1. |
2022/07/27 |
Time Series Analysis of SHAP Values by Automobile Manufacturers Recovery Rates(6th International Conference on Deep Learning Technologies) |
2. |
2022/07/23 |
An Analysis of Indian Companies’ Profit Growth Pattern by Amplitude-based Clustering(5th IEEE Intl. Conf. on Knowledge Innovation and Invention (ICKII)) |
3. |
2021/12/08 |
Exploring Threats to Disguise Reliability of Information Sources on Fake News Dissemination(IEEE International Workshop in Cyber Forensics, Security, and E-discovery (CFSE 2021)) |
4. |
2021/10/15 |
Periocular Recognition Based on Features from Thermal and Visible-Light Images(IEEE 10th Global Conference on Consumer Electronics (GCCE 2021)) |
5. |
2021/09/12 |
Maintaining soundness of social network by understanding fake news dissemination and people's belief(15th International Workshop on Informatics (IWIN2021)) |
6. |
2021/09/02 |
Modeling Malicious Behaviors and Fake News Dissemination on Social Networks(20th IFIP Conference e-Business, e-Services, and e-Society (I3E2021), Springer Lecture Notes in Computer Science 12896, pp.643-655) |
7. |
2021/08/21 |
匿名データからの個人の特定ー移動履歴を例としてー(日本セキュリティ・マネジメント学会 ITリスク学研究会2021年第2回研究発表会) |
8. |
2020/12/12 |
Time-aware multi-resolutional approach to re-identifying location histories by using social networks(IEEE International Workshop on Cyber Forensics in Software Engineering (CFSE 2020)) |
9. |
2020/12/08 |
A Fake News Dissemination Model Based on Updating Reliability and Doubt among Individuals(11th IEEE International Conference on Awareness Science and Technology) |
10. |
2019/10 |
A Re-Identification Strategy Using Machine Learning that Exploits Better Side Data(機械学習を用いてより適切なデータと照合する匿名性への攻撃戦略)(査読付)(2019 IEEE International Conference on Awareness Science and Technology (iCAST 2019)) |
11. |
2019/10 |
Personal Authentication of Iris and Periocular Recognition Using XGBoost(虹彩と目周辺領域の特徴量をエックスジーブーストを用いて統合する個人認証)(査読付)(2019 IEEE Global Conference on Consumer Electronics (GCCE 2019)) |
12. |
2019/10 |
Re-Identifying People from Anonymous Histories of their Activities(匿名化された行動履歴からの対象者の再特定)(2019 IEEE International Conference on Awareness Science and Technology (iCAST 2019)) |
13. |
2019/07 |
対象者の人数と人間関係に制約のない移動履歴とSNSアカウントの照合(CSEC優秀研究賞受賞)(情報処理学会第86回コンピュータセキュリティ(CSEC)研究発表会) |
14. |
2019/03 |
匿名加工を伴う2パーティ秘匿クロス集計の性能比較(CSEC優秀研究賞受賞)(情報処理学会第84回コンピュータセキュリティ(CSEC)研究発表会) |
15. |
2018/09 |
Detection of Malware Infection Using Traffic Models based on the Similarity between Malware Samples(マルウェアサンプル間の類似性に基づくトラヒックモデルを用いたマルウェア感染の検知)(査読付)(International Workshop on Informatics (IWIN2018)) |
16. |
2017/09 |
A Strategy for Mitigating Information Loss in Anonymization by Using Nature of Personal Data(個人情報の特性を利用して匿名化における情報劣化を緩和する戦略)(査読付)(International Workshop on Informatics (IWIN2017)) |
17. |
2017/07 |
Privacy-Preserving Recommender System Based on Mining Large-Scale Data Distributed among Organizations(組織間に分散した大規模データのマイニングに基づくプライバシー保護型推薦システム)(査読付)(International Conference on Business and Information) |
18. |
2016/09/14 |
Breaking Anonymity of Social Network Accounts by Using Coordinated and Extensible Classifiers based on Machine Learning(機械学習に基づく拡張可能な分類子の組合せを使用したソーシャルネットワークアカウントの匿名性への攻撃)(査読付)(IFIP Conference on e-Business, e-Services and e-Society、Springer Lecture Notes in Computer Science 9844 (I3E2016)) |
19. |
2015/06 |
A Rule-Based Approach for Detecting Location Leaks of Short Text Messages (ショートテキストメッセージにおける位置情報の漏洩の検知のためのルールベースのアプローチ)(査読付)(1st Workshop on Privacy by Transparency in Data-Centric Services (PTDCS2015), Springer Lecture Notes in Business Information Processing 208) |
20. |
2015/06 |
De-Anonymising Social Network Posts by Linking with Resume (履歴書との照合によるソーシャルネットワークの投稿の匿名性への攻撃)(査読付)(1st Workshop on Privacy by Transparency in Data-Centric Services (PTDCS2015)、Springer Lecture Notes in Business Information Processing 208) |
21. |
2015/01 |
Fusion of Iris and Periocular User Authentication by AdaBoost for Mobile Device(モバイルデバイスへの適用に向けた虹彩と眼周囲領域によるユーザ認証のアダブーストによる統合)(査読付)(2015 International Conference on Consumer Electronics(ICCE2015)) |
22. |
2015/01 |
Transportation Means Identification of Content Delivery System for Consumer Electronic Device(情報家電用コンテンツ配信システムにおける通信アプリケーションの特定)(査読付)(2015 International Conference on Consumer Electronics (ICCE 2015)) |
23. |
2014/09 |
A System for Anonymizing Temporal Phrases of Message Posted in Online Social Networks and for Detecting Disclosure(オンラインソーシャルネットワークに投稿されたメッセージの時間に関する語句を匿名化し、開示を検出するシステム)(査読付)(4th International Workshop on Resilience and IT-Risk in Social Infrastructures (RISI 2014)) |
24. |
2014/09 |
Effects of External Information on Anonymity and Role of Transparency with Example of Social Network De-Anonymisation(匿名性に対する外部情報の影響と透明性の役割:ソーシャルネットワークの匿名性への攻撃をとして)(査読付)(4th International Workshop on Resilience and IT-Risk in Social Infrastructures) |
25. |
2014/06 |
Altitude Estimation Using Mobile Terminal's Pressure Sensor and External Weather Information(モバイル端末の圧力センサーと外部気象情報を使用した高度推定)(査読付)(18th IEEE International Symposium on Consumer Electronics (ISCE 2014)) |
26. |
2013/11 |
Anonymizing Temporal Phrases in Natural Language Text to Be Posted on Social Networking Services(ソーシャルネットワーキングサービスに投稿する自然言語テキストの時間に関する語句の自動匿名化)(査読付)(12th International Workshop on Digital-forensics and Watermarking, Springer Lecture Notes in Computer Science 8389) |
27. |
2013/10 |
Detection of Malware Infection Using Score Level Fusion with Kernel Fisher Discriminant Analysis(スコアレベルの統合とカーネルフィッシャー判別分析を使用したマルウェア感染の検出)(査読付)(2013 IEEE Global Conference on Consumer Electronics) |
28. |
2013/08 |
Anonymizing Face Images by Using Similarity-Based Metric(類似性に基づく定量化を使用した顔画像の匿名化)(査読付)(3rd International Workshop on Resilience and IT-Risk in Social Infrastructures (RISI 2013)) |
29. |
2013/03 |
Ineluctable Background Checking on Social Networks: Linking Job Seeker's Resume and Posts(ソーシャルネットワークでの逃れられない背景調査:就職希望者の履歴書と投稿の照合)(査読付)(5th IEEE International Workshop on Security and Social Networking (SESOC2013)) |
30. |
2013/03 |
Securing a B+tree for Use with Secret-Shared Databases(秘密分散データベースで使用するためのB+木構造の安全性確保)(査読付)(8th International Workshop on Databases in Networked Information Systems (DNIS 2013)、Springer Lecture Notes in Compute Science 7813) |
31. |
2012/11 |
Automatic Anonymous Fingerprinting of Text Posted on Social Networking Services(ソーシャルネットワーキングサービスに投稿されたテキストの自動匿名フィンガープリンティング)(査読付)(11th International Workshop on Digital-forensics and Watermarking, Springer Lecture Notes in Computer Science 7809) |
32. |
2012/08 |
A Private Information Detector for Controlling Circulation of Private Information through Social Networks(ソーシャルネットワーク上の個人情報の流通を制御するための個人情報検出システム)(査読付)(2nd International Workshop on Resilience and IT-Risk in Social Infrastructures (RISI 2012)) |
33. |
2012/08 |
Evaluation of Secular Changes in Statistical Features of Traffic for the Purpose of Malware Detection(マルウェア検出を目的としたトラヒックの統計的特徴量の経年変化の評価)(査読付)(1st International Workshop on Data Mining for Info-Communication Service and its Diffusion (DMICSiD2012)) |
34. |
2012/08 |
Identifying Anonymous Posts of Job Seekers(就職希望者の匿名投稿の検出)(査読付)(21st USENIX Security Symposium (USENIX Security '12), poster session) |
35. |
2012/08 |
Virtualizing Secret-Shared Database System(秘密分散データベースの仮想化)(査読付)(21st USENIX Security Symposium (USENIX Security '12), poster session) |
36. |
2011/11 |
Batching Multiple Protocols to Improve Efficiency of Multi-party Computation(複数のプロトコルのバッチ処理によるマルチパーティ計算の効率向上)(査読付)(7th International Conference on InformationSecurity and Cryptology (Inscrypt'2011)、Springer Lecture Notes in Computer Science 7537) |
37. |
2011/10 |
Content-based De-anonymisation of Tweets(ツイートの内容に基づく匿名性への攻撃)(査読付)(2011 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing) |
38. |
2011/08 |
Accelerating Multiparty Computation by Efficient Random Number Bitwise-Sharing Protocols(効率的なビット単位の乱数共有プロトコルによるマルチパーティ計算の高速化)(査読付)(12th International Workshop on Information Security Applications (WISA2011) Springer Lecture Notes in Computer Science 7115, pp.187-200) |
39. |
2010/12 |
In-depth Evaluation of Content-Based Phishing Detection to Clarify its Strengths and Limitations(コンテンツベースのフィッシング検出の長所と限界の明確化のための詳細評価)(査読付)(2nd International Conference on u- and e- Service, Science and Technology, Springer Communications in Computer and Information Science 124) |
40. |
2010/11 |
Measuring Accumulated Revelations of Private Information by Multiple Media(複数のメディアによる個人情報漏洩の累積効果の定量化)(査読付)(10th IFIP Conference on e-Business, e-Services, and e-Society) |
41. |
2010/11 |
Proposal for a Social-MRC Social Consensus Formation Support System Concerning IT Risk Countermeasures(ITリスク対策に関する社会的合意形成支援システムSocial-MRCの提案)(査読付)(6th International Conference on Advanced Information Management and Service (IMS2010)) |
42. |
2010/10 |
Detecting Revelation of Private Information from Online Social Networks(オンラインソーシャルネットワーク上の個人情報の漏洩の検知)(査読付)(2010 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing) |
43. |
2010/10 |
Unified Metric for Measuring Anonymity and Privacy with Application to Online Social Network(匿名性とプライバシーを測定するための汎用的な定量化手法とそのオンラインソーシャルネットワークへの適用)(査読付)(2010 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing) |
44. |
2010/08 |
ITリスク対策に関する社会的合意形成支援システムSocial-MRCの開発構想(情報処理学会マルチメディア、分散、協調とモバイルシンポジウム(DICOMO)2010) |
45. |
2010/07 |
Experiment on Video Watermark Detection System Using Degraded Original Images(劣化したオリジナル画像を使用した動画用透かし検出システムの実験)(査読付)(2010 IEEE International Conference on Industrial Informatics (Indin 2010)) |
46. |
2010/04 |
New Approach to Quantification of Privacy on Social Network Sites(ソーシャルネットワークサイトのプライバシーの定量化への新しいアプローチ)(査読付)(24th IEEE International Conference on Advenced Information Networking and Applications(AINA2010)) |
47. |
2009/12 |
Preventing False Positives in Content-Based Phishing Detection(コンテンツベースのフィッシング検知における偽陽性誤検知の防止)(査読付)(2009 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP2009)) |
48. |
2008/11 |
Evaluation and Improvement of Digital Watermarking Algorithm Based on Cryptographic Security Models(暗号学的安全性モデルに基づく電子透かしアルゴリズムの評価と改良)(査読付)(7th International Workshop on Digital Watermarking、Springer Lecture Notes in Computer Science 5450) |
49. |
2008/07 |
