Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-21 14:55 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
An Examination of Privacy-Aware Malicious Activity Detection Methods Using NII-SOCS Benchmark Data Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2023-81 |
Detection of malicious communications from communication logs may pose a risk of privacy infringement as it requires mon... [more] |
ICSS2023-81 pp.87-92 |
IA |
2024-01-25 16:40 |
Tokyo |
Kwansei Gakuin Univiversity, Marunouchi Campus (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Strengthening Cybersecurity with Data Analytics
-- A Web Tool for Secure Exploration of CVE Data -- Chidchanok Choksuchat, Sorawit Khamnaewnak, Chanin Maiprom, Suwimon Bureekarn, Touchai Angchuan, Sinchai Kamonphiwong, Thossaporn Kamolphiwong (PSU) IA2023-68 |
In the realm of Higher Education, the sophistication of cyberattacks necessitates a departure from traditional security ... [more] |
IA2023-68 pp.48-51 |
MI, MICT |
2023-11-14 13:20 |
Fukuoka |
|
Medical image diagnosis support system with image anonymization based on deep learning techniques Katsuto Iwai, Ryuunosuke Kounosu (Toho Univ./AIST), Hirokazu Nosato (AIST), Yuu Nakajima (Toho Univ.) MICT2023-30 MI2023-23 |
When medical imaging AI models are hosted on cloud service there is a risk of sensitive medical images being leaked when... [more] |
MICT2023-30 MI2023-23 pp.21-24 |
CPSY, DC, IPSJ-ARC [detail] |
2023-06-05 16:00 |
Ehime |
Nigitatsu-Kaikan (Primary: On-site, Secondary: Online) |
CPSY2023-5 DC2023-5 |
This paper describes the design of computer systems necessary for a smart city, focusing on the processing of data and c... [more] |
CPSY2023-5 DC2023-5 p.19 |
NLP, MSS |
2023-03-17 10:40 |
Nagasaki |
(Primary: On-site, Secondary: Online) |
Machine Learning-Based Risk Evaluation of Reconstruction Attack on Query System for Handling Privacy Data Mohd Anuaruddin Bin Ahmadon (山口大) MSS2022-96 NLP2022-141 |
In this paper, we proposed a method to evaluate the strength of a data privacy protection mechanism by separating the me... [more] |
MSS2022-96 NLP2022-141 pp.160-163 |
RCC, ISEC, IT, WBS |
2023-03-14 17:40 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Diversification of Personal Records using GAN Chengxi Jiang, Tiancheng Wang, Hikaru Morita (Kanagawa Univ.) IT2022-99 ISEC2022-78 WBS2022-96 RCC2022-96 |
In this paper, we deal with data anonymization as a privacy protection technology.Even in an anonymized database, it is ... [more] |
IT2022-99 ISEC2022-78 WBS2022-96 RCC2022-96 pp.203-208 |
ICSS, IPSJ-SPT |
2023-03-14 10:50 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Discussion about Privacy-aware Anonymization of Traffic Logs for Malicious Activity Detection Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2022-74 |
The detection of malicious communications from traffic logs has an aspect of invading the privacy because of monitoring ... [more] |
ICSS2022-74 pp.157-162 |
IPSJ-SLDM, RECONF, VLD [detail] |
2023-01-23 13:30 |
Kanagawa |
Raiosha, Hiyoshi Campus, Keio University (Primary: On-site, Secondary: Online) |
[Invited Talk]
Can we say "No FPGA, No Smart City"?
-- Let's declare if we do a smart city, we need FPGAs. -- Hiroaki Nishi (Keio Univ.) VLD2022-60 RECONF2022-83 |
From the perspective of a chair of standardization of technologies related to Smart City information infrastructure, we ... [more] |
VLD2022-60 RECONF2022-83 p.24 |
EMM |
2022-01-27 15:00 |
Online |
Online |
Speech Watermarking Approach for Securing Speaker Anonymization using McAdams Coefficients Candy Olivia Mawalim, Masashi Unoki (JAIST) EMM2021-88 |
Speaker anonymization aims to suppress speaker individuality to protect privacy in speech while preserving the other asp... [more] |
EMM2021-88 pp.25-30 |
ISEC |
2019-05-17 11:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Examination of quantitative evaluation of attack method to restore the anonymized data Takaya Yamazoe, Kazumasa Omote (Tsukuba Univ.) ISEC2019-4 |
With the increasing scale of data, integrated analysis of data distributed to multiple institutions is required. On the ... [more] |
ISEC2019-4 pp.7-13 |
DE, IPSJ-DBS |
2018-12-22 13:45 |
Tokyo |
National Institute of Informatics |
A Study on Detecting Anonymized Personal Identifiers including Multiple Individuals in Japanese Health Insurance Claims Data Jumpei Sato, Hiroyuki Yamada, Kazuo Goda, Kitsuregawa Masaru (Tokyo Univ.), Naohiro Mitsutake (IHEP) DE2018-27 |
Anonymization of medical data helps protect patient identities. However, with conventional anonymized personal identifie... [more] |
DE2018-27 pp.55-60 |
EMM |
2018-03-05 17:05 |
Kagoshima |
Naze Community Center (Amami-Shi, Kagoshima) |
[Invited Talk]
On Information Loss by Micro-aggregation Hiroko Akiyama (NIT, Nagano College), Masaaki Wada (Osaka Univ.) EMM2017-89 |
For the purpose of measuring information loss caused by micro-aggregation, we define a new information loss index ILD b... [more] |
EMM2017-89 pp.61-66 |
ICSS, IPSJ-SPT |
2017-03-13 14:25 |
Nagasaki |
University of Nagasaki |
Feature Extraction for Identifying High Yielding Investment Programs Related Transactions in Bitcoin Kentaroh Toyoda, Tomoaki Ohtsuki (Keio Univ.), P. Takis Mathiopoulos (UoA) ICSS2016-49 |
As recent research has revealed, Bitcoin is used as fraudulent activities such as HYIP (High Yield Investment Programs).... [more] |
ICSS2016-49 pp.31-36 |
ICD, CPSY |
2016-12-15 10:55 |
Tokyo |
Tokyo Institute of Technology |
Proposal of anonymization methods for secondary use considering data properties Yuichi Nakamura, Takahiro Hosoe, Hiroaki Nishi (Keio Univ.) ICD2016-53 CPSY2016-59 |
Applications for secondary use of data, which is a usage that is not same as an original purpose to obtain the data, hav... [more] |
ICD2016-53 CPSY2016-59 pp.13-18 |
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC (Joint) [detail] |
2016-03-25 13:05 |
Nagasaki |
Fukue Bunka Hall/Rodou Fukushi Center |
Combined Watermarking Method for Anonymized Data Yuichi Nakamura, Hiroaki Nishi (Keio Univ.) CPSY2015-152 DC2015-106 |
An anonymization infrastructure for secondary use of data has been proposed. The infrastructure was proposed to publish ... [more] |
CPSY2015-152 DC2015-106 pp.235-240 |
IT, ISEC, WBS |
2016-03-11 11:40 |
Tokyo |
The University of Electro-Communications |
k-Anonymization Techinque for Encrypted Data Masayuki Yoshino, Hisayoshi Sato, Ken Naganuma, Yasuko Fukuzawa (Hitachi) IT2015-135 ISEC2015-94 WBS2015-118 |
This paper proposes k-anonymizaiton technique for encrypted data stored on cloud environment. The proposed method utiliz... [more] |
IT2015-135 ISEC2015-94 WBS2015-118 pp.211-217 |
EMM |
2016-03-02 14:30 |
Kagoshima |
Yakushima Environ. and Cultural Vill. Center |
[Poster Presentation]
Data Anonymization based on TF-IDF Method Using Hierarchies Built from Attributes of Recommended Targets Kensuke Arai (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Noboru Babaguchi (Osaka Univ.) EMM2015-81 |
This paper proposes a personal data anonymization method using hierarchies considering information recommendation for us... [more] |
EMM2015-81 pp.31-36 |
EMM, IT |
2015-05-21 15:45 |
Kyoto |
Kyoto International Community House |
Data Anonymization for Information Recommendation Based on TF-IDF Method Kensuke Arai (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Noboru Babaguchi (Osaka Univ.) IT2015-10 EMM2015-10 |
This paper proposes a data anonymization method considering information recommendation for users.
Attaching importance ... [more] |
IT2015-10 EMM2015-10 pp.51-56 |
MoNA, ASN, IPSJ-MBL, IPSJ-UBI (Joint) [detail] |
2015-03-02 14:35 |
Tokyo |
Shibaura Institute of Technology(Toyosu Campus) |
A Study on Data Processing among Users' Mobiles for Application of Privacy Data Takafumi Harada, Keizo Murakami, Hironobu Okuyama, Takahiro Yamamoto (NTT) MoNA2014-96 |
Recently, smartphones have many kinds of sensors. Therefore data from these probes is able to be used for many kinds of ... [more] |
MoNA2014-96 pp.129-133 |
CS, NS, IN (Joint) |
2014-09-12 14:50 |
Miyagi |
Tohoku Univ. Research Institute of Electrical Communication 2gokan |
The proposal of the privacy protection technique in the network using positional addresses Taichi Aoki (IISEC) NS2014-101 |
Our study is a network, that is using location information as an address. One of the theme of a position address
networ... [more] |
NS2014-101 pp.129-134 |