Rie Shigetomi Yamaguchi

Orcid: 0000-0002-6359-2221

According to our database1, Rie Shigetomi Yamaguchi authored at least 48 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Forgery Resistance of User Authentication Methods Using Location, Wi-Fi and Their Correlation.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

2023
Privacy preserving medical knowledge discovery by multiple "patient characteristics" formatted data.
Int. J. Netw. Comput., 2023

Trade-Off Between Authentication Performance and Detection Time for Zero-Effort Attack in Location-Based Authentication.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023

Disclosure of Multiple "Patient Characteristics" Format Statistics leaks Quasi-identifier Linkage.
Proceedings of the 9th ACM International Workshop on Security and Privacy Analytics, 2023

Impact of Anonymity Indicator "PFDOC Entropy l-Diversity" on Medical Data Utility.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023

Brain Intervention Therapy Dilemma: Functional Recovery versus Identity.
Proceedings of the Brain Informatics - 16th International Conference, 2023

Optimization of Public Bus Route in a Smart City Utilizing Real-time Human Location Data Analysis.
Proceedings of the IEEE International Conference on Big Data, 2023

XAI for Medicine by ChatGPT Code interpreter.
Proceedings of the 5th International Conference on Big-data Service and Intelligent Computation, 2023

2022
Preserving Operation Frequency Privacy of Incumbents in CBRS.
IEEE Access, 2022

Behavioral Authentication Method Focusing on the Tendency of the Days of the Week.
Proceedings of the International Symposium on Information Theory and Its Applications, 2022

Component-Wise Natural Gradient Descent - An Efficient Neural Network Optimization.
Proceedings of the Tenth International Symposium on Computing and Networking, 2022

Medical knowledge discovery by randomly sampled "patient characteristics" formatted data.
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022

Anonymity test attacks and vulnerability indicators for the "Patient characteristics" disclosure in medical articles.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

Evaluating the Performance Acceleration of Generalized Linear Solver using Normal Equation on Three Architectures for Tall Skinny Datasets.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2022

Component-Wise Natural Gradient Descent on Deep Neural Networks.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2022

Enhancing Boundary Attack in Adversarial Image Using Square Random Constraint.
Proceedings of the IWSPA@CODASPY 2022: Proceedings of the 2022 ACM on International Workshop on Security and Privacy Analytics, 2022

Multi-factor Behavioral Authentication Using Correlations Enhanced by Neural Network-based Score Fusion.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

2021
OPA2D: One-Pixel Attack, Detection, and Defense in Deep Neural Networks.
Proceedings of the International Joint Conference on Neural Networks, 2021

Learning from Smartphone Location Data as Anomaly Detection for Behavioral Authentication through Deep Neuroevolution.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

Effects of Data Sampling Interval on Accuracy of Authentication Using Wi-Fi Information Captured by Smartphone.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021

Lifestyle Authentication Using a Correlation Between Activity and GPS/Wi-Fi Data.
Proceedings of the Advanced Information Networking and Applications, 2021

Template Protected Authentication based on Location History and b-Bit MinHash.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Redefine and Organize, 4th Authentication Factor, Behavior.
Int. J. Netw. Comput., 2020

Boosting Homograph Attack Classification Using Ensemble Learning and N-gram Model.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Score Fusion Method by Neural Network Using GPS and Wi-Fi Log Data.
Proceedings of the International Symposium on Information Theory and Its Applications, 2020

Enhanced Classification Method for Homograph Attack Detection.
Proceedings of the Eighth International Symposium on Computing and Networking Workshops, 2020

Predicting Smartphone Users' Future Locations through Deep Reinforcement Learning.
Proceedings of the Eighth International Symposium on Computing and Networking Workshops, 2020

GPS-Based Behavioral Authentication Utilizing Distance Coherence.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020

Self-enhancing GPS-Based Authentication Using Corresponding Address.
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020

Enhancing A New Classification for IDN Homograph Attack Detection.
Proceedings of the IEEE Intl Conf on Dependable, 2020

A Score Fusion Method by Neural Network in Multi-Factor Authentication.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

User authentication based on smartphone application usage patterns through learning classifier systems.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Effects of Temporal Factors on Human Mobility Lifestyle Through GPS Information.
Proceedings of the 7th International Conference on Behavioural and Social Computing, 2020

Effective Classification for Multi-modal Behavioral Authentication on Large-Scale Data.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

Human Factors in Homograph Attack Recognition.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Accelerating Solution of Generalized Linear Models by Solving Normal Equation Using GPGPU on a Large Real-World Tall-Skinny Data Set.
Proceedings of the 31st International Symposium on Computer Architecture and High Performance Computing, 2019

Privacy Preserving Scheme for Operating Frequency of Incumbents in Citizens Broadband Radio Service.
Proceedings of the 2019 IEEE International Symposium on Dynamic Spectrum Access Networks, 2019

Large Scale PoC Experiment with 57, 000 people to Accumulate Patterns for Lifestyle Authentication.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Preserving Users' Privacy for Location-Based Services.
Proceedings of the 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2019

2018
Lifestyle authentication and MITHRA project.
Proceedings of the 10th International Conference on Communication Systems & Networks, 2018

Preliminary study about advantageous trajectory anonymization methods based on population.
Proceedings of the 10th International Conference on Communication Systems & Networks, 2018

2017
Behavioral Authentication Method Utilizing Wi-Fi History Information Captured by IoT Device.
Proceedings of the 2017 International Workshop on Secure Internet of Things, 2017

2016
One hour term authentication for Wi-Fi information captured by smartphone sensors.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

Multi-factor Authentication Updating System Evaluation Dynamically for Service Continuity.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

2015
Cost-Effective Modeling for Authentication and Its Application to Activity Tracker.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

A Behavior Authentication Method Using Wi-Fi BSSIDs around Smartphone Carried by a User.
Proceedings of the Third International Symposium on Computing and Networking, 2015

2014
A cloud architecture for protecting guest's information from malicious operators with memory management.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

2012
Applicability of existing anonymization methods to large location history data in urban travel.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012


  Loading...