Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HCS, CNR |
2023-11-05 11:15 |
Tokyo |
Kogakuin University (Primary: On-site, Secondary: Online) |
Proposal and Evaluation of Recommendation Acceptance Tendency Scale for Overtrust Awareness Yoshinori Hijikata, Reika Miwa, Aika Tsuchida (KGU), Masahiro Hamasaki, Masataka Goto (AIST) CNR2023-10 HCS2023-72 |
As services providing recommendations or judgments of AI (artificial intelligence) become popular, the problem of "recom... [more] |
CNR2023-10 HCS2023-72 pp.15-20 |
HCS |
2022-01-28 09:40 |
Online |
Online |
Proposal of an Overtrust Scale of Users in Recommender Systems Aika Tsuchida, Reika Miwa, Yoshinori Hijikata (KGU), Masahiro Hamasaki, Masataka Goto (AIST) HCS2021-43 |
Recommender systems have been used in many online services, and people have been exposed to such recommendations frequen... [more] |
HCS2021-43 pp.1-6 |
SWIM |
2020-11-28 14:10 |
Online |
Online |
Governance and accessment of the use of IT and AI for sustainable development Hiroyuki Ogura (Nihon Univ.), Yonosuke Harada (Inst. of Information Security), Shunsuke Managi (Kyushu Univ.) SWIM2020-8 |
It is required that the management of everything surrounding the organization becomes smarter and that it is transformed... [more] |
SWIM2020-8 pp.10-17 |
ISEC |
2020-05-20 15:30 |
Online |
Online |
An Anonymous Trust-Marking Scheme on NEM Blockchain Systems Tomoki Fujitani (Univ.Tsukuba/NICT), Keita Emura (NICT), Kazumasa Omote (Univ.Tsukuba/NICT) ISEC2020-11 |
In recent years, cryptocurrencies (crypto-assets) such as Bitcoin, Ethereum, and NEM have attracted attention in various... [more] |
ISEC2020-11 pp.47-54 |
CS |
2019-07-04 09:00 |
Kagoshima |
Amami City Social Welfare Center |
Trust-based Verification Attack Prevention Scheme using Tendency of Contents Request on NDN Hironori Nakano, Hiroya Kato, Shuichiro Haruta, Masashi Yoshida, Iwao Sasase (Keio Univ.) CS2019-13 |
In this paper, we propose a trust-based verification attack prevention scheme using tendency of contents request on NDN.... [more] |
CS2019-13 pp.1-6 |
CS |
2017-07-27 09:36 |
Nagasaki |
Fukue Bunka Kaikan |
Low Cost Dummy Generation using Non-Trusted LBS Sanghun Choi, Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2017-14 |
Although LBS(Location Based Service) is quite convenient and usually used these days, The location privacy of the user i... [more] |
CS2017-14 pp.7-12 |
SC |
2016-08-26 11:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. B2F Room No.2 |
Improvement of Trust Value Prediction Using Text Mining for Recommender System Incheon Paik, Tomoya Maemori (UoA) SC2016-12 |
Recommender system will help to provide a list of items information that users are interested in. And with growth of soc... [more] |
SC2016-12 pp.7-11 |
DC, CPSY (Joint) |
2012-08-02 14:30 |
Tottori |
Torigin Bunka Kaikan |
Application Authentication System on Untrusted OS Tsuyoshi Yamada, Masahiro Goshima, Shuichi Sakai (UT) CPSY2012-11 |
In order to prevent the information which an application deal from leakage, it is necessary to verify that following thr... [more] |
CPSY2012-11 pp.13-18 |
NS |
2011-05-19 13:10 |
Tokyo |
Sophia University |
Trust-value management considering second infection for P2P file sharing networks Yuki Yamashita, Kenji Yokota (Kyoto Univ.), Takuya Asaka (Tokyo Metropolitan Univ.), Tatsuro Takahashi (Kyoto Univ.) NS2011-23 |
In recent years, malwares in P2P networks are a major problem. As one of the virus prevention methods, DTM (Dynamic trus... [more] |
NS2011-23 pp.41-46 |
SSS |
2009-07-24 00:40 |
Tokyo |
|
[Keynote Address]
Psychology on Risk, Safety and Peace of Mind
-- The Determinants of Social Trust -- Kazuya Nakayachi (Doshisha Univ.) SSS2009-7 |
In this presentation the relationship between safety and peace of mind is discussed. The safety level of our society has... [more] |
SSS2009-7 pp.5-8 |
AI |
2007-11-26 10:00 |
Tokyo |
Kwansei Gakuin University, Tokyo Marunouchi Campus |
Proposal of noise diffusion Secure Eigen Trust Algorithm(ndSET) Yukio Okada, Youki Kadobayashi (NAIST) AI2007-11 |
In overlay Network, Secure Eigen TrustAlgorithm( SET ) is proposed as an algorithm to check trust values. It ranks files... [more] |
AI2007-11 pp.1-3 |
VLD, CPSY, RECONF, DC, IPSJ-SLDM, IPSJ-ARC (Joint) [detail] |
2007-11-21 13:00 |
Fukuoka |
Kitakyushu International Conference Center |
[Fellow Memorial Lecture]
Social Information Infrastructure and Dependable VLSI Hiroto Yasuura (Kyushu Univ.) VLD2007-82 DC2007-37 RECONF2007-36 |
Our daily lives heavily depends on the social information infrastructure, which includes a huge numbers of VLSI chips. V... [more] |
VLD2007-82 DC2007-37 RECONF2007-36 pp.1-6 |