Hiroaki Kikuchi

According to our database1, Hiroaki Kikuchi authored at least 118 papers between 1995 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Privacy-Preserving Hypothesis Testing for Reduced Cancer Risk on Daily Physical Activity.
J. Medical Systems, 2018

How to Handle Excessively Anonymized Datasets.
JIP, 2018

Privacy-Preserving Multiple Linear Regression of Vertically Partitioned Real Medical Datasets.
JIP, 2018

Probably Secure Efficient Anonymous Credential Scheme.
IJSI, 2018

Study on Record Linkage of Anonymizied Data.
IEICE Transactions, 2018

Evaluation and Development of Onomatopoeia CAPTCHAs.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Development of White List Based Autonomous Evolution of Defense System for RAT Malware.
Proceedings of the 13th Asia Joint Conference on Information Security, 2018

Risk of Re-identification from Payment Card Histories in Multiple Domains.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

Privacy Preserved Spectral Analysis Using IoT mHealth Biomedical Data for Stress Estimation.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
Multireceiver Predicate Encryption for Online Social Networks.
IEEE Trans. Signal and Information Processing over Networks, 2017

A Spatio-Temporal malware and country clustering algorithm: 2012 IIJ MITF case study.
Int. J. Inf. Sec., 2017

How Much is Risk Increased by Sharing Credential in Group?
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

Audio-CAPTCHA with distinction between random phoneme sequences and words spoken by multi-speaker.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

Risk of Re-Identification Based on Euclidean Distance in Anonymized Data PWSCUP2015.
Proceedings of the Advances in Network-Based Information Systems, 2017

Decision Tree Analysis on Environmental Factors of Insider Threats.
Proceedings of the HCI International 2017 - Posters' Extended Abstracts, 2017

Sharing or Non-sharing Credentials: A Study of What Motivates People to Be Malicious Insiders.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

Privacy-Preserving Multiple Linear Regression of Vertically Partitioned Real Medical Datasets.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
SWIPASS: Image-Based User Authentication for Touch Screen Devices.
JIP, 2016

Recursive-Rule Extraction Algorithm With J48graft And Applications To Generating Credit Scores.
J. Artif. Intell. Soft Comput. Res., 2016

Proposal and Evaluation of Cyber Defense System Using Blacklist Refined Based on Authentication Results.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments.
Proceedings of the Adjunct Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing Networking and Services, 2016

Interactive History Sniffing Attack with Amida Lottery.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Flexible Authentication Protocol with Key Reconstruction in WBAN Environments.
Proceedings of the 6th International Conference on IT Convergence and Security, 2016

Primary Factors of Malicious Insider in E-learning Model.
Proceedings of the HCI International 2016 - Posters' Extended Abstracts, 2016

A Study from the Data Anonymization Competition Pwscup 2015.
Proceedings of the Data Privacy Management and Security Assurance, 2016

Efficient Privacy-Preserving Logistic Regression with Iteratively Re-weighted Least Squares.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

Ice and Fire: Quantifying the Risk of Re-identification and Utility in Data Anonymization.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
Privacy-Preserving Decision Tree Learning with Boolean Target Class.
IEICE Transactions, 2015

Zipf distribution model for quantifying risk of re-identification from trajectory data.
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015

CAPTCHA System by Differentiating the Awkwardness of Objects.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

Automated Detection of Drive-By Download Attack.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Privacy-Preserving Epidemiological Analysis for a Distributed Database of Hospitals.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

Scalability of Privacy-Preserving Linear Regression in Epidemiological Studies.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

Cryptographic Operation Load-Balancing between Cryptographic Module and CPU.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
Vulnerability of the conventional accessible CAPTCHA used by the White House and an alternative approach for visually impaired people.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

Privacy-Preserving Dose-Response Relationship Test.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

On the Vulnerability of Ghost Domain Names.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

An Accessible CAPTCHA System for People with Visual Disability - Generation of Human/Computer Distinguish Test with Documents on the Net.
Proceedings of the Universal Access in Human-Computer Interaction. Design for All and Accessibility Practice, 2014

Secret Sharing Scheme with Efficient Keyword Search for Cloud Storage.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

Privacy-Preserving Hypothesis Testing for the Analysis of Epidemiological Medical Data.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
Mining Botnet Coordinated Attacks using Apriori-PrefixSpan Hybrid Algorithm.
JIP, 2013

Time Zone Correlation Analysis of Malware/Bot Downloads.
IEICE Transactions, 2013

Location Privacy Vulnerable from Bluetooth Devices.
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013

Privacy-Preserving Protocol for Epidemiology in Effect of Radiation.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size of an Intersection.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

Privacy-Preserving Distributed Decision Tree Learning with Boolean Class Attributes.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

Privacy-Preserving Collaborative Filtering on the Cloud and Practical Implementation Experiences.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Privacy preserving collaborative filtering for SaaS enabling PaaS clouds.
J. Cloud Computing, 2012

Accuracy of Privacy-Preserving Collaborative Filtering Based on Quasi-homomorphic Similarity.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

Feasibility of a privacy preserving collaborative filtering scheme on the Google App Engine: a performance case study.
Proceedings of the ACM Symposium on Applied Computing, 2012

Word Salad CAPTCHA - Application and Evaluation of Synthesized Sentences.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

Privacy-Preserving Collaborative Filtering Using Randomized Response.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Perturbation Based Privacy Preserving Slope One Predictors for Collaborative Filtering.
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012

Geographical Visualization of Malware Download for Anomaly Detection.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
Efficient Privacy-Preserving Collaborative Filtering Based on the Weighted Slope One Predictor.
J. Internet Serv. Inf. Secur., 2011

Perfect Privacy-preserving Automated Trust Negotiation.
JIP, 2011

Principal Component Analysis of Botnet Takeover.
JIP, 2011

Analysis on the Sequential Behavior of Malware Attacks.
IEICE Transactions, 2011

Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasets.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

Improving Efficiency in Privacy-Preserving Automated Trust Negotiation with Conjunctive Policies.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

Apriori-PrefixSpan Hybrid Approach for Automated Detection of Botnet Coordinated Attacks.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

Distributed Collaborative Filtering Protocol Based on Quasi-homomorphic Similarity.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Privacy-preserving Collaborative Filtering for the Cloud.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

Perfect Privacy Preserving in Automated Trust Negotiation.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

2010
Principal Component Analysis of Port-scans for Reduction of Distributed Sensors.
JIP, 2010

Foreword.
IEICE Transactions, 2010

A discovery of sequential attack patterns of malware in botnets.
Proceedings of the IEEE International Conference on Systems, 2010

Mining Association Rules Consisting of Download Servers from Distributed Honeypot Observation.
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010

Privacy-Preserving Collaborative Filtering Protocol Based on Similarity between Items.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

Heuristics for Detecting Botnet Coordinated Attacks.
Proceedings of the ARES 2010, 2010

2009
Multiparty Computation from El Gamal/Paillier Conversion.
IEICE Transactions, 2009

Orthogonal Expansion of Port-scanning Packets.
Proceedings of the NBiS 2009, 2009

A Proposal of Efficient Remote Biometric Authentication Protocol.
Proceedings of the Advances in Information and Computer Security, 2009

A Storage Efficient Redactable Signature in the Standard Model.
Proceedings of the Information Security, 12th International Conference, 2009

A Study of User-Friendly Hash Comparison Schemes.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

Privacy-Preserving Collaborative Filtering Schemes.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Estimation of Increase of Scanners Based on ISDAS Distributed Sensors.
JIP, 2008

Automated Port-scan Classification with Decision Tree and Distributed Sensors.
JIP, 2008

Multi-Bit Embedding in Asymmetric Digital Watermarking without Exposing Secret Information.
IEICE Transactions, 2008

Secure Multiparty Computation for Comparator Networks.
IEICE Transactions, 2008

Principal Components of Port-Address Matrices in Port-Scan Analysis.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008

Privacy-Preserving Similarity Evaluation and Application to Remote Biometrics Authentication.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2008

Automated Classification of Port-Scans from Distributed Sensors.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

Internet Observation with ISDAS: How Long Does a Worm Perform Scanning?
Proceedings of the The Third International Conference on Availability, 2008

2007
Cryptanalysis of Modification to Self-Certified Group-Oriented Cryptosystem without A Combiner.
I. J. Network Security, 2007

Evaluation and implement of fuzzy vault scheme using indexed minutiae.
Proceedings of the IEEE International Conference on Systems, 2007

Estimation of Behavior of Scanners Based on ISDAS Distributed Sensors.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Online and Offline Presence Information Integrated with RFID and Instant Messaging Agent.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

ZeroBio - Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation Protocol.
Proceedings of the The Second International Conference on Availability, 2007

Efficient Multiparty Computation for Comparator Networks.
Proceedings of the The Second International Conference on Availability, 2007

2006
How Many Malicious Scanners Are in the Internet?
Proceedings of the Information Security Applications, 7th International Workshop, 2006

Dual RSA Accumulators and Its Application for Private Revocation Check.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Secure Asymmetric Watermark Detection Without Secret of Modified Pixels.
Proceedings of the Information Security Applications, 6th International Workshop, 2005

Webpage clustering - automated classification into jointly classified groups.
Proceedings of the IEEE International Conference on Systems, 2005

Privacy Preserving Web-Based Questionnaire.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Efficient Key Management Based on the Subset Difference Method for Secure Group Communication.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
Applications of Fuzzy Logic Functions to Knowledge Discovery in Databases.
, 2004

ModInt: Compact Modular Arithmatic Class Library Available on Cellular Phone and its Application to Secure Electronic Voting System.
Proceedings of the Security and Protection in Information Processing Systems, 2004

Rabin Tree and Its Application to Group Key Distribution.
Proceedings of the Automated Technology for Verification and Analysis: Second International Conference, 2004

Secure Instant Messaging Protocol Preserving Confidentiality against Administrator.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2002
Hierarchical fuzzy modeling and jointly expandable functions.
Int. J. Intell. Syst., 2002

Oblivious Counter and Majority Protocol.
Proceedings of the Information Security, 5th International Conference, 2002

de Morgan Bisemilattice of Fuzzy Truth Value.
Proceedings of the 32nd IEEE International Symposium on Multiple-Valued Logic (ISMVL 2002), 2002

2001
Identification of Incompletely Specified Fuzzy Unate Logic Function.
Proceedings of the 31st IEEE International Symposium on Multiple-Valued Logic, 2001

Power Auction Protocol without Revealing Winning Bids.
Proceedings of the 15th International Conference on Information Networking, 2001

Multi-Interval Truth Valued Logic.
Proceedings of the 10th IEEE International Conference on Fuzzy Systems, 2001

Closures of Fuzzy Linguitic Trugh Value With Regards to the Extension Principle.
Proceedings of the 10th IEEE International Conference on Fuzzy Systems, 2001

(M+1)st-Price Auction Protocol.
Proceedings of the Financial Cryptography, 2001

2000
Distributed auction servers resolving winner and winning bid without revealing privacy of bids.
Proceedings of the Seventh International Conference on Parallel and Distributed Systems Workshops, 2000

1999
Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree.
Proceedings of the Information Security, Second International Workshop, 1999

Performance Evaluation of Public-Key Certificate Revocation System with Balanced Hash Tree.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999

1998
Identification of incompletely specified multiple-valued Kleenean functions.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 1998

Functional Completeness of Hierarchical Fuzzy Modeling.
Inf. Sci., 1998

Electronic Auctions with Private Bids.
Proceedings of the 3rd USENIX Workshop on Electronic Commerce, Boston, Massachusetts, USA, August 31, 1998

1997
Fuzzy system identification for composite operation and fuzzy relation by genetic algorithms.
Proceedings of the Knowledge-Based Intelligent Electronic Systems, 1997

1995
Structure Identification of Acquired Knowledge in Fuzzy Inference by Genetic Algorithms.
Proceedings of the Fuzzy Logic, Neural Networks, and Evolutionary Computation, 1995

A Characterization of Kleenean Functions.
Proceedings of the 25th IEEE International Symposium on Multiple-Valued Logic, 1995

Uniqueness of Partially Specified Multiple-Valued Kleenean Function.
Proceedings of the 25th IEEE International Symposium on Multiple-Valued Logic, 1995


  Loading...