Hiroaki Kikuchi
Orcid: 0000-0002-0903-8430
According to our database1,
Hiroaki Kikuchi
authored at least 160 papers
between 1995 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2024
Proceedings of the Privacy in Statistical Databases - International Conference, 2024
A Poisoning-Resilient LDP Schema Leveraging Oblivious Transfer with the Hadamard Transform.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2024
2023
J. Ambient Intell. Humaniz. Comput., December, 2023
Proc. Priv. Enhancing Technol., January, 2023
J. Ambient Intell. Humaniz. Comput., 2023
Proceedings of the ICT Systems Security and Privacy Protection, 2023
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
Proceedings of the Network and System Security - 17th International Conference, 2023
Failure of Privacy Policy for Session Replay Services Used for Monitor Your Keystroke.
Proceedings of the Advances in Networked-based Information Systems, 2023
Proceedings of the Mobile, Secure, and Programmable Networking, 2023
Local Differential Privacy Protocol for Making Key-Value Data Robust Against Poisoning Attacks.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
Expectation-Maximization Estimation for Key-Value Data Randomized with Local Differential Privacy.
Proceedings of the Advanced Information Networking and Applications, 2023
2022
Proposal of anonymization dictionary using disclosed statements by business operators.
Internet Things, 2022
Castell: Scalable Joint Probability Estimation of Multi-dimensional Data Randomized with Local Differential Privacy.
CoRR, 2022
A Vulnerability in Video Anonymization - Privacy Disclosure from Face-obfuscated video.
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022
Proceedings of the Modeling Decisions for Artificial Intelligence, 2022
2021
More Accurate and Robust PRNU-Based Source Camera Identification with 3-Step 3-Class Approach.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021
Proposal and Development of Anonymization Dictionary Using Public Information Disclosed by Anonymously Processed Information Handling Business Operators.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
Proceedings of the 16th Asia Joint Conference on Information Security, 2021
Proceedings of the Advanced Information Networking and Applications, 2021
2020
De-identification for Transaction Data Secure against Re-identification Risk Based on Payment Records.
J. Inf. Process., 2020
Int. J. Inf. Sec., 2020
Analysis on Malicious Residential Hosts Activities Exploited by Residential IP Proxy Services.
Proceedings of the Information Security Applications - 21st International Conference, 2020
Proceedings of the Advances in Networked-Based Information Systems, 2020
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020
2019
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
2018
Anonymization methods and inference attacks: theory and practice (NII Shonan Meeting 2018-5).
NII Shonan Meet. Rep., 2018
Privacy-Preserving Hypothesis Testing for Reduced Cancer Risk on Daily Physical Activity.
J. Medical Syst., 2018
Privacy-Preserving Multiple Linear Regression of Vertically Partitioned Real Medical Datasets.
J. Inf. Process., 2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Proceedings of the Advances in Network-Based Information Systems, 2018
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
Development of White List Based Autonomous Evolution of Defense System for RAT Malware.
Proceedings of the 13th Asia Joint Conference on Information Security, 2018
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018
Privacy Preserved Spectral Analysis Using IoT mHealth Biomedical Data for Stress Estimation.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018
2017
IEEE Trans. Signal Inf. Process. over Networks, 2017
A Spatio-Temporal malware and country clustering algorithm: 2012 IIJ MITF case study.
Int. J. Inf. Sec., 2017
Proceedings of the Security and Trust Management - 13th International Workshop, 2017
Audio-CAPTCHA with distinction between random phoneme sequences and words spoken by multi-speaker.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017
Risk of Re-Identification Based on Euclidean Distance in Anonymized Data <i>PWSCUP2015</i>.
Proceedings of the Advances in Network-Based Information Systems, 2017
Proceedings of the HCI International 2017 - Posters' Extended Abstracts, 2017
Sharing or Non-sharing Credentials: A Study of What Motivates People to Be Malicious Insiders.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017
Privacy-Preserving Multiple Linear Regression of Vertically Partitioned Real Medical Datasets.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017
2016
J. Inf. Process., 2016
Zipf Distribution Model for Quantifying Risk of Re-identification from Trajectory Data.
J. Inf. Process., 2016
Recursive-Rule Extraction Algorithm With J48graft And Applications To Generating Credit Scores.
J. Artif. Intell. Soft Comput. Res., 2016
Proposal and Evaluation of Cyber Defense System Using Blacklist Refined Based on Authentication Results.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016
Proceedings of the Adjunct Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing Networking and Services, 2016
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
Proceedings of the 6th International Conference on IT Convergence and Security, 2016
Proceedings of the HCI International 2016 - Posters' Extended Abstracts, 2016
Proceedings of the Data Privacy Management and Security Assurance, 2016
Efficient Privacy-Preserving Logistic Regression with Iteratively Re-weighted Least Squares.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016
Ice and Fire: Quantifying the Risk of Re-identification and Utility in Data Anonymization.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016
2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015
Proceedings of the 10th Asia Joint Conference on Information Security, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
2014
Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size of an Intersection.
