Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-21 14:55 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
An Examination of Privacy-Aware Malicious Activity Detection Methods Using NII-SOCS Benchmark Data Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2023-81 |
Detection of malicious communications from communication logs may pose a risk of privacy infringement as it requires mon... [more] |
ICSS2023-81 pp.87-92 |
RCC, ISEC, IT, WBS |
2024-03-13 14:15 |
Osaka |
Osaka Univ. (Suita Campus) |
Data processing methods for high-performance Privacy-Preserving Machine Learning Tatsuhiro Yamatsuki (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) IT2023-94 ISEC2023-93 WBS2023-82 RCC2023-76 |
Currently, attempts are being made in various fields to solve problems by utilizing big data. However, privacy protectio... [more] |
IT2023-94 ISEC2023-93 WBS2023-82 RCC2023-76 pp.118-126 |
CNR, BioX |
2024-02-29 15:00 |
Tokyo |
NHK Science & Technology Research Laboratories (Primary: On-site, Secondary: Online) |
Implementation and Evaluation of Privacy-Preserving Image Transformation Methods for Person Re-identification Junpei Yamaguchi, Hajime Nada, Yumo Ouchi, Narishige Abe (Fujitsu) BioX2023-73 CNR2023-40 |
Advances in machine learning have enabled high-accuracy tracking of individuals using surveillance cameras, making the d... [more] |
BioX2023-73 CNR2023-40 pp.18-23 |
NS, IN (Joint) |
2024-02-29 10:45 |
Okinawa |
Okinawa Convention Center |
A privacy protection mechanism using Bloom Filter for a P2P-based tracking system watching over children Yuki Matsumoto, Akihiro Fujimoto (Wakayama Univ), Hideki Tode (Osaka Metropolitan Univ) NS2023-193 |
With the increase in the number of single-parent and elderly-only families, as well as changes in work patterns such as ... [more] |
NS2023-193 pp.125-130 |
EMM |
2024-01-16 15:25 |
Miyagi |
Tohoku Univ. (Primary: On-site, Secondary: Online) |
[Invited Talk]
Federated Learning with Enhanced Privacy Protection in AI Lihua Wang (NICT) EMM2023-83 |
Federated learning is a crucial methodology in artificial intelligence where multiple organizations collaborate to perfo... [more] |
EMM2023-83 p.19 |
RISING (3rd) |
2023-10-31 10:45 |
Hokkaido |
Kaderu 2・7 (Sapporo) |
[Poster Presentation]
Performance Analysis of Cognitive Radio Networks With Location Privacy Preservation Ryutaro Kobuchi (Osaka Univ.), Tatsuaki Kimura (Doshisha Univ.), Tetsuya Takine (Osaka Univ.) |
With the rapid increase in demand for wireless communication services, dynamic spectrum sharing in cognitive radio netwo... [more] |
|
NS |
2023-10-06 15:20 |
Hokkaido |
Hokkaidou University + Online (Primary: On-site, Secondary: Online) |
Incentive Mechanism Considering Heterogeneous Privacy Demand Level in Federated Learning with Differential Privacy Shota Miyagoshi, Takuji Tachibana (Univ. Fukui) NS2023-104 |
In federated learning, where multiple data owners participate as clients to perform machine learning, each client shares... [more] |
NS2023-104 pp.162-167 |
IA |
2023-09-21 13:50 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
A consideration about a discovering method of privacy-enhanced authoritative DNS servers Satoru Sunahara (CIST), Yong Jin (Tokyo Tech), Katsuyoshi Iida (HU) IA2023-11 |
Plain-text communication of DNS queries poses a risk of privacy leakage. Therefore, it is imperative to achieve protecti... [more] |
IA2023-11 pp.1-5 |
AI |
2023-09-12 14:35 |
Hokkaido |
|
Proposal of effective location information privacy protection method using measurement equipment error Riho Isawa, Yuichi Sei, Yasuyuki Tahara, Akihiko Ahsuga (UEC) AI2023-15 |
In recent years, systems that publicly share statistical data based on people's location information, such as congestion... [more] |
AI2023-15 pp.77-82 |
SIP |
2023-08-07 12:50 |
Osaka |
Osaka Univ. (Suita) Convention Center (Primary: On-site, Secondary: Online) |
An Extension of Image Encryption for Vision Transformer Considering Privacy Protection Haiwei Lin, Shoko Imaizumi (Chiba Univ.), Kiya Hitoshi (Tokyo Metropolitan Univ) SIP2023-46 |
In this paper, we propose an extended framework of access control for Vision Transformer (ViT).
