Toru Nakamura

Orcid: 0000-0003-2530-648X

According to our database1, Toru Nakamura authored at least 70 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Private Verification in Multi-stakeholder Environment and its Application to Stable Matching.
SN Comput. Sci., March, 2024

Verification Protocol for Stable Matching from Conditional Disclosure of Secrets.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
A Review on Machine Unlearning.
SN Comput. Sci., July, 2023

Privacy-Preserving Correlation Coefficient.
IEICE Trans. Inf. Syst., May, 2023

Hierarchical Local Differential Privacy.
J. Inf. Process., 2023

Effects of environmental control before sleeping on autonomic nervous activity and sleep: A pilot study.
J. Ambient Intell. Smart Environ., 2023

Privacy-Preserving Reputation System Against Dishonest Queries.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

Systematizing the State of Knowledge in Detecting Privacy Sensitive Information in Unstructured Texts using Machine Learning.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

Group Oriented Attribute-Based Encryption Scheme from Lattices with the Employment of Shamir's Secret Sharing Scheme.
Proceedings of the Network and System Security - 17th International Conference, 2023

MilliSign: mmWave-Based Passive Signs for Guiding UAVs in Poor Visibility Conditions.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023

An Inclination Estimation Method for UAV Landing Surfaces Using Millimeterwave Radar.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2023

Achieving Private Verification in Multi-stakeholder Environment and Application to Stable Matching.
Proceedings of the 25th International Conference on Enterprise Information Systems, 2023

An End-to-End Model for Mental Disorders Detection by Spontaneous Physical Activity Data.
Proceedings of the IEEE International Conference on Data Mining, 2023

Crossmodal Transformer on Multi-Physical Signals for Personalised Daily Mental Health Prediction.
Proceedings of the IEEE International Conference on Data Mining, 2023

Daily Mental Health Monitoring from Speech: A Real-World Japanese Dataset and Multitask Learning Analysis.
Proceedings of the IEEE International Conference on Acoustics, 2023

Application and Limitations of Digital Signature Schemes for Implementing Non-Fungible Token (NFT).
Proceedings of the 4th Asia Service Sciences and Software Engineering Conference, 2023

2022
Learning Multimodal Representations for Drowsiness Detection.
IEEE Trans. Intell. Transp. Syst., 2022

Certificate Management Scheme for VANETs Using Blockchain Structure.
Cryptogr., 2022

A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity.
Cryptogr., 2022

TRANSDIRE: data-driven direct reprogramming by a pioneer factor-guided trans-omics approach.
Bioinform., 2022

Assessment of spatio-temporal gait parameters using a novel wearable motion capture system.
Proceedings of the 4th IEEE Global Conference on Life Sciences and Technologies, 2022

Feature-level Approach for the Evaluation of Text Classification Models.
Proceedings of the 17th International Joint Conference on Computer Vision, 2022

Attribute Based Tracing for Securing Group Signatures Against Centralized Authorities.
Proceedings of the Information Security Practice and Experience, 2022

Differential Privacy under Incalculable Sensitivity.
Proceedings of the 6th International Conference on Cryptography, Security and Privacy, 2022

Analysis of Trust Factors in Children's Abilities to Use Digital Devices.
Proceedings of the GoodIT 2022: ACM International Conference on Information Technology for Social Good, Limassol, Cyprus, September 7, 2022

Decentralized and Collaborative Tracing for Group Signatures.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Almost fully anonymous attribute-based group signatures with verifier-local revocation and member registration from lattice assumptions.
Theor. Comput. Sci., 2021

Private Information Retrieval from Coded Storage in the Presence of Omniscient and Limited-Knowledge Byzantine Adversaries.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Seasonal Sleep Variations and Their Association With Meteorological Factors: A Japanese Population Study Using Large-Scale Body Acceleration Data.
Frontiers Digit. Health, 2021

Explainable Machine Learning for Default Privacy Setting Prediction.
IEEE Access, 2021

Automatic Security Inspection Framework for Trustworthy Supply Chain.
Proceedings of the 19th IEEE/ACIS International Conference on Software Engineering Research, 2021

(Short Paper) Evidence Collection and Preservation System with Virtual Machine Monitoring.
Proceedings of the Advances in Information and Computer Security, 2021

2020
Cross-Certification Towards Distributed Authentication Infrastructure: A Case of Hyperledger Fabric.
IEEE Access, 2020

Consideration on Data Conformance Toward Building Trust in Supply Chain.
Proceedings of the 2020 European Conference on Networks and Communications, 2020

2019
The Effects of Nudging a Privacy Setting Suggestion Algorithm's Outputs on User Acceptability.
J. Inf. Process., 2019

Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with VLR.
Proceedings of the Information Security Applications - 20th International Conference, 2019

Traceable and Fully Anonymous Attribute Based Group Signature Scheme with Verifier Local Revocation from Lattices.
Proceedings of the Network and System Security - 13th International Conference, 2019

A Framework for Secure and Trustworthy Data Management in Supply Chain.
Proceedings of the Mobile Web and Intelligent Information Systems, 2019

A data-driven approach for reconstructing bifurcation diagrams of discrete dynamical systems.
Proceedings of the IEEE 1st Global Conference on Life Sciences and Technologies, 2019

An Epidemiological Sleep Study Based on a Large-Scale Physical Activity Database.
Proceedings of the IEEE 1st Global Conference on Life Sciences and Technologies, 2019

Automatic Detection of Major Depressive Disorder via a Bag-of-Behaviour-Words Approach.
Proceedings of the Third International Symposium on Image Computing and Digital Medicine, 2019

Teaching Machines to Know Your Depressive State: On Physical Activity in Health and Major Depressive Disorder.
Proceedings of the 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2019

Security and Trust Issues on Digital Supply Chain.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

2018
PPM: Privacy Policy Manager for Home Energy Management System.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

I Read but Don't Agree: Privacy Policy Benchmarking using Machine Learning and the EU GDPR.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

Challenges in Classifying Privacy Policies by Machine Learning with Word-based Features.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018

PrivacyGuide: Towards an Implementation of the EU GDPR on Internet Privacy Policy Evaluation.
Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics, 2018

2017
Default Privacy Setting Prediction by Grouping User's Attributes and Settings Preferences.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

2016
Multiscale Analysis of Intensive Longitudinal Biomedical Signals and Its Clinical Applications.
Proc. IEEE, 2016

On Gender Specific Perception of Data Sharing in Japan.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Easing the Burden of Setting Privacy Preferences: A Machine Learning Approach.
Proceedings of the Information Systems Security and Privacy, 2016

Personalised Privacy by Default Preferences - Experiment and Analysis.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Method for Preventing Imposter Fraud During Blood-Pressure Measurement.
Proceedings of the HCI International 2016 - Posters' Extended Abstracts, 2016

2015
Covariation of Depressive Mood and Spontaneous Physical Activity in Major Depressive Disorder: Toward Continuous Monitoring of Depressive Mood.
IEEE J. Biomed. Health Informatics, 2015

Towards Tracing of k-Anonymized Datasets.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

k-anonymity: Risks and the Reality.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Lightweight Practical Private One-Way Anonymous Messaging.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

Psychobehavioral validity of self-reported symptoms based on spontaneous physical activity.
Proceedings of the 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2015

Personal Agent for Services in ITS.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Co-variation of depressive mood and spontaneous physical activity evaluated by ecological momentary assessment in major depressive disorder.
Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014

2013
P3MCF: Practical Privacy-Preserving Multi-domain Collaborative Filtering.
Proceedings of the 12th IEEE International Conference on Trust, 2013

PPM: Privacy Policy Manager for Personalized Services.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Behavioral organization of locomotor activity and its modeling.
Proceedings of the 6th International Conference on Soft Computing and Intelligent Systems (SCIS), 2012

2011
Password Based Anonymous Authentication with Private Information Retrieval.
J. Digit. Inf. Manag., 2011

An Anonymous Authentication Protocol with Single-database PIR.
Proceedings of the Ninth Australasian Information Security Conference, 2011

2010
An Identifiable Yet Unlinkable Authentication System with Smart Cards for Multiple Services.
Proceedings of the Computational Science and Its Applications, 2010

2007
A Door Access Control System with Mobile Phones.
Proceedings of the Personal Wireless Communications, 2007

2006
Local Holder exponent analysis of heart rate variability in preterm infants.
IEEE Trans. Biomed. Eng., 2006

2005
Mobile 'tsunagari-kan': always-on, casual telecommunication.
Proceedings of the 7th Conference on Human-Computer Interaction with Mobile Devices and Services, 2005

1998
Temporal Differences in Eye and Mouth Movements Classifying Facial Expressions of Smiles.
Proceedings of the 3rd International Conference on Face & Gesture Recognition (FG '98), 1998


  Loading...