IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 403 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
15:10
Hokkaido Hokkaido Jichiro Kaikan Extended $k^m$-anonymity for randomization
Masaya Kobayashi, Atsushi Fujioka (Kanagawa Univ.), Koji Chida (Gunma Univ.) ISEC2023-53 SITE2023-47 BioX2023-56 HWS2023-53 ICSS2023-50 EMM2023-53
Various models have been proposed to evaluate anonymity. Among them, $k$-anonymity is widely known as a representative a... [more] ISEC2023-53 SITE2023-47 BioX2023-56 HWS2023-53 ICSS2023-50 EMM2023-53
pp.255-260
MSS, CAS, SIP, VLD 2023-07-06
15:20
Hokkaido
(Primary: On-site, Secondary: Online)
A Study on Golomb Coding for Scrambled Domain Layered Coding Compatible with JPEG XS
Takayuki Nakachi (Univ. of the Ryukyus), Hiroyuki Kimiyama (Daido), Mitsuru Murayama (KAIST) CAS2023-10 VLD2023-10 SIP2023-26 MSS2023-10
In this report, we propose a Golomb coding method for scrambled domain layered coding compatible with JPEG XS. The propo... [more] CAS2023-10 VLD2023-10 SIP2023-26 MSS2023-10
pp.47-52
IA, ICSS 2023-06-21
10:55
Saga Saga Univ.
(Primary: On-site, Secondary: Online)
A Consideration of Privacy Preserved IoT Data Inquiry System using DoT
Hayato Sagara (Hokkaido Univ.), Yong Jin (Tokyo Tech), Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ.) IA2023-10 ICSS2023-10
Recently, with the increase of Internet of Things (IoT) devices, the number of cyber-attacks against IoT devices has als... [more] IA2023-10 ICSS2023-10
pp.56-61
NS 2023-04-13
12:50
Fukushima Nihon University, Koriyama Campus + Online
(Primary: On-site, Secondary: Online)
[Encouragement Talk] Designing Name Obfuscation Protocol on Content-Centric Networking using a Programmable Switch
Yutaro Yoshinaka, Kentaro Kita, Junji Takemasa, Yuki Koizumi, Toru Hasegawa (Osaka Univ.) NS2023-1
In CCN, much user privacy leaks to eavesdroppers due to the routing based on content names, which are semantically rich ... [more] NS2023-1
pp.1-6
NLP, MSS 2023-03-17
10:40
Nagasaki
(Primary: On-site, Secondary: Online)
Machine Learning-Based Risk Evaluation of Reconstruction Attack on Query System for Handling Privacy Data
Mohd Anuaruddin Bin Ahmadon (山口大) MSS2022-96 NLP2022-141
In this paper, we proposed a method to evaluate the strength of a data privacy protection mechanism by separating the me... [more] MSS2022-96 NLP2022-141
pp.160-163
RCC, ISEC, IT, WBS 2023-03-14
10:30
Yamaguchi
(Primary: On-site, Secondary: Online)
[Invited Talk] Information-Theoretic Analyses for Two Problems Taking Security into Consideration -- Parameter Estimation Problem under Local Differential Privacy, and Privacy-Utility Tradeoff Problem --
Shota Saito (Gunma Univ.) IT2022-71 ISEC2022-50 WBS2022-68 RCC2022-68
This lecture surveys the following two problems: 1) parameter estimation problem under $(epsilon, delta)$-local differen... [more] IT2022-71 ISEC2022-50 WBS2022-68 RCC2022-68
pp.19-24
RCC, ISEC, IT, WBS 2023-03-14
16:50
Yamaguchi
(Primary: On-site, Secondary: Online)
Proposal for a privacy-preserving frequency estimation method
Naoki Kawahara, Atsuko Miyaji (Osaka Univ.), Tomoaki Mimoto (ATR) IT2022-97 ISEC2022-76 WBS2022-94 RCC2022-94
Differential privacy is one of the methods used to protect personal data by adding noise to personal data and its analys... [more] IT2022-97 ISEC2022-76 WBS2022-94 RCC2022-94
pp.187-194
LOIS 2023-03-13
11:15
Okinawa
(Primary: On-site, Secondary: Online)
Research of privacy violation for smart speaker
Yunosuke Nishimura, Kenichi Arai (Nagasaki Univ.) LOIS2022-47
The demand of smart home devices, including smart speakers, is expected to increase in the future. In this study, as one... [more] LOIS2022-47
pp.17-22
ICSS, IPSJ-SPT 2023-03-13
16:30
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Evaluation and countermeasures of notification destination restoration attacks using password recovery functions of multiple web services
Ryusei Ishikawa, Soramichi Akiyama (Ritsumeikan Univ.), Atsuo Inomata (Ritsumeikan Univ., Osaka Univ.), Tetsutaro Uehara (Ritsumeikan Univ.) ICSS2022-62
Many web services with a login function using pair of ID and password have the password recovery function in case the us... [more] ICSS2022-62
pp.85-90
ICSS, IPSJ-SPT 2023-03-14
10:50
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Discussion about Privacy-aware Anonymization of Traffic Logs for Malicious Activity Detection
Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2022-74
The detection of malicious communications from traffic logs has an aspect of invading the privacy because of monitoring ... [more] ICSS2022-74
pp.157-162
EMM 2023-03-02
13:00
Nagasaki Fukue culture hall
(Primary: On-site, Secondary: Online)
[Poster Presentation] Improvement of human flow measurement using flor estimation on depth images
Takuya Nagatoshi, Michiharu Niimi (KIT) EMM2022-74
Measuring human flow to determine the number of people and flow lines in a space is a useful decision-making tool when c... [more] EMM2022-74
pp.38-43
IN, NS
(Joint)
2023-03-03
10:10
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
Access Control Method with Privacy Preservation in NDN
Yuma Fukagawa, Noriaki Kamiyama (Ritsumeikan Univ.) NS2022-221
Information-Centric Networking (ICN), which transfers Interest by the name of content without using name resolution and ... [more] NS2022-221
pp.310-315
IN, NS
(Joint)
2023-03-03
13:30
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
Designing Lightweight Anonymity Protocol for Host- and AS-Level Relationship Anonymity
Yutaro Yoshinaka, Junji Takemasa, Yuki Koizumi, Toru Hasegawa (Osaka Univ.) NS2022-238
Lightweight anonymity protocols achieve high-performance anonymity communication compared to Onion Routing, which repeat... [more] NS2022-238
pp.406-411
EMM 2023-03-02
16:00
Nagasaki Fukue culture hall
(Primary: On-site, Secondary: Online)
[Invited Talk] Image transformation with random numbers for reliable AI
Hitoshi Kiya (TMU) EMM2022-87
The combined use of deep neural networks (DNNs) and images transformed with random sequences has given a new insight for... [more] EMM2022-87
pp.107-109
AI 2022-12-21
17:10
Fukuoka   An Algorithm Combined Grouping and Adding Dummy to Satisfy l-diversity
Keiichiro Oishi, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga (UEC) AI2022-47
Universities and companies access personal information databases for a wide range of purposes, and privacy consideration... [more] AI2022-47
pp.80-86
CW
(2nd)
2022-12-16     Proposal and Validation of a Serious Game to Improve Internet Literacy among Youth
Owada Mitsuki, Kokubo Rin, Hamada Atsushi, Iio Jun (Chuo Univ.)
This paper describes our original Serious Game about the personal information and how youth’s internet literacy changed ... [more]
NS, ICM, CQ, NV
(Joint)
2022-11-24
09:55
Fukuoka Humanities and Social Sciences Center, Fukuoka Univ. + Online
(Primary: On-site, Secondary: Online)
Highly Accurate Privacy-Enhanced Federated Learning Using Data On The Server
Yuta Kakizaki (TUS), Koya Sato (UEC), Keiichi Iwamura (TUS) NS2022-100
Federated learning is a cooperative machine learning approach that prohibits disclosing training data from distributed d... [more] NS2022-100
pp.1-6
NS, ICM, CQ, NV
(Joint)
2022-11-24
10:20
Fukuoka Humanities and Social Sciences Center, Fukuoka Univ. + Online
(Primary: On-site, Secondary: Online)
Social Surplus Maximization Using Incentive Mechanism for Cross-Silo Federated Learning with Differential Privacy
Shota Miyagoshi, Takuji Tachibana (Univ. Fukui) NS2022-101
In cross-silo federated learning, where multiple organizations participate, the prediction accuracy of the global model ... [more] NS2022-101
pp.7-12
NS, ICM, CQ, NV
(Joint)
2022-11-25
13:00
Fukuoka Humanities and Social Sciences Center, Fukuoka Univ. + Online
(Primary: On-site, Secondary: Online)
[Invited Talk] Continual Learning for Privacy Protection and Data Leakage Prevention
Takashi Shibata (NTT) NS2022-123 CQ2022-56 ICM2022-26
Continuous learning aims to train a highly expressive model for a new task while retaining all knowledge about previous ... [more] NS2022-123 CQ2022-56 ICM2022-26
pp.131-132(NS), pp.52-53(CQ), pp.25-26(ICM)
EA, EMM, ASJ-H 2022-11-21
10:00
Online Online [Poster Presentation] ConvMixer model transformation using random orthogonal matrices for privacy protection of test images.
Rei Aso, Tatsuya Chuman, Hitoshi Kiya (TMU) EA2022-49 EMM2022-49
In this paper, a privacy preserving image classification method is proposed under the use of ConvMixer models. To protec... [more] EA2022-49 EMM2022-49
pp.46-51
 Results 21 - 40 of 403 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan