Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 15:10 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Extended $k^m$-anonymity for randomization Masaya Kobayashi, Atsushi Fujioka (Kanagawa Univ.), Koji Chida (Gunma Univ.) ISEC2023-53 SITE2023-47 BioX2023-56 HWS2023-53 ICSS2023-50 EMM2023-53 |
Various models have been proposed to evaluate anonymity. Among them, $k$-anonymity is widely known as a representative a... [more] |
ISEC2023-53 SITE2023-47 BioX2023-56 HWS2023-53 ICSS2023-50 EMM2023-53 pp.255-260 |
MSS, CAS, SIP, VLD |
2023-07-06 15:20 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
A Study on Golomb Coding for Scrambled Domain Layered Coding Compatible with JPEG XS Takayuki Nakachi (Univ. of the Ryukyus), Hiroyuki Kimiyama (Daido), Mitsuru Murayama (KAIST) CAS2023-10 VLD2023-10 SIP2023-26 MSS2023-10 |
In this report, we propose a Golomb coding method for scrambled domain layered coding compatible with JPEG XS. The propo... [more] |
CAS2023-10 VLD2023-10 SIP2023-26 MSS2023-10 pp.47-52 |
IA, ICSS |
2023-06-21 10:55 |
Saga |
Saga Univ. (Primary: On-site, Secondary: Online) |
A Consideration of Privacy Preserved IoT Data Inquiry System using DoT Hayato Sagara (Hokkaido Univ.), Yong Jin (Tokyo Tech), Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ.) IA2023-10 ICSS2023-10 |
Recently, with the increase of Internet of Things (IoT) devices, the number of cyber-attacks against IoT devices has als... [more] |
IA2023-10 ICSS2023-10 pp.56-61 |
NS |
2023-04-13 12:50 |
Fukushima |
Nihon University, Koriyama Campus + Online (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
Designing Name Obfuscation Protocol on Content-Centric Networking using a Programmable Switch Yutaro Yoshinaka, Kentaro Kita, Junji Takemasa, Yuki Koizumi, Toru Hasegawa (Osaka Univ.) NS2023-1 |
In CCN, much user privacy leaks to eavesdroppers due to the routing based on content names, which are semantically rich ... [more] |
NS2023-1 pp.1-6 |
NLP, MSS |
2023-03-17 10:40 |
Nagasaki |
(Primary: On-site, Secondary: Online) |
Machine Learning-Based Risk Evaluation of Reconstruction Attack on Query System for Handling Privacy Data Mohd Anuaruddin Bin Ahmadon (山口大) MSS2022-96 NLP2022-141 |
In this paper, we proposed a method to evaluate the strength of a data privacy protection mechanism by separating the me... [more] |
MSS2022-96 NLP2022-141 pp.160-163 |
RCC, ISEC, IT, WBS |
2023-03-14 10:30 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
[Invited Talk]
Information-Theoretic Analyses for Two Problems Taking Security into Consideration
-- Parameter Estimation Problem under Local Differential Privacy, and Privacy-Utility Tradeoff Problem -- Shota Saito (Gunma Univ.) IT2022-71 ISEC2022-50 WBS2022-68 RCC2022-68 |
This lecture surveys the following two problems: 1) parameter estimation problem under $(epsilon, delta)$-local differen... [more] |
IT2022-71 ISEC2022-50 WBS2022-68 RCC2022-68 pp.19-24 |
RCC, ISEC, IT, WBS |
2023-03-14 16:50 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Proposal for a privacy-preserving frequency estimation method Naoki Kawahara, Atsuko Miyaji (Osaka Univ.), Tomoaki Mimoto (ATR) IT2022-97 ISEC2022-76 WBS2022-94 RCC2022-94 |
Differential privacy is one of the methods used to protect personal data by adding noise to personal data and its analys... [more] |
IT2022-97 ISEC2022-76 WBS2022-94 RCC2022-94 pp.187-194 |
LOIS |
2023-03-13 11:15 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Research of privacy violation for smart speaker Yunosuke Nishimura, Kenichi Arai (Nagasaki Univ.) LOIS2022-47 |
The demand of smart home devices, including smart speakers, is expected to increase in the future. In this study, as one... [more] |
LOIS2022-47 pp.17-22 |
ICSS, IPSJ-SPT |
2023-03-13 16:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Evaluation and countermeasures of notification destination restoration attacks using password recovery functions of multiple web services Ryusei Ishikawa, Soramichi Akiyama (Ritsumeikan Univ.), Atsuo Inomata (Ritsumeikan Univ., Osaka Univ.), Tetsutaro Uehara (Ritsumeikan Univ.) ICSS2022-62 |
Many web services with a login function using pair of ID and password have the password recovery function in case the us... [more] |
ICSS2022-62 pp.85-90 |
ICSS, IPSJ-SPT |
2023-03-14 10:50 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Discussion about Privacy-aware Anonymization of Traffic Logs for Malicious Activity Detection Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2022-74 |
The detection of malicious communications from traffic logs has an aspect of invading the privacy because of monitoring ... [more] |
ICSS2022-74 pp.157-162 |
EMM |
2023-03-02 13:00 |
Nagasaki |
Fukue culture hall (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Improvement of human flow measurement using flor estimation on depth images Takuya Nagatoshi, Michiharu Niimi (KIT) EMM2022-74 |
Measuring human flow to determine the number of people and flow lines in a space is a useful decision-making tool when c... [more] |
EMM2022-74 pp.38-43 |
IN, NS (Joint) |
2023-03-03 10:10 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Access Control Method with Privacy Preservation in NDN Yuma Fukagawa, Noriaki Kamiyama (Ritsumeikan Univ.) NS2022-221 |
Information-Centric Networking (ICN), which transfers Interest by the name of content without using name resolution and ... [more] |
NS2022-221 pp.310-315 |
IN, NS (Joint) |
2023-03-03 13:30 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Designing Lightweight Anonymity Protocol for Host- and AS-Level Relationship Anonymity Yutaro Yoshinaka, Junji Takemasa, Yuki Koizumi, Toru Hasegawa (Osaka Univ.) NS2022-238 |
Lightweight anonymity protocols achieve high-performance anonymity communication compared to Onion Routing, which repeat... [more] |
NS2022-238 pp.406-411 |
EMM |
2023-03-02 16:00 |
Nagasaki |
Fukue culture hall (Primary: On-site, Secondary: Online) |
[Invited Talk]
Image transformation with random numbers for reliable AI Hitoshi Kiya (TMU) EMM2022-87 |
The combined use of deep neural networks (DNNs) and images transformed with random sequences has given a new insight for... [more] |
EMM2022-87 pp.107-109 |
AI |
2022-12-21 17:10 |
Fukuoka |
|
An Algorithm Combined Grouping and Adding Dummy to Satisfy l-diversity Keiichiro Oishi, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga (UEC) AI2022-47 |
Universities and companies access personal information databases for a wide range of purposes, and privacy consideration... [more] |
AI2022-47 pp.80-86 |
CW (2nd) |
2022-12-16 |
  |
|
Proposal and Validation of a Serious Game to Improve Internet Literacy among Youth Owada Mitsuki, Kokubo Rin, Hamada Atsushi, Iio Jun (Chuo Univ.) |
This paper describes our original Serious Game about the personal information and how youth’s internet literacy changed ... [more] |
|
NS, ICM, CQ, NV (Joint) |
2022-11-24 09:55 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
Highly Accurate Privacy-Enhanced Federated Learning Using Data On The Server Yuta Kakizaki (TUS), Koya Sato (UEC), Keiichi Iwamura (TUS) NS2022-100 |
Federated learning is a cooperative machine learning approach that prohibits disclosing training data from distributed d... [more] |
NS2022-100 pp.1-6 |
NS, ICM, CQ, NV (Joint) |
2022-11-24 10:20 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
Social Surplus Maximization Using Incentive Mechanism for Cross-Silo Federated Learning with Differential Privacy Shota Miyagoshi, Takuji Tachibana (Univ. Fukui) NS2022-101 |
In cross-silo federated learning, where multiple organizations participate, the prediction accuracy of the global model ... [more] |
NS2022-101 pp.7-12 |
NS, ICM, CQ, NV (Joint) |
2022-11-25 13:00 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
[Invited Talk]
Continual Learning for Privacy Protection and Data Leakage Prevention Takashi Shibata (NTT) NS2022-123 CQ2022-56 ICM2022-26 |
Continuous learning aims to train a highly expressive model for a new task while retaining all knowledge about previous ... [more] |
NS2022-123 CQ2022-56 ICM2022-26 pp.131-132(NS), pp.52-53(CQ), pp.25-26(ICM) |
EA, EMM, ASJ-H |
2022-11-21 10:00 |
Online |
Online |
[Poster Presentation]
ConvMixer model transformation using random orthogonal matrices for privacy protection of test images. Rei Aso, Tatsuya Chuman, Hitoshi Kiya (TMU) EA2022-49 EMM2022-49 |
In this paper, a privacy preserving image classification method is proposed under the use of ConvMixer models. To protec... [more] |
EA2022-49 EMM2022-49 pp.46-51 |