J. Inf. Process., 2014
Vulnerability of the conventional accessible CAPTCHA used by the White House and an alternative approach for visually impaired people.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
An Accessible CAPTCHA System for People with Visual Disability - Generation of Human/Computer Distinguish Test with Documents on the Net.
Proceedings of the Universal Access in Human-Computer Interaction. Design for All and Accessibility Practice, 2014
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014
Privacy-Preserving Hypothesis Testing for the Analysis of Epidemiological Medical Data.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
2013
J. Inf. Process., 2013
J. Inf. Process., 2013
Inf. Media Technol., 2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Proceedings of the Seventh International Conference on Sensing Technology, 2013
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013
Privacy-Preserving Collaborative Filtering on the Cloud and Practical Implementation Experiences.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013
2012
J. Cloud Comput., 2012
Accuracy of Privacy-Preserving Collaborative Filtering Based on Quasi-homomorphic Similarity.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012
Feasibility of a privacy preserving collaborative filtering scheme on the Google App Engine: a performance case study.
Proceedings of the ACM Symposium on Applied Computing, 2012
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012
Perturbation Based Privacy Preserving Slope One Predictors for Collaborative Filtering.
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012
2011
Efficient Privacy-Preserving Collaborative Filtering Based on the Weighted Slope One Predictor.
J. Internet Serv. Inf. Secur., 2011
IEICE Trans. Inf. Syst., 2011
Improving Efficiency in Privacy-Preserving Automated Trust Negotiation with Conjunctive Policies.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011
Apriori-PrefixSpan Hybrid Approach for Automated Detection of Botnet Coordinated Attacks.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011
2010
Privacy-preserving similarity evaluation and application to remote biometrics authentication.
Soft Comput., 2010
J. Inf. Process., 2010
Proceedings of the IEEE International Conference on Systems, 2010
Mining Association Rules Consisting of Download Servers from Distributed Honeypot Observation.
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010
Privacy-Preserving Collaborative Filtering Protocol Based on Similarity between Items.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
Proceedings of the ARES 2010, 2010
2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Proceedings of the Advances in Information and Computer Security, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
J. Inf. Process., 2008
J. Inf. Process., 2008
Multi-Bit Embedding in Asymmetric Digital Watermarking without Exposing Secret Information.
IEICE Trans. Inf. Syst., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Cryptanalysis of Modification to Self-Certified Group-Oriented Cryptosystem without A Combiner.
Int. J. Netw. Secur., 2007
Proceedings of the IEEE International Conference on Systems, 2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
Online and Offline Presence Information Integrated with RFID and Instant Messaging Agent.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
ZeroBio - Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation Protocol.
Proceedings of the The Second International Conference on Availability, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
Proceedings of the Information Security Applications, 7th International Workshop, 2006
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
2005
Proceedings of the Information Security Applications, 6th International Workshop, 2005
Proceedings of the IEEE International Conference on Systems, 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
Efficient Key Management Based on the Subset Difference Method for Secure Group Communication.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
2004
Trans. Rough Sets, 2004
ModInt: Compact Modular Arithmatic Class Library Available on Cellular Phone and its Application to Secure Electronic Voting System.
Proceedings of the Security and Protection in Information Processing Systems, 2004
Proceedings of the Automated Technology for Verification and Analysis: Second International Conference, 2004
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
2002
Int. J. Intell. Syst., 2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
Proceedings of the Information Security, 5th International Conference, 2002
Proceedings of the 32nd IEEE International Symposium on Multiple-Valued Logic (ISMVL 2002), 2002
2001
Proceedings of the 31st IEEE International Symposium on Multiple-Valued Logic, 2001
Proceedings of the 15th International Conference on Information Networking, 2001
Proceedings of the 10th IEEE International Conference on Fuzzy Systems, 2001
Proceedings of the 10th IEEE International Conference on Fuzzy Systems, 2001
2000
Distributed auction servers resolving winner and winning bid without revealing privacy of bids.
Proceedings of the Seventh International Conference on Parallel and Distributed Systems Workshops, 2000
1999
Proceedings of the Information Security, Second International Workshop, 1999
Performance Evaluation of Public-Key Certificate Revocation System with Balanced Hash Tree.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999
1998
IEEE Trans. Syst. Man Cybern. Part A, 1998
Proceedings of the 3rd USENIX Workshop on Electronic Commerce, Boston, Massachusetts, USA, August 31, 1998
1997
Fuzzy system identification for composite operation and fuzzy relation by genetic algorithms.
Proceedings of the Knowledge-Based Intelligent Electronic Systems, 1997
1995
Structure Identification of Acquired Knowledge in Fuzzy Inference by Genetic Algorithms.
Proceedings of the Fuzzy Logic, Neural Networks, and Evolutionary Computation, 1995
Proceedings of the 25th IEEE International Symposium on Multiple-Valued Logic, 1995
Proceedings of the 25th IEEE International Symposium on Multiple-Valued Logic, 1995