Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SS, DC |
2023-10-12 10:25 |
Nagano |
(Primary: On-site, Secondary: Online) |
Robustness trends of DP-SGD, a machine learning with differential privacy Takahiro Kanki, Shinpei Ogata, Kozo Okano (Sinshu Univ), Shin Nakajima (NII) SS2023-28 DC2023-34 |
Although machine learning has been successful in various fields, there is a problem that an adversary can extract traini... [more] |
SS2023-28 DC2023-34 pp.38-43 |
RCC, ISEC, IT, WBS |
2023-03-14 16:50 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Proposal for a privacy-preserving frequency estimation method Naoki Kawahara, Atsuko Miyaji (Osaka Univ.), Tomoaki Mimoto (ATR) IT2022-97 ISEC2022-76 WBS2022-94 RCC2022-94 |
Differential privacy is one of the methods used to protect personal data by adding noise to personal data and its analys... [more] |
IT2022-97 ISEC2022-76 WBS2022-94 RCC2022-94 pp.187-194 |
AI |
2022-12-21 17:10 |
Fukuoka |
|
An Algorithm Combined Grouping and Adding Dummy to Satisfy l-diversity Keiichiro Oishi, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga (UEC) AI2022-47 |
Universities and companies access personal information databases for a wide range of purposes, and privacy consideration... [more] |
AI2022-47 pp.80-86 |
ICD, CPSY |
2016-12-15 10:55 |
Tokyo |
Tokyo Institute of Technology |
Proposal of anonymization methods for secondary use considering data properties Yuichi Nakamura, Takahiro Hosoe, Hiroaki Nishi (Keio Univ.) ICD2016-53 CPSY2016-59 |
Applications for secondary use of data, which is a usage that is not same as an original purpose to obtain the data, hav... [more] |
ICD2016-53 CPSY2016-59 pp.13-18 |
PRMU, IPSJ-CVIM, MVE [detail] |
2016-01-22 16:05 |
Osaka |
|
a Note on a Privacy-Preserving Method for Distributed Regularized Logistic Regression Hideyuki Masui, Nozomi Miya, Toshiyasu Matsushima (Waseda Univ.) PRMU2015-131 MVE2015-53 |
In this paper, we study a privacy-preserving logistic regression. We consider the situation that two users have differen... [more] |
PRMU2015-131 MVE2015-53 pp.281-286 |
COMP |
2015-10-02 10:30 |
Tokyo |
|
Online Bayesian estimation of Randomized Response models Tota Suko, Shunsuke Horii (Waseda Univ) COMP2015-23 |
In this paper, we treat the randomized-response technique. This is the estimation method for population proportion of a ... [more] |
COMP2015-23 pp.7-11 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 11:30 |
Hokkaido |
San-Refure Hakodate |
Privacy Preserving Conditional Disclosure II Kohtaro Tadaki, Shigeo Tsujii (Chuo Univ.) ISEC2014-13 SITE2014-8 ICSS2014-17 EMM2014-13 |
In SCIS2012, we proposed a privacy preserving and utilization scheme, called the privacy preserving conditional disclosu... [more] |
ISEC2014-13 SITE2014-8 ICSS2014-17 EMM2014-13 pp.25-30 |
ASN |
2014-05-30 15:10 |
Tokyo |
Convention Hall, RCAST, The University of Tokyo |
[Encouragement Talk]
Privacy-Preserving Data Mining with Perturbation for Multidimensional Data Shunsuke Aoki, Kaoru Sezaki (Univ. of Tokyo) ASN2014-37 |
With the rapid spread of utilization of personal data in cyber and physical world, privacy-preserving data mining become... [more] |
ASN2014-37 pp.143-147 |
PRMU, MI, IE, SIP |
2014-05-23 13:40 |
Aichi |
|
[Special Talk]
Privacy Protection in Data Analytics
-- Towards Application Development for Complex Event Sensing and Healthcare Services -- Jun Sakuma (Univ. of Tsukuba) SIP2014-18 IE2014-18 PRMU2014-18 MI2014-18 |
Advanced integration of big data are expected to bring about innovative services.
