-
Differential Private Risk Factors Analysis of Polypharmacy
Hiroaki Kikuchi, Andres Hernandez-Matamoros
2026
-
Fine-Grained Data Poisoning Attack to Local Differential Privacy Protocols for Key-Value Data
Terumi Yaguchi, Hiroaki Kikuchi
2026
-
Data Poisoning Attacks to Locally Differentially Private Range Query Protocols.
Ting-Wei Liao, Chih-Hsun Lin, Yu-Lin Tsai, Takao Murakami, Chia-Mu Yu, Jun Sakuma, Chun-Ying Huang, Hiroaki Kikuchi
CoRR
abs/2503.03454
2025.3
-
Empirical Evaluation of Record Reconstruction Risk from Model Explanations with Differential Privacy
Ryotaro Toma, Hiroaki Kikuchi
2025
-
Impact Assessment of Adversary-in-the-Middle Attack Evilginx Bypassing 2FA
Hiroaki Kikuchi
2025
-
Secure Aggregation of Smartwatch Health Data with LDP
Reviewed
Andres Hernandez-Matamoros, Hiroaki Kikuchi
Lecture Notes in Computer Science
15565
157
-
174
2025
-
"Cancer Risk Evaluation with Diabetes Mellitus by a Large Medical Claims Dataset,"
Reviewed
K. Fukuyama, Y. Mori, T. Kuroda, H. Kikuchi
Joint 13th International Conference on Soft Computing and Intelligent Systems and 25th International Symposium on Advanced Intelligent Systems (SCIS&ISIS), IEEE
1
-
7
2024.11
-
Meaningful Performance Analysis on Healthcare Data Under Local Differential Privacy
Andres Hernandez-Matamoros, Hiroaki Kikuchi
2024.9
-
A Poisoning-Resilient LDP Schema Leveraging Oblivious Transfer with the Hadamard Transform
Reviewed
Masahiro Shimizu, Hiroaki Kikuchi
Lecture Notes in Computer Science
14986
2024.8
-
Robust Estimation Method against Poisoning Attacks for Key-Value Data with Local Differential Privacy
Reviewed
Hikaru Horigome, Hiroaki Kikuchi, Masahiro Fujita, Chia-Mu Yu
Applied Sciences
14
(
14
)
1
-
19, 6368
2024.7
-
Privacy-Preserving Clustering for Multi-dimensional Data Randomization Under LDP
Reviewed
Hiroaki Kikuchi
IFIP Advances in Information and Communication Technology
679
15
-
29
2024.4
-
Comparative Analysis of Local Differential Privacy Schemes in Healthcare Datasets
Reviewed
Andres Hernandez-Matamoros, Hiroaki Kikuchi
Applied Sciences
14
2864
-
2864
2024.3
-
Combinations of AI Models and XAI Metrics Vulnerable to Record Reconstruction Risk
Reviewed
Ryotaro Toma, Hiroaki Kikuchi
Lecture Notes in Computer Science
14915
329
-
343
2024
-
Targeted Ads Analysis: What are The most Targeted Personas?,
Reviewed
Kikuchi, H., Aoyama, A.
IEEE International Conference on Big Data (BigData), Sorrento, Italy, 2023
5512
-
5518
2023.12
-
Multiple Person Tracking Based on Gait Identification Using Kinect and OpenPose
Reviewed
Ryotaro Toma, Terumi Yaguchi, Hiroaki Kikuchi
Lecture Notes in Computer Science
14482
175
-
187
2023.10
-
Key-Valueデータの局所差分プライバシプロトコルにおけるEMアルゴリズムを用いたロバストな分布推定手法の提案
Reviewed
堀込 光, 菊池 浩明, ジャミュー ユー
情報処理学会論文誌
64
(
9
)
1227
-
1240
2023.9
-
Failure of Privacy Policy for Session Replay Services Used for Monitor Your Keystroke
Reviewed
Daichi Kajima, Hiroaki Kikuchi
Lecture Notes on Data Engineering and Communications Technologies
183
123
-
129
2023.8
-
New LDP Approach Using VAE
Reviewed
Andres Hernandez-Matamoros, Hiroaki Kikuchi
Network and System Security, NSS 2023, Lecture Notes in Computer Science
13983
177
-
191
2023.8
-
An Efficient Local Differential Privacy Scheme Using Bayesian Ridge Regression
Andres Hernandez-Matamoros, Hiroaki Kikuchi
2023 20th Annual International Conference on Privacy, Security and Trust (PST)
1
-
7
2023.8
-
個人データの利用に対する許容度に関する社会調査
Reviewed
中川 裕志, 菊池 浩明
情報処理学会論文誌
64
(
8
)
1206
-
1215
2023.8
-
Local Differential Privacy Protocol for Making Key–Value Data Robust Against Poisoning Attacks
Reviewed
Hikaru Horigome, Hiroaki Kikuchi, Chia-Mu Yu
Lecture Notes in Computer Science
13890
241
-
252
2023.5
-
Expectation-Maximization Estimation for Key-Value Data Randomized with Local Differential Privacy
Reviewed
Hikaru Horigome, Hiroaki Kikuchi, Chia-Mu Yu
Lecture Notes in Networks and Systems
654
501
-
512
2023.3
-
Diseases Prediction from Officially Anonymized Medical and Healthcare Big Data
Reviewed
Hiroaki Kikuchi, Satoshi Ito, Kazuki Ikegami, Shota Shindo
2022 IEEE International Conference on Big Data (Big Data)
1
-
11
2022.12
-
Improvement of Estimate Distribution with Local Differential Privacy
Reviewed
Hikaru Horigome, Hiroaki Kikuchi
Modeling Decisions for Artificial Intelligence. MDAI 2022, Lecture Notes in Computer Science
13408
2022.9
-
A Vulnerability in Video Anonymization – Privacy Disclosure from Face-obfuscated video
Reviewed
Hiroaki Kikuchi, Shun Miyoshi, Takafumi Mori, Andres Hernandez-Matamoros
2022 19th Annual International Conference on Privacy, Security & Trust (PST), Fredericton, NB, Canada
1
-
10
2022.8
-
Web Crawler for an Anonymously Processed Information Database
Reviewed
Hiroaki Kikuchi, Atsuki Ono, Satoshi Ito, Masahiro Fujita, Tadakazu Yamanaka
Innovative Mobile and Internet Services in Ubiquitous Computing
501
-
510
2022.6
-
Proposal and Development of Anonymization Dictionary Using Public Information Disclosed by Anonymously Processed Information Handling Business Operators
Reviewed
Masahiro Fujita, Yasuoki Iida, Mitsuhiro Hattori, Tadakazu Yamanaka, Nori Matsuda, Satoshi Ito, Hiroaki Kikuchi
Innovative Mobile and Internet Services in Ubiquitous Computing
30
-
39
2022.6
-
Estimation of cost of k–anonymity in the number of dummy records
Reviewed
Satoshi Ito, Hiroaki Kikuchi
Journal of Ambient Intelligence and Humanized Computing
2022.3
-
Best Security Measures to Reduce Cyber-Incident and Data Breach Risks
Reviewed
Hiroaki Kikuchi, Michihiro Yamada, Kazuki Ikegami, Koji Inui
Lecture Notes in Computer Science
3
-
19
2022.1
-
健康診断データとレセプトデータの匿名加工情報を用いた疾病リスク分析
Reviewed
伊藤 聡志, 池上 和輝, 菊池 浩明
情報処理学会論文誌
62
(
9
)
1560
-
1574
2021.9
-
Bitcoin取引履歴の特徴量に基づくアドレス識別リスクの評価
Reviewed
松本 寛輝, 菊池 浩明
情報処理学会論文誌
62
(
9
)
1487
-
1498
2021.9
-
Vulnerability Exploiting SMS Push Notifications
Reviewed
Rina Shibayama, Hiroaki Kikuchi
2021 16th Asia Joint Conference on Information Security (AsiaJCIS)
23
-
30
2021.8
-
Reidentification Risk from Pseudonymized Customer Payment History
Reviewed
Hiroaki Kikuchi
Advanced Information Networking and Applications
634
-
645
2021.4
-
Vulnerability of Privacy Visor Used to Disrupt Unauthorized Face Recognition
Reviewed
Hiroaki Kikuchi, Kazuki Eto, Kazushi Waki, Takafumi Mori
2021 IEEE Conference on Dependable and Secure Computing (DSC)
1
-
7
2021.1
-
Modeling the risk of data breach incidents at the firm level
Kazuki Ikegami, Hiroaki Kikuchi
Advances in Intelligent Systems and Computing
1195
135
-
148
2021
-
Designing a Location Trace Anonymization Contest.
Reviewed
Takao Murakami, Hiromi Arai, Koki Hamada, Takuma Hatano, Makoto Iguchi, Hiroaki Kikuchi, Atsushi Kuromasa, Hiroshi Nakagawa, Yuichi Nakamura, Kenshiro Nishiyama, Ryo Nojima, Hidenobu Oguri, Chiemi Watanabe, Akira Yamada 0001, Takayasu Yamaguchi, Yuji Yamaoka
CoRR
abs/2107.10407
225
-
243
2021
-
Analysis on Malicious Residential Hosts Activities Exploited by Residential IP Proxy Services
Reviewed
A. Hanzawa, H. Kikuchi
You I. (eds) Information Security Applications (WISA 2020), Lecture Notes in Computer Science
12583
349
-
361
2020.12
-
セキュリティマネジメントによるサイバーインシデントリスク削減の評価
Reviewed
山田 道洋, 池上 和輝, 菊池 浩明, 乾孝治
情報処理学会論文誌
61
(
12
)
1781
-
1791
2020.12
-
Differentially Private Profiling of Anonymized Customer Purchase Records., Cham.
Reviewed
Kikuchi H.
Data Privacy Management, Cryptocurrencies and Blockchain Technology, DPM 2020, CBT 2020, Lecture Notes in Computer Science
12484
19
-
34
2020.12
-
De-identification for Transaction Data Secure against Re-identification Risk Based on Payment Records
Reviewed
Satoshi Ito, Reo Harada, Hiroaki Kikuchi
Journal of Information Processing
28
511
-
519
2020.9
-
Address Usage Estimation Based on Bitcoin Traffic Behavior.
Reviewed
Matsumoto H., Igaki S., Kikuchi H.
Advances in Networked-Based Information Systems (NBiS 2020), Advances in Intelligent Systems and Computing
1264
188
-
199
2020.8
-
Impact assessment of password reset PRMITM attack with two-factor authentication
Kota Sasa, Hiroaki Kikuchi
Journal of Internet Technology
20
(
7
)
2297
-
2306
2019.12
-
Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks
Reviewed
Chun-I Fan, Yi-Fan Tseng, Hui-Po Su, Ruei-Hau Hsu, Hiroaki Kikuchi
International Journal of Information Security
Springer
1
-
11
2019.11
-
個人情報漏洩の損害額の新しい数理モデルの提案
Reviewed
山田 道洋, 菊池 浩明, 松山 直樹, 乾 孝治
情報処理学会論文誌
60
(
9
)
1528
-
1537
2019.9
-
複数の歩容特徴量のDTW距離に基づくロバストな個人識別手法の提案
Reviewed
森駿文, 菊池浩明
情報処理学会論文誌
60
(
9
)
1538
-
1549
2019.9
-
De-identification for Transaction Data Secure against Re-identification Risk Based on Payment Records
Reviewed
Satoshi Ito, Reo Harada, Hiroaki Kikuchi
USB Proceedings of The 15th International Conference on Modeling Decisions for Artificial Intelligence (MDAI 2019)
158
-
169
2019.9
-
Development of a Cyber Incident Information Crawler
Reviewed
Kazuki Ikegami, Michihiro Yamada, Hiroaki Kikuchi, Koji Inui
Kazuki Ikegami, Michihiro Yamada, Hiroaki Kikuchi and Koji Inui
994
(
Springer
)
447
-
455
2019.7
-
Attacker models with a variety of background knowledge to de-identified data
Reviewed
toshi Ito, Hiroaki Kikuchi, Hiroshi Nakagawa
Journal of Ambient Intelligence and Humanized Computing
Springer
1
-
11
2019.6
-
Mathematical Model to Estimate Loss by Cyber Incident in Japan
Reviewed
Michihiro Yamada, Hiroaki Kikuchi, Naoki Matsuyama, Koji Inui
Proc. of 5th International Sysstems Security and Privacy (ICISSP 2019)
1
-
8
2019.2
-
Robust Person Identification based on DTW Distance of Multiple-Joint Gait Pattern
Reviewed
Takafumi Mori, Hiroaki Kikuchi
Proc. of 5th International Sysstems Security and Privacy (ICISSP 2019)
1
-
9
2019.2
-
Impact Assessment of Password Reset PRMitM attack with Two-factor Authentication
Reviewed
Kota Sasa, Hiroaki Kikuchi
2018 IEEE Conference on Dependable and Secure Computing (DSC)
20
(
7
)
90
-
97
2018.12
-
Risk of Bitcoin Addresses to be Identified from Features of Output Addresses
Reviewed
Kodai Nagata, Hiroaki Kikuchi, Chun-I Fan
2018 IEEE Conference on Dependable and Secure Computing (DSC) federated workshop
349
-
354
2018.12
-
Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks
Reviewed
Chun-I Fan, Yi-Fan Tseng, Hui-Po Su, Ruei-Hau Hsu, Hiroaki Kikuchi
2018 IEEE Conference on Dependable and Secure Computing (DSC) federated workshop
1
-
8
2018.12
-
Risk of Re-identification Based on Euclidean distance in Anonymized Data PWSCUP2015
Reviewed
Satoshi Ito, Hiroaki Kikuchi, Hiroshi Nakagawa
The 15th International Conference on Modeling Decisions for Artificial Intelligence (MDAI 2018)
178
-
189
2018.10
-
オノマトペCAPTCHAの開発と評価
Reviewed
滋野 莉子, 山田 道洋, 菊池 浩明, 坂本 真樹
情報処理学会論文誌
59
(
9
)
1666
-
1667
2018.9
-
Person Tracking Based on Gait Features from Depth Sensors
Reviewed
Mori T, Kikuchi H
Advances in Network-Based Information Systems, NBiS 2018, Lecture Notes on Data Engineering and Communications Technologies
22
743
-
751
2018.9
-
Development of Autonomous Evolution of Defense System Based on White List
Reviewed
Tomohiro Shigemoto, Shota Fujii, Ichiro Kurima, Tetsuro Kito, Hirofumi Nakakoji, Yasuhiro Fujii, Hiroaki Kikuchi
The 13th Asia Joint Conference on Information Security (AsiaJCIS'18)
95
-
101
2018.9
-
Evaluation and Development of Onomatopoeia CAPTCHAs
Reviewed
Michihiro Yamada, Riko Shigeno, Hiroaki Kikuchi, Maki Sakamoto
2018 16th Annual Conference on Privacy, Security and Trust (PST)
1
-
2
2018.8
-
Probably secure efficient anonymous credential scheme
Reviewed
Chien-Nan Wu, Chun-I Fan, Jheng-Jia Huang, Yi-Fan Tseng, Hiroaki Kikuchi
International Journal of Software Innovation
6
(
3
)
18
-
35
2018.7
-
Anonymization for Personal Data and Re-idenfication Contst: PWSCUP
Reviewed
Hidetomo Atsushi Kuromasa, Hiroshi Nakagawa, Hiroaki Kikuchi, Masanori Monnda
IPSJ Digital Practice
9
(
3
)
659
-
684
2018.7
-
Privacy-Preserving Hypothesis Testing for Reduced Cancer Risk on Daily Physical Activity
Reviewed
Hiroaki Kikuchi, Xuping Huang, Shigeta Ikuji, Manami Inoue
Journal of Medical Systems
42
(
5
)
1
2018.4
-
ホワイトリストを用いた自律進化型防御システムの開発
Reviewed
重本 倫宏, 藤井 翔太, 来間 一郎, 鬼頭 哲郎, 仲小路 博史, 藤井 康広, 菊池 浩明
情報処理学会論文誌
59
(
3
)
1050
-
1060
2018.3
-
Study on record linkage of anonymizied data
Reviewed
Hiroaki Kikuchi, Takayasu Yamaguchi, Koki Hamada, Yuji Yamaoka, Hidenobu Oguri, Jun Sakuma
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
E101A
(
1
)
19
-
28
2018.1
-
An efficient signature scheme for anonymous credentials
Reviewed
Chien-Nan Wu, Chun-I Fan, Jheng-Jia Huang, Yi-Fan Tseng, Hiroaki Kikuchi
Studies in Computational Intelligence
727
51
-
65
2018
-
Development of White List Based Autonomous Evolution of Defense System for RAT Malware.
Reviewed
Tomohiro Shigemoto, Shota Fujii, Ichiro Kuriama, Tetsuro Kito, Hirofumi Nakakoji, Yasuhiro Fujii, Hiroaki Kikuchi
13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018
95
-
101
2018
-
Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings
Reviewed
ISPEC 2018
11125
2018
-
Privacy Preserved Spectral Analysis Using IoT mHealth Biomedical Data for Stress Estimation.
Reviewed
Xuping Huang, Hiroaki Kikuchi, Chun-I Fan
32nd IEEE International Conference on Advanced Information Networking and Applications, AINA 2018, Krakow, Poland, May 16-18, 2018
793
-
800
2018
-
Risk of Re-identification from Payment Card Histories in Multiple Domains.
Reviewed
Satoshi Ito,Reo Harada, Hiroaki Kikuchi
32nd IEEE International Conference on Advanced Information Networking and Applications, AINA 2018, Krakow, Poland, May 16-18, 2018
934
-
941
2018
-
How to Handle Excessively Anonymized Datasets.
Reviewed
Ryo Nojima, Hidenobu Oguri, Hiroaki Kikuchi, Hiroshi Nakagawa, Koki Hamada, Takao Murakami, Yuji Yamaoka, Chiemi Watanabe
JIP
26
477
-
485
2018
-
Privacy-Preserving Multiple Linear Regression of Vertically Partitioned Real Medical Datasets.
Reviewed
Hiroaki Kikuchi, Chika Hamanaga, Hideo Yasunaga, Hiroki Matsui, Hideki Hashimoto, Chun-I Fan
JIP
26
638
-
647
2018
-
共有アカウント利用時における不正行為の誘発要因
Reviewed
新原 功一, 山田 道洋, 菊池 浩明
情報処理学会論文誌
58
(
12
)
1875
-
1889
2017.12
-
Audio-CAPTCHA with distinction between random phoneme sequences and words spoken by multi-speaker
Reviewed
Michitomo Yamaguchi, Hiroaki Kikuchi
2017 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2017
2017-
3071
-
3076
2017.11
-
プライバシー保護したIoTモバイルヘルス心拍変動及び睡眠段階の周波数解析に関する考察
Xuping Huang, Hiroaki Kikuchi, Chun-I Fan
Computer Security Symposium 2017
304
-
311
2017.10
-
A Spatio-Temporal malware and country clustering algorithm: 2012 IIJ MITF case study
Reviewed
Khamphao Sisaat, Surin Kittitornkun, Hiroaki Kikuchi, Chaxiong Yukonhiatou, Masato Terada, Hiroshi Ishii
INTERNATIONAL JOURNAL OF INFORMATION SECURITY
16
(
5
)
459
-
473
2017.10
-
Study from Data Anonymization Competition of Online Retail Data
Reviewed
KIKUCHI Hiroaki
Workshop on Design Issues for a data Anonymization Competition (WODIAC), 2017.
2017.7
-
Multireceiver Predicate Encryption for Online Social Networks.
Reviewed
Chun-I Fan, Yi-Fan Tseng, Jheng-Jia Huang, Shih-Fen Chen, Hiroaki Kikuchi
IEEE Trans. Signal and Information Processing over Networks 3(2)
3
(
2
)
388
-
403
2017.4
-
Privacy-Preserving Multiple Linear Regression of Vertically Partitioned Real Medical Datasets
Reviewed
Hiroaki Kikuchi, Chika Hamanaga, Hideo Yasunaga, Hiroki Matsui, Hideki Hashimoto
2017 IEEE 31ST INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA)
1042
-
1049
2017
-
How much is risk increased by sharing credential in group?
Reviewed
Hiroaki Kikuchi, Niihara Koichi, Michihiro Yamada
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
10547
103
-
117
2017
-
Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings
Reviewed
ACNS 2017
10355
2017
-
Decision tree analysis on environmental factors of insider threats
Reviewed
Michihiro Yamada, Koichi Niihara, Hiroaki Kikuchi
Communications in Computer and Information Science
714
658
-
662
2017
-
Risk of Re-Identification Based on Euclidean Distance in Anonymized Data PWSCUP2015.
Reviewed
Satoshi Ito, Hiroaki Kikuchi
Advances in Network-Based Information Systems, The 20th International Conference on Network-Based Information Systems, NBiS 2017, Ryerson University, Toronto, ON, Canada, August 24-26, 2017.
901
-
913
2017
-
Sharing or non-sharing credentials: A study of what motivates people to be malicious insiders
Reviewed
Koichi Niihara, Michihiro Yamada, Hiroaki Kikuchi
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
10292
353
-
365
2017
-
eラーニングをモデルとした内部犯行の予測因子の識別
Reviewed
新原 功一, 菊池 浩明
情報処理学会論文誌
57
(
9
)
2064
-
2076
2016.9
-
匿名加工・再識別コンテストIce and Fire:匿名加工方式とその安全性を評価する試み
Reviewed
菊池 浩明
情報処理学会論文誌
57
(
9
)
1900
-
1910
2016.9
-
SWIPASS: Image-based user authentication for touch screen devices
Reviewed
Masafumi Kosugi, Tsuyoshi Suzuki, Osamu Uchida, Hiroaki Kikuchi
Journal of Information Processing
24
(
2
)
227
-
236
2016.3
-
Interactive History Sniffing Attack with Amida Lottery
Reviewed
Hiroaki Kikuchi, Kota Sasa, Yuta Shimizu
2016 10TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS)
599
-
602
2016
-
Primary Factors of Malicious Insider in E-learning Model
Reviewed
Koichi Niihara, Hiroaki Kikuchi
HCI INTERNATIONAL 2016 - POSTERS' EXTENDED ABSTRACTS, PT I
617
482
-
487
2016
-
Primary Factors of Malicious Insider in E-learning Model
Reviewed
Koichi Niihara, Hiroaki Kikuchi
HCI INTERNATIONAL 2016 - POSTERS' EXTENDED ABSTRACTS, PT I
617
(
Springer
)
482
-
487
2016
-
Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments
Reviewed
Jheng-Jia Huang, Wen-Shenq Juang, Chun-I Fan, Yi-Fan Tseng, Hiroaki Kikuchi
ADJUNCT PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING NETWORKING AND SERVICES (MOBIQUITOUS 2016)
88
-
93
2016
-
Recursive-rule extraction algorithm with J48graft and applications to generating credit scores
Reviewed
Yoichi Hayashi, Yuki Tanaka, Tomohiro Takagi, Takamichi Saito, Hideaki Iiduka, Hiroaki Kikuchi, Guido Bologna, Sushmita Mitra
Journal of Artificial Intelligence and Soft Computing Research
6
(
1
)
35
-
44
2016
-
A Study from the Data Anonymization Competition Pwscup 2015
Reviewed
Hiroaki Kikuchi, Takayasu Yamaguchi, Koki Hamada, Yuji Yamaoka, Hidenobu Oguri, Jun Sakuma
DATA PRIVACY MANAGEMENT AND SECURITY ASSURANCE
9963
(
9963
)
230
-
237
2016
-
Flexible Authentication Protocol with Key Reconstruction in WBAN Environments
Reviewed
Chun-I Fan, Jian-Sheng Wang, Jheng-Jia Huang, Yi-Fan Tseng, Wen-Shenq Juang, Hiroaki Kikuchi
2016 6TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS 2016)
220
-
224
2016
-
Ice and Fire: Quantifying the Risk of Re-identification and Utility in Data Anonymization
Reviewed
Hiroaki Kikuchi, Takayasu Yamaguchi, Koki Hamada, Yuji Yamaoka, Hidenobu Oguri, Jun Sakuma
IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS IEEE AINA 2016
1035
-
1042
2016
-
Proposal and Evaluation of Cyber Defense System using Blacklist Refined Based on Authentication Results
Reviewed
Hirofumi Nakakoji, Yasuhiro Fujii, Yoshiaki Isobe, Tomohiro Shigemoto, Tetsuro Kito, Naoki Hayashi, Nobutaka Kawaguchi, Naoki Shimotsuma, Hiroaki Kikuchi
PROCEEDINGS OF 2016 19TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS)
135
-
139
2016
-
Efficient Privacy-Preserving Logistic Regression with Iteratively Re-weighted Least Squares
Reviewed
Hiroaki Kikuchi, Hideo Yasunaga, Hiroki Matsui, Chun-I Fan
2016 11TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS)
48
-
54
2016
-
Zipf distribution model for quantifying risk of re-identification from trajectory data
Reviewed
Hiroaki Kikuchi, Katsumi Takahashi
Journal of Information Processing
24
(
5
)
816
-
823
2016
-
パーソナルデータの行方
木村 映善, 菊池 浩明, 佐久間 淳, 千田 浩司, 美馬 正司
医療情報学連合大会論文集
35回
172
-
173
2015.11
-
Privacy-Preserving Decision Tree Learning with Boolean Target Class
Reviewed
Hiroaki Kikuchi, Kouichi Itoh, Mebae Ushida, Hiroshi Tsuda, Yuji Yamaoka
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES
E98A
(
11
)
2291
-
2300
2015.11
-
暗号モジュールを搭載したプロセッサにおける暗号処理のオフローディング方式の効率化の提案と評価
Reviewed
金子 洋平, 齋藤 孝道, 菊池 浩明
情報処理学会論文誌
56
(
9
)
1846
-
1856
2015.9
-
多種環境マルウェア動的解析システムの提案および評価
Reviewed
仲小路 博史, 重本 倫宏, 鬼頭 哲郎, 林 直樹, 寺田 真敏, 菊池 浩明
情報処理学会論文誌
56
(
9
)
1730
-
1744
2015.9
-
機械合成文の不自然度相対識別問題に基づくCAPTCHAの提案
Reviewed
山口 通智, 岡本 健, 菊池 浩明
情報処理学会論文誌
56
(
9
)
1834
-
1845
2015.9
-
Privacy-Preserving Epidemiological Analysis for a Distributed Database of Hospitals
Reviewed
Hiroaki Kikuchi, Hideki Hashimoto, Hideo Yasunaga
2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS)
IEEE
85
-
90
2015
-
Scalability of Privacy-Preserving Linear Regression in Epidemiological Studies
Reviewed
Hiroaki Kikuchi, Hideki Hashimoto, Hideo Yasunaga, Takamichi Saito
2015 IEEE 29th International Conference on Advanced Information Networking and Applications (IEEE AINA 2015)
IEEE
510
-
514
2015
-
Cryptographic Operation Load-balancing between Cryptographic Module and CPU
Reviewed
Yohei Kaneko, Takamichi Saito, Hiroaki Kikuchi
2015 IEEE 29th International Conference on Advanced Information Networking and Applications (IEEE AINA 2015)
IEEE
698
-
705
2015
-
Automated Detection of Drive-by Download Attack
Reviewed
Hiroaki Kikuchi, Hiroaki Matsumoto, Hiroshi Ishii
2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015
IEEE
511
-
515
2015
-
Zipf Distribution Model for Quantifying Risk of Re-identification from Trajectory Data
Reviewed
Hiroaki Kikuchi, Katsumi Takahashi
2015 THIRTEENTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST)
IEEE
14
-
21
2015
-
CAPTCHA System by Differentiating the Awkwardness of Objects
Reviewed
Michitomo Yamaguchi, Takeshi Okamoto, Hiroaki Kikuchi
PROCEEDINGS 2015 18TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2015)
IEEE
257
-
263
2015
-
Privacy-Preserving Protocol for Reduced Cancer Risk on Daily Physical Activity
Reviewed
Hiroaki Kikuchi, Shigeta Ikuji, Manami Inoue
The 2014 International Conference on Security & Management (SAM)
246
-
254
2014.7
-
Secret Sharing Scheme with Efficient Keyword Search for Cloud Storage
Reviewed
Hiroaki Kikuchi, Kouichi Itoh, Mebae Ushida, Yuji Yamaoka, Takanori Oikawa
2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS)
164
-
169
2014
-
Temporal Behaviors of Top-10 Malware Download in 2010-2012
Reviewed
Chaxiong Yukonhiatou, Surin Kittitornkun, Hiroaki Kikuchi, Khamphao Sisaat, Masato Terada, Hiroshi Ishii
2014 INTERNATIONAL ELECTRICAL ENGINEERING CONGRESS (IEECON)
2014
-
Privacy-preserving Dose-Response Relationship Test
Reviewed
Hiroaki Kikuchi, Tomoki Sato, Jun Sakuma
2014 17TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2014)
504
-
508
2014
-
On the Vulnerability of Ghost Domain Names
Reviewed
Hiroaki Kikuchi, Tomohiro Arimizu
2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
IEEE
584
-
587
2014
-
Privacy-preserving Hypothesis Testing for the Analysis of Epidemiological Medical Data
Reviewed
Hiroaki Kikuchi, Tomoki Sato, Jun Sakuma
2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA)
IEEE
359
-
365
2014
-
Vulnerability of the Conventional Accessible CAPTCHA used by the White House and an Alternative Approach for Visually Impaired People
Reviewed
Michitomo Yamaguchi, Torn Nakata, Hajime Watanabe, Takeshi Okamoto, Hiroaki Kikuchi
2014 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC)
IEEE
3946
-
3951
2014
-
An Accessible CAPTCHA System for People with Visual Disability - Generation of Human/Computer Distinguish Test with Documents on the Net.
Reviewed
Michitomo Yamaguchi, Toru Nakata, Takeshi Okamoto, Hiroaki Kikuchi
8th International Conference, UAHCI 2014, Held as Part of HCI International 2014
Springer
119
-
130
2014
-
Bloom filter bootstrap: Privacy-preserving estimation of the size of an intersection
Reviewed
Hiroaki Kikuchi, Jun Sakuma
Journal of Information Processing
22
(
2
)
388
-
400
2014
-
Application for Privacy-Preserving Epidemic analysis and Bayes Estimation of Size of Intersection using Bloom Filter
Reviewed
Hiroaki Kikuchi
The 8th International Workshop on Security (IWSEC2013), Okinawa, 2013.
2013.11
-
マルコフ連鎖による合成文章の不自然さを用いたCAPTCHAの提案と安全性評価
Reviewed
鴨志田 芳典, 菊池 浩明
情報処理学会論文誌
54
(
9
)
2156
-
2166
2013.9
-
Privacy-preserving Online Logistic Regression Based on Homomorphic Encryption
WU,Shuang, KAWAMOTO,Junpei, KIKUCHI,Hiroaki, SAKUMA,Jun
電子情報通信学会技術研究報告. IBISML, 情報論的学習理論と機械学習
113
(
139
)
67
-
74
2013.7
-
Time Zone Correlation Analysis of Malware/Bot Downloads
Reviewed
Khamphao Sisaat, Hiroaki Kikuchi, Shunji Matsuo, Masato Terada, Masashi Fujiwara, Surin Kittitornkun
IEICE TRANSACTIONS ON COMMUNICATIONS
E96B
(
7
)
1753
-
1763
2013.7
-
Privacy-Preserving Data Mining for Medical Applications
Reviewed
Hiroaki Kikuchi
2013 AI Forum, Tamkang, Taiwan, 2013.
2013.5
-
Hadoopを用いた大規模分散プライバシー保護システムと医療情報統合への応用
川村, 生地,小柳
暗号と情報セキュリティシンポジウム (SCIS 2013)( 1C1-5)
1-6
2013.1
-
傾向性の検定における秘匿疫学調査プロトコル
佐藤智貴, 佐久間淳
暗号と情報セキュリティシンポジウム (SCIS 2013)
1-4
2013.1
-
Location privacy vulnerable from bluetooth devices
Reviewed
Hiroaki Kikuchi, Takeru Yokomizo
Proceedings - 16th International Conference on Network-Based Information Systems, NBiS 2013
IEEE
534
-
538
2013
-
Privacy-preserving collaborative filtering using randomized response
Reviewed
Hiroaki Kikuchi, Anna Mochizuki
Journal of Information Processing
21
(
4
)
617
-
623
2013
-
Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size of an Intersection
Reviewed
Hiroaki Kikuchi, Jun Sakuma
DATA AND APPLICATIONS SECURITY AND PRIVACY XXVII
7964
(
Springer
)
145
-
163
2013
-
Mining botnet coordinated attacks using Apriori-Prefixspan hybrid algorithm
Reviewed
Masayuki Ohrui, Hiroaki Kikuchi, Nur Rohman Rosyid, Masato Terada
Journal of Information Processing
21
(
4
)
607
-
616
2013
-
Privacy-preserving collaborative filtering on the cloud and practical implementation experiences
Reviewed
Anirban Basu, Jaideep Vaidya, Hiroaki Kikuchi, Theo Dimitrakos
IEEE International Conference on Cloud Computing, CLOUD
IEEE
406
-
413
2013
-
Privacy-preserving protocol for epidemiology in effect of radiation
Reviewed
Hiroaki Kikuchi, Tomoki Sato, Jun Sakuma
Proceedings - 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013
IEEE
831
-
836
2013
-
Mining Botnet Coordinated Attacks using <i>Apriori-PrefixSpan</i> Hybrid Algorithm
Ohrui Masayuki, Kikuchi Hiroaki, Rosyid Nur Rohman, Terada Masato
IMT
8
(
4
)
1207
-
1216
2013
-
Temporal Behavior Analysis of Malware/Bot Downloads Using Top-10 Processing
Reviewed
Chaxiong Yukonhiatou, Surin Kittitornkun, Hiroaki Kikuchi, Khamphao Sisaat, Masato Terada, Hiroshi Ishii
2013 INTERNATIONAL COMPUTER SCIENCE AND ENGINEERING CONFERENCE (ICSEC)
343
-
347
2013
-
Scalable privacy-preserving data mining with asynchronously partitioned datasets
Reviewed
Hiroaki Kikuchi, Daisuke Kagawa, Anirban Basu, Kazuhiko Ishii, Masayuki Terada, Sadayuki Hongo
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
E96-A
(
1
)
111
-
120
2013
-
Privacy-Preserving Distributed Decision Tree Learning with Boolean Class Attributes
Reviewed
Hiroaki Kikuchi, Kouichi Ito, Mebae Ushida, Hiroshi Tsuda, Yuji Yamaoka
2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA)
538
-
545
2013
-
Clustering Top-10 malware/bots based on download behavior
Reviewed
Chaxiong Yukonhiatou, Surin Kittitornkun, Hiroaki Kikuchi, Khamphao Sisaat, Masato Terada, Hiroshi Ishii
Proceedings - 2013 International Conference on Information Technology and Electrical Engineering: "Intelligent and Green Technologies for Sustainable Development", ICITEE 2013
IEEE
62
-
67
2013
-
プライバシー保護確率検定システムの実装と評価
佐藤智貴, 佐久間淳
信学技報(ICSS2012-55)
112
(
315
)
61-66
2012.11
-
Bloom Filter を用いた積集合サイズのベイズ推定とそのプライバシー保護疫学調査への応用
佐久間淳
コンピュータセキュリティシンポジウム (CSS 2012),(IPSJ, 2012)
216-223
2012.11
-
利用者認証とフェールセーフ性について
信学技報(SSS2012-19)
112
(
313
)
11-15
2012.11
-
プライバシー保護決定木学習におけるエントロピーを近似する順序同型関数
伊藤孝一, 牛田芽生恵, 津田宏, 山岡裕司
コンピュータセキュリティシンポジウム (CSS 2012),(IPSJ,2012)
92-97
2012.11
-
Template-protecting Biometric Authentication Using Oblivious Evaluation of Feature Value Function with Fuzzy Polynomial
Reviewed
Masakatsu Nishigaki, Yoshimasa Watanabe, Masahiro Oda, Yuta Yoneyama, Takumi Yamamoto, Kenta Takahashi, Wakaha Ogata, Hiroaki Kikuchi
IPSJ Journal
53
(
9
)
2254
-
2266
2012.9
-
曖昧性を含んだ多項式による特徴量関数の秘匿評価を利用したテンプレート保護型生体認証
西垣正勝, 渡邊幸聖, 小田雅洋, 米山裕太, 山本匠, 高橋健太, 尾形わかは
Journal of Cloud Computing: Advances, Systems and Applications, Springer
1
(
8
)
1-14
2012.9
-
ネットワークのサービス品質に対する対話型アプリケーションの要求条件の評価
小澤 友也
マルチメディア、分散、協調とモバイルシンポジウム(DICOMO2012),(IPSJ, 2012.)
1034-1039
2012.7
-
マルコフ連鎖による合成文章の不自然さを用いたCAPTCHAの安全性評価と改良について
鴨志田 芳典
マルチメディア、分散、協調とモバイルシンポジウム(DICOMO2012) (IPSJ, 2012)
205-212
2012.7
-
安全だけど安心できない,安全でないけど安心できる
三菱電機技法(巻頭言)
371
(
7
)
2012.7
-
IFIP TM 2012参加報告
Anirban Basu
研究報告コンピュータセキュリティ(CSEC)
2012-CSEC-58
(
45
)
1-6
2012.7
-
プライバシーを保護したピロリ菌疫学調査
佐久間淳, 三上春夫
2012年度人工知能学会全国大会(第26回)(3I2-OS-20-9)
1-4
2012.6
-
Privacy-Preserving Collaborative Filtering Schemes With Sampling Users
Reviewed
Hiroaki Kikuchi, Hiroatsu Kizawa
Journal of Japan Society for Fuzzy Theory and Intelligent Informatics
24
(
3
)
753
-
762
2012.6
-
偽造証明書を用いたファーミング攻撃の危険性について
平井圭佑
情報処理学会第74回全国大会(1ZA-5 )
(
3
)
615-616
-
616
2012.3
-
各種センサを統合した行動状態推定機能を持つライフログシステムのAndroidへの実装と評価
大久保成晃
情報処理学会第74回全国大会(6X-2)
(
3
)
35-36
-
352
2012.3
-
ターゲット属性の論理演算を可能とする垂直分割プライバシー保護決定木学習
伊藤孝一, 牛田芽生恵, 津田宏, 山岡裕司
暗号と情報セキュリティシンポジウム (SCIS 2012),2D1
1-5
2012.1
-
アイテム依存の摂動化によるプライバシー保護情報推薦
望月安菜
2012年暗号と情報セキュリティシンポジウム (SCIS 2012), 2D1-6, 電子情報通信学会
1-5
2012.1
-
Word salad CAPTCHA - Application and evaluation of synthesized sentences
Reviewed
Yoshifumi Kamoshida, Hiroaki Kikuchi
Proceedings of the 2012 15th International Conference on Network-Based Information Systems, NBIS 2012
IEEE
799
-
804
2012
-
Feasibility of a privacy preserving collaborative filtering scheme on the Google App Engine - A performance case study
Reviewed
Anirban Basu, Jaideep Vaidya, Theo Dimitrakos, Hiroaki Kikuchi
Proceedings of the ACM Symposium on Applied Computing
447
-
452
2012
-
Accuracy of Privacy-preserving Collaborative Filtering Based on Quasi-homomorphic Similarity
Reviewed
Hiroaki Kikuchi, Yoshiki Aoki, Masayuki Terada, Kazuhiko Ishii, Kimihiko Sekino
2012 9TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INTELLIGENCE & COMPUTING AND 9TH INTERNATIONAL CONFERENCE ON AUTONOMIC & TRUSTED COMPUTING (UIC/ATC)
IEEE
555
-
562
2012
-
Perturbation based privacy preserving slope one predictors for collaborative filtering
