IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 6 of 6  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
MIKA
(2nd)
2019-10-03
14:05
Hokkaido Hokkaido Univ. [Invited Lecture] Traffic Analysis Empowered by Machine Learning for Estimating Context of IoT Application
Anan Sawabe, Takanori Iwai (NEC)
We have observed the emergence of various Internet of Things (IoT) use cases, such as remote robot control, over the las... [more]
EMM 2019-03-13
14:05
Okinawa TBD [Poster Presentation] A privacy preserving culculation method of eigenface using EtC images
Masaki Kitayama, Hitoshi Kiya (Tokyo Metro. Univ.) EMM2018-91
In this paper, we propose a face recognition scheme using eigenface and kernel eigenface with EtC (Encryption-then-Compr... [more] EMM2018-91
pp.1-6
IEE-CMN, EMM, LOIS, IE, ITE-ME [detail] 2018-09-27
13:25
Oita Beppu Int'l Convention Ctr. aka B-CON Plaza SVM Computing Considering Dimension Reduction in the Encrypted Domain
Ayana Kawamura, Takahiro Maekawa, Yuma Kinoshita, Hitoshi Kiya (Tokyo Metropolitan Univ.) LOIS2018-11 IE2018-31 EMM2018-50
In this paper, we propose a SVM computing scheme with EtC images, and evaluate the effectiveness of the proposed scheme,... [more] LOIS2018-11 IE2018-31 EMM2018-50
pp.7-12
SIS, IPSJ-AVM, ITE-3DMT [detail] 2018-06-07
10:00
Hokkaido Jozankei View Hotel SVM Computing Using EtC Images in the Encrypted Domain
Ayana Kawamura, Takahiro Maekawa, Yuma Kinoshita, Hitoshi Kiya (Tokyo Metro. Univ.) SIS2018-1
In this paper, we propose a SVM computing scheme with EtC images, and evaluate the effectiveness of the proposed scheme,... [more] SIS2018-1
pp.1-6
IT, ISEC, WBS 2016-03-11
11:40
Tokyo The University of Electro-Communications k-Anonymization Techinque for Encrypted Data
Masayuki Yoshino, Hisayoshi Sato, Ken Naganuma, Yasuko Fukuzawa (Hitachi) IT2015-135 ISEC2015-94 WBS2015-118
This paper proposes k-anonymizaiton technique for encrypted data stored on cloud environment. The proposed method utiliz... [more] IT2015-135 ISEC2015-94 WBS2015-118
pp.211-217
IN 2015-10-15
15:55
Osaka Osaka University [Invited Talk] Data Secrecy in the Cloud Era
Yasunori Ishihara (Osaka Univ.) IN2015-56
In the Cloud Era, third parties are required to process data without knowing the content of the data. In this talk, we f... [more] IN2015-56
pp.19-24
 Results 1 - 6 of 6  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan