Hiroaki Kikuchi

Orcid: 0000-0002-0903-8430

According to our database1, Hiroaki Kikuchi authored at least 155 papers between 1995 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Estimation of cost of k-anonymity in the number of dummy records.
J. Ambient Intell. Humaniz. Comput., December, 2023

Designing a Location Trace Anonymization Contest.
Proc. Priv. Enhancing Technol., January, 2023

Attacker models with a variety of background knowledge to de-identified data.
J. Ambient Intell. Humaniz. Comput., 2023

An Efficient Local Differential Privacy Scheme Using Bayesian Ridge Regression.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

New LDP Approach Using VAE.
Proceedings of the Network and System Security - 17th International Conference, 2023

Failure of Privacy Policy for Session Replay Services Used for Monitor Your Keystroke.
Proceedings of the Advances in Networked-based Information Systems, 2023

Multiple Person Tracking Based on Gait Identification Using Kinect and OpenPose.
Proceedings of the Mobile, Secure, and Programmable Networking, 2023

Local Differential Privacy Protocol for Making Key-Value Data Robust Against Poisoning Attacks.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2023

Targeted Ads Analysis: What are The most Targeted Personas?
Proceedings of the IEEE International Conference on Big Data, 2023

Expectation-Maximization Estimation for Key-Value Data Randomized with Local Differential Privacy.
Proceedings of the Advanced Information Networking and Applications, 2023

2022
Proposal of anonymization dictionary using disclosed statements by business operators.
Internet Things, 2022

Castell: Scalable Joint Probability Estimation of Multi-dimensional Data Randomized with Local Differential Privacy.
CoRR, 2022

A Vulnerability in Video Anonymization - Privacy Disclosure from Face-obfuscated video.
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022

Improvement of Estimate Distribution with Local Differential Privacy.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2022

2021
More Accurate and Robust PRNU-Based Source Camera Identification with 3-Step 3-Class Approach.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021

Web Crawler for an Anonymously Processed Information Database.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021

Proposal and Development of Anonymization Dictionary Using Public Information Disclosed by Anonymously Processed Information Handling Business Operators.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021

Best Security Measures to Reduce Cyber-Incident and Data Breach Risks.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021

Vulnerability of Privacy Visor Used to Disrupt Unauthorized Face Recognition.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

Vulnerability Exploiting SMS Push Notifications.
Proceedings of the 16th Asia Joint Conference on Information Security, 2021

Reidentification Risk from Pseudonymized Customer Payment History.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
De-identification for Transaction Data Secure against Re-identification Risk Based on Payment Records.
J. Inf. Process., 2020

Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks.
Int. J. Inf. Sec., 2020

Special Issue on FinTech Security and Privacy.
Future Gener. Comput. Syst., 2020

Analysis on Malicious Residential Hosts Activities Exploited by Residential IP Proxy Services.
Proceedings of the Information Security Applications - 21st International Conference, 2020

Address Usage Estimation Based on Bitcoin Traffic Behavior.
Proceedings of the Advances in Networked-Based Information Systems, 2020

Modeling the Risk of Data Breach Incidents at the Firm Level.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020

Differentially Private Profiling of Anonymized Customer Purchase Records.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020

2019
Development of a Cyber Incident Information Crawler.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

Mathematical Model to Estimate Loss by Cyber Incident in Japan.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Robust Person Identification based on DTW Distance of Multiple-Joint Gait Pattern.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

2018
Anonymization methods and inference attacks: theory and practice (NII Shonan Meeting 2018-5).
NII Shonan Meet. Rep., 2018

Privacy-Preserving Hypothesis Testing for Reduced Cancer Risk on Daily Physical Activity.
J. Medical Syst., 2018

How to Handle Excessively Anonymized Datasets.
J. Inf. Process., 2018

Privacy-Preserving Multiple Linear Regression of Vertically Partitioned Real Medical Datasets.
J. Inf. Process., 2018

Probably Secure Efficient Anonymous Credential Scheme.
Int. J. Softw. Innov., 2018

Study on Record Linkage of Anonymizied Data.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Evaluation and Development of Onomatopoeia CAPTCHAs.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Person Tracking Based on Gait Features from Depth Sensors.
Proceedings of the Advances in Network-Based Information Systems, 2018

Impact Assessment of Password Reset PRMitM Attack with Two-Factor Authentication.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Risk of Bitcoin Addresses to be Identified from Features of Output Addresses.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Development of White List Based Autonomous Evolution of Defense System for RAT Malware.
Proceedings of the 13th Asia Joint Conference on Information Security, 2018

Risk of Re-identification from Payment Card Histories in Multiple Domains.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

Privacy Preserved Spectral Analysis Using IoT mHealth Biomedical Data for Stress Estimation.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
Multireceiver Predicate Encryption for Online Social Networks.
IEEE Trans. Signal Inf. Process. over Networks, 2017

A Spatio-Temporal malware and country clustering algorithm: 2012 IIJ MITF case study.
Int. J. Inf. Sec., 2017

How Much is Risk Increased by Sharing Credential in Group?
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

Audio-CAPTCHA with distinction between random phoneme sequences and words spoken by multi-speaker.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

Risk of Re-Identification Based on Euclidean Distance in Anonymized Data <i>PWSCUP2015</i>.
Proceedings of the Advances in Network-Based Information Systems, 2017

Decision Tree Analysis on Environmental Factors of Insider Threats.
Proceedings of the HCI International 2017 - Posters' Extended Abstracts, 2017

Sharing or Non-sharing Credentials: A Study of What Motivates People to Be Malicious Insiders.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

Privacy-Preserving Multiple Linear Regression of Vertically Partitioned Real Medical Datasets.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
SWIPASS: Image-Based User Authentication for Touch Screen Devices.
J. Inf. Process., 2016

Zipf Distribution Model for Quantifying Risk of Re-identification from Trajectory Data.
J. Inf. Process., 2016

Recursive-Rule Extraction Algorithm With J48graft And Applications To Generating Credit Scores.
J. Artif. Intell. Soft Comput. Res., 2016

Proposal and Evaluation of Cyber Defense System Using Blacklist Refined Based on Authentication Results.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments.
Proceedings of the Adjunct Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing Networking and Services, 2016

Interactive History Sniffing Attack with Amida Lottery.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Flexible Authentication Protocol with Key Reconstruction in WBAN Environments.
Proceedings of the 6th International Conference on IT Convergence and Security, 2016

Primary Factors of Malicious Insider in E-learning Model.
Proceedings of the HCI International 2016 - Posters' Extended Abstracts, 2016

A Study from the Data Anonymization Competition Pwscup 2015.
Proceedings of the Data Privacy Management and Security Assurance, 2016

Efficient Privacy-Preserving Logistic Regression with Iteratively Re-weighted Least Squares.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

Ice and Fire: Quantifying the Risk of Re-identification and Utility in Data Anonymization.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
Privacy-Preserving Decision Tree Learning with Boolean Target Class.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

CAPTCHA System by Differentiating the Awkwardness of Objects.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

Automated Detection of Drive-By Download Attack.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Privacy-Preserving Epidemiological Analysis for a Distributed Database of Hospitals.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

Scalability of Privacy-Preserving Linear Regression in Epidemiological Studies.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

Cryptographic Operation Load-Balancing between Cryptographic Module and CPU.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size of an Intersection.
J. Inf. Process., 2014

Vulnerability of the conventional accessible CAPTCHA used by the White House and an alternative approach for visually impaired people.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

Privacy-Preserving Dose-Response Relationship Test.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

On the Vulnerability of Ghost Domain Names.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

An Accessible CAPTCHA System for People with Visual Disability - Generation of Human/Computer Distinguish Test with Documents on the Net.
Proceedings of the Universal Access in Human-Computer Interaction. Design for All and Accessibility Practice, 2014

Secret Sharing Scheme with Efficient Keyword Search for Cloud Storage.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

Privacy-Preserving Hypothesis Testing for the Analysis of Epidemiological Medical Data.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
Mining Botnet Coordinated Attacks using Apriori-PrefixSpan Hybrid Algorithm.
J. Inf. Process., 2013

Privacy-preserving Collaborative Filtering Using Randomized Response.
J. Inf. Process., 2013

Time Zone Correlation Analysis of Malware/Bot Downloads.
IEICE Trans. Commun., 2013

Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasets.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Location Privacy Vulnerable from Bluetooth Devices.
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013

Privacy-Preserving Protocol for Epidemiology in Effect of Radiation.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Nondestructive evaluation of hardness using AC permeability and impedance analysis.
Proceedings of the Seventh International Conference on Sensing Technology, 2013

Privacy-Preserving Distributed Decision Tree Learning with Boolean Class Attributes.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

Privacy-Preserving Collaborative Filtering on the Cloud and Practical Implementation Experiences.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Privacy preserving collaborative filtering for SaaS enabling PaaS clouds.
J. Cloud Comput., 2012

Accuracy of Privacy-Preserving Collaborative Filtering Based on Quasi-homomorphic Similarity.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

Feasibility of a privacy preserving collaborative filtering scheme on the Google App Engine: a performance case study.
Proceedings of the ACM Symposium on Applied Computing, 2012

Word Salad CAPTCHA - Application and Evaluation of Synthesized Sentences.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

Perturbation Based Privacy Preserving Slope One Predictors for Collaborative Filtering.
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012

Synthesis of Secure Passwords.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

Geographical Visualization of Malware Download for Anomaly Detection.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
Efficient Privacy-Preserving Collaborative Filtering Based on the Weighted Slope One Predictor.
J. Internet Serv. Inf. Secur., 2011

Perfect Privacy-preserving Automated Trust Negotiation.
J. Inf. Process., 2011

Principal Component Analysis of Botnet Takeover.
J. Inf. Process., 2011

Analysis on the Sequential Behavior of Malware Attacks.
IEICE Trans. Inf. Syst., 2011

Improving Efficiency in Privacy-Preserving Automated Trust Negotiation with Conjunctive Policies.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

Apriori-PrefixSpan Hybrid Approach for Automated Detection of Botnet Coordinated Attacks.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

Distributed Collaborative Filtering Protocol Based on Quasi-homomorphic Similarity.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Privacy-preserving Collaborative Filtering for the Cloud.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

2010
Privacy-preserving similarity evaluation and application to remote biometrics authentication.
Soft Comput., 2010

Principal Component Analysis of Port-scans for Reduction of Distributed Sensors.
J. Inf. Process., 2010

Foreword.
IEICE Trans. Inf. Syst., 2010

A discovery of sequential attack patterns of malware in botnets.
Proceedings of the IEEE International Conference on Systems, 2010

Mining Association Rules Consisting of Download Servers from Distributed Honeypot Observation.
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010

Privacy-Preserving Collaborative Filtering Protocol Based on Similarity between Items.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

Heuristics for Detecting Botnet Coordinated Attacks.
Proceedings of the ARES 2010, 2010

2009
Multiparty Computation from El Gamal/Paillier Conversion.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Orthogonal Expansion of Port-scanning Packets.
Proceedings of the NBiS 2009, 2009

A Proposal of Efficient Remote Biometric Authentication Protocol.
Proceedings of the Advances in Information and Computer Security, 2009

A Storage Efficient Redactable Signature in the Standard Model.
Proceedings of the Information Security, 12th International Conference, 2009

A Study of User-Friendly Hash Comparison Schemes.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

Privacy-Preserving Collaborative Filtering Schemes.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Estimation of Increase of Scanners Based on ISDAS Distributed Sensors.
J. Inf. Process., 2008

Automated Port-scan Classification with Decision Tree and Distributed Sensors.
J. Inf. Process., 2008

Multi-Bit Embedding in Asymmetric Digital Watermarking without Exposing Secret Information.
IEICE Trans. Inf. Syst., 2008

Secure Multiparty Computation for Comparator Networks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Principal Components of Port-Address Matrices in Port-Scan Analysis.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008

Automated Classification of Port-Scans from Distributed Sensors.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

Internet Observation with ISDAS: How Long Does a Worm Perform Scanning?
Proceedings of the The Third International Conference on Availability, 2008

2007
Cryptanalysis of Modification to Self-Certified Group-Oriented Cryptosystem without A Combiner.
Int. J. Netw. Secur., 2007

Evaluation and implement of fuzzy vault scheme using indexed minutiae.
Proceedings of the IEEE International Conference on Systems, 2007

Estimation of Behavior of Scanners Based on ISDAS Distributed Sensors.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Online and Offline Presence Information Integrated with RFID and Instant Messaging Agent.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

ZeroBio - Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation Protocol.
Proceedings of the The Second International Conference on Availability, 2007

Efficient Multiparty Computation for Comparator Networks.
Proceedings of the The Second International Conference on Availability, 2007

2006
How Many Malicious Scanners Are in the Internet?
Proceedings of the Information Security Applications, 7th International Workshop, 2006

Dual RSA Accumulators and Its Application for Private Revocation Check.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Secure Asymmetric Watermark Detection Without Secret of Modified Pixels.
Proceedings of the Information Security Applications, 6th International Workshop, 2005

Webpage clustering - automated classification into jointly classified groups.
Proceedings of the IEEE International Conference on Systems, 2005

Privacy Preserving Web-Based Questionnaire.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Efficient Key Management Based on the Subset Difference Method for Secure Group Communication.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
Applications of Fuzzy Logic Functions to Knowledge Discovery in Databases.
Trans. Rough Sets, 2004

ModInt: Compact Modular Arithmatic Class Library Available on Cellular Phone and its Application to Secure Electronic Voting System.
Proceedings of the Security and Protection in Information Processing Systems, 2004

Rabin Tree and Its Application to Group Key Distribution.
Proceedings of the Automated Technology for Verification and Analysis: Second International Conference, 2004

Secure Instant Messaging Protocol Preserving Confidentiality against Administrator.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2002
Hierarchical fuzzy modeling and jointly expandable functions.
Int. J. Intell. Syst., 2002

(<i>M</i>+1)st-Price Auction Protocol.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

Oblivious Counter and Majority Protocol.
Proceedings of the Information Security, 5th International Conference, 2002

de Morgan Bisemilattice of Fuzzy Truth Value.
Proceedings of the 32nd IEEE International Symposium on Multiple-Valued Logic (ISMVL 2002), 2002

2001
Identification of Incompletely Specified Fuzzy Unate Logic Function.
Proceedings of the 31st IEEE International Symposium on Multiple-Valued Logic, 2001

Power Auction Protocol without Revealing Winning Bids.
Proceedings of the 15th International Conference on Information Networking, 2001

Multi-Interval Truth Valued Logic.
Proceedings of the 10th IEEE International Conference on Fuzzy Systems, 2001

Closures of Fuzzy Linguitic Trugh Value With Regards to the Extension Principle.
Proceedings of the 10th IEEE International Conference on Fuzzy Systems, 2001

(M+1)st-Price Auction Protocol.
Proceedings of the Financial Cryptography, 2001

2000
Distributed auction servers resolving winner and winning bid without revealing privacy of bids.
Proceedings of the Seventh International Conference on Parallel and Distributed Systems Workshops, 2000

1999
Performance Evaluation of Certificate Revocation Using <i>k</i>-Valued Hash Tree.
Proceedings of the Information Security, Second International Workshop, 1999

Performance Evaluation of Public-Key Certificate Revocation System with Balanced Hash Tree.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999

1998
Identification of incompletely specified multiple-valued Kleenean functions.
IEEE Trans. Syst. Man Cybern. Part A, 1998

Functional Completeness of Hierarchical Fuzzy Modeling.
Inf. Sci., 1998

Electronic Auctions with Private Bids.
Proceedings of the 3rd USENIX Workshop on Electronic Commerce, Boston, Massachusetts, USA, August 31, 1998

1997
Fuzzy system identification for composite operation and fuzzy relation by genetic algorithms.
Proceedings of the Knowledge-Based Intelligent Electronic Systems, 1997

1995
Structure Identification of Acquired Knowledge in Fuzzy Inference by Genetic Algorithms.
Proceedings of the Fuzzy Logic, Neural Networks, and Evolutionary Computation, 1995

A Characterization of Kleenean Functions.
Proceedings of the 25th IEEE International Symposium on Multiple-Valued Logic, 1995

Uniqueness of Partially Specified Multiple-Valued Kleenean Function.
Proceedings of the 25th IEEE International Symposium on Multiple-Valued Logic, 1995


  Loading...