Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-13 14:15 |
Osaka |
Osaka Univ. (Suita Campus) |
Data processing methods for high-performance Privacy-Preserving Machine Learning Tatsuhiro Yamatsuki (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) IT2023-94 ISEC2023-93 WBS2023-82 RCC2023-76 |
Currently, attempts are being made in various fields to solve problems by utilizing big data. However, privacy protectio... [more] |
IT2023-94 ISEC2023-93 WBS2023-82 RCC2023-76 pp.118-126 |
MSS, CAS, IPSJ-AL [detail] |
2023-11-16 13:20 |
Okinawa |
|
On Speed Response and Disclosed Subspace of Privacy-Preserving Vehicle Platoon Speed Control Takeshi Hyodo, Kenji Sawada (UEC) CAS2023-62 MSS2023-32 |
There is a growing demand for cyber security measures in vehicle platoon control. In order to prevent malicious vehicles... [more] |
CAS2023-62 MSS2023-32 pp.13-18 |
SIP |
2023-08-07 12:50 |
Osaka |
Osaka Univ. (Suita) Convention Center (Primary: On-site, Secondary: Online) |
An Extension of Image Encryption for Vision Transformer Considering Privacy Protection Haiwei Lin, Shoko Imaizumi (Chiba Univ.), Kiya Hitoshi (Tokyo Metropolitan Univ) SIP2023-46 |
In this paper, we propose an extended framework of access control for Vision Transformer (ViT).
The previous study acc... [more] |
SIP2023-46 pp.1-6 |
IN, NS (Joint) |
2023-03-03 10:10 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Access Control Method with Privacy Preservation in NDN Yuma Fukagawa, Noriaki Kamiyama (Ritsumeikan Univ.) NS2022-221 |
Information-Centric Networking (ICN), which transfers Interest by the name of content without using name resolution and ... [more] |
NS2022-221 pp.310-315 |
EMM |
2023-03-02 16:00 |
Nagasaki |
Fukue culture hall (Primary: On-site, Secondary: Online) |
[Invited Talk]
Image transformation with random numbers for reliable AI Hitoshi Kiya (TMU) EMM2022-87 |
The combined use of deep neural networks (DNNs) and images transformed with random sequences has given a new insight for... [more] |
EMM2022-87 pp.107-109 |
BioX |
2022-10-03 15:15 |
Okinawa |
|
[Invited Talk]
Sensing Technologies for Social Safety Naoyuki Takada (SECOM) BioX2022-58 |
In 1966, the first online security system outfitted in Japan was developed and commercialized by SECOM. It used sensors ... [more] |
BioX2022-58 p.19 |
NS, SR, RCS, SeMI, RCC (Joint) |
2022-07-14 14:00 |
Ishikawa |
The Kanazawa Theatre + Online (Primary: On-site, Secondary: Online) |
A Study of Dynamic Privacy Control Method in LDP for Preserving Temporal/Spatial Intrinsic Information Value of Trajectory Data Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-47 |
Spatiotemporal data, including people's movement trajectories and transit points, is highly valuable for various applica... [more] |
NS2022-47 pp.106-111 |
NS, SR, RCS, SeMI, RCC (Joint) |
2022-07-15 11:30 |
Ishikawa |
The Kanazawa Theatre + Online (Primary: On-site, Secondary: Online) |
Human counting with low-resolution thermal camera from small data sets Daisuke Aoshima (Osaka Pref. Univ.), Masashi Sugano (Osaka Metro. Univ.) SeMI2022-41 |
This study is to estimate the number of people by infrared array sensor. Data obtained from this sensor do not include p... [more] |
SeMI2022-41 pp.93-97 |
SP, IPSJ-SLP, IPSJ-MUS |
2021-06-19 13:00 |
Online |
Online |
Study on the background cancellation system for speech privacy Jiangning Huang, Akinori Ito (Tohoku Univ.) SP2021-14 |
Evacuation centers at the time of disaster do not have sufficient sound insulation to maintain sound privacy. In this st... [more] |
SP2021-14 pp.57-62 |
LOIS, ISEC, SITE |
2020-11-06 14:40 |
Online |
Online |
Considering the variation of the noise-addition amount in local differential privacy with user trajectory adjacency Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi, Doudou Fall (NAIST) ISEC2020-39 SITE2020-36 LOIS2020-19 |
The detection of clusters in densely populated areas by contact tracing is urgent, because these locations are trajector... [more] |
ISEC2020-39 SITE2020-36 LOIS2020-19 pp.45-50 |
NS, ICM, CQ, NV (Joint) |
2019-11-22 13:30 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
[Invited Talk]
Security and Privacy for Personal Data Katsumi Takahashi (NTT) ICM2019-25 |
Technologies for security and privacy of personal data are described. Many technologies are proposed for data security a... [more] |
ICM2019-25 pp.25-26 |
NS |
2019-04-19 14:15 |
Kagoshima |
Tenmonkan Vision Hall |
A Study on Identity Exchange System in Consideration of User's Privacy Motoshi Horii, Dai Suzuki, Kenji Taka, Takeshi Kawasaki, Satoshi Imai (Fujitsu Labs.) NS2019-18 |
Service provider requires service users’ personal data such as their name and address to identify each of the service us... [more] |
NS2019-18 pp.103-106 |
RCS, NS (Joint) |
2018-12-21 10:15 |
Hiroshima |
Onomichi City Hall |
Low Bandwidth and High Privacy Surveillance System Architecture Integrating Edge and Cloud Computing Jiaxing Lu (UTokyo), Kouichirou Amemiya, Kazuhito Matsuda, Makoto Kubota (FUJITSU), Akihiro Nakao (UTokyo) NS2018-171 |
Surveillance of objects in modern cities through IoT and Edge Computing such as automobile traffic monitoring for public... [more] |
NS2018-171 pp.71-76 |
IBISML |
2018-11-05 15:10 |
Hokkaido |
Hokkaido Citizens Activites Center (Kaderu 2.7) |
[Poster Presentation]
Differential Privacy for Likelihood Ratio Test Arashi Haishima (Univ. of Tsukuba), Jun Sakuma (Univ. of Tsukuba/RIKEN) IBISML2018-86 |
Likelihood ratio test of logistic regression commonly used when testing whether an attribute of data significantly influ... [more] |
IBISML2018-86 pp.313-320 |
EMM |
2017-11-07 10:00 |
Kagoshima |
Kagoshima Univ. (Inamori Academy) |
Compression-Friendly Reversible Data Hiding for Privacy Protection Minoru Kuribayashi (Okayama Univ.), Vaibhav B. Joshi, Mehul S. Raval (Ahmedabad Univ.) EMM2017-61 |
Usually in the study of reversible data hiding for digital image, the evaluation criteria is the trade-off between paylo... [more] |
EMM2017-61 pp.33-38 |
CS, NS, IN, NV (Joint) |
2017-09-07 13:05 |
Miyagi |
Research Institute of Electrical Communication, Tohoku Univ. |
A Proposal for Personal Data Control Assistant Based on User's Preference Clearness Keita Kayaba, Takuma Oide, Toru Abe, Takuo Suganuma (Tohoku Univ.) IN2017-23 |
With the development of IoT technology, the utilization of personal data has attracted much attention from various persp... [more] |
IN2017-23 pp.1-6 |
NS, IN (Joint) |
2017-03-02 09:30 |
Okinawa |
OKINAWA ZANPAMISAKI ROYAL HOTEL |
User-Driven Privacy Management Framework for Content Access Daishi Kondo (UL), Thomas Silverston (NICT), Hideki Tode (Osaka Prefecture Univ.), Tohru Asami (Univ. of Tokyo), Olivier Perrin (UL) NS2016-158 |
The current Internet has a social problem that content providers collect the large scale of personal information and use... [more] |
NS2016-158 pp.7-12 |
NS, CQ, ICM, NV (Joint) |
2016-11-24 15:25 |
Yamaguchi |
Shimonoseki Chember of Commerce and Industry |
[Invited Talk]
Network Services Based on Enterprise Value Coordination Toshihiro Nishizono (Nihon Univ.) NS2016-108 CQ2016-80 ICM2016-26 |
The speaker proposes configuration of a platform for implementing new network services based on coordination of enterpri... [more] |
NS2016-108 CQ2016-80 ICM2016-26 pp.39-42(NS), pp.37-40(CQ), pp.9-12(ICM) |
IN, MoNA, CNR (Joint) |
2016-11-17 09:50 |
Kagoshima |
Kirishima-kanko Hotel |
Privacy Control Enabled by Social-Network Based Virtualized Networks Kazuki Takagi, Ryoichi Shinkuma (Kyoto Univ) MoNA2016-23 |
The recent commercial success of social networking services (SNSs) has encouraged people to share their privacy sensitiv... [more] |
MoNA2016-23 pp.7-10 |
DC, SS |
2016-10-27 14:05 |
Shiga |
Hikone Kinro-Fukushi Kaikan Bldg. |
Note on Data Aggregation on Smart Grid Communications Considering Fault Tolerance and Privacy Ryota Ogasawara, Masayuki Arai (Nihon Univ.) SS2016-23 DC2016-25 |
In smart grid communications it is important to aggregate users' usage data while preserving privacy. In this paper we p... [more] |
SS2016-23 DC2016-25 pp.31-36 |