Rie Shigetomi Yamaguchi
Orcid: 0000-0002-6359-2221
According to our database1,
Rie Shigetomi Yamaguchi
authored at least 48 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Forgery Resistance of User Authentication Methods Using Location, Wi-Fi and Their Correlation.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
2023
Privacy preserving medical knowledge discovery by multiple "patient characteristics" formatted data.
Int. J. Netw. Comput., 2023
Trade-Off Between Authentication Performance and Detection Time for Zero-Effort Attack in Location-Based Authentication.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023
Disclosure of Multiple "Patient Characteristics" Format Statistics leaks Quasi-identifier Linkage.
Proceedings of the 9th ACM International Workshop on Security and Privacy Analytics, 2023
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023
Proceedings of the Brain Informatics - 16th International Conference, 2023
Optimization of Public Bus Route in a Smart City Utilizing Real-time Human Location Data Analysis.
Proceedings of the IEEE International Conference on Big Data, 2023
Proceedings of the 5th International Conference on Big-data Service and Intelligent Computation, 2023
2022
Proceedings of the International Symposium on Information Theory and Its Applications, 2022
Proceedings of the Tenth International Symposium on Computing and Networking, 2022
Medical knowledge discovery by randomly sampled "patient characteristics" formatted data.
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022
Anonymity test attacks and vulnerability indicators for the "Patient characteristics" disclosure in medical articles.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022
Evaluating the Performance Acceleration of Generalized Linear Solver using Normal Equation on Three Architectures for Tall Skinny Datasets.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2022
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2022
Proceedings of the IWSPA@CODASPY 2022: Proceedings of the 2022 ACM on International Workshop on Security and Privacy Analytics, 2022
Multi-factor Behavioral Authentication Using Correlations Enhanced by Neural Network-based Score Fusion.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022
2021
Proceedings of the International Joint Conference on Neural Networks, 2021
Learning from Smartphone Location Data as Anomaly Detection for Behavioral Authentication through Deep Neuroevolution.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
Effects of Data Sampling Interval on Accuracy of Authentication Using Wi-Fi Information Captured by Smartphone.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021
Proceedings of the Advanced Information Networking and Applications, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Int. J. Netw. Comput., 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the International Symposium on Information Theory and Its Applications, 2020
Proceedings of the Eighth International Symposium on Computing and Networking Workshops, 2020
Proceedings of the Eighth International Symposium on Computing and Networking Workshops, 2020
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020
Proceedings of the IEEE Intl Conf on Dependable, 2020
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
User authentication based on smartphone application usage patterns through learning classifier systems.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
Proceedings of the 7th International Conference on Behavioural and Social Computing, 2020
Effective Classification for Multi-modal Behavioral Authentication on Large-Scale Data.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020
Proceedings of the Applied Cryptography and Network Security, 2020
2019
Accelerating Solution of Generalized Linear Models by Solving Normal Equation Using GPGPU on a Large Real-World Tall-Skinny Data Set.
Proceedings of the 31st International Symposium on Computer Architecture and High Performance Computing, 2019
Privacy Preserving Scheme for Operating Frequency of Incumbents in Citizens Broadband Radio Service.
Proceedings of the 2019 IEEE International Symposium on Dynamic Spectrum Access Networks, 2019
Large Scale PoC Experiment with 57, 000 people to Accumulate Patterns for Lifestyle Authentication.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
Proceedings of the 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2019
2018
Proceedings of the 10th International Conference on Communication Systems & Networks, 2018
Preliminary study about advantageous trajectory anonymization methods based on population.
Proceedings of the 10th International Conference on Communication Systems & Networks, 2018
2017
Behavioral Authentication Method Utilizing Wi-Fi History Information Captured by IoT Device.
Proceedings of the 2017 International Workshop on Secure Internet of Things, 2017
2016
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
Multi-factor Authentication Updating System Evaluation Dynamically for Service Continuity.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
2015
Proceedings of the Information Security Applications - 16th International Workshop, 2015
A Behavior Authentication Method Using Wi-Fi BSSIDs around Smartphone Carried by a User.
Proceedings of the Third International Symposium on Computing and Networking, 2015
2014
A cloud architecture for protecting guest's information from malicious operators with memory management.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
2012
Applicability of existing anonymization methods to large location history data in urban travel.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012