Evaluation of Integrity Verification System for Video Content Using Digital Watermarking(電子透かしを用いた動画コンテンツの完全性検証システムの評価)(International Symposium on Intelligent Interactive Multimedia Systems and Services) |
50. |
2008/07 |
Evaluation of PC-Based Real-Time Watermark Embedding System for SD Video Stream(SD規格動画ストリーミングのためのパソコンベースのリアルタイム電子透かし埋め込みシステムの評価)(International Symposium on Intelligent Interactive Multimedia Systems and Services) |
51. |
2008/05 |
Development and Applications of Multiple Risk Communicator(多重リスクコミュニケーターの開発と応用)(査読付)(6th International Conference in Computer Simulation Risk Analysis and Hazard Mitigation, pp.401-418) |
52. |
2008/03 |
Electronic Voting Scheme to Maintain Anonymity in Small-scale Election by Hiding the Number of Votes(投票数の秘匿によって小規模選挙の匿名性を維持する電子投票方式)(査読付)(2nd International Workshop on Advances in Information Security) |
53. |
2008/03 |
カラー画像の二つの色成分の関係に基づいてランダムゆがみとアフィン変形に対応する画像電子透かし方式(電子情報通信学会 2008年総合大会) |
54. |
2008/01 |
Novel Criterion Based on Log Inflation for Fraudulent Audit Log Preservation(ログ容量の爆発的増加を利用して不正な監査ログを防止する新しい基準)(査読付)(4th International Conference on Digital Forensics (ICDF 2008)pp.387-392) |
55. |
2007/11 |
HVS-Based Robust Video Watermarking with Dual-plane Correlation(人間の視覚システムに基づいて相対平面間の相関を利用する堅牢な動画用電子透かし)(査読付)(2007 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2007)) |
56. |
2007/04 |
Disclosure Control of Natural Language Information to Enable Secure and Enjoyable Communication over the Internet(インターネットを介した安全で楽しいコミュニケーションを可能にする自然言語情報の開示制御)(15th International Workshop on Security Protocols、Springer Lecture Notes in Computer Science 5964) |
57. |
2007/04 |
Secure Generation of Digital Signature on Compromised Computer(不正侵入されたコンピューター上でのデジタル署名の安全な生成)(査読付)(2007 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2007)) |
58. |
2006/12 |
Dual-plane Watermarking for Color Pictures Immune to Rotation, Scale, Translation, and Random Bending(回転、拡大縮小、平行移動、ランダム歪みに耐性のあるカラー画像用の相対平面電子透かし)(査読付)(2006 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2006)) |
59. |
2006/12 |
Improved Video Verification Method Using Digital Watermarking(電子透かしを用いた高性能動画像検証方法)(査読付)(2006 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2006)) |
60. |
2006/10 |
PC-based Real-Time Watermark Embedding System with Standard Video Interface(標準ビデオインターフェースを用いたパソコン上の実時間電子透かし埋め込みシステム)(査読付)(Proc. 2006 IEEE International Conference on Systems, Man and Cybernetics) |
61. |
2006/10 |
暗号学的安全性モデルに基づく電子透かしアルゴリズムの評価(情報処理達回コンピュータセキュリティシンポジウム(CSS)2006) |
62. |
2006/06 |
Evaluation of PC-based Real-time Watermarking System for Long-Term Video Preservation(一般的なパソコン上での動画用電子透かし実時間埋め込みシステムの評価)(査読付)(International Workshop on Long-Term Security) |
63. |
2005/10 |
Development Concept for and Trial Application of Multiplex Risk Communicator(多重リスクコミュニケータの開発コンセプトと試適用)(査読付)(2005 IFIP International Conrefence on E-Commerce, E-Business, and E-Governmentpp.607-621) |
64. |
2005/10 |
Real-Time Video Watermarking Embedding System Using Software on Personal Computer(パソコン上のソフトウェアを使用した動画用電子透かしの実時間埋め込み)(査読付)(2005 IEEE International Conference on Systems, Man and Cyberneticss) |
65. |
2005/09 |
Improved Video Watermarking Detection Using Statistically-Adaptive Accumulation(統計的適応累積を使用した動画用電子透かし検出の改善)(査読付)(2005 International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2005), Springer Lecture Notes in Computer Science 3684) |
66. |
2005/07 |
