Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IN, NS (Joint) |
2025-03-06 11:10 |
Okinawa |
Okinawa Industry Support Center (Okinawa) |
A P2P-based watch-over support system with privacy protection mechanism using Bloom Filter Yuki Matsumoto, Akihiro Huzimoto (Wakayama Univ.), Hideki Tode (Osaka Metropolitan Univ.) |
(To be available after the conference date) [more] |
|
ICSS, IPSJ-SPT |
2025-03-06 16:20 |
Okinawa |
Okinawa Prefectural Museum & Art Museum (Okinawa) |
Feasibility Study on Machine Learning Applications for Privacy-Protected Image Data Tomoshi Yagishita (Osaka Univ.), Pierre Boudvillain (IMT Nord Europe), Yuki Hyohdoh (Kochi University), Atsuko Miyaji (Osaka Univ.) |
(To be available after the conference date) [more] |
|
MVE, CQ, IMQ, IE (Joint) [detail] |
2025-03-06 09:50 |
Okinawa |
(Okinawa, Online) (Primary: On-site, Secondary: Online) |
Noise Addition Techniques to Feature Vectors for Privacy Protection in Face Recognition Systems Satoru Matsumoto (Osaka Univ), Yoshihisa Tomoki (Shiga Univ), Kenji Ohira, Hideyuki Shimonishi (Osaka Univ) |
(To be available after the conference date) [more] |
|
EA, SIP, SP, IPSJ-SLP [detail] |
2025-03-03 11:20 |
Okinawa |
(Okinawa) |
[Poster Presentation]
An Extension of Privacy-Preserving FedSGD Federated Learning with Random Binary Weights to FedAvg Federated Learning Hiroto Sawada, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metropolitan Univ.) |
(To be available after the conference date) [more] |
|
RISING (3rd) |
2024-11-12 10:15 |
Hokkaido |
Kaderu 2・7 (Sapporo) (Hokkaido) |
[Poster Presentation]
Investigation on Lightweight Privacy Protection Methods in Split Computing Using CNNs Yuya Okada, Takayuki Nishio (Science Tokyo) |
Split Computing is a technique that partitions neural network inference between a client device and a server, where the ... [more] |
|
MIKA (3rd) |
2024-10-28 15:40 |
Okayama |
Okayama Convention Center (Okayama) |
[Poster Presentation]
Flight Path Selection Considering Privacy Protection of Destination for Drone Delivery Hayato Taniguchi, Tomotaka Kimura, Cheng Jun (Doshisha Univ.) |
In this presentation, we consider flight path selection to protect the privacy of a destination for drone delivery. In d... [more] |
|
ET |
2024-10-12 14:55 |
Hokkaido |
National Insititute of Technology, Hakodate College (Hokkaido) |
A study of At-risk Student Detection based on Federated Learning Shunsuke Yoneda, Fumiya Okubo, Tsubasa Minematsu (Kyushu Univ.), Daisuke Deguchi (Nagoya Univ.), Atsushi Shimada (Kyushu Univ.) ET2024-34 |
By using federated learning, it is possible to utilize a large amount of data while protecting privacy. In this study, w... [more] |
ET2024-34 pp.49-54 |
KBSE, SS, IPSJ-SE [detail] |
2024-07-25 14:00 |
Hokkaido |
(Hokkaido, Online) (Primary: On-site, Secondary: Online) |
Privacy protection of training datasets in CNN transfer learning models Takumi Katsuie, Kozo Okano, Shinpei Ogata (Shinshu Univ.), Shin Nakajima (NII) SS2024-1 KBSE2024-7 |
Transfer learning, one of the machine learning methods, has attracted attention as a technique that can create highly ac... [more] |
SS2024-1 KBSE2024-7 pp.1-6 |
KBSE, SS, IPSJ-SE [detail] |
2024-07-26 15:00 |
Hokkaido |
(Hokkaido, Online) (Primary: On-site, Secondary: Online) |
A Spatio-Temporal Data Protection Method Considering Trade-offs between Privacy and Service Quality Yuki Wakita, Hiroyuki Seki (Nagoya U.) SS2024-8 KBSE2024-14 |
This research aims at a spatio-temporal data protection method that considers
a better trade-off between privacy prote... [more] |
SS2024-8 KBSE2024-14 pp.43-48 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-22 17:55 |
Hokkaido |
Sapporo Convention Center (Hokkaido) |
A Study of the Japanese Version of the Security Clearance System, or Suitability Assessment System
-- From a Supply Chain Security Perspective -- Yusuke Tachibana (FIT) ISEC2024-45 SITE2024-42 BioX2024-55 HWS2024-45 ICSS2024-49 EMM2024-51 |
This paper examines the so-called "Japanese version of the security clearance (suitability assessment) system". This sys... [more] |
ISEC2024-45 SITE2024-42 BioX2024-55 HWS2024-45 ICSS2024-49 EMM2024-51 pp.243-246 |
LOIS, IPSJ-DC |
2024-07-11 13:50 |
Hyogo |
