Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM |
2023-03-02 16:00 |
Nagasaki |
Fukue culture hall (Primary: On-site, Secondary: Online) |
[Invited Talk]
Image transformation with random numbers for reliable AI Hitoshi Kiya (TMU) |
(To be available after the conference date) [more] |
|
AI |
2022-12-21 17:10 |
Fukuoka |
|
An Algorithm Combined Grouping and Adding Dummy to Satisfy l-diversity Keiichiro Oishi, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga (UEC) AI2022-47 |
Universities and companies access personal information databases for a wide range of purposes, and privacy consideration... [more] |
AI2022-47 pp.80-86 |
EA, EMM, ASJ-H |
2022-11-21 10:00 |
Online |
Online |
[Poster Presentation]
ConvMixer model transformation using random orthogonal matrices for privacy protection of test images. Rei Aso, Tatsuya Chuman, Hitoshi Kiya (TMU) EA2022-49 EMM2022-49 |
In this paper, a privacy preserving image classification method is proposed under the use of ConvMixer models. To protec... [more] |
EA2022-49 EMM2022-49 pp.46-51 |
IA, CQ, MIKA (Joint) |
2022-09-15 13:50 |
Hokkaido |
Hokkaido Citizens Actives Center (Primary: On-site, Secondary: Online) |
Secure outsourcing data integrity auditing for Internet of Things in cloud-edge environment Yangfei Lin, Celimuge Wu, Tsutomu Yoshinaga (UEC) CQ2022-30 |
The number of IoT devices has expanded greatly last few years. Given the feature of limited computing and storage resour... [more] |
CQ2022-30 pp.42-47 |
NS, SR, RCS, SeMI, RCC (Joint) |
2022-07-14 14:00 |
Ishikawa |
The Kanazawa Theatre + Online (Primary: On-site, Secondary: Online) |
A Study of Dynamic Privacy Control Method in LDP for Preserving Temporal/Spatial Intrinsic Information Value of Trajectory Data Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-47 |
Spatiotemporal data, including people's movement trajectories and transit points, is highly valuable for various applica... [more] |
NS2022-47 pp.106-111 |
EMM |
2022-01-27 15:00 |
Online |
Online |
Speech Watermarking Approach for Securing Speaker Anonymization using McAdams Coefficients Candy Olivia Mawalim, Masashi Unoki (JAIST) EMM2021-88 |
Speaker anonymization aims to suppress speaker individuality to protect privacy in speech while preserving the other asp... [more] |
EMM2021-88 pp.25-30 |
SIS, ITE-BCT |
2020-10-01 13:00 |
Online |
Online |
Evaluation of linear dimensionality reduction methods considering visual information protection for privacy-preserving machine learning Masaki Kitayama, Nobutaka Ono, Hitoshi Kiya (Tokyo Metro. Univ.) SIS2020-13 |
In this paper, linear dimensionality reduction methods are evaluated in terms of difficulty in estimating the visual inf... [more] |
SIS2020-13 pp.17-22 |
ISEC, IT, WBS |
2020-03-10 13:50 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
A Statistical Decision-Theoretic Approach for Measuring Privacy Risk in Information Disclosure Problem Alisa Miyashita, Akira Kamatsuka (Waseda Univ.), Takahiro Yoshida (Yokohama College of Commerce), Toshiyasu Matsushima (Waseda Univ.) IT2019-104 ISEC2019-100 WBS2019-53 |
In this paper, we deal with the problem of database statistics publishing with privacy and utility guarantees. While var... [more] |
IT2019-104 ISEC2019-100 WBS2019-53 pp.95-100 |
NS, IN (Joint) |
2020-03-06 09:50 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
Privacy-preserving Recommendation based on Provider Coordination Daiki Himi, Taiju Mikoshi, Katsunori Oyama, Toshihiro Nishizono (Nihon Univ.) NS2019-215 |
This paper proposes a privacy preserving information recommendation method based on cooperation among providers. IDs of ... [more] |
NS2019-215 pp.205-210 |
ITE-HI, IE, ITS, ITE-MMS, ITE-ME, ITE-AIT [detail] |
2020-02-27 14:00 |
Hokkaido |
Hokkaido Univ. (Cancelled but technical report was issued) |
An Image Transformation Network for Privacy-Preserving Deep Neural Networks Hiroki Ito, Yuma Kinoshita, Hitoshi Kiya (Tokyo Metro. Univ.) ITS2019-37 IE2019-75 |
We propose an image transformation network to generate visually-protected images for privacy-preserving deep neural netw... [more] |
ITS2019-37 IE2019-75 pp.195-200 |
SIS |
2019-12-12 14:35 |
Okayama |
Okayama University of Science |
A Dimensionality Reduction Method with Random Sampling for Privacy-Preserving Machine Learning Ayana Kawamura, Kenta Iida, Hitoshi Kiya (Tokyo Metro. Univ.) SIS2019-26 |
In this paper, we propose a dimensionality reduction method with random sampling for privacy-preserving machine learning... [more] |
SIS2019-26 pp.17-21 |
ISEC, SITE, LOIS |
2019-11-02 15:50 |
Osaka |
Osaka Univ. |
A Note on Encryption-based Recommender Systems Seiya Jumonji, Kazuya Sakai (TMU) ISEC2019-85 SITE2019-79 LOIS2019-44 |
Collaborative filtering recommends unknown contents to a user based on the past behavior or review of the user and is us... [more] |
ISEC2019-85 SITE2019-79 LOIS2019-44 pp.149-152 |
EMM, IT |
2019-05-23 14:00 |
Hokkaido |
Asahikawa International Conference Hall |
Generation of privacy-preserving images holding positional information for HOG feature extraction Masaki Kitayama, Hitoshi Kiya (Tokyo Metro. Univ.) IT2019-1 EMM2019-1 |
In this paper, we propose a generation method of images which have no visual information but hold the gradient direction... [more] |
IT2019-1 EMM2019-1 pp.1-6 |
SC |
2018-06-02 09:25 |
Fukushima |
UBIC 3D Theater, University of Aizu |
Simultaneous recognition of human activities and locations based on sensor array Shoichi Ichimura, Qiangfu Zhao (Univ. of Aizu) SC2018-11 |
In recent years, smart homes for senior care have attracted great attention in Japan. But a smart home has a privacy iss... [more] |
SC2018-11 pp.59-64 |
NS, IN (Joint) |
2018-03-01 10:50 |
Miyazaki |
Phoenix Seagaia Resort |
Light-Weight Mechanism for Authorized Pseudonym/Key Allocation Yusuke Fukushima, Ved Kafle, Hiroaki Harai (NICT) IN2017-102 |
Authorized pseudonym-based communication helps to mitigate tracking risks of message sender and receiver as well as prov... [more] |
IN2017-102 pp.75-80 |
ISEC, COMP |
2017-12-21 14:10 |
Kochi |
Eikokuji Campus, Kochi University of Technology |
[Invited Talk]
Foundations and practical studies of secure computation Ryo Kikuchi (NTT) ISEC2017-78 COMP2017-32 |
Secure computation, also known as secure multiparty computation, is a method to compute a function on encrypted data. Th... [more] |
ISEC2017-78 COMP2017-32 p.41 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 10:40 |
Tokyo |
|
Improvement of Privacy Preserving Digital Contents Circulation System on Blockchain Kohei Miura, Hiroyuki Inaba (KIT) ISEC2017-14 SITE2017-6 ICSS2017-13 EMM2017-17 |
We have proposed a digital contents circulation system on Blockchain. The system can protect user’s privacy from both co... [more] |
ISEC2017-14 SITE2017-6 ICSS2017-13 EMM2017-17 pp.5-8 |
LOIS |
2017-03-02 14:55 |
Okinawa |
N.Ohama Memorial Hall |
Evaluating Estimation Methods of Reconstruction Accuracy of Negative Surveys Using Field Survey Data of Air Pollution Takao Suzuki, Masaki Ito, Kaoru Sezaki (The Univ. of Tokyo) LOIS2016-77 |
In mobile environmental sensing, where mobile users sense environmental variables and send data to a server via mobile d... [more] |
LOIS2016-77 pp.85-90 |
IA |
2017-01-27 12:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. B3 Kenshu-2 room |
Pseudonym and Key Allocation for Privacy-Aware Communications of Smart IoT Applications Yusuke Fukushima, Ved P. Kafle, Hiroaki Harai (NICT) IA2016-82 |
From the viewpoint of privacy protection and communication reliability, it is necessary to hide every relationship betwe... [more] |
IA2016-82 pp.19-24 |
ICD, CPSY |
2016-12-15 10:55 |
Tokyo |
Tokyo Institute of Technology |
Proposal of anonymization methods for secondary use considering data properties Yuichi Nakamura, Takahiro Hosoe, Hiroaki Nishi (Keio Univ.) ICD2016-53 CPSY2016-59 |
Applications for secondary use of data, which is a usage that is not same as an original purpose to obtain the data, hav... [more] |
ICD2016-53 CPSY2016-59 pp.13-18 |