Tetsushi Ohki

Orcid: 0000-0001-6636-9394

According to our database1, Tetsushi Ohki authored at least 58 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Synthesizing differentially private location traces including co-locations.
Int. J. Inf. Sec., February, 2024

Ensemble Malware Classifier Considering PE Section Information.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024

Multibiometrics Using a Single Face Image.
CoRR, 2024

ExpressionAuth: Utilizing Avatar Expression Blendshapes for Behavioral Biometrics in VR.
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2024

DAP PLXENT#x1D107; : Develop pair-Authentication Protocol with DAP.
Proceedings of the Adjunct Proceedings of the 26th International Conference on Mobile Human-Computer Interaction, 2024

MagSerea: Fingerprinting Magnetic Field of Specified Area with Wearable Sensors.
Proceedings of the Adjunct Proceedings of the 26th International Conference on Mobile Human-Computer Interaction, 2024

LabellessFace: Fair Metric Learning for Face Recognition without Attribute Labels.
Proceedings of the IEEE International Joint Conference on Biometrics, 2024

A Human-Centered Risk Evaluation of Biometric Systems Using Conjoint Analysis.
Proceedings of the IEEE International Joint Conference on Biometrics, 2024

Electrical Muscle Stimulation System for Automatic Reproduction of Secret Information Without Exposing Biometric Data.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2024

Are Dark Patterns Self-destructive for Service Providers?: Revealing Their Impacts on Usability and User Satisfaction.
Proceedings of the HCI in Business, Government and Organizations, 2024

Perceiving Human Psychological Consistency: Attack Detection Against Advanced Persistent Social Engineering.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024

The Catcher in the Eye: Recognizing Users by their Blinks.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023

PinchKey: A Natural and User-Friendly Approach to VR User Authentication.
Proceedings of the 2023 European Symposium on Usable Security, 2023

Scheme for Selection of Deceptions as a Countermeasure for Insider Threats.
Proceedings of the Advances on Broad-Band and Wireless Computing, Communication and Applications, 2023

Development of a Robust Ear Recognition Algorithm using Planar Approximation.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

2022
Multi-observed Multi-factor Authentication: A Multi-factor Authentication Using Single Credential.
Proceedings of the Advances in Network-Based Information Systems, 2022

Improving Rank-N Identification Rate of Palmprint Identification Using Permutation-Based Indexing.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2022

Privacy-aware Snippets: Enhancing Assessment of Balance between Privacy Risks and Benefits in Web Search.
Proceedings of the GoodIT 2022: ACM International Conference on Information Technology for Social Good, Limassol, Cyprus, September 7, 2022

Improving Classification Accuracy by Optimizing Activation Function for Convolutional Neural Network on Homomorphic Encryption.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2022

Improving Palmprint-Region Estimation for ID-Less Palmprint Recognition.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2022

Model-Free Template Reconstruction Attack with Feature Converter.
Proceedings of the 21st International Conference of the Biometrics Special Interest Group, 2022

Improving Robustness and Visibility of Adversarial CAPTCHA Using Low-Frequency Perturbation.
Proceedings of the Advanced Information Networking and Applications, 2022

2021
Deterrence-Based Trust: A Study on Improving the Credibility of Social Media Messages in Disaster Using Registered Volunteers.
Proceedings of the Advances in Networked-Based Information Systems, 2021

Synthesizing Privacy-Preserving Location Traces Including Co-locations.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021

Improved Post-quantum-secure Face Template Protection System Based on Packed Homomorphic Encryption.
Proceedings of the 20th International Conference of the Biometrics Special Interest Group, 2021

Examining of Shallow Autoencoder on Black-box Attack against Face Recognition.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2021

2020
A Liveness Detection Method for Palmprint Authentication.
Proceedings of the Intelligent Human Systems Integration 2020, 2020

Communication Protocol Between Humans and Bank Server Secure Against Man-in-the-Browser Attacks.
Proceedings of the Intelligent Human Systems Integration 2020, 2020

Understanding the Impact of Service Trials on Privacy Disclosure.
Proceedings of the HCI International 2020 - Posters - 22nd International Conference, 2020

Study on Possibility of Estimating Smartphone Inputs from Tap Sounds.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020

Micro Biometric Authentication Using Fingernail Surfaces: A Study of Practical Use.
Proceedings of the Advanced Information Networking and Applications, 2020

2019
Cancelable indexing based on low-rank approximation of correlation-invariant random filtering for fast and secure biometric identification.
Pattern Recognit. Lett., 2019

Cancelable Permutation-Based Indexing for Secure and Efficient Biometric Identification.
IEEE Access, 2019

On Trust Confusional, Trust Ignorant, and Trust Transitions.
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019

DiReCT: Disaster Response Coordination with Trusted Volunteers.
Proceedings of the 5th International Conference on Information and Communication Technologies for Disaster Management, 2019

PDH : Probabilistic Deep Hashing Based on Map Estimation of Hamming Distance.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

Efficient Spoofing Attack Detection against Unknown Sample using End-to-End Anomaly Detection.
Proceedings of the 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2019

2018
A Study on Human Reflex-Based Biometric Authentication Using Eye-Head Coordination.
Proceedings of the Advances in Network-Based Information Systems, 2018

Micro Disposable Biometric Authentication: An Application Using Fingernail Minute Textures for Nonsensitive Services.
Proceedings of the 2018 3rd International Conference on Biomedical Imaging, 2018

Automatic Examination-Based Whitelist Generation for XSS Attack Detection.
Proceedings of the Advances on Broadband and Wireless Computing, 2018

Face/Fingerphoto Spoof Detection under Noisy Conditions by using Deep Convolutional Neural Network.
Proceedings of the 11th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2018), 2018

Biometric Bit String Generation for Smart-Phones Using Voice Data.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

Ransomware Detection Considering User's Document Editing.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
Toward More Secure and Convenient User Authentication in Smart Device Era.
IEICE Trans. Inf. Syst., 2017

A Secure and Practical Signature Scheme for Blockchain Based on Biometrics.
Proceedings of the Information Security Practice and Experience, 2017

Theoretical vulnerabilities in map speaker adaptation.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

A Study on Autoencoder-based Reconstruction Method for Wi-Fi Location Data with Erasures.
Proceedings of the 2017 on Multimedia Privacy and Security, 2017

2016
Optimal sequential fusion for multibiometric cryptosystems.
Inf. Fusion, 2016

2014
Theoretical vulnerability in likelihood-ratio-based biometric verification.
Proceedings of the IEEE International Joint Conference on Biometrics, Clearwater, 2014

A consideration on a common template-based biometric cryptosystem using on-line signatures.
Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014

2013
Security performance evaluation for biometric template protection techniques.
Int. J. Biom., 2013

New Security Definitions for Biometric Authentication with Template Protection: Toward covering more threats against authentication systems.
Proceedings of the 2013 BIOSIG, 2013

2012
Evaluation of wolf attack for classified target on speaker verification systems.
Proceedings of the 12th International Conference on Control Automation Robotics & Vision, 2012

Evaluation of security for biometric guessing attacks in biometric cryptosystem using fuzzy commitment scheme.
Proceedings of the 2012 BIOSIG, 2012

2010
A metric of identification performance of biometrics based on information content.
Proceedings of the 11th International Conference on Control, 2010

2008
On biometric encryption using fingerprint and it's security evaluation.
Proceedings of the 10th International Conference on Control, 2008

2006
Safety of templates in biometric person authentication using error-correcting code.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006


  Loading...