Mikage Kokaido (Hyogo) |
LOIS2024-3 |
Domain names, indispensable for web access and other internet communications, can also be used to direct users to phishi... [more] |
LOIS2024-3 pp.13-18 |
ITE-ME, ITE-IST, BioX, SIP, MI, IE [detail] |
2024-06-06 13:20 |
Niigata |
Nigata University (Ekinan-Campus "TOKIMATE") (Niigata) |
Enhanced Security with Random Binary Weights for Privacy-Preserving Federated Learning Hiroto Sawada, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (TMU) SIP2024-1 BioX2024-1 IE2024-1 MI2024-1 |
In this paper, we propose a novel method for enhancing security in privacy-preserving federated learning under the use o... [more] |
SIP2024-1 BioX2024-1 IE2024-1 MI2024-1 pp.1-6 |
ICSS, IPSJ-SPT |
2024-03-21 14:55 |
Okinawa |
OIST (Okinawa, Online) (Primary: On-site, Secondary: Online) |
An Examination of Privacy-Aware Malicious Activity Detection Methods Using NII-SOCS Benchmark Data Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2023-81 |
Detection of malicious communications from communication logs may pose a risk of privacy infringement as it requires mon... [more] |
ICSS2023-81 pp.87-92 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) (Osaka) |
Data processing methods for high-performance Privacy-Preserving Machine Learning Tatsuhiro Yamatsuki (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) IT2023-94 ISEC2023-93 WBS2023-82 RCC2023-76 |
Currently, attempts are being made in various fields to solve problems by utilizing big data. However, privacy protectio... [more] |
IT2023-94 ISEC2023-93 WBS2023-82 RCC2023-76 pp.118-126 |
CNR, BioX |
2024-02-29 15:00 |
Tokyo |
NHK Science & Technology Research Laboratories (Tokyo, Online) (Primary: On-site, Secondary: Online) |
Implementation and Evaluation of Privacy-Preserving Image Transformation Methods for Person Re-identification Junpei Yamaguchi, Hajime Nada, Yumo Ouchi, Narishige Abe (Fujitsu) BioX2023-73 CNR2023-40 |
Advances in machine learning have enabled high-accuracy tracking of individuals using surveillance cameras, making the d... [more] |
BioX2023-73 CNR2023-40 pp.18-23 |
NS, IN (Joint) |
2024-02-29 10:45 |
Okinawa |
Okinawa Convention Center (Okinawa) |
A privacy protection mechanism using Bloom Filter for a P2P-based tracking system watching over children Yuki Matsumoto, Akihiro Fujimoto (Wakayama Univ), Hideki Tode (Osaka Metropolitan Univ) NS2023-193 |
With the increase in the number of single-parent and elderly-only families, as well as changes in work patterns such as ... [more] |
NS2023-193 pp.125-130 |
EMM |
2024-01-16 15:25 |
Miyagi |
Tohoku Univ. (Miyagi, Online) (Primary: On-site, Secondary: Online) |
[Invited Talk]
Federated Learning with Enhanced Privacy Protection in AI Lihua Wang (NICT) EMM2023-83 |
Federated learning is a crucial methodology in artificial intelligence where multiple organizations collaborate to perfo... [more] |
EMM2023-83 p.19 |
RISING (3rd) |
2023-10-31 10:45 |
Hokkaido |
Kaderu 2・7 (Sapporo) (Hokkaido) |
[Poster Presentation]
Performance Analysis of Cognitive Radio Networks With Location Privacy Preservation Ryutaro Kobuchi (Osaka Univ.), Tatsuaki Kimura (Doshisha Univ.), Tetsuya Takine (Osaka Univ.) |
With the rapid increase in demand for wireless communication services, dynamic spectrum sharing in cognitive radio netwo... [more] |
|
NS |
2023-10-06 15:20 |
Hokkaido |
Hokkaidou University + Online (Hokkaido, Online) (Primary: On-site, Secondary: Online) |
Incentive Mechanism Considering Heterogeneous Privacy Demand Level in Federated Learning with Differential Privacy Shota Miyagoshi, Takuji Tachibana (Univ. Fukui) NS2023-104 |
In federated learning, where multiple data owners participate as clients to perform machine learning, each client shares... [more] |
NS2023-104 pp.162-167 |
IA |
2023-09-21 13:50 |
Hokkaido |
Hokkaido Univeristy (Hokkaido, Online) (Primary: On-site, Secondary: Online) |
A consideration about a discovering method of privacy-enhanced authoritative DNS servers Satoru Sunahara (CIST), Yong Jin (Tokyo Tech), Katsuyoshi Iida (HU) IA2023-11 |
Plain-text communication of DNS queries poses a risk of privacy leakage. Therefore, it is imperative to achieve protecti... [more] |
IA2023-11 pp.1-5 |