Correlation-Based Model of Color Picture Watermarking against Random Geometric Distortion(ランダムな幾何学的歪みに対するカラー画像用電子透かしの相関ベースのモデル)(査読付)(2005 IEEE International Conference on Multimedia & Expo) |
67. |
2005/01 |
Error Correction of Statistically Unstable Signals in Consumer Wireless Networks(情報家電用無線ネットワークにおける統計的に不安定な信号のエラー訂正)(査読付)(2005 IEEE International Conference on Consumer Electronics) |
68. |
2005/01 |
Use of Inferential Statistics to Estimate Error Probability of Video Watermarks(動画用電子透かしの誤り確率を推定するための推論統計の利用)(査読付)(SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents) |
69. |
2004/10 |
Evaluation of Total Cost in Hysteresis Sigature Systems(ヒステリシス型電子署名のトータルコストの評価)(査読付)(2004 International Workshop for Applied PKI (IWAP2004)) |
70. |
2003/10 |
Use of Motion Analysis to Improve Video Watermarking for MPEG Encoders(動き解析を用いたMPEGエンコーダのための動画用電子透かしの改良)(査読付)(2nd International Workshop on Digital Watermarking, Springer Lecture Notes in Computer Science 2939) |
71. |
2002/04 |
Combinatorial Optimization of Countermeasures against Illegal Copying(不正コピー対策の組合せ最適化)(10th Cambridge International Workshop on Security Protocols、Springer Lecture Notes in Computer Science 2845) |
72. |
2002/04 |
Legally Authorized and Unauthorized Digital Evidence(電子的証拠の法的有効性と無効性)(10th Cambridge International Workshop on Security Protocols、Springer Lecture Notes in Computer Science 2845) |
73. |
2001/08 |
A Multi-OS Approach to Trusted Computer Systems(信頼できるコンピューターシステムへのマルチOSアプローチ)(9th International Workshop on Security Protocols、Springer Lecture Notes in Computer Science 2467) |
74. |
2001/06 |
Digital Camera for Taking Evidential Photographic Images(証拠写真画像を撮影するためのデジタルカメラ)(査読付)(2001 IEEE International Conference on Consumer Electronics) |
75. |
2000/04 |
Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks(デジタル署名を埋め込んだマークによる電子店舗の認証)(8th Cambridge International Workshop on Security Protocols、Springer Lecture Notes in Computer Science 2133) |
76. |
1999/11 |
General Quality Maintenance Module for Motion Picture Watermarking(動画用電子透かしのための汎用画質維持モジュール)(査読付)(1999 IEEE International Conference on Consumer Electronics, pp.98-99) |
77. |
1999/10 |
Digital Watermarking Techniques for Contents Distribution(コンテンツ配信のための電子透かし技術)(Symposium on Internet Services and Mobility) |
78. |
1999/09 |
Internet-Marks: Reliable Visual Marks for the Web Site Authentication(インターネット・マーク:Webサイト認証のための信頼できる視覚的マーク )(査読付)(8th International Conference on Computer Communication) |
79. |
1999/04 |
Internet-Marks: Clear, Secure, and Portable Visual Marks for the Cyber Worlds(インターネット・マークス:サイバーワールドのための視認性、安全性、可搬性を備えたビジュアルマーク)(7th International Workshop on Security Protocols、Springer Lecture Notes in Computer Science 1796) |
80. |
1998/06 |
VSP: A Digital Watermark Method for Motion Picture Copyright Protection(VSP:動画像の著作権保護のための電子透かし方式)(査読付)(1998 IEEE International Conference on Consumer Electronics) |
81. |
1998/04 |
Secure Fingerprinting Using Public-Key Cryptography(公開鍵暗号を用いた安全なフィンガープリンティング)(6th International Workshop on Security Protocols、Springer Lecture Notes in Computer Science 1550) |
82. |
1995/05 |
An Evaluation Point Culling Algorithm for Radio Propagation Simulation based on the Imaging Method(画像法に基づく電波伝搬シミュレーションのための評価点枝刈りアルゴリズム)(査読付)(Virginia Tech's 5th Symposium on Wireless Personal Communications) |
83. |
1990/03 |
Case-Based Reasoningによるエキスパートシステムの知識獲得の容易化―事例利用方式―(情報処理学会第40回全国大会) |
5件表示
|
全件表示(83件)
|