IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 16 of 16  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICD, CPSY 2016-12-15
10:55
Tokyo Tokyo Institute of Technology Proposal of anonymization methods for secondary use considering data properties
Yuichi Nakamura, Takahiro Hosoe, Hiroaki Nishi (Keio Univ.) ICD2016-53 CPSY2016-59
Applications for secondary use of data, which is a usage that is not same as an original purpose to obtain the data, hav... [more] ICD2016-53 CPSY2016-59
pp.13-18
PRMU, IPSJ-CVIM, MVE [detail] 2016-01-22
16:05
Osaka   a Note on a Privacy-Preserving Method for Distributed Regularized Logistic Regression
Hideyuki Masui, Nozomi Miya, Toshiyasu Matsushima (Waseda Univ.) PRMU2015-131 MVE2015-53
In this paper, we study a privacy-preserving logistic regression. We consider the situation that two users have differen... [more] PRMU2015-131 MVE2015-53
pp.281-286
COMP 2015-10-02
10:30
Tokyo   Online Bayesian estimation of Randomized Response models
Tota Suko, Shunsuke Horii (Waseda Univ) COMP2015-23
In this paper, we treat the randomized-response technique. This is the estimation method for population proportion of a ... [more] COMP2015-23
pp.7-11
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
11:30
Hokkaido San-Refure Hakodate Privacy Preserving Conditional Disclosure II
Kohtaro Tadaki, Shigeo Tsujii (Chuo Univ.) ISEC2014-13 SITE2014-8 ICSS2014-17 EMM2014-13
In SCIS2012, we proposed a privacy preserving and utilization scheme, called the privacy preserving conditional disclosu... [more] ISEC2014-13 SITE2014-8 ICSS2014-17 EMM2014-13
pp.25-30
ASN 2014-05-30
15:10
Tokyo Convention Hall, RCAST, The University of Tokyo [Encouragement Talk] Privacy-Preserving Data Mining with Perturbation for Multidimensional Data
Shunsuke Aoki, Kaoru Sezaki (Univ. of Tokyo) ASN2014-37
With the rapid spread of utilization of personal data in cyber and physical world, privacy-preserving data mining become... [more] ASN2014-37
pp.143-147
PRMU, MI, IE, SIP 2014-05-23
13:40
Aichi   [Special Talk] Privacy Protection in Data Analytics -- Towards Application Development for Complex Event Sensing and Healthcare Services --
Jun Sakuma (Univ. of Tsukuba) SIP2014-18 IE2014-18 PRMU2014-18 MI2014-18
Advanced integration of big data are expected to bring about innovative services.
Along with the ICT services that pene... [more]
SIP2014-18 IE2014-18 PRMU2014-18 MI2014-18
p.97
IBISML 2013-07-18
15:10
Tokyo Nishiwaseda Campus (Waseda univ.) Privacy-preserving Online Logistic Regression Based on Homomorphic Encryption
Shuang Wu, Junpei Kawamoto (Univ. of Tsukuba), Hiroaki Kikuchi (Meiji Univ.), Jun Sakuma (Univ. of Tsukuba) IBISML2013-10
Preserve the privacy of personal information when conducting statistical analysis has attracted much attention in machin... [more] IBISML2013-10
pp.67-74
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-19
13:20
Hokkaido   Generalization of Noises in Differential Privacy
Akihiro Yamanaka, Ryo Kikuchi, Dai Ikarashi (NTT) ISEC2013-49 SITE2013-44 ICSS2013-54 EMM2013-51
In this note we verify a sufficient condition of noises for satisfying Differential Privacy and introduce some new noise... [more] ISEC2013-49 SITE2013-44 ICSS2013-54 EMM2013-51
pp.395-402
LOIS 2013-03-07
15:10
Okinawa   A Study of Privacy-Preserving Participatory Sensing with Empirical Data Distributions
Shunsuke Aoki, Masayuki Iwai, Kaoru Sezaki (Univ. of Tokyo) LOIS2012-83
Participatory sensing is emerging paradigm for collecting spatial statistical information by gathering data from citizen... [more] LOIS2012-83
pp.83-88
PRMU, IBISML, IPSJ-CVIM
(Joint) [detail]
2012-09-02
10:00
Tokyo   A Survey on Fairness/Discrimination-Aware Mining
Toshihiro Kamishima (AIST) PRMU2012-30 IBISML2012-13
Fairness-aware / discrimination-aware mining is data analysis techniques while keeping aware of fairness, discrimination... [more] PRMU2012-30 IBISML2012-13
pp.1-8
SITE, IPSJ-CE 2011-12-17
15:15
Shimane   On Electronic Government System for Overcoming Contradiction between Protection and Utilization of Personal Information and Privacy -- Part 1 --
Shigeo Tsujii, Hiroshi Yamaguchi, Masahito Gotaishi (Chuo University), Yukiyasu Tsunoo (NEC), Mikio Ihori (IOG), Takuma Yamamoto (Kanamic) SITE2011-28
First the concept of 3 layers of electronic government is proposed. 3 layers are mental, social system, and technologica... [more] SITE2011-28
pp.19-24
IBISML 2011-03-28
15:50
Osaka Nakanoshima Center, Osaka Univ. Privacy-preserving mining of frequent closed patterns using ZDDs
Keisuke Ootaki, Akihiro Yamamoto (Kyoto Univ.) IBISML2010-111
In this paper, we propose new methods for privacy-preserving mining of frequent closed patterns from horizontally partit... [more] IBISML2010-111
pp.49-54
IA, SITE, IPSJ-IOT [detail] 2011-02-28
13:55
Kochi Kochi City Culture-Plaza CUL-PORT (Kochi prefecture) Realization of both Protection and Utilization of the Personal Information in the Medical/Care Network
Hiroshi Yamaguchi, Kohtaro Tadaki, Shigeo Tsujii, Norihisa Doi (Chuo Univ.) SITE2010-52 IA2010-88
On consignment from the Ministry of Economy, Trade and Industry, our research group at Chuo University develops the tech... [more] SITE2010-52 IA2010-88
pp.33-38
IN 2011-01-20
15:10
Osaka Osaka Univ. [Invited Talk] Data Masking and Traceability for Inter-Cloud Data Security
Kouichi Itoh, Yoshinori Katayama, Mebae Ushida, Gao Jie, Fumihiko Kozakura, Hiroshi Tsuda (Fujitsu Laboratories) IN2010-129
The use of cloud computing in business is expanding at a rapid clip in recent years. However, security of the data store... [more] IN2010-129
pp.65-70
ISEC, SITE, IPSJ-CSEC 2007-07-19
15:45
Hokkaido Future University-Hakodate Privacy-Preserving Assocaition Rules Mining Scheme Revisited
Chunhua Su (Kyushu Univ.), Jianying Zhou, Feng Bao (I2R), Tsuyoshi Takagi (Future Univ. Hakodate), Kouichi Sakurai (Kyushu Univ.) ISEC2007-35 SITE2007-29
Assocaition Rules Mining is a frequently used technique which finds interesting associations and correlation relationshi... [more] ISEC2007-35 SITE2007-29
pp.133-138
ISEC 2005-09-16
14:40
Tokyo Kikai-Shinko-Kaikan Bldg. Interactive Protocol for Privacy-preserving K-mean Clustering
Chunhua Su, Kouichi Sakurai (Kyushu Univ.)
Data mining, the extraction of hidden predictive information from large databases, is a powerful new technology with gre... [more] ISEC2005-83
pp.53-60
 Results 1 - 16 of 16  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan