Yuji Yamaoka

According to our database1, Yuji Yamaoka authored at least 20 papers between 2004 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Designing a Location Trace Anonymization Contest.
Proc. Priv. Enhancing Technol., January, 2023

Synchro: Block-generation Protocol to Synchronously Process Cross-shard Transactions in State Sharding.
CoRR, 2023

2020
Model Extraction Oriented Data Publishing with k-anonymity.
Proceedings of the Advances in Information and Computer Security, 2020

Evaluation of Secure Remote Offering Service for Information Bank.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

2019
Custom-made Anonymization by Data Analysis Program Provided by Recipient.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
How to Handle Excessively Anonymized Datasets.
J. Inf. Process., 2018

Study on Record Linkage of Anonymizied Data.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

2017
<i>k</i>-Presence-Secrecy: Practical Privacy Model as Extension of <i>k</i>-Anonymity.
IEICE Trans. Inf. Syst., 2017

2016
A Study from the Data Anonymization Competition Pwscup 2015.
Proceedings of the Data Privacy Management and Security Assurance, 2016

Ice and Fire: Quantifying the Risk of Re-identification and Utility in Data Anonymization.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
Privacy-Preserving Decision Tree Learning with Boolean Target Class.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

2014
New Privacy-Preserving Method for Matching Location Data.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Secret Sharing Scheme with Efficient Keyword Search for Cloud Storage.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

2013
Privacy-Preserving Distributed Decision Tree Learning with Boolean Class Attributes.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2011
Threat Tree Templates to Ease Difficulties in Threat Modeling.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

2009
Information State Based Multimodal Dialogue Management: Estimating Conversational Engagement from Gaze Information.
Proceedings of the Intelligent Virtual Agents, 9th International Conference, 2009

The Lessons Learned in Developing Multi-user Attentive Quiz Agents.
Proceedings of the Intelligent Virtual Agents, 9th International Conference, 2009

Implementing a Multi-user Tour Guide System with an Embodied Conversational Agent.
Proceedings of the Active Media Technology, 5th International Conference, 2009

2008
Enculturating Conversational Agents Based on a Comparative Corpus Study.
Proceedings of the Intelligent Virtual Agents, 8th International Conference, 2008

2004
Cozilet: Transparent Encapsulation to Prevent Abuse of Trusted Applets.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004


  Loading...