Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-13 14:15 |
Osaka |
Osaka Univ. (Suita Campus) |
Data processing methods for high-performance Privacy-Preserving Machine Learning Tatsuhiro Yamatsuki (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) IT2023-94 ISEC2023-93 WBS2023-82 RCC2023-76 |
Currently, attempts are being made in various fields to solve problems by utilizing big data. However, privacy protectio... [more] |
IT2023-94 ISEC2023-93 WBS2023-82 RCC2023-76 pp.118-126 |
CNR, BioX |
2024-02-29 15:00 |
Tokyo |
NHK Science & Technology Research Laboratories (Primary: On-site, Secondary: Online) |
Implementation and Evaluation of Privacy-Preserving Image Transformation Methods for Person Re-identification Junpei Yamaguchi, Hajime Nada, Yumo Ouchi, Narishige Abe (Fujitsu) BioX2023-73 CNR2023-40 |
Advances in machine learning have enabled high-accuracy tracking of individuals using surveillance cameras, making the d... [more] |
BioX2023-73 CNR2023-40 pp.18-23 |
SIP, SP, EA, IPSJ-SLP [detail] |
2024-02-29 15:10 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Byzantine attack detection via similarity of local updates in federated learning Kenta Ohno, Masao Yamagishi (Hosei Univ.) EA2023-86 SIP2023-133 SP2023-68 |
We propose a method to detect Byzantine attacks in federated learning, as well as a method for identifying clients repea... [more] |
EA2023-86 SIP2023-133 SP2023-68 pp.150-155 |
MSS, CAS, IPSJ-AL [detail] |
2023-11-16 13:20 |
Okinawa |
|
On Speed Response and Disclosed Subspace of Privacy-Preserving Vehicle Platoon Speed Control Takeshi Hyodo, Kenji Sawada (UEC) CAS2023-62 MSS2023-32 |
There is a growing demand for cyber security measures in vehicle platoon control. In order to prevent malicious vehicles... [more] |
CAS2023-62 MSS2023-32 pp.13-18 |
SS, DC |
2023-10-12 10:25 |
Nagano |
(Primary: On-site, Secondary: Online) |
Robustness trends of DP-SGD, a machine learning with differential privacy Takahiro Kanki, Shinpei Ogata, Kozo Okano (Sinshu Univ), Shin Nakajima (NII) SS2023-28 DC2023-34 |
Although machine learning has been successful in various fields, there is a problem that an adversary can extract traini... [more] |
SS2023-28 DC2023-34 pp.38-43 |
SIP |
2023-08-07 12:50 |
Osaka |
Osaka Univ. (Suita) Convention Center (Primary: On-site, Secondary: Online) |
An Extension of Image Encryption for Vision Transformer Considering Privacy Protection Haiwei Lin, Shoko Imaizumi (Chiba Univ.), Kiya Hitoshi (Tokyo Metropolitan Univ) SIP2023-46 |
In this paper, we propose an extended framework of access control for Vision Transformer (ViT).
The previous study acc... [more] |
SIP2023-46 pp.1-6 |
RCC, ISEC, IT, WBS |
2023-03-14 16:50 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Proposal for a privacy-preserving frequency estimation method Naoki Kawahara, Atsuko Miyaji (Osaka Univ.), Tomoaki Mimoto (ATR) IT2022-97 ISEC2022-76 WBS2022-94 RCC2022-94 |
Differential privacy is one of the methods used to protect personal data by adding noise to personal data and its analys... [more] |
IT2022-97 ISEC2022-76 WBS2022-94 RCC2022-94 pp.187-194 |
EMM |
2023-03-02 16:00 |
Nagasaki |
Fukue culture hall (Primary: On-site, Secondary: Online) |
[Invited Talk]
Image transformation with random numbers for reliable AI Hitoshi Kiya (TMU) EMM2022-87 |
The combined use of deep neural networks (DNNs) and images transformed with random sequences has given a new insight for... [more] |
EMM2022-87 pp.107-109 |
AI |
2022-12-21 17:10 |
Fukuoka |
|
An Algorithm Combined Grouping and Adding Dummy to Satisfy l-diversity Keiichiro Oishi, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga (UEC) AI2022-47 |
Universities and companies access personal information databases for a wide range of purposes, and privacy consideration... [more] |
AI2022-47 pp.80-86 |
EA, EMM, ASJ-H |
2022-11-21 10:00 |
Online |
Online |
[Poster Presentation]
ConvMixer model transformation using random orthogonal matrices for privacy protection of test images. Rei Aso, Tatsuya Chuman, Hitoshi Kiya (TMU) EA2022-49 EMM2022-49 |
In this paper, a privacy preserving image classification method is proposed under the use of ConvMixer models. To protec... [more] |
EA2022-49 EMM2022-49 pp.46-51 |
IA, CQ, MIKA (Joint) |
2022-09-15 13:50 |
Hokkaido |
Hokkaido Citizens Actives Center (Primary: On-site, Secondary: Online) |
Secure outsourcing data integrity auditing for Internet of Things in cloud-edge environment Yangfei Lin, Celimuge Wu, Tsutomu Yoshinaga (UEC) CQ2022-30 |
The number of IoT devices has expanded greatly last few years. Given the feature of limited computing and storage resour... [more] |
CQ2022-30 pp.42-47 |
NS, SR, RCS, SeMI, RCC (Joint) |
2022-07-14 14:00 |
Ishikawa |
The Kanazawa Theatre + Online (Primary: On-site, Secondary: Online) |
A Study of Dynamic Privacy Control Method in LDP for Preserving Temporal/Spatial Intrinsic Information Value of Trajectory Data Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-47 |
Spatiotemporal data, including people's movement trajectories and transit points, is highly valuable for various applica... [more] |
NS2022-47 pp.106-111 |
EMM |
2022-01-27 15:00 |
Online |
Online |
Speech Watermarking Approach for Securing Speaker Anonymization using McAdams Coefficients Candy Olivia Mawalim, Masashi Unoki (JAIST) EMM2021-88 |
Speaker anonymization aims to suppress speaker individuality to protect privacy in speech while preserving the other asp... [more] |
EMM2021-88 pp.25-30 |
SIS, ITE-BCT |
2020-10-01 13:00 |
Online |
Online |
Evaluation of linear dimensionality reduction methods considering visual information protection for privacy-preserving machine learning Masaki Kitayama, Nobutaka Ono, Hitoshi Kiya (Tokyo Metro. Univ.) SIS2020-13 |
In this paper, linear dimensionality reduction methods are evaluated in terms of difficulty in estimating the visual inf... [more] |
SIS2020-13 pp.17-22 |
ISEC, IT, WBS |
2020-03-10 13:50 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
A Statistical Decision-Theoretic Approach for Measuring Privacy Risk in Information Disclosure Problem Alisa Miyashita, Akira Kamatsuka (Waseda Univ.), Takahiro Yoshida (Yokohama College of Commerce), Toshiyasu Matsushima (Waseda Univ.) IT2019-104 ISEC2019-100 WBS2019-53 |
In this paper, we deal with the problem of database statistics publishing with privacy and utility guarantees. While var... [more] |
IT2019-104 ISEC2019-100 WBS2019-53 pp.95-100 |
NS, IN (Joint) |
2020-03-06 09:50 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
Privacy-preserving Recommendation based on Provider Coordination Daiki Himi, Taiju Mikoshi, Katsunori Oyama, Toshihiro Nishizono (Nihon Univ.) NS2019-215 |
This paper proposes a privacy preserving information recommendation method based on cooperation among providers. IDs of ... [more] |
NS2019-215 pp.205-210 |
ITE-HI, IE, ITS, ITE-MMS, ITE-ME, ITE-AIT [detail] |
2020-02-27 14:00 |
Hokkaido |
Hokkaido Univ. (Cancelled but technical report was issued) |
An Image Transformation Network for Privacy-Preserving Deep Neural Networks Hiroki Ito, Yuma Kinoshita, Hitoshi Kiya (Tokyo Metro. Univ.) ITS2019-37 IE2019-75 |
We propose an image transformation network to generate visually-protected images for privacy-preserving deep neural netw... [more] |
ITS2019-37 IE2019-75 pp.195-200 |
SIS |
2019-12-12 14:35 |
Okayama |
Okayama University of Science |
A Dimensionality Reduction Method with Random Sampling for Privacy-Preserving Machine Learning Ayana Kawamura, Kenta Iida, Hitoshi Kiya (Tokyo Metro. Univ.) SIS2019-26 |
In this paper, we propose a dimensionality reduction method with random sampling for privacy-preserving machine learning... [more] |
SIS2019-26 pp.17-21 |
ISEC, SITE, LOIS |
2019-11-02 15:50 |
Osaka |
Osaka Univ. |
A Note on Encryption-based Recommender Systems Seiya Jumonji, Kazuya Sakai (TMU) ISEC2019-85 SITE2019-79 LOIS2019-44 |
Collaborative filtering recommends unknown contents to a user based on the past behavior or review of the user and is us... [more] |
ISEC2019-85 SITE2019-79 LOIS2019-44 pp.149-152 |
EMM, IT |
2019-05-23 14:00 |
Hokkaido |
Asahikawa International Conference Hall |
Generation of privacy-preserving images holding positional information for HOG feature extraction Masaki Kitayama, Hitoshi Kiya (Tokyo Metro. Univ.) IT2019-1 EMM2019-1 |
In this paper, we propose a generation method of images which have no visual information but hold the gradient direction... [more] |
IT2019-1 EMM2019-1 pp.1-6 |