IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 85  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2024-03-13
14:15
Osaka Osaka Univ. (Suita Campus) Data processing methods for high-performance Privacy-Preserving Machine Learning
Tatsuhiro Yamatsuki (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) IT2023-94 ISEC2023-93 WBS2023-82 RCC2023-76
Currently, attempts are being made in various fields to solve problems by utilizing big data. However, privacy protectio... [more] IT2023-94 ISEC2023-93 WBS2023-82 RCC2023-76
pp.118-126
CNR, BioX 2024-02-29
15:00
Tokyo NHK Science & Technology Research Laboratories
(Primary: On-site, Secondary: Online)
Implementation and Evaluation of Privacy-Preserving Image Transformation Methods for Person Re-identification
Junpei Yamaguchi, Hajime Nada, Yumo Ouchi, Narishige Abe (Fujitsu) BioX2023-73 CNR2023-40
Advances in machine learning have enabled high-accuracy tracking of individuals using surveillance cameras, making the d... [more] BioX2023-73 CNR2023-40
pp.18-23
SIP, SP, EA, IPSJ-SLP [detail] 2024-02-29
15:10
Okinawa
(Primary: On-site, Secondary: Online)
Byzantine attack detection via similarity of local updates in federated learning
Kenta Ohno, Masao Yamagishi (Hosei Univ.) EA2023-86 SIP2023-133 SP2023-68
We propose a method to detect Byzantine attacks in federated learning, as well as a method for identifying clients repea... [more] EA2023-86 SIP2023-133 SP2023-68
pp.150-155
MSS, CAS, IPSJ-AL [detail] 2023-11-16
13:20
Okinawa   On Speed Response and Disclosed Subspace of Privacy-Preserving Vehicle Platoon Speed Control
Takeshi Hyodo, Kenji Sawada (UEC) CAS2023-62 MSS2023-32
There is a growing demand for cyber security measures in vehicle platoon control. In order to prevent malicious vehicles... [more] CAS2023-62 MSS2023-32
pp.13-18
SS, DC 2023-10-12
10:25
Nagano
(Primary: On-site, Secondary: Online)
Robustness trends of DP-SGD, a machine learning with differential privacy
Takahiro Kanki, Shinpei Ogata, Kozo Okano (Sinshu Univ), Shin Nakajima (NII) SS2023-28 DC2023-34
Although machine learning has been successful in various fields, there is a problem that an adversary can extract traini... [more] SS2023-28 DC2023-34
pp.38-43
SIP 2023-08-07
12:50
Osaka Osaka Univ. (Suita) Convention Center
(Primary: On-site, Secondary: Online)
An Extension of Image Encryption for Vision Transformer Considering Privacy Protection
Haiwei Lin, Shoko Imaizumi (Chiba Univ.), Kiya Hitoshi (Tokyo Metropolitan Univ) SIP2023-46
In this paper, we propose an extended framework of access control for Vision Transformer (ViT).
The previous study acc... [more]
SIP2023-46
pp.1-6
RCC, ISEC, IT, WBS 2023-03-14
16:50
Yamaguchi
(Primary: On-site, Secondary: Online)
Proposal for a privacy-preserving frequency estimation method
Naoki Kawahara, Atsuko Miyaji (Osaka Univ.), Tomoaki Mimoto (ATR) IT2022-97 ISEC2022-76 WBS2022-94 RCC2022-94
Differential privacy is one of the methods used to protect personal data by adding noise to personal data and its analys... [more] IT2022-97 ISEC2022-76 WBS2022-94 RCC2022-94
pp.187-194
EMM 2023-03-02
16:00
Nagasaki Fukue culture hall
(Primary: On-site, Secondary: Online)
[Invited Talk] Image transformation with random numbers for reliable AI
Hitoshi Kiya (TMU) EMM2022-87
The combined use of deep neural networks (DNNs) and images transformed with random sequences has given a new insight for... [more] EMM2022-87
pp.107-109
AI 2022-12-21
17:10
Fukuoka   An Algorithm Combined Grouping and Adding Dummy to Satisfy l-diversity
Keiichiro Oishi, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga (UEC) AI2022-47
Universities and companies access personal information databases for a wide range of purposes, and privacy consideration... [more] AI2022-47
pp.80-86
EA, EMM, ASJ-H 2022-11-21
10:00
Online Online [Poster Presentation] ConvMixer model transformation using random orthogonal matrices for privacy protection of test images.
Rei Aso, Tatsuya Chuman, Hitoshi Kiya (TMU) EA2022-49 EMM2022-49
In this paper, a privacy preserving image classification method is proposed under the use of ConvMixer models. To protec... [more] EA2022-49 EMM2022-49
pp.46-51
IA, CQ, MIKA
(Joint)
2022-09-15
13:50
Hokkaido Hokkaido Citizens Actives Center
(Primary: On-site, Secondary: Online)
Secure outsourcing data integrity auditing for Internet of Things in cloud-edge environment
Yangfei Lin, Celimuge Wu, Tsutomu Yoshinaga (UEC) CQ2022-30
The number of IoT devices has expanded greatly last few years. Given the feature of limited computing and storage resour... [more] CQ2022-30
pp.42-47
NS, SR, RCS, SeMI, RCC
(Joint)
2022-07-14
14:00
Ishikawa The Kanazawa Theatre + Online
(Primary: On-site, Secondary: Online)
A Study of Dynamic Privacy Control Method in LDP for Preserving Temporal/Spatial Intrinsic Information Value of Trajectory Data
Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-47
Spatiotemporal data, including people's movement trajectories and transit points, is highly valuable for various applica... [more] NS2022-47
pp.106-111
EMM 2022-01-27
15:00
Online Online Speech Watermarking Approach for Securing Speaker Anonymization using McAdams Coefficients
Candy Olivia Mawalim, Masashi Unoki (JAIST) EMM2021-88
Speaker anonymization aims to suppress speaker individuality to protect privacy in speech while preserving the other asp... [more] EMM2021-88
pp.25-30
SIS, ITE-BCT 2020-10-01
13:00
Online Online Evaluation of linear dimensionality reduction methods considering visual information protection for privacy-preserving machine learning
Masaki Kitayama, Nobutaka Ono, Hitoshi Kiya (Tokyo Metro. Univ.) SIS2020-13
In this paper, linear dimensionality reduction methods are evaluated in terms of difficulty in estimating the visual inf... [more] SIS2020-13
pp.17-22
ISEC, IT, WBS 2020-03-10
13:50
Hyogo University of Hyogo
(Cancelled but technical report was issued)
A Statistical Decision-Theoretic Approach for Measuring Privacy Risk in Information Disclosure Problem
Alisa Miyashita, Akira Kamatsuka (Waseda Univ.), Takahiro Yoshida (Yokohama College of Commerce), Toshiyasu Matsushima (Waseda Univ.) IT2019-104 ISEC2019-100 WBS2019-53
In this paper, we deal with the problem of database statistics publishing with privacy and utility guarantees. While var... [more] IT2019-104 ISEC2019-100 WBS2019-53
pp.95-100
NS, IN
(Joint)
2020-03-06
09:50
Okinawa Royal Hotel Okinawa Zanpa-Misaki
(Cancelled but technical report was issued)
Privacy-preserving Recommendation based on Provider Coordination
Daiki Himi, Taiju Mikoshi, Katsunori Oyama, Toshihiro Nishizono (Nihon Univ.) NS2019-215
This paper proposes a privacy preserving information recommendation method based on cooperation among providers. IDs of ... [more] NS2019-215
pp.205-210
ITE-HI, IE, ITS, ITE-MMS, ITE-ME, ITE-AIT [detail] 2020-02-27
14:00
Hokkaido Hokkaido Univ.
(Cancelled but technical report was issued)
An Image Transformation Network for Privacy-Preserving Deep Neural Networks
Hiroki Ito, Yuma Kinoshita, Hitoshi Kiya (Tokyo Metro. Univ.) ITS2019-37 IE2019-75
We propose an image transformation network to generate visually-protected images for privacy-preserving deep neural netw... [more] ITS2019-37 IE2019-75
pp.195-200
SIS 2019-12-12
14:35
Okayama Okayama University of Science A Dimensionality Reduction Method with Random Sampling for Privacy-Preserving Machine Learning
Ayana Kawamura, Kenta Iida, Hitoshi Kiya (Tokyo Metro. Univ.) SIS2019-26
In this paper, we propose a dimensionality reduction method with random sampling for privacy-preserving machine learning... [more] SIS2019-26
pp.17-21
ISEC, SITE, LOIS 2019-11-02
15:50
Osaka Osaka Univ. A Note on Encryption-based Recommender Systems
Seiya Jumonji, Kazuya Sakai (TMU) ISEC2019-85 SITE2019-79 LOIS2019-44
Collaborative filtering recommends unknown contents to a user based on the past behavior or review of the user and is us... [more] ISEC2019-85 SITE2019-79 LOIS2019-44
pp.149-152
EMM, IT 2019-05-23
14:00
Hokkaido Asahikawa International Conference Hall Generation of privacy-preserving images holding positional information for HOG feature extraction
Masaki Kitayama, Hitoshi Kiya (Tokyo Metro. Univ.) IT2019-1 EMM2019-1
In this paper, we propose a generation method of images which have no visual information but hold the gradient direction... [more] IT2019-1 EMM2019-1
pp.1-6
 Results 1 - 20 of 85  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan