Hiroshi Yoshiura

According to our database1, Hiroshi Yoshiura authored at least 84 papers between 1984 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Explainable Multimodal Fake Posts Detection Using Feature Extraction with Attention Mechanisms.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

Cross-Spectral Periocular Recognition by Translating Thermal Images into Visible Light Images.
Proceedings of the 12th IEEE Global Conference on Consumer Electronics, 2023

2022
Machine Learning based Re-identification of Location Histories using Contact Information Collected from Social Networking Services.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

Breaking Anonymity of Social Media by Profiling from Multimodal Information.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

Time Series Analysis of SHAP Values by Automobile Manufacturers Recovery Rates.
Proceedings of the ICDLT 2022: 6th International Conference on Deep Learning Technologies, Xi'an, China, July 26, 2022

2021
Reliability-Disguised Attacks on Social Network to Accelerate Fake News Dissemination.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

Modeling Malicious Behaviors and Fake News Dissemination on Social Networks.
Proceedings of the Responsible AI and Analytics for an Ethical and Inclusive Digitized Society, 2021

Periocular Recognition Based on Features from Thermal and Visible-Light Images.
Proceedings of the 10th IEEE Global Conference on Consumer Electronics, 2021

2020
Time-aware multi-resolutional approach to re-identifying location histories by using social networks.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

A Fake News Dissemination Model Based on Updating Reliability and Doubt among Individuals.
Proceedings of the 11th International Conference on Awareness Science and Technology, 2020

2019
Re-identifying people from anonymous histories of their activities.
Proceedings of the IEEE 10th International Conference on Awareness Science and Technology, 2019

A Re-Identification Strategy Using Machine Learning that Exploits Better Side Data.
Proceedings of the IEEE 10th International Conference on Awareness Science and Technology, 2019

Personal Authentication of Iris and Periocular Recognition using XGBoost.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

2018
Personal Identification by Integrating a Number of Features from Iris and Periocular Region Using AdaBoost.
J. Inf. Process., 2018

2016
Score Level Fusion for Network Traffic Application Identification.
IEICE Trans. Commun., 2016

Breaking Anonymity of Social Network Accounts by Using Coordinated and Extensible Classifiers Based on Machine Learning.
Proceedings of the Social Media: The Good, the Bad, and the Ugly, 2016

2015
Speaker verification method for operation system of consumer electronic devices.
IEEE Trans. Consumer Electron., 2015

Evaluating Header Information Features for Malware Infection Detection.
J. Inf. Process., 2015

Anonymizing Personal Text Messages Posted in Online Social Networks and Detecting Disclosures of Personal Information.
IEICE Trans. Inf. Syst., 2015

Fusion of iris and periocular user authentication by AdaBoost for mobile devices.
Proceedings of the IEEE International Conference on Consumer Electronics, 2015

Transportation means identification of content delivery system for consumer electronic devices.
Proceedings of the IEEE International Conference on Consumer Electronics, 2015

De-anonymising Social Network Posts by Linking with Résumé.
Proceedings of the Business Information Systems Workshops, 2015

A Rule-Based Approach for Detecting Location Leaks of Short Text Messages.
Proceedings of the Business Information Systems Workshops, 2015

2014
Evaluating payload features for malware infection detection.
J. Inf. Process., 2014

A System for Anonymizing Temporal Phrases of Message Posted in Online Social Networks and for Detecting Disclosure.
Proceedings of the Ninth International Conference on Availability, 2014

Effects of External Information on Anonymity and Role of Transparency with Example of Social Network De-anonymisation.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Ineluctable background checking on social networks: Linking job seeker's résumé and posts.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

Anonymizing Temporal Phrases in Natural Language Text to be Posted on Social Networking Services.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Detection of malware infection using score level fusion with Kernel Fisher Discriminant Analysis.
Proceedings of the IEEE 2nd Global Conference on Consumer Electronics, 2013

Securing a B+tree for Use with Secret-Shared Databases.
Proceedings of the Databases in Networked Information Systems - 8th International Workshop, 2013

Anonymizing Face Images by Using Similarity-Based Metric.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
PC-Based Real-Time Video Watermark Embedding System Independent of Platform for Parallel Computing.
Trans. Data Hiding Multim. Secur., 2012

Reducing Communication Complexity of Random Number Bitwise-Sharing for Efficient Multi-party Computation.
J. Inf. Process., 2012

Batch Logical Protocols for Efficient Multi-Party Computation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Automatic Anonymous Fingerprinting of Text Posted on Social Networking Services.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

Automatic Anonymization of Natural Languages Texts Posted on Social Networking Services and Automatic Detection of Disclosure.
Proceedings of the Seventh International Conference on Availability, 2012

A Private Information Detector for Controlling Circulation of Private Information through Social Networks.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Accelerating Multiparty Computation by Efficient Random Number Bitwise-Sharing Protocols.
Proceedings of the Information Security Applications - 12th International Workshop, 2011

Content-Based De-anonymisation of Tweets.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Batching Multiple Protocols to Improve Efficiency of Multi-Party Computation.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

2010
HiGate (High Grade Anti-Tamper Equipment) Prototype and Application to e-Discovery.
J. Digit. Forensics Secur. Law, 2010

Detecting Revelation of Private Information on Online Social Networks.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Unified Metric for Measuring Anonymity and Privacy with Application to Online Social Network.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Measuring Accumulated Revelations of Private Information by Multiple Media.
Proceedings of the Software Services for e-World, 2010

In-depth Evaluation of Content-Based Phishing Detection to Clarify Its Strengths and Limitations.
Proceedings of the U- and E-Service, Science and Technology, 2010

Approach to Privacy-Preserve Data in Two-Tiered Wireless Sensor Network Based on Linear System and Histogram.
Proceedings of the U- and E-Service, Science and Technology, 2010

New Approach to Quantification of Privacy on Social Network Sites.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
Integrity verification method for video content using robust watermarking.
Int. J. Knowl. Based Intell. Eng. Syst., 2009

Preventing False Positives in Content-Based Phishing Detection.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2008
Evaluation of PC-Based Real-Time Watermark Embedding System for Standard-Definition Video Stream.
Proceedings of the New Directions in Intelligent Interactive Multimedia, 2008

Evaluation of Integrity Verification System for Video Content Using Digital Watermarking.
Proceedings of the New Directions in Intelligent Interactive Multimedia, 2008

Robust Video Watermarking based on Dual-plane Correlation for Immunity to Rotation, Scale, Translation, and Random Distortion.
J. Digit. Inf. Manag., 2008

Evaluation and Improvement of Digital Watermarking Algorithm Based on Cryptographic Security Models.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

Picture Watermarks Surviving General Affine Transformation and Random Distortion.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Electronic Voting Scheme to Maintain Anonymity in Small-scale Election by Hiding the Number of Votes.
Proceedings of the The Third International Conference on Availability, 2008

2007
Adaptive Embedding and Detection for Improved Video Watermarking.
Proceedings of the Intelligent Multimedia Data Hiding: New Directions, 2007

Disclosure Control of Natural Language Information to Enable Secure and Enjoyable Communication over the Internet - (Transcript of Discussion).
Proceedings of the Security Protocols, 2007

Disclosure Control of Natural Language Information to Enable Secure and Enjoyable Communication over the Internet.
Proceedings of the Security Protocols, 2007

Secure Generation of Digital Signature on Compromised Computer.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

HVS-Based Robust Video Watermarking with Dual-plane Correlation.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
Maintaining Picture Quality and Improving Robustness of Color Watermarking by Using Human Vision Models.
IEICE Trans. Inf. Syst., 2006

PC-based real-time watermark embedding system with standard video interface.
Proceedings of the IEEE International Conference on Systems, 2006

Improved Video Verification Method Using Digital Watermarking.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Dual-Plane Watermarking for Color Pictures Immune to Rotation, Scale, Translation, and Random Bending.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

2005
Perceptually Adaptive Video Watermarking Using Motion Estimation.
Int. J. Image Graph., 2005

Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Use of inferential statistics to estimate error probability of video watermarks.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Real-time video watermark embedding system using software on personal computer.
Proceedings of the IEEE International Conference on Systems, 2005

Improved Video Watermark Detection Using Statistically-Adaptive Accumulation.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Correlation-based model of color picture watermarking against random geometric distortion.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

Development Concept for and Trial Application of a "Mulutiplex Risk Communicator".
Proceedings of the Challenges of Expanding Internet: E-Commerce, 2005

2004
Color Picture Watermarking Correlating Two Constituent Planes for Immunity to Random Geometric Distortion.
IEICE Trans. Inf. Syst., 2004

2003
Use of Motion Estimation to Improve Video Watermarking for MPEG Encoders.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

2002
Legally Authorized and Unauthorized Digital Evidence.
Proceedings of the Security Protocols, 2002

Combinatorial Optimization of Countermeasures against Illegal Copying.
Proceedings of the Security Protocols, 2002

2001
A Multi-OS Approach to Trusted Computer Systems.
Proceedings of the Security Protocols, 2001

A Multi-OS Approach to Trusted Computer Systems (Transcript of Discussion).
Proceedings of the Security Protocols, 2001

2000
Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis.
Proceedings of the Security Protocols, 2000

Authentication Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis (Transcript of Discussion).
Proceedings of the Security Protocols, 2000

Internet-Marks: the secure seal for WWW site authentication.
Proceedings of the Seventh International Conference on Parallel and Distributed Systems Workshops, 2000

1999
General quality maintenance module for motion picture watermarking.
IEEE Trans. Consumer Electron., 1999

INTERNET-MARKs: Clear, Secure, and Portable Visual Marks for the Cyber Worlds.
Proceedings of the Security Protocols, 1999

1998
Secure Fingerprinting Using Public-Key Cryptography (Position Paper).
Proceedings of the Security Protocols, 1998

1984
Top-Down Construction of 3-D Mechanical Object Shapes from Engineering Drawings.
Computer, 1984


  Loading...