Takao Murakami

Orcid: 0000-0002-5110-1261

According to our database1, Takao Murakami authored at least 60 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Degree-Preserving Randomized Response for Graph Neural Networks under Local Differential Privacy.
Trans. Data Priv., May, 2024

Synthesizing differentially private location traces including co-locations.
Int. J. Inf. Sec., February, 2024

Federated Graph Analytics with Differential Privacy.
CoRR, 2024

CARGO: Crypto-Assisted Differentially Private Triangle Counting Without Trusted Servers.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024

Card-Based Cryptography Meets Differential Privacy.
Proceedings of the 12th International Conference on Fun with Algorithms, 2024

2023
Automatic Tuning of Privacy Budgets in Input-Discriminative Local Differential Privacy.
IEEE Internet Things J., September, 2023

Designing a Location Trace Anonymization Contest.
Proc. Priv. Enhancing Technol., January, 2023

Two-Dimensional Dynamic Fusion for Continuous Authentication.
Proceedings of the IEEE International Joint Conference on Biometrics, 2023

2022
Differentially Private Subgraph Counting in the Shuffle Model.
CoRR, 2022

Communication-Efficient Triangle Counting under Local Differential Privacy.
Proceedings of the 31st USENIX Security Symposium, 2022

Differentially Private Triangle and 4-Cycle Counting in the Shuffle Model.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

A Crypto-Assisted Approach for Publishing Graph Statistics with Node Local Differential Privacy.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Toward Evaluating Re-identification Risks in the Local Privacy Model.
Trans. Data Priv., 2021

Privacy-Preserving Multiple Tensor Factorization for Synthesizing Large-Scale Location Traces with Cluster-Specific Features.
Proc. Priv. Enhancing Technol., 2021

Locally Differentially Private Analysis of Graph Statistics.
Proceedings of the 30th USENIX Security Symposium, 2021

TransMIA: Membership Inference Attacks Using Transfer Shadow Training.
Proceedings of the International Joint Conference on Neural Networks, 2021

Synthesizing Privacy-Preserving Location Traces Including Co-locations.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021

Locality Sensitive Hashing with Extended Differential Privacy.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
Exposing Private User Behaviors of Collaborative Filtering via Model Inversion Techniques.
Proc. Priv. Enhancing Technol., 2020

2019
Cancelable indexing based on low-rank approximation of correlation-invariant random filtering for fast and secure biometric identification.
Pattern Recognit. Lett., 2019

Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions.
IACR Cryptol. ePrint Arch., 2019

Privacy-Preserving Multiple Tensor Factorization for Synthesizing Large-Scale Location Traces.
CoRR, 2019

Local Distribution Obfuscation via Probability Coupling.
CoRR, 2019

Cancelable Permutation-Based Indexing for Secure and Efficient Biometric Identification.
IEEE Access, 2019

Utility-Optimized Local Differential Privacy Mechanisms for Distribution Estimation.
Proceedings of the 28th USENIX Security Symposium, 2019

Local Obfuscation Mechanisms for Hiding Probability Distributions.
Proceedings of the Computer Security - ESORICS 2019, 2019

Local Distribution Obfuscation via Probability Coupling<sup>*</sup>.
Proceedings of the 57th Annual Allerton Conference on Communication, 2019

2018
Toward Distribution Estimation under Local Differential Privacy with Small Samples.
Proc. Priv. Enhancing Technol., 2018

How to Handle Excessively Anonymized Datasets.
J. Inf. Process., 2018

Model Inversion Attacks for Online Prediction Systems: Without Knowledge of Non-Sensitive Attributes.
IEICE Trans. Inf. Syst., 2018

Differentially Private Obfuscation Mechanisms for Hiding Probability Distributions.
CoRR, 2018

Restricted Local Differential Privacy for Distribution Estimation with High Data Utility.
CoRR, 2018

A Succinct Model for Re-identification of Mobility Traces Based on Small Training Data.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

On the Anonymization of Differentially Private Location Obfuscation.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Face/Fingerphoto Spoof Detection under Noisy Conditions by using Deep Convolutional Neural Network.
Proceedings of the 11th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2018), 2018

A Generalization of the Theory of Biometric System Entropy.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
Group Sparsity Tensor Factorization for Re-Identification of Open Mobility Traces.
IEEE Trans. Inf. Forensics Secur., 2017

Expectation-Maximization Tensor Factorization for Practical Location Privacy Attacks.
Proc. Priv. Enhancing Technol., 2017

Modality Selection Attacks and Modality Restriction in Likelihood-Ratio Based Biometric Score Fusion.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Signature Schemes with a Fuzzy Private Key.
IACR Cryptol. ePrint Arch., 2017

Model Inversion Attacks for Prediction Systems: Without Knowledge of Non-Sensitive Attributes.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

A Secure and Practical Signature Scheme for Blockchain Based on Biometrics.
Proceedings of the Information Security Practice and Experience, 2017

2016
Localization Attacks Using Matrix and Tensor Factorization.
IEEE Trans. Inf. Forensics Secur., 2016

Optimal sequential fusion for multibiometric cryptosystems.
Inf. Fusion, 2016

Information-Theoretic Performance Evaluation of Multibiometric Fusion under Modality Selection Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

On restricting modalities in likelihood-ratio based biometric score fusion.
Proceedings of the 23rd International Conference on Pattern Recognition, 2016

Fuzzy Signatures: Relaxing Requirements and a New Construction.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Group Sparsity Tensor Factorization for De-anonymization of Mobility Traces.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Information-theoretic performance evaluation of likelihood-ratio based biometric score fusion under modality selection attacks.
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015

A Signature Scheme with a Fuzzy Private Key.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Toward Optimal Fusion Algorithms With Security Against Wolves and Lambs in Biometrics.
IEEE Trans. Inf. Forensics Secur., 2014

A measure of information gained through biometric systems.
Image Vis. Comput., 2014

A General Framework and Algorithms for Score Level Indexing and Fusion in Biometric Identification.
IEICE Trans. Inf. Syst., 2014

Location prediction attacks using tensor factorization and optimal defenses.
Proceedings of the 2014 IEEE International Conference on Big Data (IEEE BigData 2014), 2014

2013
Probabilistic enhancement of approximate indexing in metric spaces.
Inf. Syst., 2013

2012
Towards optimal countermeasures against wolves and lambs in biometrics.
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012

2011
Versatile probability-based indexing for approximate similarity search.
Proceedings of the Fourth International Conference on Similarity Search and Applications, 2011

Fast and accurate biometric identification using score level indexing and fusion.
Proceedings of the 2011 IEEE International Joint Conference on Biometrics, 2011

2009
Accuracy improvement with high convenience in biometric identification using multihypothesis sequential probability ratio test.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

2005
Japanese vowel recognition based on structural representation of speech.
Proceedings of the 9th European Conference on Speech Communication and Technology, 2005


  Loading...