The previous study acc... [more] |
SIP2023-46 pp.1-6 |
MSS, CAS, SIP, VLD |
2023-07-06 15:20 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
A Study on Golomb Coding for Scrambled Domain Layered Coding Compatible with JPEG XS Takayuki Nakachi (Univ. of the Ryukyus), Hiroyuki Kimiyama (Daido), Mitsuru Murayama (KAIST) CAS2023-10 VLD2023-10 SIP2023-26 MSS2023-10 |
In this report, we propose a Golomb coding method for scrambled domain layered coding compatible with JPEG XS. The propo... [more] |
CAS2023-10 VLD2023-10 SIP2023-26 MSS2023-10 pp.47-52 |
NLP, MSS |
2023-03-17 10:40 |
Nagasaki |
(Primary: On-site, Secondary: Online) |
Machine Learning-Based Risk Evaluation of Reconstruction Attack on Query System for Handling Privacy Data Mohd Anuaruddin Bin Ahmadon (山口大) MSS2022-96 NLP2022-141 |
In this paper, we proposed a method to evaluate the strength of a data privacy protection mechanism by separating the me... [more] |
MSS2022-96 NLP2022-141 pp.160-163 |
ICSS, IPSJ-SPT |
2023-03-14 10:50 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Discussion about Privacy-aware Anonymization of Traffic Logs for Malicious Activity Detection Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2022-74 |
The detection of malicious communications from traffic logs has an aspect of invading the privacy because of monitoring ... [more] |
ICSS2022-74 pp.157-162 |
EMM |
2023-03-02 13:00 |
Nagasaki |
Fukue culture hall (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Improvement of human flow measurement using flor estimation on depth images Takuya Nagatoshi, Michiharu Niimi (KIT) EMM2022-74 |
Measuring human flow to determine the number of people and flow lines in a space is a useful decision-making tool when c... [more] |
EMM2022-74 pp.38-43 |
CW (2nd) |
2022-12-16 |
  |
|
Proposal and Validation of a Serious Game to Improve Internet Literacy among Youth Owada Mitsuki, Kokubo Rin, Hamada Atsushi, Iio Jun (Chuo Univ.) |
This paper describes our original Serious Game about the personal information and how youth’s internet literacy changed ... [more] |
|
NS, ICM, CQ, NV (Joint) |
2022-11-25 13:00 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
[Invited Talk]
Continual Learning for Privacy Protection and Data Leakage Prevention Takashi Shibata (NTT) NS2022-123 CQ2022-56 ICM2022-26 |
Continuous learning aims to train a highly expressive model for a new task while retaining all knowledge about previous ... [more] |
NS2022-123 CQ2022-56 ICM2022-26 pp.131-132(NS), pp.52-53(CQ), pp.25-26(ICM) |
EA, EMM, ASJ-H |
2022-11-21 10:00 |
Online |
Online |
[Poster Presentation]
ConvMixer model transformation using random orthogonal matrices for privacy protection of test images. Rei Aso, Tatsuya Chuman, Hitoshi Kiya (TMU) EA2022-49 EMM2022-49 |
In this paper, a privacy preserving image classification method is proposed under the use of ConvMixer models. To protec... [more] |
EA2022-49 EMM2022-49 pp.46-51 |
ISEC, SITE, LOIS |
2022-11-18 16:20 |
Online |
Online |
Decentralization of Revocation Process Using Intermediate Servers in Revocable Group Signatures Kai Kimura, Toru Nakanishi, Teruaki Kitasuka (Hiroshima Univ.) ISEC2022-41 SITE2022-45 LOIS2022-25 |
A group signature is a signature method that allows a user who belongs to a group to prove that he or she ”belongs to th... [more] |
ISEC2022-41 SITE2022-45 LOIS2022-25 pp.66-72 |
ISEC, SITE, LOIS |
2022-11-18 16:55 |
Online |
Online |
Reducing Authentication Data Size in Decentralized Blacklistable Anonymous Credential System Using DualRing Atsuki Iriboshi, Toru Nakanishi, Katsunobu Imai (Hiroshima Univ.) ISEC2022-44 SITE2022-48 LOIS2022-28 |
For privacy protection, blacklistable anonymous credential systems have been proposed, where a user is authenticated wit... [more] |
ISEC2022-44 SITE2022-48 LOIS2022-28 pp.85-91 |
SIS, ITE-BCT |
2022-10-13 13:55 |
Aomori |
Hachinohe Institute of Technology (Primary: On-site, Secondary: Online) |
An 8K image perceptual scramble scheme for JPEG XS standard Takayuki Nakachi (Univ. of the Ryukyus), Hiroyuki Kimiyama (Daido), Mitsuru Murayama (KAIST) SIS2022-11 |
In this report, we propose a scrambled image compression algorithm for the JPEG XS standard. The JPEG XS is a low-delay,... [more] |
SIS2022-11 pp.1-6 |