IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 154  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2024-03-21
14:55
Okinawa OIST
(Primary: On-site, Secondary: Online)
An Examination of Privacy-Aware Malicious Activity Detection Methods Using NII-SOCS Benchmark Data
Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2023-81
Detection of malicious communications from communication logs may pose a risk of privacy infringement as it requires mon... [more] ICSS2023-81
pp.87-92
RCC, ISEC, IT, WBS 2024-03-13
14:15
Osaka Osaka Univ. (Suita Campus) Data processing methods for high-performance Privacy-Preserving Machine Learning
Tatsuhiro Yamatsuki (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) IT2023-94 ISEC2023-93 WBS2023-82 RCC2023-76
Currently, attempts are being made in various fields to solve problems by utilizing big data. However, privacy protectio... [more] IT2023-94 ISEC2023-93 WBS2023-82 RCC2023-76
pp.118-126
CNR, BioX 2024-02-29
15:00
Tokyo NHK Science & Technology Research Laboratories
(Primary: On-site, Secondary: Online)
Implementation and Evaluation of Privacy-Preserving Image Transformation Methods for Person Re-identification
Junpei Yamaguchi, Hajime Nada, Yumo Ouchi, Narishige Abe (Fujitsu) BioX2023-73 CNR2023-40
Advances in machine learning have enabled high-accuracy tracking of individuals using surveillance cameras, making the d... [more] BioX2023-73 CNR2023-40
pp.18-23
NS, IN
(Joint)
2024-02-29
10:45
Okinawa Okinawa Convention Center A privacy protection mechanism using Bloom Filter for a P2P-based tracking system watching over children
Yuki Matsumoto, Akihiro Fujimoto (Wakayama Univ), Hideki Tode (Osaka Metropolitan Univ) NS2023-193
With the increase in the number of single-parent and elderly-only families, as well as changes in work patterns such as ... [more] NS2023-193
pp.125-130
EMM 2024-01-16
15:25
Miyagi Tohoku Univ.
(Primary: On-site, Secondary: Online)
[Invited Talk] Federated Learning with Enhanced Privacy Protection in AI
Lihua Wang (NICT) EMM2023-83
Federated learning is a crucial methodology in artificial intelligence where multiple organizations collaborate to perfo... [more] EMM2023-83
p.19
RISING
(3rd)
2023-10-31
10:45
Hokkaido Kaderu 2・7 (Sapporo) [Poster Presentation] Performance Analysis of Cognitive Radio Networks With Location Privacy Preservation
Ryutaro Kobuchi (Osaka Univ.), Tatsuaki Kimura (Doshisha Univ.), Tetsuya Takine (Osaka Univ.)
With the rapid increase in demand for wireless communication services, dynamic spectrum sharing in cognitive radio netwo... [more]
NS 2023-10-06
15:20
Hokkaido Hokkaidou University + Online
(Primary: On-site, Secondary: Online)
Incentive Mechanism Considering Heterogeneous Privacy Demand Level in Federated Learning with Differential Privacy
Shota Miyagoshi, Takuji Tachibana (Univ. Fukui) NS2023-104
In federated learning, where multiple data owners participate as clients to perform machine learning, each client shares... [more] NS2023-104
pp.162-167
IA 2023-09-21
13:50
Hokkaido Hokkaido Univeristy
(Primary: On-site, Secondary: Online)
A consideration about a discovering method of privacy-enhanced authoritative DNS servers
Satoru Sunahara (CIST), Yong Jin (Tokyo Tech), Katsuyoshi Iida (HU) IA2023-11
Plain-text communication of DNS queries poses a risk of privacy leakage. Therefore, it is imperative to achieve protecti... [more] IA2023-11
pp.1-5
AI 2023-09-12
14:35
Hokkaido   Proposal of effective location information privacy protection method using measurement equipment error
Riho Isawa, Yuichi Sei, Yasuyuki Tahara, Akihiko Ahsuga (UEC) AI2023-15
In recent years, systems that publicly share statistical data based on people's location information, such as congestion... [more] AI2023-15
pp.77-82
SIP 2023-08-07
12:50
Osaka Osaka Univ. (Suita) Convention Center
(Primary: On-site, Secondary: Online)
An Extension of Image Encryption for Vision Transformer Considering Privacy Protection
Haiwei Lin, Shoko Imaizumi (Chiba Univ.), Kiya Hitoshi (Tokyo Metropolitan Univ) SIP2023-46
In this paper, we propose an extended framework of access control for Vision Transformer (ViT).
The previous study acc... [more]
SIP2023-46
pp.1-6
MSS, CAS, SIP, VLD 2023-07-06
15:20
Hokkaido
(Primary: On-site, Secondary: Online)
A Study on Golomb Coding for Scrambled Domain Layered Coding Compatible with JPEG XS
Takayuki Nakachi (Univ. of the Ryukyus), Hiroyuki Kimiyama (Daido), Mitsuru Murayama (KAIST) CAS2023-10 VLD2023-10 SIP2023-26 MSS2023-10
In this report, we propose a Golomb coding method for scrambled domain layered coding compatible with JPEG XS. The propo... [more] CAS2023-10 VLD2023-10 SIP2023-26 MSS2023-10
pp.47-52
NLP, MSS 2023-03-17
10:40
Nagasaki
(Primary: On-site, Secondary: Online)
Machine Learning-Based Risk Evaluation of Reconstruction Attack on Query System for Handling Privacy Data
Mohd Anuaruddin Bin Ahmadon (山口大) MSS2022-96 NLP2022-141
In this paper, we proposed a method to evaluate the strength of a data privacy protection mechanism by separating the me... [more] MSS2022-96 NLP2022-141
pp.160-163
ICSS, IPSJ-SPT 2023-03-14
10:50
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Discussion about Privacy-aware Anonymization of Traffic Logs for Malicious Activity Detection
Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2022-74
The detection of malicious communications from traffic logs has an aspect of invading the privacy because of monitoring ... [more] ICSS2022-74
pp.157-162
EMM 2023-03-02
13:00
Nagasaki Fukue culture hall
(Primary: On-site, Secondary: Online)
[Poster Presentation] Improvement of human flow measurement using flor estimation on depth images
Takuya Nagatoshi, Michiharu Niimi (KIT) EMM2022-74
Measuring human flow to determine the number of people and flow lines in a space is a useful decision-making tool when c... [more] EMM2022-74
pp.38-43
CW
(2nd)
2022-12-16     Proposal and Validation of a Serious Game to Improve Internet Literacy among Youth
Owada Mitsuki, Kokubo Rin, Hamada Atsushi, Iio Jun (Chuo Univ.)
This paper describes our original Serious Game about the personal information and how youth’s internet literacy changed ... [more]
NS, ICM, CQ, NV
(Joint)
2022-11-25
13:00
Fukuoka Humanities and Social Sciences Center, Fukuoka Univ. + Online
(Primary: On-site, Secondary: Online)
[Invited Talk] Continual Learning for Privacy Protection and Data Leakage Prevention
Takashi Shibata (NTT) NS2022-123 CQ2022-56 ICM2022-26
Continuous learning aims to train a highly expressive model for a new task while retaining all knowledge about previous ... [more] NS2022-123 CQ2022-56 ICM2022-26
pp.131-132(NS), pp.52-53(CQ), pp.25-26(ICM)
EA, EMM, ASJ-H 2022-11-21
10:00
Online Online [Poster Presentation] ConvMixer model transformation using random orthogonal matrices for privacy protection of test images.
Rei Aso, Tatsuya Chuman, Hitoshi Kiya (TMU) EA2022-49 EMM2022-49
In this paper, a privacy preserving image classification method is proposed under the use of ConvMixer models. To protec... [more] EA2022-49 EMM2022-49
pp.46-51
ISEC, SITE, LOIS 2022-11-18
16:20
Online Online Decentralization of Revocation Process Using Intermediate Servers in Revocable Group Signatures
Kai Kimura, Toru Nakanishi, Teruaki Kitasuka (Hiroshima Univ.) ISEC2022-41 SITE2022-45 LOIS2022-25
A group signature is a signature method that allows a user who belongs to a group to prove that he or she ”belongs to th... [more] ISEC2022-41 SITE2022-45 LOIS2022-25
pp.66-72
ISEC, SITE, LOIS 2022-11-18
16:55
Online Online Reducing Authentication Data Size in Decentralized Blacklistable Anonymous Credential System Using DualRing
Atsuki Iriboshi, Toru Nakanishi, Katsunobu Imai (Hiroshima Univ.) ISEC2022-44 SITE2022-48 LOIS2022-28
For privacy protection, blacklistable anonymous credential systems have been proposed, where a user is authenticated wit... [more] ISEC2022-44 SITE2022-48 LOIS2022-28
pp.85-91
SIS, ITE-BCT 2022-10-13
13:55
Aomori Hachinohe Institute of Technology
(Primary: On-site, Secondary: Online)
An 8K image perceptual scramble scheme for JPEG XS standard
Takayuki Nakachi (Univ. of the Ryukyus), Hiroyuki Kimiyama (Daido), Mitsuru Murayama (KAIST) SIS2022-11
In this report, we propose a scrambled image compression algorithm for the JPEG XS standard. The JPEG XS is a low-delay,... [more] SIS2022-11
pp.1-6
 Results 1 - 20 of 154  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan