Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SIP, SP, EA, IPSJ-SLP [detail] |
2024-02-29 15:10 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Privacy preserving deep unrolling ISTA method for sparse representation Nichika Yuge, Takayuki Nakachi (Univ. of the Ryukyus.) EA2023-81 SIP2023-128 SP2023-63 |
In recent years, the use of edge and cloud computing has expanded. Along with this, a method called sparse modeling is a... [more] |
EA2023-81 SIP2023-128 SP2023-63 pp.121-126 |
BioX, SIP, IE, ITE-IST, ITE-ME [detail] |
2023-05-19 10:30 |
Mie |
Sansui Hall, Mie University (Primary: On-site, Secondary: Online) |
Privacy Preserving Deep Unrolling Methods using Random Unitary Transform Nichika Yuge, Takayuki Nakachi, Morikazu Nakamura (Univ. of the Ryukyus.) SIP2023-10 BioX2023-10 IE2023-10 |
Edge and cloud computing has been spreading in many fields including machine learning.Sparse modeling attracts attention... [more] |
SIP2023-10 BioX2023-10 IE2023-10 pp.41-46 |
SANE |
2022-12-16 11:45 |
Nagasaki |
Nagasaki Public Hall (Primary: On-site, Secondary: Online) |
General 5-component Scattering Power Decomposition with Unitary Transformation Yoshio Yamaguchi (Niigata Univ.), Gulab Singh (IITB, India), Ryu Sugimoto (AIST) SANE2022-80 |
Polarimetric synthetic aperture radar (PolSAR) provides us with a full 3x3 coherency matrix that bears 9 real-valued and... [more] |
SANE2022-80 pp.85-90 |
EMM |
2022-03-08 11:50 |
Online |
(Primary: Online, Secondary: On-site) (Primary: Online, Secondary: On-site) |
RUT Computation of Gaussian Process Regression for Encrypting Input and Output Signals Takayuki Nakachi (Univ. of the Ryukyus), Yitu Wang (NTT) EMM2021-115 |
n this paper, we propose Gaussian Process Regression (GPR) for encrypted data generated based on random unitary transfor... [more] |
EMM2021-115 pp.124-129 |
SIS, IPSJ-AVM |
2021-06-24 13:45 |
Online |
Online |
Privacy-Preserving Secure Computation of Gaussian Process Regression
-- Find patterns and rules from encrypted data -- Takayuki Nakachi (Univ. of the Ryukyus), Yitu Wang (NTT) SIS2021-8 |
In this paper, we propose Gaussian Process Regression (GPR) for encrypted data generated based on random unitary transfo... [more] |
SIS2021-8 pp.43-48 |
HCGSYMPO (2nd) |
2020-12-15 - 2020-12-17 |
Online |
Online |
Joint Inter-device Matching and Temporal Alignment between Camera and Wearable Sensors using 3D Motion Correlation Hiroyuki Ishihara, Shiro Kumano, Takayuki Nakachi (NTT) |
In this paper, we propose a method to estimate the correspondence between a person’s ID and a device ID of a person, and... [more] |
|
SP, EA, SIP |
2020-03-02 15:10 |
Okinawa |
Okinawa Industry Support Center (Cancelled but technical report was issued) |
A Pattern Recognition Method Using Secure Sparse Representations in L0 Norm Minimization Takayuki Nakachi, Yitu Wang (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) EA2019-130 SIP2019-132 SP2019-79 |
In this paper, we propose a privacy-preserving pattern recognition method using encrypted sparse representations in L0 n... [more] |
EA2019-130 SIP2019-132 SP2019-79 pp.169-174 |
ITE-BCT, SIS |
2019-10-25 11:10 |
Fukui |
Fukui International Activities Plaza |
Image Compression in Encryption-then-Compression System Using Secure Sparse Representations Takayuki Nakachi (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) SIS2019-21 |
n this paper, we propose a image compression method using secure sparse representations in Encryption-then-Compression (... [more] |
SIS2019-21 pp.77-82 |
IE, EMM, LOIS, IEE-CMN, ITE-ME, IPSJ-AVM [detail] |
2019-09-19 15:10 |
Niigata |
Tokimeito, Niigata University |
Secure sparse representations in L0 norm minimization Takayuki Nakachi (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) LOIS2019-11 IE2019-24 EMM2019-68 |
In this paper, we propose a method to estimate secure sparse representations in L0 norm minimization, and evaluate the e... [more] |
LOIS2019-11 IE2019-24 EMM2019-68 pp.25-30 |
QIT (2nd) |
2019-05-20 12:00 |
Fukuoka |
Kyushu University, Chikushi Campus |
One-Shot Randomized and Nonrandomized Partial Decoupling Eyuri Wakakuwa (UEC), Yoshifumi Nakata (Kyoto U) |
We introduce a task that we call partial decoupling, in which a bipartite quantum state is transformed by a unitary oper... [more] |
|
EMM |
2019-03-14 11:30 |
Okinawa |
TBD |
Image Patch Modeling using Secure Computation of Sparse Dictionary Learning Takayuki Nakachi (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) EMM2018-115 |
With the advent of the big data era, digital content continues to increase.
Sparse coding is attracting attention as an... [more] |
EMM2018-115 pp.129-134 |
SIS |
2019-03-06 15:10 |
Tokyo |
Tokyo Univ. Science, Katsushika Campus |
Secure Computation of Sparse Dictionary Learning Takayuki Nakachi, Yukihiro Bandoh (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) SIS2018-43 |
With the advent of the big data era, all digital contents continue to increase. Sparse modeling is drawing attention as ... [more] |
SIS2018-43 pp.35-40 |
ITS, IE, ITE-MMS, ITE-HI, ITE-ME, ITE-AIT [detail] |
2019-02-20 14:45 |
Hokkaido |
Hokkaido Univ. |
Encrypted Image Classification by Using Secure OMP Computation Takayuki Nakachi (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) ITS2018-84 IE2018-105 |
Currently, huge amounts of image/video are being recorded and uploaded every day by surveillance systems or SNS services... [more] |
ITS2018-84 IE2018-105 pp.227-232 |
IEE-CMN, EMM, LOIS, IE, ITE-ME [detail] |
2018-09-27 13:50 |
Oita |
Beppu Int'l Convention Ctr. aka B-CON Plaza |
Image Patch Modeling in Encrypted Domain using Sparse Coding Takayuki Nakachi (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) LOIS2018-12 IE2018-32 EMM2018-51 |
Sparse coding represents observed signals effectively as a linear combination of a small number of bases which are chose... [more] |
LOIS2018-12 IE2018-32 EMM2018-51 pp.13-18 |
SIS, IPSJ-AVM, ITE-3DMT [detail] |
2018-06-07 10:20 |
Hokkaido |
Jozankei View Hotel |
Secure Computation of Sparse Coding for Privacy Protection Takayuki Nakachi (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) SIS2018-2 |
Sparse coding represents observed signals effectively as a linear combination of a small number of bases which are chose... [more] |
SIS2018-2 pp.7-12 |
EMM, IE, LOIS, IEE-CMN, ITE-ME [detail] |
2017-09-04 13:50 |
Kyoto |
Kyoto Univ. (Clock Tower Centennial Hall) |
Privacy-preserving SVM processing by using random unitary transformation Takahiro Maekawa, Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya (Tokyo Metro.Univ.) LOIS2017-15 IE2017-36 EMM2017-44 |
In this paper,we propose a privacy-preserving SVM processing method with templates protected by using a random unitary t... [more] |
LOIS2017-15 IE2017-36 EMM2017-44 pp.13-18 |
AP, SAT, SANE (Joint) |
2016-07-20 16:20 |
Hokkaido |
Otaru port marina |
Improvement of RV-MUSIC using Unitary Transformation and Orthogonal Complement Koji Sonoyama, Takashi Matsubara, Takakazu Kurokawa (NDA) AP2016-42 |
Direction-of-arrival (DOA) estimation with an array antenna includes MUSIC and ESPRIT. MUSIC needs big computational com... [more] |
AP2016-42 pp.31-36 |
ITS, IE, ITE-AIT, ITE-HI, ITE-ME, ITE-MMS, ITE-CE [detail] |
2016-02-22 10:00 |
Hokkaido |
Hokkaido Univ. |
Secure classification based on kernel method using unitary transformation Ibuki Nakamura, Yuko Saito, Sayaka Shiota, Hitoshi Kiya (Tokyo Metropolitan Univ.) ITS2015-59 IE2015-101 |
This study considers a template protection scheme based on an random unitary transformation, where the template consists... [more] |
ITS2015-59 IE2015-101 pp.17-22 |
IE, ITE-ME, IPSJ-AVM, ITE-CE [detail] |
2015-08-03 10:55 |
Tokyo |
Tokyo Metropolitan Univ. |
A study of random unitary matrices for secure biometric authentication Yuko Saito, Ibuki Nakamura, Sayaka Shiota (Tokyo Metro.Univ), Yoshihide Tonomura (NTT), Hitoshi Kiya (Tokyo Metro.Univ) IE2015-47 |
Random unitary transformation-based template protection methods have
been proposed as one of biometric template protec... [more] |
IE2015-47 pp.7-12 |
EMM, IT |
2015-05-21 14:30 |
Kyoto |
Kyoto International Community House |
Generating Protected Eigenface Templates Using an Unitary Transformaion Ibuki Nakamura (Tokyo Metropolitan Univ.), Yoshihide Tonomura (NTT), Hitoshi Kiya (Tokyo Metropolitan Univ.) IT2015-7 EMM2015-7 |
This paper considers a template protection scheme based on an unitary transformation, where the template consists of the... [more] |
IT2015-7 EMM2015-7 pp.35-40 |