IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 78  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM 2023-03-02
16:00
Nagasaki Fukue culture hall
(Primary: On-site, Secondary: Online)
[Invited Talk] Image transformation with random numbers for reliable AI
Hitoshi Kiya (TMU)
(To be available after the conference date) [more]
AI 2022-12-21
17:10
Fukuoka   An Algorithm Combined Grouping and Adding Dummy to Satisfy l-diversity
Keiichiro Oishi, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga (UEC) AI2022-47
Universities and companies access personal information databases for a wide range of purposes, and privacy consideration... [more] AI2022-47
pp.80-86
EA, EMM, ASJ-H 2022-11-21
10:00
Online Online [Poster Presentation] ConvMixer model transformation using random orthogonal matrices for privacy protection of test images.
Rei Aso, Tatsuya Chuman, Hitoshi Kiya (TMU) EA2022-49 EMM2022-49
In this paper, a privacy preserving image classification method is proposed under the use of ConvMixer models. To protec... [more] EA2022-49 EMM2022-49
pp.46-51
IA, CQ, MIKA
(Joint)
2022-09-15
13:50
Hokkaido Hokkaido Citizens Actives Center
(Primary: On-site, Secondary: Online)
Secure outsourcing data integrity auditing for Internet of Things in cloud-edge environment
Yangfei Lin, Celimuge Wu, Tsutomu Yoshinaga (UEC) CQ2022-30
The number of IoT devices has expanded greatly last few years. Given the feature of limited computing and storage resour... [more] CQ2022-30
pp.42-47
NS, SR, RCS, SeMI, RCC
(Joint)
2022-07-14
14:00
Ishikawa The Kanazawa Theatre + Online
(Primary: On-site, Secondary: Online)
A Study of Dynamic Privacy Control Method in LDP for Preserving Temporal/Spatial Intrinsic Information Value of Trajectory Data
Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-47
Spatiotemporal data, including people's movement trajectories and transit points, is highly valuable for various applica... [more] NS2022-47
pp.106-111
EMM 2022-01-27
15:00
Online Online Speech Watermarking Approach for Securing Speaker Anonymization using McAdams Coefficients
Candy Olivia Mawalim, Masashi Unoki (JAIST) EMM2021-88
Speaker anonymization aims to suppress speaker individuality to protect privacy in speech while preserving the other asp... [more] EMM2021-88
pp.25-30
SIS, ITE-BCT 2020-10-01
13:00
Online Online Evaluation of linear dimensionality reduction methods considering visual information protection for privacy-preserving machine learning
Masaki Kitayama, Nobutaka Ono, Hitoshi Kiya (Tokyo Metro. Univ.) SIS2020-13
In this paper, linear dimensionality reduction methods are evaluated in terms of difficulty in estimating the visual inf... [more] SIS2020-13
pp.17-22
ISEC, IT, WBS 2020-03-10
13:50
Hyogo University of Hyogo
(Cancelled but technical report was issued)
A Statistical Decision-Theoretic Approach for Measuring Privacy Risk in Information Disclosure Problem
Alisa Miyashita, Akira Kamatsuka (Waseda Univ.), Takahiro Yoshida (Yokohama College of Commerce), Toshiyasu Matsushima (Waseda Univ.) IT2019-104 ISEC2019-100 WBS2019-53
In this paper, we deal with the problem of database statistics publishing with privacy and utility guarantees. While var... [more] IT2019-104 ISEC2019-100 WBS2019-53
pp.95-100
NS, IN
(Joint)
2020-03-06
09:50
Okinawa Royal Hotel Okinawa Zanpa-Misaki
(Cancelled but technical report was issued)
Privacy-preserving Recommendation based on Provider Coordination
Daiki Himi, Taiju Mikoshi, Katsunori Oyama, Toshihiro Nishizono (Nihon Univ.) NS2019-215
This paper proposes a privacy preserving information recommendation method based on cooperation among providers. IDs of ... [more] NS2019-215
pp.205-210
ITE-HI, IE, ITS, ITE-MMS, ITE-ME, ITE-AIT [detail] 2020-02-27
14:00
Hokkaido Hokkaido Univ.
(Cancelled but technical report was issued)
An Image Transformation Network for Privacy-Preserving Deep Neural Networks
Hiroki Ito, Yuma Kinoshita, Hitoshi Kiya (Tokyo Metro. Univ.) ITS2019-37 IE2019-75
We propose an image transformation network to generate visually-protected images for privacy-preserving deep neural netw... [more] ITS2019-37 IE2019-75
pp.195-200
SIS 2019-12-12
14:35
Okayama Okayama University of Science A Dimensionality Reduction Method with Random Sampling for Privacy-Preserving Machine Learning
Ayana Kawamura, Kenta Iida, Hitoshi Kiya (Tokyo Metro. Univ.) SIS2019-26
In this paper, we propose a dimensionality reduction method with random sampling for privacy-preserving machine learning... [more] SIS2019-26
pp.17-21
ISEC, SITE, LOIS 2019-11-02
15:50
Osaka Osaka Univ. A Note on Encryption-based Recommender Systems
Seiya Jumonji, Kazuya Sakai (TMU) ISEC2019-85 SITE2019-79 LOIS2019-44
Collaborative filtering recommends unknown contents to a user based on the past behavior or review of the user and is us... [more] ISEC2019-85 SITE2019-79 LOIS2019-44
pp.149-152
EMM, IT 2019-05-23
14:00
Hokkaido Asahikawa International Conference Hall Generation of privacy-preserving images holding positional information for HOG feature extraction
Masaki Kitayama, Hitoshi Kiya (Tokyo Metro. Univ.) IT2019-1 EMM2019-1
In this paper, we propose a generation method of images which have no visual information but hold the gradient direction... [more] IT2019-1 EMM2019-1
pp.1-6
SC 2018-06-02
09:25
Fukushima UBIC 3D Theater, University of Aizu Simultaneous recognition of human activities and locations based on sensor array
Shoichi Ichimura, Qiangfu Zhao (Univ. of Aizu) SC2018-11
In recent years, smart homes for senior care have attracted great attention in Japan. But a smart home has a privacy iss... [more] SC2018-11
pp.59-64
NS, IN
(Joint)
2018-03-01
10:50
Miyazaki Phoenix Seagaia Resort Light-Weight Mechanism for Authorized Pseudonym/Key Allocation
Yusuke Fukushima, Ved Kafle, Hiroaki Harai (NICT) IN2017-102
Authorized pseudonym-based communication helps to mitigate tracking risks of message sender and receiver as well as prov... [more] IN2017-102
pp.75-80
ISEC, COMP 2017-12-21
14:10
Kochi Eikokuji Campus, Kochi University of Technology [Invited Talk] Foundations and practical studies of secure computation
Ryo Kikuchi (NTT) ISEC2017-78 COMP2017-32
Secure computation, also known as secure multiparty computation, is a method to compute a function on encrypted data. Th... [more] ISEC2017-78 COMP2017-32
p.41
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2017-07-14
10:40
Tokyo   Improvement of Privacy Preserving Digital Contents Circulation System on Blockchain
Kohei Miura, Hiroyuki Inaba (KIT) ISEC2017-14 SITE2017-6 ICSS2017-13 EMM2017-17
We have proposed a digital contents circulation system on Blockchain. The system can protect user’s privacy from both co... [more] ISEC2017-14 SITE2017-6 ICSS2017-13 EMM2017-17
pp.5-8
LOIS 2017-03-02
14:55
Okinawa N.Ohama Memorial Hall Evaluating Estimation Methods of Reconstruction Accuracy of Negative Surveys Using Field Survey Data of Air Pollution
Takao Suzuki, Masaki Ito, Kaoru Sezaki (The Univ. of Tokyo) LOIS2016-77
In mobile environmental sensing, where mobile users sense environmental variables and send data to a server via mobile d... [more] LOIS2016-77
pp.85-90
IA 2017-01-27
12:20
Tokyo Kikai-Shinko-Kaikan Bldg. B3 Kenshu-2 room Pseudonym and Key Allocation for Privacy-Aware Communications of Smart IoT Applications
Yusuke Fukushima, Ved P. Kafle, Hiroaki Harai (NICT) IA2016-82
From the viewpoint of privacy protection and communication reliability, it is necessary to hide every relationship betwe... [more] IA2016-82
pp.19-24
ICD, CPSY 2016-12-15
10:55
Tokyo Tokyo Institute of Technology Proposal of anonymization methods for secondary use considering data properties
Yuichi Nakamura, Takahiro Hosoe, Hiroaki Nishi (Keio Univ.) ICD2016-53 CPSY2016-59
Applications for secondary use of data, which is a usage that is not same as an original purpose to obtain the data, hav... [more] ICD2016-53 CPSY2016-59
pp.13-18
 Results 1 - 20 of 78  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan