IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 10 of 10  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
SIP, SP, EA, IPSJ-SLP [detail] 2024-02-29
15:10
Okinawa
(Primary: On-site, Secondary: Online)
Privacy preserving deep unrolling ISTA method for sparse representation
Nichika Yuge, Takayuki Nakachi (Univ. of the Ryukyus.) EA2023-81 SIP2023-128 SP2023-63
In recent years, the use of edge and cloud computing has expanded. Along with this, a method called sparse modeling is a... [more] EA2023-81 SIP2023-128 SP2023-63
pp.121-126
SANE 2022-12-16
11:45
Nagasaki Nagasaki Public Hall
(Primary: On-site, Secondary: Online)
General 5-component Scattering Power Decomposition with Unitary Transformation
Yoshio Yamaguchi (Niigata Univ.), Gulab Singh (IITB, India), Ryu Sugimoto (AIST) SANE2022-80
Polarimetric synthetic aperture radar (PolSAR) provides us with a full 3x3 coherency matrix that bears 9 real-valued and... [more] SANE2022-80
pp.85-90
EMM 2022-03-08
11:50
Online (Primary: Online, Secondary: On-site)
(Primary: Online, Secondary: On-site)
RUT Computation of Gaussian Process Regression for Encrypting Input and Output Signals
Takayuki Nakachi (Univ. of the Ryukyus), Yitu Wang (NTT) EMM2021-115
n this paper, we propose Gaussian Process Regression (GPR) for encrypted data generated based on random unitary transfor... [more] EMM2021-115
pp.124-129
SIS, IPSJ-AVM 2021-06-24
13:45
Online Online Privacy-Preserving Secure Computation of Gaussian Process Regression -- Find patterns and rules from encrypted data --
Takayuki Nakachi (Univ. of the Ryukyus), Yitu Wang (NTT) SIS2021-8
In this paper, we propose Gaussian Process Regression (GPR) for encrypted data generated based on random unitary transfo... [more] SIS2021-8
pp.43-48
HCGSYMPO
(2nd)
2020-12-15
- 2020-12-17
Online Online Joint Inter-device Matching and Temporal Alignment between Camera and Wearable Sensors using 3D Motion Correlation
Hiroyuki Ishihara, Shiro Kumano, Takayuki Nakachi (NTT)
In this paper, we propose a method to estimate the correspondence between a person’s ID and a device ID of a person, and... [more]
EMM, IE, LOIS, IEE-CMN, ITE-ME [detail] 2017-09-04
13:50
Kyoto Kyoto Univ. (Clock Tower Centennial Hall) Privacy-preserving SVM processing by using random unitary transformation
Takahiro Maekawa, Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya (Tokyo Metro.Univ.) LOIS2017-15 IE2017-36 EMM2017-44
In this paper,we propose a privacy-preserving SVM processing method with templates protected by using a random unitary t... [more] LOIS2017-15 IE2017-36 EMM2017-44
pp.13-18
AP, SAT, SANE
(Joint)
2016-07-20
16:20
Hokkaido Otaru port marina Improvement of RV-MUSIC using Unitary Transformation and Orthogonal Complement
Koji Sonoyama, Takashi Matsubara, Takakazu Kurokawa (NDA) AP2016-42
Direction-of-arrival (DOA) estimation with an array antenna includes MUSIC and ESPRIT. MUSIC needs big computational com... [more] AP2016-42
pp.31-36
ITS, IE, ITE-AIT, ITE-HI, ITE-ME, ITE-MMS, ITE-CE [detail] 2016-02-22
10:00
Hokkaido Hokkaido Univ. Secure classification based on kernel method using unitary transformation
Ibuki Nakamura, Yuko Saito, Sayaka Shiota, Hitoshi Kiya (Tokyo Metropolitan Univ.) ITS2015-59 IE2015-101
This study considers a template protection scheme based on an random unitary transformation, where the template consists... [more] ITS2015-59 IE2015-101
pp.17-22
IE, ITE-ME, IPSJ-AVM, ITE-CE [detail] 2015-08-03
10:55
Tokyo Tokyo Metropolitan Univ. A study of random unitary matrices for secure biometric authentication
Yuko Saito, Ibuki Nakamura, Sayaka Shiota (Tokyo Metro.Univ), Yoshihide Tonomura (NTT), Hitoshi Kiya (Tokyo Metro.Univ) IE2015-47
Random unitary transformation-based template protection methods have
been proposed as one of biometric template protec... [more]
IE2015-47
pp.7-12
EMM, IT 2015-05-21
14:30
Kyoto Kyoto International Community House Generating Protected Eigenface Templates Using an Unitary Transformaion
Ibuki Nakamura (Tokyo Metropolitan Univ.), Yoshihide Tonomura (NTT), Hitoshi Kiya (Tokyo Metropolitan Univ.) IT2015-7 EMM2015-7
This paper considers a template protection scheme based on an unitary transformation, where the template consists of the... [more] IT2015-7 EMM2015-7
pp.35-40
 Results 1 - 10 of 10  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan