IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 28  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2024-03-21
14:55
Okinawa OIST
(Primary: On-site, Secondary: Online)
An Examination of Privacy-Aware Malicious Activity Detection Methods Using NII-SOCS Benchmark Data
Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2023-81
Detection of malicious communications from communication logs may pose a risk of privacy infringement as it requires mon... [more] ICSS2023-81
pp.87-92
IA 2024-01-25
16:40
Tokyo Kwansei Gakuin Univiversity, Marunouchi Campus
(Primary: On-site, Secondary: Online)
[Poster Presentation] Strengthening Cybersecurity with Data Analytics -- A Web Tool for Secure Exploration of CVE Data --
Chidchanok Choksuchat, Sorawit Khamnaewnak, Chanin Maiprom, Suwimon Bureekarn, Touchai Angchuan, Sinchai Kamonphiwong, Thossaporn Kamolphiwong (PSU) IA2023-68
In the realm of Higher Education, the sophistication of cyberattacks necessitates a departure from traditional security ... [more] IA2023-68
pp.48-51
MI, MICT 2023-11-14
13:20
Fukuoka   Medical image diagnosis support system with image anonymization based on deep learning techniques
Katsuto Iwai, Ryuunosuke Kounosu (Toho Univ./AIST), Hirokazu Nosato (AIST), Yuu Nakajima (Toho Univ.) MICT2023-30 MI2023-23
When medical imaging AI models are hosted on cloud service there is a risk of sensitive medical images being leaked when... [more] MICT2023-30 MI2023-23
pp.21-24
CPSY, DC, IPSJ-ARC [detail] 2023-06-05
16:00
Ehime Nigitatsu-Kaikan
(Primary: On-site, Secondary: Online)
CPSY2023-5 DC2023-5 This paper describes the design of computer systems necessary for a smart city, focusing on the processing of data and c... [more] CPSY2023-5 DC2023-5
p.19
NLP, MSS 2023-03-17
10:40
Nagasaki
(Primary: On-site, Secondary: Online)
Machine Learning-Based Risk Evaluation of Reconstruction Attack on Query System for Handling Privacy Data
Mohd Anuaruddin Bin Ahmadon (山口大) MSS2022-96 NLP2022-141
In this paper, we proposed a method to evaluate the strength of a data privacy protection mechanism by separating the me... [more] MSS2022-96 NLP2022-141
pp.160-163
RCC, ISEC, IT, WBS 2023-03-14
17:40
Yamaguchi
(Primary: On-site, Secondary: Online)
Diversification of Personal Records using GAN
Chengxi Jiang, Tiancheng Wang, Hikaru Morita (Kanagawa Univ.) IT2022-99 ISEC2022-78 WBS2022-96 RCC2022-96
In this paper, we deal with data anonymization as a privacy protection technology.Even in an anonymized database, it is ... [more] IT2022-99 ISEC2022-78 WBS2022-96 RCC2022-96
pp.203-208
ICSS, IPSJ-SPT 2023-03-14
10:50
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Discussion about Privacy-aware Anonymization of Traffic Logs for Malicious Activity Detection
Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2022-74
The detection of malicious communications from traffic logs has an aspect of invading the privacy because of monitoring ... [more] ICSS2022-74
pp.157-162
IPSJ-SLDM, RECONF, VLD [detail] 2023-01-23
13:30
Kanagawa Raiosha, Hiyoshi Campus, Keio University
(Primary: On-site, Secondary: Online)
[Invited Talk] Can we say "No FPGA, No Smart City"? -- Let's declare if we do a smart city, we need FPGAs. --
Hiroaki Nishi (Keio Univ.) VLD2022-60 RECONF2022-83
From the perspective of a chair of standardization of technologies related to Smart City information infrastructure, we ... [more] VLD2022-60 RECONF2022-83
p.24
EMM 2022-01-27
15:00
Online Online Speech Watermarking Approach for Securing Speaker Anonymization using McAdams Coefficients
Candy Olivia Mawalim, Masashi Unoki (JAIST) EMM2021-88
Speaker anonymization aims to suppress speaker individuality to protect privacy in speech while preserving the other asp... [more] EMM2021-88
pp.25-30
ISEC 2019-05-17
11:45
Tokyo Kikai-Shinko-Kaikan Bldg. Examination of quantitative evaluation of attack method to restore the anonymized data
Takaya Yamazoe, Kazumasa Omote (Tsukuba Univ.) ISEC2019-4
With the increasing scale of data, integrated analysis of data distributed to multiple institutions is required. On the ... [more] ISEC2019-4
pp.7-13
DE, IPSJ-DBS 2018-12-22
13:45
Tokyo National Institute of Informatics A Study on Detecting Anonymized Personal Identifiers including Multiple Individuals in Japanese Health Insurance Claims Data
Jumpei Sato, Hiroyuki Yamada, Kazuo Goda, Kitsuregawa Masaru (Tokyo Univ.), Naohiro Mitsutake (IHEP) DE2018-27
Anonymization of medical data helps protect patient identities. However, with conventional anonymized personal identifie... [more] DE2018-27
pp.55-60
EMM 2018-03-05
17:05
Kagoshima Naze Community Center (Amami-Shi, Kagoshima) [Invited Talk] On Information Loss by Micro-aggregation
Hiroko Akiyama (NIT, Nagano College), Masaaki Wada (Osaka Univ.) EMM2017-89
For the purpose of measuring information loss caused by micro-aggregation, we define a new information loss index ILD b... [more] EMM2017-89
pp.61-66
ICSS, IPSJ-SPT 2017-03-13
14:25
Nagasaki University of Nagasaki Feature Extraction for Identifying High Yielding Investment Programs Related Transactions in Bitcoin
Kentaroh Toyoda, Tomoaki Ohtsuki (Keio Univ.), P. Takis Mathiopoulos (UoA) ICSS2016-49
As recent research has revealed, Bitcoin is used as fraudulent activities such as HYIP (High Yield Investment Programs).... [more] ICSS2016-49
pp.31-36
ICD, CPSY 2016-12-15
10:55
Tokyo Tokyo Institute of Technology Proposal of anonymization methods for secondary use considering data properties
Yuichi Nakamura, Takahiro Hosoe, Hiroaki Nishi (Keio Univ.) ICD2016-53 CPSY2016-59
Applications for secondary use of data, which is a usage that is not same as an original purpose to obtain the data, hav... [more] ICD2016-53 CPSY2016-59
pp.13-18
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC
(Joint) [detail]
2016-03-25
13:05
Nagasaki Fukue Bunka Hall/Rodou Fukushi Center Combined Watermarking Method for Anonymized Data
Yuichi Nakamura, Hiroaki Nishi (Keio Univ.) CPSY2015-152 DC2015-106
An anonymization infrastructure for secondary use of data has been proposed. The infrastructure was proposed to publish ... [more] CPSY2015-152 DC2015-106
pp.235-240
IT, ISEC, WBS 2016-03-11
11:40
Tokyo The University of Electro-Communications k-Anonymization Techinque for Encrypted Data
Masayuki Yoshino, Hisayoshi Sato, Ken Naganuma, Yasuko Fukuzawa (Hitachi) IT2015-135 ISEC2015-94 WBS2015-118
This paper proposes k-anonymizaiton technique for encrypted data stored on cloud environment. The proposed method utiliz... [more] IT2015-135 ISEC2015-94 WBS2015-118
pp.211-217
EMM 2016-03-02
14:30
Kagoshima Yakushima Environ. and Cultural Vill. Center [Poster Presentation] Data Anonymization based on TF-IDF Method Using Hierarchies Built from Attributes of Recommended Targets
Kensuke Arai (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Noboru Babaguchi (Osaka Univ.) EMM2015-81
This paper proposes a personal data anonymization method using hierarchies considering information recommendation for us... [more] EMM2015-81
pp.31-36
EMM, IT 2015-05-21
15:45
Kyoto Kyoto International Community House Data Anonymization for Information Recommendation Based on TF-IDF Method
Kensuke Arai (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Noboru Babaguchi (Osaka Univ.) IT2015-10 EMM2015-10
This paper proposes a data anonymization method considering information recommendation for users.
Attaching importance ... [more]
IT2015-10 EMM2015-10
pp.51-56
MoNA, ASN, IPSJ-MBL, IPSJ-UBI
(Joint) [detail]
2015-03-02
14:35
Tokyo Shibaura Institute of Technology(Toyosu Campus) A Study on Data Processing among Users' Mobiles for Application of Privacy Data
Takafumi Harada, Keizo Murakami, Hironobu Okuyama, Takahiro Yamamoto (NTT) MoNA2014-96
Recently, smartphones have many kinds of sensors. Therefore data from these probes is able to be used for many kinds of ... [more] MoNA2014-96
pp.129-133
CS, NS, IN
(Joint)
2014-09-12
14:50
Miyagi Tohoku Univ. Research Institute of Electrical Communication 2gokan The proposal of the privacy protection technique in the network using positional addresses
Taichi Aoki (IISEC) NS2014-101
Our study is a network, that is using location information as an address. One of the theme of a position address
networ... [more]
NS2014-101
pp.129-134
 Results 1 - 20 of 28  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan