Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, SITE, IPSJ-IOT [detail] |
2025-03-04 13:35 |
Kagoshima |
Ama-Home Plaza (Primary: On-site, Secondary: Online) |
Access control to prevent information leakage from patent documents using topic models and reinforcement learning Ritsuki Sone, Kaito Hosono, Tetsuya Morizumi, HIrotsugu Kinoshita (Kanagawa Univ.) SITE2024-106 IA2024-86 |
[more] |
SITE2024-106 IA2024-86 pp.124-129 |
IA, SITE, IPSJ-IOT [detail] |
2025-03-04 14:00 |
Kagoshima |
Ama-Home Plaza (Primary: On-site, Secondary: Online) |
Perceptual Hashing for Audio Information Using Machine Learning Kuo Chenghsun, Kaito Hosono (Kanagawa Univ), Miyata Takamichi (Chiba Institute of Technology), Miyata Sumiko (Science Tokyo), Hirotsugu Kinoshita (Kanagawa Univ) SITE2024-107 IA2024-87 |
[more] |
SITE2024-107 IA2024-87 pp.130-136 |
IN, CCS (Joint) |
2024-07-29 16:00 |
Hokkaido |
Moerenuma Park Glass Pyramid |
A study of image completion using tensor nuclear norm minus Frobenius norm Kaito Hosono (Kanagawa Univ.), Takamichi Miyata (CIT), Hirotsugu Kinoshita (Kanagawa Univ.) CCS2024-35 |
Tensor nuclear norm minus Frobenius norm is one of the regularization functions that indicate the low-rankness of a tens... [more] |
CCS2024-35 pp.40-43 |
CCS |
2024-03-27 16:50 |
Hokkaido |
RUSUTSU RESORT |
JPEG Compression Quality Setting Considering Image Quality and Information Loss for Correlated Steganography Mariiko Aikawa, Sumiko Miyata (SIT), Kaito Hosono, Hirotsugu Kinoshita (KU) CCS2023-50 |
As more and more confidential information, including personal information, is transmitted and received over the Internet... [more] |
CCS2023-50 pp.64-69 |
CCS |
2024-03-27 17:15 |
Hokkaido |
RUSUTSU RESORT |
Dual Watermarking for Ownership Authentication and Tamper Detection Using Chaos Maps Kohei Kubota, Sumiko Miyata (SIT), Kaito Hosono, Hirotsugu Kinoshita (KU) CCS2023-51 |
[more] |
CCS2023-51 pp.70-75 |
IA, SITE, IPSJ-IOT [detail] |
2024-03-13 14:05 |
Okinawa |
Miyakojima City Future Creation Center (Primary: On-site, Secondary: Online) |
Perceptual Hashing Based on CNN Node Responses Yusei Sugawara, Kaito Hosono, Tetsuya Morizumi, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2023-101 IA2023-107 |
As technology advances, unauthorized duplication of images has become a serious issue related to copyright infringement.... [more] |
SITE2023-101 IA2023-107 pp.203-210 |
IA, SITE, IPSJ-IOT [detail] |
2024-03-13 15:30 |
Okinawa |
Miyakojima City Future Creation Center (Primary: On-site, Secondary: Online) |
Access control through topic analysis considering with intents Yuta Kariya, Tetsuya Morizumi, Kaito Hosono, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2023-107 IA2023-113 |
(To be available after the conference date) [more] |
SITE2023-107 IA2023-113 pp.247-254 |
IA, SITE, IPSJ-IOT [detail] |
2024-03-13 15:55 |
Okinawa |
Miyakojima City Future Creation Center (Primary: On-site, Secondary: Online) |
An Evaluation Experiment of Document Retrieval Methods based on Entropy Co-occurrence on Topics in Folk Cultural Materials Junya Komatsu, Tetsuya Morizumi, Kaito Hosono, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2023-108 IA2023-114 |
In our general linguistic activities, there are "unspeakable things" such as common knowledge or things implied. It is n... [more] |
SITE2023-108 IA2023-114 pp.255-262 |
IA, SITE, IPSJ-IOT [detail] |
2023-03-15 15:10 |
Gunma |
Maebashi Institute of Technology (Primary: On-site, Secondary: Online) |
Search by topic model to support research of ethnographic materials Junya Komatsu, Tetsuya Morizumi, Hirotsugu Kinoshita (Kanagawa Univ) SITE2022-56 IA2022-79 |
In a text retrieval system, there are three types of retrieval methods: word retrieval, textual relationship retrieval, ... [more] |
SITE2022-56 IA2022-79 pp.15-20 |
IA, SITE, IPSJ-IOT [detail] |
2023-03-16 15:35 |
Gunma |
Maebashi Institute of Technology (Primary: On-site, Secondary: Online) |
Model compression by pruning of CNN based on perceptual hashes Shota Mishina, Tetsuya Morizumi, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2022-59 IA2022-82 |
