IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
... (for ESS/CS/ES/ISS)
Tech. Rep. Archives
... (for ES/CS)
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 21件中 1~20件目  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SIS 2019-12-12
14:35
Okayama Okayama University of Science A Dimensionality Reduction Method with Random Sampling for Privacy-Preserving Machine Learning
Ayana Kawamura, Kenta Iida, Hitoshi Kiya (Tokyo Metro. Univ.) SIS2019-26
In this paper, we propose a dimensionality reduction method with random sampling for privacy-preserving machine learning... [more] SIS2019-26
pp.17-21
EMM, IT 2019-05-23
14:00
Hokkaido Asahikawa International Conference Hall Generation of privacy-preserving images holding positional information for HOG feature extraction
Masaki Kitayama, Hitoshi Kiya (Tokyo Metro. Univ.) IT2019-1 EMM2019-1
In this paper, we propose a generation method of images which have no visual information but hold the gradient direction... [more] IT2019-1 EMM2019-1
pp.1-6
SC 2018-06-02
09:25
Fukushima UBIC 3D Theater, University of Aizu Simultaneous recognition of human activities and locations based on sensor array
Shoichi Ichimura, Qiangfu Zhao (Univ. of Aizu) SC2018-11
In recent years, smart homes for senior care have attracted great attention in Japan. But a smart home has a privacy iss... [more] SC2018-11
pp.59-64
NS, IN
(Joint)
2018-03-01
10:50
Miyazaki Phoenix Seagaia Resort Light-Weight Mechanism for Authorized Pseudonym/Key Allocation
Yusuke Fukushima, Ved Kafle, Hiroaki Harai (NICT) IN2017-102
Authorized pseudonym-based communication helps to mitigate tracking risks of message sender and receiver as well as prov... [more] IN2017-102
pp.75-80
ISEC, COMP 2017-12-21
14:10
Kochi Eikokuji Campus, Kochi University of Technology [Invited Talk] Foundations and practical studies of secure computation
Ryo Kikuchi (NTT) ISEC2017-78 COMP2017-32
Secure computation, also known as secure multiparty computation, is a method to compute a function on encrypted data. Th... [more] ISEC2017-78 COMP2017-32
p.41
IA 2017-01-27
12:20
Tokyo Kikai-Shinko-Kaikan Bldg. B3 Kenshu-2 room Pseudonym and Key Allocation for Privacy-Aware Communications of Smart IoT Applications
Yusuke Fukushima, Ved P. Kafle, Hiroaki Harai (NICT) IA2016-82
From the viewpoint of privacy protection and communication reliability, it is necessary to hide every relationship betwe... [more] IA2016-82
pp.19-24
ICSS, IPSJ-SPT 2016-03-03
16:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University Privacy-preserving Log Analysis with Deterministic Encryption
Yuji Furuta, Naoto Yanai (Osaka Univ.), Masashi Karasaki (NTT-neomeit), Katsuhiko Eguchi (NTT Neomeit), Yasunori Ishihara, Toru Fujiwara (Osaka Univ.) ICSS2015-54
Recently, an increase of attacks via a network is remarkable, and the observation and the analysis of log information is... [more] ICSS2015-54
pp.41-46
PRMU, IPSJ-CVIM, MVE [detail] 2016-01-22
16:05
Osaka   a Note on a Privacy-Preserving Method for Distributed Regularized Logistic Regression
Hideyuki Masui, Nozomi Miya, Toshiyasu Matsushima (Waseda Univ.) PRMU2015-131 MVE2015-53
In this paper, we study a privacy-preserving logistic regression. We consider the situation that two users have differen... [more] PRMU2015-131 MVE2015-53
pp.281-286
COMP 2015-10-02
10:30
Tokyo   Online Bayesian estimation of Randomized Response models
Tota Suko, Shunsuke Horii (Waseda Univ) COMP2015-23
In this paper, we treat the randomized-response technique. This is the estimation method for population proportion of a ... [more] COMP2015-23
pp.7-11
CS 2015-07-03
11:40
Okinawa Eef Information Plaza (Kumejima Is.) Privacy-preserving Biometric Authentication with Homomorphic Encryption by Comparing Partial Bio-information
Takumi Matsunaga, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2015-28
In recent years, the privacy-preserving biometric authentication executed on encrypted biometric information is getting ... [more] CS2015-28
pp.103-108
ASN 2014-05-30
15:10
Tokyo Convention Hall, RCAST, The University of Tokyo [Encouragement Talk] Privacy-Preserving Data Mining with Perturbation for Multidimensional Data
Shunsuke Aoki, Kaoru Sezaki (Univ. of Tokyo) ASN2014-37
With the rapid spread of utilization of personal data in cyber and physical world, privacy-preserving data mining become... [more] ASN2014-37
pp.143-147
IBISML 2013-07-18
15:10
Tokyo Nishiwaseda Campus (Waseda univ.) Privacy-preserving Online Logistic Regression Based on Homomorphic Encryption
Shuang Wu, Junpei Kawamoto (Univ. of Tsukuba), Hiroaki Kikuchi (Meiji Univ.), Jun Sakuma (Univ. of Tsukuba) IBISML2013-10
Preserve the privacy of personal information when conducting statistical analysis has attracted much attention in machin... [more] IBISML2013-10
pp.67-74
PRMU, IBISML, IPSJ-CVIM
(Joint) [detail]
2012-09-02
10:00
Tokyo   A Survey on Fairness/Discrimination-Aware Mining
Toshihiro Kamishima (AIST) PRMU2012-30 IBISML2012-13
Fairness-aware / discrimination-aware mining is data analysis techniques while keeping aware of fairness, discrimination... [more] PRMU2012-30 IBISML2012-13
pp.1-8
LOIS 2012-03-09
13:10
Okinawa Meio Univ. t-test for Privacy-Preserved Data
Ryo Kikuchi, Akihiro Yamanaka, Dai Ikarashi (NTT) LOIS2011-101
As the needs of utilizing the privacy information such as giving the receipt to researchers in the university for
the d... [more]
LOIS2011-101
pp.171-176
IBISML 2011-03-28
15:50
Osaka Nakanoshima Center, Osaka Univ. Privacy-preserving mining of frequent closed patterns using ZDDs
Keisuke Ootaki, Akihiro Yamamoto (Kyoto Univ.) IBISML2010-111
In this paper, we propose new methods for privacy-preserving mining of frequent closed patterns from horizontally partit... [more] IBISML2010-111
pp.49-54
ICSS 2011-03-25
10:45
Tokyo Suspended Proposal of an Order Preserving Encryption for Anonymity
Ryoichi Isawa (Kobe Univ./Crypto), Masakatu Morii (Kobe Univ.) ICSS2010-57
The study of Order Preserving Encryption (OPE) is focusing much attention by researchers. OPE is able to anonymize the n... [more] ICSS2010-57
pp.5-10
CPSY, DC, IPSJ-SLDM, IPSJ-EMB [detail] 2011-03-19
15:10
Okinawa   An Architecture for Low-Latency Anonymizing Mechanism
Junichi Sawada, Koichi Inoue, Hiroaki Nishi (Keio Univ.) CPSY2010-81 DC2010-80
In experiencing the growth of quantity and value of data, data holders realize the importance to utilize information tha... [more] CPSY2010-81 DC2010-80
pp.309-314
IN 2011-01-20
15:10
Osaka Osaka Univ. [Invited Talk] Data Masking and Traceability for Inter-Cloud Data Security
Kouichi Itoh, Yoshinori Katayama, Mebae Ushida, Gao Jie, Fumihiko Kozakura, Hiroshi Tsuda (Fujitsu Laboratories) IN2010-129
The use of cloud computing in business is expanding at a rapid clip in recent years. However, security of the data store... [more] IN2010-129
pp.65-70
IA, ICSS 2010-06-17
15:20
Kyoto Academic Center for Computing and Media Studies, Kyoto University Proposal and Consideration for An Anonymity Method for Widespred High-Speed Incident Analysis System(II)
Ryoichi Isawa (CRYPTO), Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO), Koji Nakao (NICT) IA2010-6 ICSS2010-6
Some organizations need to collaborate each other to analyze the computer security incidents which become complex. The n... [more] IA2010-6 ICSS2010-6
pp.31-36
IA, ICSS 2009-06-18
13:30
Tokyo Kikai-Shinko-Kaikan Bldg *
Ryoichi Isawa (CRYPTO Co., Ltd.), Kota Kondo, Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO Co., Ltd.), Koji Nakao (NICT) IA2009-5 ICSS2009-13
The widely distributed incidents analysis system developed by NICT consists of some L-SOCs and an upper level SOC. The L... [more] IA2009-5 ICSS2009-13
pp.25-30
 21件中 1~20件目  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (No. 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan