Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EA, EMM, ASJ-H |
2022-11-21 10:00 |
Online |
Online |
[Poster Presentation]
Personal authentication method using thermal and visible light images of periocular regions Takumi Nakamura (UEC), Hiroshi yoshiura (KTU), Masatsugu Ichino (UEC) EA2022-50 EMM2022-50 |
In recent years, as it has become more common for people to go out wearing masks, there are more and more situations in ... [more] |
EA2022-50 EMM2022-50 pp.52-57 |
EMM |
2020-03-05 12:30 |
Okinawa |
(Cancelled but technical report was issued) |
Biometric authentication based on temperature change of the facial region caused by heartbeat Shutaro Yoshizawa, Hiroshi Yoshiura, Masatsugu Ichino (UEC) EMM2019-102 |
Biometrics has been used in various scenes such as smartphones and airports. Biometrics has advantages and disadvantages... [more] |
EMM2019-102 pp.1-6 |
BioX, CNR |
2020-03-05 14:15 |
Tokyo |
(Cancelled but technical report was issued) |
Applying Deep Metric Learning to Periocular Biometrics Tomoki Nukata, Hiroshi Yoshiura, Masatsugu Ichino (UEC) BioX2019-73 CNR2019-56 |
Periocular biometrics has been studied in recent years due to spread of surveillance cameras and smartphones. Zhao et. a... [more] |
BioX2019-73 CNR2019-56 pp.65-70 |
PRMU, BioX |
2019-03-18 13:00 |
Tokyo |
|
[Invited Talk]
Using Machine Learning To Attack Against Personal Privacy
-- Models and Experiments Using Location Histories and Social Networks -- Hiroshi Yoshiura (UEC) BioX2018-56 PRMU2018-160 |
[more] |
BioX2018-56 PRMU2018-160 p.161 |
EMM |
2014-01-27 16:00 |
Miyagi |
Research Institute of Electrical Communication |
[Invited Talk]
Privacy and Personal Identification in Online Social Network Hiroshi Yoshiura (UEC) EMM2013-92 |
[more] |
EMM2013-92 pp.21-26 |
EMM |
2013-05-24 14:00 |
Kochi |
Kochijyo Hall |
A Recommendation System for Anonymous Fingerprinting of Text Posted on Social Networks HoangQuoc Nguyen-Son (SOKENDAI), Hiroshi Yoshiura (Univ. of Electro-Comm.), Noboru Sonehara, Isao Echizen (NII) EMM2013-6 |
Sensitive information about a user can be disclosed by the user's Online Social Networks (OSNs) friends. This makes it u... [more] |
EMM2013-6 pp.31-36 |
LOIS |
2013-03-08 14:50 |
Okinawa |
|
A Study on Malware Traffic Detection by Using N-gram Probability Density Kenji Kawamoto (Waseda Univ.), Masatsugu Ichino, Yusuke Otsuki (Univ. of Electro-Comm.), Mitsuhiro Hatada (NTT), Hiroshi Yoshiura (Univ. of Electro-Comm.), Jiro Katto (Waseda Univ.) LOIS2012-102 |
The threat of malware is increasing.
Malware detection has thus become important for the safety of the Internet usage.
... [more] |
LOIS2012-102 pp.191-196 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 10:45 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Relational Algebra in Multi-Party Protocol to Enable Secure and Unlimited Databases Masanori Shimura, Tsukasa Endo (UEC), Kunihiko Miyazaki (Hitachi Ltd.), Hiroshi Yoshiura (UEC) |
As personal information comes to be in digital and transferred on networks, its leakage is becoming more and more seriou... [more] |
ISEC2008-42 pp.53-60 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 10:20 |
Hokkaido |
Future University-Hakodate |
Electronic Voting Scheme to Maintain Anonymity in Small Scale Election by Hiding the Number of Votes Tsukasa Endo (UEC), Isao Echizen (NII), Hiroshi Yoshiura (UEC) |
Loss of anonymity, bribery, and coercion are more serious in small-scale voting than in large-scale one. This paper show... [more] |
ISEC2007-21 SITE2007-15 pp.37-44 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 15:05 |
Hokkaido |
Future University-Hakodate |
Human communication security to adapt to ever-expanding media environment Hiroshi Yoshiura, Haruno Kataoka, Shinta Nakayama (UEC) |
As network-based media such as Web systems are improved, various new forms of human communication become possible but, a... [more] |
ISEC2007-34 SITE2007-28 pp.125-131 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 16:35 |
Hokkaido |
Future University-Hakodate |
Phishing detection based on features of mimic content. Shinta Nakayama, Hiroshi Yoshiura (UEC) |
Phishing, the fraud to get personal information illegally through fake Web sites, is prevailing. This paper proposes a n... [more] |
ISEC2007-72 pp.179-184 |
SITE |
2006-11-02 15:45 |
Tokyo |
|
Analysis method of multiple risks by using adversary model
-- For the trial application to the illegal circulation problem of music CD -- Yuji Okada, Hiroshi Yoshiura (UEC) |
[more] |
SITE2006-40 pp.19-25 |