IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 403  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2024-03-21
14:30
Okinawa OIST
(Primary: On-site, Secondary: Online)
A poisoning-resilient LDP schema using oblivious transfer and Hadamard transform
Masahiro Shimizu, Hiroaki Kikuchi (Meiji Univ.) ICSS2023-79
In recent years, Local Differential Privacy (LDP) has been actively used to collect and utilize users’ usage history from... [more] ICSS2023-79
pp.71-78
ICSS, IPSJ-SPT 2024-03-21
14:55
Okinawa OIST
(Primary: On-site, Secondary: Online)
An Examination of Privacy-Aware Malicious Activity Detection Methods Using NII-SOCS Benchmark Data
Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2023-80
Detection of malicious communications from communication logs may pose a risk of privacy infringement as it requires mon... [more] ICSS2023-80
pp.79-84
ICSS, IPSJ-SPT 2024-03-21
16:10
Okinawa OIST
(Primary: On-site, Secondary: Online)
Considerations on Differential Privacy Mechanisms in MNIST
Naoki Kawahara, Pengxuan Wei, Ryunosuke Higashi, Kenta Okada, Tatsuhiro Yamatsuki, Atsuko Miyaji (Osaka Univ.) ICSS2023-81
In recent years, data utilization technologies, including machine learning, have been steadily advancing. One means of p... [more] ICSS2023-81
pp.85-92
RCC, ISEC, IT, WBS 2024-03-13
- 2024-03-14
Osaka Osaka Univ. (Suita Campus) Data processing methods for high-performance Privacy-Preserving Machine Learning
Tatsuhiro Yamatsuki (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) IT2023-94 ISEC2023-93 WBS2023-82 RCC2023-76
Currently, attempts are being made in various fields to solve problems by utilizing big data. However, privacy protectio... [more] IT2023-94 ISEC2023-93 WBS2023-82 RCC2023-76
pp.118-126
RCC, ISEC, IT, WBS 2024-03-13
- 2024-03-14
Osaka Osaka Univ. (Suita Campus) Efficient Replay Data Selection in Continual Federated Learning Model
Yuto Kitano (Kobe Univ), Lihua Wang (NICT), Seiichi Ozawa (Kobe Univ) IT2023-96 ISEC2023-95 WBS2023-84 RCC2023-78
In this study, we propose a continual federated learning that can continuously learn distributed data generated daily by... [more] IT2023-96 ISEC2023-95 WBS2023-84 RCC2023-78
pp.135-141
CNR, BioX 2024-02-29
15:00
Tokyo NHK Science & Technology Research Laboratories
(Primary: On-site, Secondary: Online)
Implementation and Evaluation of Privacy-Preserving Image Transformation Methods for Person Re-identification
Junpei Yamaguchi, Hajime Nada, Yumo Ouchi, Narishige Abe (Fujitsu) BioX2023-73 CNR2023-40
Advances in machine learning have enabled high-accuracy tracking of individuals using surveillance cameras, making the d... [more] BioX2023-73 CNR2023-40
pp.18-23
SIP, SP, EA, IPSJ-SLP [detail] 2024-02-29
15:10
Okinawa
(Primary: On-site, Secondary: Online)
Byzantine attack detection via similarity of local updates in federated learning
Kenta Ohno, Masao Yamagishi (Hosei Univ.) EA2023-86 SIP2023-133 SP2023-68
We propose a method to detect Byzantine attacks in federated learning, as well as a method for identifying clients repea... [more] EA2023-86 SIP2023-133 SP2023-68
pp.150-155
NS, IN
(Joint)
2024-02-29
10:45
Okinawa Okinawa Convention Center Proposal of a Data Leakage Attack against a Vertical Federated Learning System based on Knowledge Distillation
Takumi Suimon, Yuki Koizumi, Junji Takemasa, Toru Hasegawa (Osaka Univ.) NS2023-187
Vertical federated learning is a method for participants who have data with the same samples but different features to c... [more] NS2023-187
pp.90-95
NS, IN
(Joint)
2024-02-29
10:45
Okinawa Okinawa Convention Center A privacy protection mechanism using Bloom Filter for a P2P-based tracking system watching over children
Yuki Matsumoto, Akihiro Fujimoto (Wakayama Univ), Hideki Tode (Osaka Metropolitan Univ) NS2023-193
With the increase in the number of single-parent and elderly-only families, as well as changes in work patterns such as ... [more] NS2023-193
pp.125-130
EMM 2024-01-16
15:25
Miyagi Tohoku Univ.
(Primary: On-site, Secondary: Online)
[Invited Talk] Federated Learning with Enhanced Privacy Protection in AI
Lihua Wang (NICT) EMM2023-83
Federated learning is a crucial methodology in artificial intelligence where multiple organizations collaborate to perfo... [more] EMM2023-83
p.19
MSS, CAS, IPSJ-AL [detail] 2023-11-16
13:20
Okinawa   On Speed Response and Disclosed Subspace of Privacy-Preserving Vehicle Platoon Speed Control
Takeshi Hyodo, Kenji Sawada (UEC) CAS2023-62 MSS2023-32
There is a growing demand for cyber security measures in vehicle platoon control. In order to prevent malicious vehicles... [more] CAS2023-62 MSS2023-32
pp.13-18
RISING
(3rd)
2023-10-31
09:45
Hokkaido Kaderu 2・7 (Sapporo) [Poster Presentation] Triadic Split Computing toward Privacy-Conscious Generative AI services
Shoki Ohta, Takayuki Nishio (Tokyo Tech)
With the rapid advancements in big AI models such as text and image generation models, numerous web services have begun ... [more]
RISING
(3rd)
2023-10-31
10:45
Hokkaido Kaderu 2・7 (Sapporo) [Poster Presentation] Performance Analysis of Cognitive Radio Networks With Location Privacy Preservation
Ryutaro Kobuchi (Osaka Univ.), Tatsuaki Kimura (Doshisha Univ.), Tetsuya Takine (Osaka Univ.)
With the rapid increase in demand for wireless communication services, dynamic spectrum sharing in cognitive radio netwo... [more]
BioX 2023-10-12
14:45
Okinawa Nobumoto Ohama Memorial Hall A Study on Federated Learning System for Highly Accurate Biometric Authentication
Yusei Suzuki, Yosuke Kaga (Hitachi) BioX2023-58
With the development of machine learning on large-scale datasets, the accuracy of biometric authentication has significa... [more] BioX2023-58
pp.2-7
SS, DC 2023-10-12
10:25
Nagano
(Primary: On-site, Secondary: Online)
Robustness trends of DP-SGD, a machine learning with differential privacy
Takahiro Kanki, Shinpei Ogata, Kozo Okano (Sinshu Univ), Shin Nakajima (NII) SS2023-28 DC2023-34
Although machine learning has been successful in various fields, there is a problem that an adversary can extract traini... [more] SS2023-28 DC2023-34
pp.38-43
NS 2023-10-06
15:20
Hokkaido Hokkaidou University + Online
(Primary: On-site, Secondary: Online)
Incentive Mechanism Considering Heterogeneous Privacy Demand Level in Federated Learning with Differential Privacy
Shota Miyagoshi, Takuji Tachibana (Univ. Fukui) NS2023-104
In federated learning, where multiple data owners participate as clients to perform machine learning, each client shares... [more] NS2023-104
pp.162-167
IA 2023-09-21
13:50
Hokkaido Hokkaido Univeristy
(Primary: On-site, Secondary: Online)
A consideration about a discovering method of privacy-enhanced authoritative DNS servers
Satoru Sunahara (CIST), Yong Jin (Tokyo Tech), Katsuyoshi Iida (HU) IA2023-11
Plain-text communication of DNS queries poses a risk of privacy leakage. Therefore, it is imperative to achieve protecti... [more] IA2023-11
pp.1-5
AI 2023-09-12
14:35
Hokkaido   Proposal of effective location information privacy protection method using measurement equipment error
Riho Isawa, Yuichi Sei, Yasuyuki Tahara, Akihiko Ahsuga (UEC) AI2023-15
In recent years, systems that publicly share statistical data based on people's location information, such as congestion... [more] AI2023-15
pp.77-82
SIP 2023-08-07
12:50
Osaka Osaka Univ. (Suita) Convention Center
(Primary: On-site, Secondary: Online)
An Extension of Image Encryption for Vision Transformer Considering Privacy Protection
Haiwei Lin, Shoko Imaizumi (Chiba Univ.), Kiya Hitoshi (Tokyo Metropolitan Univ) SIP2023-46
In this paper, we propose an extended framework of access control for Vision Transformer (ViT).
The previous study acc... [more]
SIP2023-46
pp.1-6
IT 2023-08-04
13:45
Kanagawa Shonan Institute of Technology
(Primary: On-site, Secondary: Online)
A Note on Private Coded Computation Method with Tolerance against Erasure of Responses from Server Groups
Yusuke Morishita, Atsushi Miki, Koki Kazama, Toshiyasu Matsushima (Waseda Univ.) IT2023-27
Coded Computation (CC) is used by a user to perform Distributed Computation using multiple servers to speed up the compu... [more] IT2023-27
pp.74-79
 Results 1 - 20 of 403  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan