Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-21 14:30 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
A poisoning-resilient LDP schema using oblivious transfer and Hadamard transform Masahiro Shimizu, Hiroaki Kikuchi (Meiji Univ.) ICSS2023-79 |
In recent years, Local Differential Privacy (LDP) has been actively used to collect and utilize users’ usage history from... [more] |
ICSS2023-79 pp.71-78 |
ICSS, IPSJ-SPT |
2024-03-21 14:55 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
An Examination of Privacy-Aware Malicious Activity Detection Methods Using NII-SOCS Benchmark Data Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2023-80 |
Detection of malicious communications from communication logs may pose a risk of privacy infringement as it requires mon... [more] |
ICSS2023-80 pp.79-84 |
ICSS, IPSJ-SPT |
2024-03-21 16:10 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Considerations on Differential Privacy Mechanisms in MNIST Naoki Kawahara, Pengxuan Wei, Ryunosuke Higashi, Kenta Okada, Tatsuhiro Yamatsuki, Atsuko Miyaji (Osaka Univ.) ICSS2023-81 |
In recent years, data utilization technologies, including machine learning, have been steadily advancing. One means of p... [more] |
ICSS2023-81 pp.85-92 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Data processing methods for high-performance Privacy-Preserving Machine Learning Tatsuhiro Yamatsuki (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) IT2023-94 ISEC2023-93 WBS2023-82 RCC2023-76 |
Currently, attempts are being made in various fields to solve problems by utilizing big data. However, privacy protectio... [more] |
IT2023-94 ISEC2023-93 WBS2023-82 RCC2023-76 pp.118-126 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Efficient Replay Data Selection in Continual Federated Learning Model Yuto Kitano (Kobe Univ), Lihua Wang (NICT), Seiichi Ozawa (Kobe Univ) IT2023-96 ISEC2023-95 WBS2023-84 RCC2023-78 |
In this study, we propose a continual federated learning that can continuously learn distributed data generated daily by... [more] |
IT2023-96 ISEC2023-95 WBS2023-84 RCC2023-78 pp.135-141 |
CNR, BioX |
2024-02-29 15:00 |
Tokyo |
NHK Science & Technology Research Laboratories (Primary: On-site, Secondary: Online) |
Implementation and Evaluation of Privacy-Preserving Image Transformation Methods for Person Re-identification Junpei Yamaguchi, Hajime Nada, Yumo Ouchi, Narishige Abe (Fujitsu) BioX2023-73 CNR2023-40 |
Advances in machine learning have enabled high-accuracy tracking of individuals using surveillance cameras, making the d... [more] |
BioX2023-73 CNR2023-40 pp.18-23 |
SIP, SP, EA, IPSJ-SLP [detail] |
2024-02-29 15:10 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Byzantine attack detection via similarity of local updates in federated learning Kenta Ohno, Masao Yamagishi (Hosei Univ.) EA2023-86 SIP2023-133 SP2023-68 |
We propose a method to detect Byzantine attacks in federated learning, as well as a method for identifying clients repea... [more] |
EA2023-86 SIP2023-133 SP2023-68 pp.150-155 |
NS, IN (Joint) |
2024-02-29 10:45 |
Okinawa |
Okinawa Convention Center |
Proposal of a Data Leakage Attack against a Vertical Federated Learning System based on Knowledge Distillation Takumi Suimon, Yuki Koizumi, Junji Takemasa, Toru Hasegawa (Osaka Univ.) NS2023-187 |
Vertical federated learning is a method for participants who have data with the same samples but different features to c... [more] |
NS2023-187 pp.90-95 |
NS, IN (Joint) |
2024-02-29 10:45 |
Okinawa |
Okinawa Convention Center |
A privacy protection mechanism using Bloom Filter for a P2P-based tracking system watching over children Yuki Matsumoto, Akihiro Fujimoto (Wakayama Univ), Hideki Tode (Osaka Metropolitan Univ) NS2023-193 |
With the increase in the number of single-parent and elderly-only families, as well as changes in work patterns such as ... [more] |
NS2023-193 pp.125-130 |
EMM |
2024-01-16 15:25 |
Miyagi |
Tohoku Univ. (Primary: On-site, Secondary: Online) |
[Invited Talk]
Federated Learning with Enhanced Privacy Protection in AI Lihua Wang (NICT) EMM2023-83 |
Federated learning is a crucial methodology in artificial intelligence where multiple organizations collaborate to perfo... [more] |
EMM2023-83 p.19 |
MSS, CAS, IPSJ-AL [detail] |
2023-11-16 13:20 |
Okinawa |
|
On Speed Response and Disclosed Subspace of Privacy-Preserving Vehicle Platoon Speed Control Takeshi Hyodo, Kenji Sawada (UEC) CAS2023-62 MSS2023-32 |
There is a growing demand for cyber security measures in vehicle platoon control. In order to prevent malicious vehicles... [more] |
CAS2023-62 MSS2023-32 pp.13-18 |
RISING (3rd) |
2023-10-31 09:45 |
Hokkaido |
Kaderu 2・7 (Sapporo) |
[Poster Presentation]
Triadic Split Computing toward Privacy-Conscious Generative AI services Shoki Ohta, Takayuki Nishio (Tokyo Tech) |
With the rapid advancements in big AI models such as text and image generation models, numerous web services have begun ... [more] |
|
RISING (3rd) |
2023-10-31 10:45 |
Hokkaido |
Kaderu 2・7 (Sapporo) |
[Poster Presentation]
Performance Analysis of Cognitive Radio Networks With Location Privacy Preservation Ryutaro Kobuchi (Osaka Univ.), Tatsuaki Kimura (Doshisha Univ.), Tetsuya Takine (Osaka Univ.) |
With the rapid increase in demand for wireless communication services, dynamic spectrum sharing in cognitive radio netwo... [more] |
|
BioX |
2023-10-12 14:45 |
Okinawa |
Nobumoto Ohama Memorial Hall |
A Study on Federated Learning System for Highly Accurate Biometric Authentication Yusei Suzuki, Yosuke Kaga (Hitachi) BioX2023-58 |
With the development of machine learning on large-scale datasets, the accuracy of biometric authentication has significa... [more] |
BioX2023-58 pp.2-7 |
SS, DC |
2023-10-12 10:25 |
Nagano |
(Primary: On-site, Secondary: Online) |
Robustness trends of DP-SGD, a machine learning with differential privacy Takahiro Kanki, Shinpei Ogata, Kozo Okano (Sinshu Univ), Shin Nakajima (NII) SS2023-28 DC2023-34 |
Although machine learning has been successful in various fields, there is a problem that an adversary can extract traini... [more] |
SS2023-28 DC2023-34 pp.38-43 |
NS |
2023-10-06 15:20 |
Hokkaido |
Hokkaidou University + Online (Primary: On-site, Secondary: Online) |
Incentive Mechanism Considering Heterogeneous Privacy Demand Level in Federated Learning with Differential Privacy Shota Miyagoshi, Takuji Tachibana (Univ. Fukui) NS2023-104 |
In federated learning, where multiple data owners participate as clients to perform machine learning, each client shares... [more] |
NS2023-104 pp.162-167 |
IA |
2023-09-21 13:50 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
A consideration about a discovering method of privacy-enhanced authoritative DNS servers Satoru Sunahara (CIST), Yong Jin (Tokyo Tech), Katsuyoshi Iida (HU) IA2023-11 |
Plain-text communication of DNS queries poses a risk of privacy leakage. Therefore, it is imperative to achieve protecti... [more] |
IA2023-11 pp.1-5 |
AI |
2023-09-12 14:35 |
Hokkaido |
|
Proposal of effective location information privacy protection method using measurement equipment error Riho Isawa, Yuichi Sei, Yasuyuki Tahara, Akihiko Ahsuga (UEC) AI2023-15 |
In recent years, systems that publicly share statistical data based on people's location information, such as congestion... [more] |
AI2023-15 pp.77-82 |
SIP |
2023-08-07 12:50 |
Osaka |
Osaka Univ. (Suita) Convention Center (Primary: On-site, Secondary: Online) |
An Extension of Image Encryption for Vision Transformer Considering Privacy Protection Haiwei Lin, Shoko Imaizumi (Chiba Univ.), Kiya Hitoshi (Tokyo Metropolitan Univ) SIP2023-46 |
In this paper, we propose an extended framework of access control for Vision Transformer (ViT).
The previous study acc... [more] |
SIP2023-46 pp.1-6 |
IT |
2023-08-04 13:45 |
Kanagawa |
Shonan Institute of Technology (Primary: On-site, Secondary: Online) |
A Note on Private Coded Computation Method with Tolerance against Erasure of Responses from Server Groups Yusuke Morishita, Atsushi Miki, Koki Kazama, Toshiyasu Matsushima (Waseda Univ.) IT2023-27 |
Coded Computation (CC) is used by a user to perform Distributed Computation using multiple servers to speed up the compu... [more] |
IT2023-27 pp.74-79 |