Hiroshi Yoshiura
According to our database1,
Hiroshi Yoshiura
authored at least 87 papers
between 1984 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Personal Authentication for Periocular Region in Thermal and Visible Light Images by Using CNN.
J. Inf. Process., 2024
Machine-Learning-Based Re-identification of Location Histories Using Features Considering Sparsity Obtained from Social Networking Services.
Proceedings of the 13th IEEE Global Conference on Consumer Electronics, 2024
2023
Explainable Multimodal Fake Posts Detection Using Feature Extraction with Attention Mechanisms.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023
Cross-Spectral Periocular Recognition by Translating Thermal Images into Visible Light Images.
Proceedings of the 12th IEEE Global Conference on Consumer Electronics, 2023
2022
Machine Learning based Re-identification of Location Histories using Contact Information Collected from Social Networking Services.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022
Proceedings of the ICDLT 2022: 6th International Conference on Deep Learning Technologies, Xi'an, China, July 26, 2022
2021
Reliability-Disguised Attacks on Social Network to Accelerate Fake News Dissemination.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
Proceedings of the Responsible AI and Analytics for an Ethical and Inclusive Digitized Society, 2021
Proceedings of the 10th IEEE Global Conference on Consumer Electronics, 2021
2020
Time-aware multi-resolutional approach to re-identifying location histories by using social networks.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020
A Fake News Dissemination Model Based on Updating Reliability and Doubt among Individuals.
Proceedings of the 11th International Conference on Awareness Science and Technology, 2020
2019
Proceedings of the IEEE 10th International Conference on Awareness Science and Technology, 2019
Proceedings of the IEEE 10th International Conference on Awareness Science and Technology, 2019
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019
2018
Personal Identification by Integrating a Number of Features from Iris and Periocular Region Using AdaBoost.
J. Inf. Process., 2018
2016
IEICE Trans. Commun., 2016
Breaking Anonymity of Social Network Accounts by Using Coordinated and Extensible Classifiers Based on Machine Learning.
Proceedings of the Social Media: The Good, the Bad, and the Ugly, 2016
2015
IEEE Trans. Consumer Electron., 2015
J. Inf. Process., 2015
Anonymizing Personal Text Messages Posted in Online Social Networks and Detecting Disclosures of Personal Information.
IEICE Trans. Inf. Syst., 2015
Proceedings of the IEEE International Conference on Consumer Electronics, 2015
Transportation means identification of content delivery system for consumer electronic devices.
Proceedings of the IEEE International Conference on Consumer Electronics, 2015
Proceedings of the Business Information Systems Workshops, 2015
Proceedings of the Business Information Systems Workshops, 2015
2014
A System for Anonymizing Temporal Phrases of Message Posted in Online Social Networks and for Detecting Disclosure.
Proceedings of the Ninth International Conference on Availability, 2014
Effects of External Information on Anonymity and Role of Transparency with Example of Social Network De-anonymisation.
Proceedings of the Ninth International Conference on Availability, 2014
2013
Ineluctable background checking on social networks: Linking job seeker's résumé and posts.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013
Anonymizing Temporal Phrases in Natural Language Text to be Posted on Social Networking Services.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013
Detection of malware infection using score level fusion with Kernel Fisher Discriminant Analysis.
Proceedings of the IEEE 2nd Global Conference on Consumer Electronics, 2013
Proceedings of the Databases in Networked Information Systems - 8th International Workshop, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
PC-Based Real-Time Video Watermark Embedding System Independent of Platform for Parallel Computing.
Trans. Data Hiding Multim. Secur., 2012
Reducing Communication Complexity of Random Number Bitwise-Sharing for Efficient Multi-party Computation.
J. Inf. Process., 2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012
Automatic Anonymization of Natural Languages Texts Posted on Social Networking Services and Automatic Detection of Disclosure.
Proceedings of the Seventh International Conference on Availability, 2012
A Private Information Detector for Controlling Circulation of Private Information through Social Networks.
Proceedings of the Seventh International Conference on Availability, 2012
2011
Accelerating Multiparty Computation by Efficient Random Number Bitwise-Sharing Protocols.
Proceedings of the Information Security Applications - 12th International Workshop, 2011
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
2010
J. Digit. Forensics Secur. Law, 2010
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010
Unified Metric for Measuring Anonymity and Privacy with Application to Online Social Network.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010
Proceedings of the Software Services for e-World, 2010
In-depth Evaluation of Content-Based Phishing Detection to Clarify Its Strengths and Limitations.
Proceedings of the U- and E-Service, Science and Technology, 2010
Approach to Privacy-Preserve Data in Two-Tiered Wireless Sensor Network Based on Linear System and Histogram.
Proceedings of the U- and E-Service, Science and Technology, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
2009
Int. J. Knowl. Based Intell. Eng. Syst., 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
2008
Evaluation of PC-Based Real-Time Watermark Embedding System for Standard-Definition Video Stream.
Proceedings of the New Directions in Intelligent Interactive Multimedia, 2008
Evaluation of Integrity Verification System for Video Content Using Digital Watermarking.
Proceedings of the New Directions in Intelligent Interactive Multimedia, 2008
Robust Video Watermarking based on Dual-plane Correlation for Immunity to Rotation, Scale, Translation, and Random Distortion.
J. Digit. Inf. Manag., 2008
Evaluation and Improvement of Digital Watermarking Algorithm Based on Cryptographic Security Models.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Electronic Voting Scheme to Maintain Anonymity in Small-scale Election by Hiding the Number of Votes.
Proceedings of the The Third International Conference on Availability, 2008
2007
Proceedings of the Intelligent Multimedia Data Hiding: New Directions, 2007
Disclosure Control of Natural Language Information to Enable Secure and Enjoyable Communication over the Internet - (Transcript of Discussion).
Proceedings of the Security Protocols, 2007
Disclosure Control of Natural Language Information to Enable Secure and Enjoyable Communication over the Internet.
Proceedings of the Security Protocols, 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
2006
Inf. Media Technol., 2006
Maintaining Picture Quality and Improving Robustness of Color Watermarking by Using Human Vision Models.
IEICE Trans. Inf. Syst., 2006
Proceedings of the IEEE International Conference on Systems, 2006
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
Dual-Plane Watermarking for Color Pictures Immune to Rotation, Scale, Translation, and Random Bending.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
2005
Int. J. Image Graph., 2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Proceedings of the IEEE International Conference on Systems, 2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Correlation-based model of color picture watermarking against random geometric distortion.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005
Proceedings of the Challenges of Expanding Internet: E-Commerce, 2005
2004
Color Picture Watermarking Correlating Two Constituent Planes for Immunity to Random Geometric Distortion.
IEICE Trans. Inf. Syst., 2004
2003
Proceedings of the Digital Watermarking, Second International Workshop, 2003
2002
Proceedings of the Security Protocols, 2002
Proceedings of the Security Protocols, 2002
2001
Proceedings of the Security Protocols, 2001
Proceedings of the Security Protocols, 2001
2000
Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis.
Proceedings of the Security Protocols, 2000
Authentication Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis (Transcript of Discussion).
Proceedings of the Security Protocols, 2000
Proceedings of the Seventh International Conference on Parallel and Distributed Systems Workshops, 2000
1999
IEEE Trans. Consumer Electron., 1999
Proceedings of the Security Protocols, 1999
1998
Proceedings of the Security Protocols, 1998
1984
Computer, 1984