Kazuhiro Minami

Orcid: 0000-0001-8452-1951

According to our database1, Kazuhiro Minami authored at least 36 papers between 2001 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
When should we use top coding in locally private estimation?
Int. J. Inf. Sec., February, 2025

2024
Utility Analysis of Differentially Private Anonymized Data Based on Random Sampling.
Proceedings of the Privacy in Statistical Databases - International Conference, 2024

2023
Differentially Private Frequency Tables Based on Random Sampling.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Membership Inference Countermeasure With A Partially Synthetic Data Approach.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

Flexible Partitioning of Geographical Information based on GPS Coordinates for k-Anonymity.
Proceedings of the IEEE International Conference on Big Data, 2022

Matching Attacks on Non-deterministic Algorithms for Cell Suppression Problem for Tabular Data.
Proceedings of the IEEE International Conference on Big Data, 2022

One-bit Submission for Locally Private Quasi-MLE: Its Asymptotic Normality and Limitation.
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2022

2020
Proposal of a Training Method for Beat Count Ability.
Proceedings of the Learning and Collaboration Technologies. Designing, Developing and Deploying Learning Experiences, 2020

2019
Algorithmic Matching Attacks on Optimally Suppressed Tabular Data.
Algorithms, 2019

Proposal of a Beat Count Ability Measurement for Learning DJ Mixing.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

2016
Formalization of resilience for constraint-based dynamic systems.
J. Reliab. Intell. Environ., 2016

2014
Evaluating data utility of privacy-preserving pseudonymized location datasets.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014

On Safety of Pseudonym-Based Location Data in the Context of Constraint Satisfation Problems.
Proceedings of the Information and Communication Technology, 2014

Preventing denial-of-request inference attacks in location-sharing services.
Proceedings of the Seventh International Conference on Mobile Computing and Ubiquitous Networking, 2014

Pseudonym exchange for privacy-preserving publishing of trajectory data set.
Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014

2013
Protecting location privacy with k-confusing paths based on dynamic pseudonyms.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

Systems resilience: a challenge problem for dynamic constraint-based agent systems.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

ICHIGAN Security - A Security Architecture That Enables Situation-Based Policy Switching.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

Privacy-Preserving Publishing of Pseudonym-Based Trajectory Location Data Set.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2011
Confidentiality-preserving proof theories for distributed proof systems.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
On the consistency of distributed proofs with hidden subtrees.
ACM Trans. Inf. Syst. Secur., 2010

Protecting location privacy against inference attacks.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Safety in discretionary access control for logic-based publish-subscribe systems.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Confidentiality-preserving distributed proofs of conjunctive queries.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
Secure aggregation in a publish-subscribe system.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

Classifying pulmonary nodules using dynamic enhanced CT images based on CT number histogram.
Proceedings of the Medical Imaging 2008: Computer-Aided Diagnosis, San Diego, 2008

2007
Single-bit re-encryption with applications to distributed proof systems.
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007

Lightweight cnsistency enforcement schemes for distributed proofs with hidden subtrees.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Classifying pulmonary nodules using dynamic enhanced CT images based on CT number histogram.
Proceedings of the Medical Imaging 2007: Computer-Aided Diagnosis, San Diego, 2007

2006
Naming and Discovery in Mobile Systems.
Proceedings of the Handbook of Mobile Middleware., 2006

Secure Context-sensitive Authorization.
PhD thesis, 2006

Scalability in a Secure Distributed Proof System.
Proceedings of the Pervasive Computing, 2006

2005
Secure context-sensitive authorization.
Pervasive Mob. Comput., 2005

2001
Computerized characterization of contrast enhancement patterns for classifying pulmonary nodules.
Proceedings of the Medical Imaging 2001: Image Processing, 2001

Patterns for classifying pulmonary nodules based on dynamic CT images.
Proceedings of the CARS 2001. Computer Assisted Radiology and Surgery. Proceedings of the 15th International Congress and Exhibition, 2001

Securing Web Servers against Insider Attack .
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001


  Loading...