Message digests that identify images are indispensable for secure and convenient copyright management of digital content... [more] |
SITE2022-59 IA2022-82 pp.28-34 |
SITE |
2019-12-06 13:00 |
Kanagawa |
|
Analysis of an intermediate layer for perceptual hashing using a convolutional neural network Ken Nakatani, Meng Zhaoxiong, Tetsuya Morizumi, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2019-80 |
This research aims to improve the digital watermark technology that embeds evidence information by using content redunda... [more] |
SITE2019-80 pp.1-6 |
SITE |
2019-12-06 14:15 |
Kanagawa |
|
A Scheme of Digital Copyright Management System Based on Blockchain and Digital Watermarking
-- Research on Improvement Method of Perceptual Hashing based on Machine Learning -- Zhaoxiong Meng, Tetsuya Morizumi (KU), Sumiko Miyata (SIT), Hirotsugu Kinoshita (KU) SITE2019-83 |
In this study, in order to search for a new digital content copyright management method that achieves both safety and co... [more] |
SITE2019-83 pp.21-27 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 09:30 |
Kochi |
Kochi University of Technology |
Generation of Family Resemblance Inference Rules by Boid Annotation and Labeled-LDA
-- A Machine Learning Approach to Integrate Inference Attack Analysis and Covert Channel Attack Analysis -- Kosuke Kurebayashi, Tetsuya Morizumi, Hirotsugu Kinoshita (KU) ISEC2019-42 SITE2019-36 BioX2019-34 HWS2019-37 ICSS2019-40 EMM2019-45 |
In this paper we propose a method for machine learning similar chains of words (word chains) similar to "rules for infer... [more] |
ISEC2019-42 SITE2019-36 BioX2019-34 HWS2019-37 ICSS2019-40 EMM2019-45 pp.243-249 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 12:10 |
Hokkaido |
Sapporo Convention Center |
About Access Control with the Deconstruction Device in Probability Measures on Metric Spaces Tetsuya Morizumi, Hirotsugu Kinoshita (KU) ISEC2018-36 SITE2018-28 HWS2018-33 ICSS2018-39 EMM2018-35 |
The word of Socrates: "Not life, but good life, is to be chiefly valued" is the dichotomy between the two, if we see tha... [more] |
ISEC2018-36 SITE2018-28 HWS2018-33 ICSS2018-39 EMM2018-35 pp.281-287 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 15:45 |
Tokyo |
|
Proposal of the concept of connecting HIMOJI-ontologies by mutual information of texts, and its case study
-- In the case to see latent texts as random variables -- Xianbo Song, Tetsuya Morizumi, Hirotsugu Kinoshita (Kanagawa Univ.) ISEC2017-26 SITE2017-18 ICSS2017-25 EMM2017-29 |
This paper is linked to the theme of database creation of "HIMOJI data" which has been studied at Kanagawa University. H... [more] |
ISEC2017-26 SITE2017-18 ICSS2017-25 EMM2017-29 pp.135-140 |
IA, IPSJ-IOT, SITE [detail] |
2015-03-06 13:30 |
Fukushima |
|
Development of the folk implements database using the relational model and thesaurus for the digital archive Toshihide Hanyu, Sumiko Miyata (Kanagawa Univ.), Tetsuya Morizumi (Toyo NetSI), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2014-77 IA2014-109 |
In recent years, digitization of museum material information has been promoted. Some museums provide digital material in... [more] |
SITE2014-77 IA2014-109 pp.215-220 |
IA, IPSJ-IOT, SITE [detail] |
2015-03-06 13:55 |
Fukushima |
|
A search scheme considering the search process using ACO and search history Shun Koizumi (Kanagawa Univ.), Sumiko Miyata (Kanagawa Univ), Tetsuya Morizumi (ToyoNSI), Hirotsugu Kinoshita (Kanagawa Univ) SITE2014-78 IA2014-110 |
Recent years, the spread of Internet reveals that we can search information easily.
However, it is difficult to find ac... [more] |
SITE2014-78 IA2014-110 pp.221-226 |
IA, IPSJ-IOT, SITE [detail] |
2015-03-06 14:45 |
Fukushima |
|
Management of information resources using the Swarm Intelligence expressing the attraction and repulsion by similarity Katsunori Ishida, Shun Koizumi, Sumiko Miyata (Kanagawa Univ.), Tetsuya Morizumi (TNSi), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2014-80 IA2014-112 |
[more] |
SITE2014-80 IA2014-112 pp.233-238 |