Along with the ICT services that pene... [more] |
SIP2014-18 IE2014-18 PRMU2014-18 MI2014-18 p.97 |
IBISML |
2013-07-18 15:10 |
Tokyo |
Nishiwaseda Campus (Waseda univ.) |
Privacy-preserving Online Logistic Regression Based on Homomorphic Encryption Shuang Wu, Junpei Kawamoto (Univ. of Tsukuba), Hiroaki Kikuchi (Meiji Univ.), Jun Sakuma (Univ. of Tsukuba) IBISML2013-10 |
Preserve the privacy of personal information when conducting statistical analysis has attracted much attention in machin... [more] |
IBISML2013-10 pp.67-74 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-19 13:20 |
Hokkaido |
|
Generalization of Noises in Differential Privacy Akihiro Yamanaka, Ryo Kikuchi, Dai Ikarashi (NTT) ISEC2013-49 SITE2013-44 ICSS2013-54 EMM2013-51 |
In this note we verify a sufficient condition of noises for satisfying Differential Privacy and introduce some new noise... [more] |
ISEC2013-49 SITE2013-44 ICSS2013-54 EMM2013-51 pp.395-402 |
LOIS |
2013-03-07 15:10 |
Okinawa |
|
A Study of Privacy-Preserving Participatory Sensing with Empirical Data Distributions Shunsuke Aoki, Masayuki Iwai, Kaoru Sezaki (Univ. of Tokyo) LOIS2012-83 |
Participatory sensing is emerging paradigm for collecting spatial statistical information by gathering data from citizen... [more] |
LOIS2012-83 pp.83-88 |
PRMU, IBISML, IPSJ-CVIM (Joint) [detail] |
2012-09-02 10:00 |
Tokyo |
|
A Survey on Fairness/Discrimination-Aware Mining Toshihiro Kamishima (AIST) PRMU2012-30 IBISML2012-13 |
Fairness-aware / discrimination-aware mining is data analysis techniques while keeping aware of fairness, discrimination... [more] |
PRMU2012-30 IBISML2012-13 pp.1-8 |
SITE, IPSJ-CE |
2011-12-17 15:15 |
Shimane |
|
On Electronic Government System for Overcoming Contradiction between Protection and Utilization of Personal Information and Privacy
-- Part 1 -- Shigeo Tsujii, Hiroshi Yamaguchi, Masahito Gotaishi (Chuo University), Yukiyasu Tsunoo (NEC), Mikio Ihori (IOG), Takuma Yamamoto (Kanamic) SITE2011-28 |
First the concept of 3 layers of electronic government is proposed. 3 layers are mental, social system, and technologica... [more] |
SITE2011-28 pp.19-24 |
IBISML |
2011-03-28 15:50 |
Osaka |
Nakanoshima Center, Osaka Univ. |
Privacy-preserving mining of frequent closed patterns using ZDDs Keisuke Ootaki, Akihiro Yamamoto (Kyoto Univ.) IBISML2010-111 |
In this paper, we propose new methods for privacy-preserving mining of frequent closed patterns from horizontally partit... [more] |
IBISML2010-111 pp.49-54 |
IA, SITE, IPSJ-IOT [detail] |
2011-02-28 13:55 |
Kochi |
Kochi City Culture-Plaza CUL-PORT (Kochi prefecture) |
Realization of both Protection and Utilization of the Personal Information in the Medical/Care Network Hiroshi Yamaguchi, Kohtaro Tadaki, Shigeo Tsujii, Norihisa Doi (Chuo Univ.) SITE2010-52 IA2010-88 |
On consignment from the Ministry of Economy, Trade and Industry, our research group at Chuo University develops the tech... [more] |
SITE2010-52 IA2010-88 pp.33-38 |
IN |
2011-01-20 15:10 |
Osaka |
Osaka Univ. |
[Invited Talk]
Data Masking and Traceability for Inter-Cloud Data Security Kouichi Itoh, Yoshinori Katayama, Mebae Ushida, Gao Jie, Fumihiko Kozakura, Hiroshi Tsuda (Fujitsu Laboratories) IN2010-129 |
The use of cloud computing in business is expanding at a rapid clip in recent years. However, security of the data store... [more] |
IN2010-129 pp.65-70 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 15:45 |
Hokkaido |
Future University-Hakodate |
Privacy-Preserving Assocaition Rules Mining Scheme Revisited Chunhua Su (Kyushu Univ.), Jianying Zhou, Feng Bao (I2R), Tsuyoshi Takagi (Future Univ. Hakodate), Kouichi Sakurai (Kyushu Univ.) ISEC2007-35 SITE2007-29 |
Assocaition Rules Mining is a frequently used technique which finds interesting associations and correlation relationshi... [more] |
ISEC2007-35 SITE2007-29 pp.133-138 |
ISEC |
2005-09-16 14:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Interactive Protocol for Privacy-preserving K-mean Clustering Chunhua Su, Kouichi Sakurai (Kyushu Univ.) |
Data mining, the extraction of hidden predictive information from large databases, is a powerful new technology with gre... [more] |
ISEC2005-83 pp.53-60 |