima Mori-no-Yado |
An analytical study for sensor service provider to keep their use's security Takamichi Aso, Atsuhiro Goto (IISEC) ICSS2012-47 |
Sensor service attracts huge attention now. It is easy to image that sensor service providers would utilize public cloud... [more] |
ICSS2012-47 pp.13-18 |
EMM, IE, LOIS, ITE-ME, IEE-CMN [detail] |
2012-08-28 10:15 |
Yamaguchi |
|
Factor Analysis Regarding Privacy Invasion of SNS Posting Photos Satomi Takada, Takayuki Koyama, Shimon Machida, Yang Song, Shigeru Shimada (AIIT) LOIS2012-24 IE2012-56 EMM2012-47 |
Recently, problems of invasion of privacy due to post images to the SNS has been increasing gradually. We analyzed these... [more] |
LOIS2012-24 IE2012-56 EMM2012-47 pp.69-74 |
EMM |
2012-03-16 11:45 |
Osaka |
|
Protection of privacy in JPEG images using reversible information hiding Fuyuki Masutani, Michiharu Niimi, Hideki Noda (KIT) EMM2011-69 |
The privacy of unknown person may be included in the digital images unintentionally taken as a sight. The action of the ... [more] |
EMM2011-69 pp.31-36 |
EMM |
2011-11-15 14:15 |
Miyagi |
|
A Preserving Scheme of Latent Privacy contained in User Participatory Scenery Service Shigeru Shimada (AIIT) EMM2011-53 |
Although we have developed new scenery systems which are utilizing user generated contents (UGC), privacy preserving obj... [more] |
EMM2011-53 pp.77-82 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-01 11:20 |
Aomori |
Hirosaki University |
Limit of "Control Theory" of Privacy
-- Presentation of Identity and Context Dependency of Privacy -- Takushi Otani (Kibi International Univ.) ISEC2010-12 SITE2010-8 ICSS2010-18 |
The concept of Privacy has enlarged with changes in technology and society. After the 1960s, when modern information tec... [more] |
ISEC2010-12 SITE2010-8 ICSS2010-18 pp.13-19 |