Reviewed
Anirban Basu, Jaideep Vaidya, Hiroaki Kikuchi
IFIP Advances in Information and Communication Technology
374
(
IFIPTM
)
17
-
35
2012
-
Privacy-preserving collaborative filtering using randomized response
Reviewed
Hiroaki Kikuchi, Anna Mochizuki
Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012
IEEE
671
-
676
2012
-
Geographical Visualization of Malware Download for Anomaly Detection
Reviewed
Naoki Hiroguchi, Khamphao Sisaat, Hiroaki Kikuchi, Surin Kittitornkun
PROCEEDINGS OF THE 2012 SEVENTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2012)
IEEE
74
-
78
2012
-
Synthesis of Secure Passwords
Reviewed
Tomoki Sato, Hiroaki Kikuchi
PROCEEDINGS OF THE 2012 SEVENTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2012)
IEEE
(
8
)
35
-
43
2012
-
Privacy preserving collaborative filtering for SaaS enabling PaaS clouds
Anirban Basu, Jaideep Vaidya, Hiroaki Kikuchi, Theo Dimitrakos, Srijith K. Nair
Journal of Cloud Computing
1
(
1
)
1
-
14
2012
-
投資額制約がある場合の調達・生産計画の研究
野口真希, 松丸正延, 山下洋史
第47回日本経営システム学会全国研究発表大会講演論文集
80-81
2011.12
-
曖昧性を含んだ多項式による特徴量関数を利用した非対称生体認証:その改良と安全性証明
渡邊幸聖, 小田雅洋, 山本匠, 高橋健太, 尾形わかは, 西垣正勝
暗号と情報セキュリティシンポジウム SCIS 2011, 電子情報通信学会,2E3-4
1-8
2011.11
-
Efficient Privacy-Preserving Collaborative Filtering Based on the Weighted Slope One Predictor
Reviewed
Anirban Basu, Jaideep Vaidya, Hiroaki Kikuchi
Journal of Internet Services and Information Security (JISIS)
1
(
4
)
26
-
46
2011.11
-
Privacy-Preserving Item Recommendation System in Cloud Computing
Reviewed
A. Basu, H. Kikuchi, J. Vaidya, T. Dimitrakos
Poster in the International Workshop on Security (IWSEC 2011)
IPSJ
(
IEICE
)
2011.11
-
Analysis on the Sequential Behavior of Malware Attacks
Reviewed
Nur Rohman Rosyid, Masayuki Ohrui, Hiroaki Kikuchi, Pitikhate Sooraksa, Masato Terada
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS
E94D
(
11
)
2139
-
2149
2011.11
-
オプションを用いた調達契約の研究
野口真希, 松丸正延, 菊池浩明
日本経営工学会 平成23年度秋季研究大会予稿集
40-41
2011.11
-
Communication Efficient Distributed Concordance Evaluation in Vertical Partitioning
青木 良樹, 菊池 浩明, 寺田 雅之, 石井 一彦, 関野 公彦
コンピュータセキュリティシンポジウム2011 論文集
2011
(
3
)
510
-
515
2011.10
-
Bloomフィルタを用いたマッチング数の秘匿比較
佐久間淳
コンピュータセキュリティシンポジウム2011, 情報処理学会(2C4-3)
516-521
2011.10
-
Practical privacy preserving collaborative filtering on the Google App Engine
2011
(
3
)
361-366
-
366
2011.10
-
Slope One を用いた摂動化プライバシー保護情報推薦方式
望月安菜
コンピュータセキュリティシンポジウム (CSS 2011), 情報処理学会
379-384
2011.10
-
Time-zone dependency in malicious activities performed by botnet
Reviewed
Hiroaki Kikuchi, Shunji Matsuo, Masato Terada, Masashi Fujiwara
The 6th Joint Workshop on Information Security (JWIS 2011)
(
5D
)
1
-
14
2011.10
-
摂動化によってプライバシーを保護する情報推薦方式
望月安菜
マルチメディア,分散,協調とモバイルシンポジウム (DICOMO2011), 情報処理学会(3G-2)
536-541
-
541
2011.7
-
プライバシーを保護した放射線疫学調査システム
佐藤智貴, 佐久間淳
情報処理学研究報告,コンピュータセキュリティ (CSEC)
CSEC-54
(
25
)
1-7
2011.7
-
Privacy-preserving weighted Slope One predictor for Item-based Collaborative Filtering
Anirban Basu, Jaideep Vaidya
Trust and Privacy in Distributed Information Processing (TP-DIS 2011), Workshop Proceedings of IFIPTM-2011(IFIP WG 11.11)
447-462
2011.6
-
入退室管理エージェントシステムの開発
田中隼人, 二之形裕貴, 青木良樹
情報処理学会全国大会,1X-4
1-2
2011.3
-
ゼロ知識性が証明可能なリモート生体認証方式
佐瀬大治郎, 尾形わかは, 西垣正勝
2011年暗号と情報セキュリティシンポジウム SCIS 2011, 電子情報通信学会,3E1-3
1-6
2011.1
-
凝準同型性を満たす類似度による分散協調フィルタリングプロトコル
青木良樹, 菊池浩明, 寺田雅之, 石井一彦, 関野公彦
暗号と情報セキュリティシンポジウム (SCIS 2011) 予稿集
2011.1
-
Fuzzy Vault Schemeにおけるチャフ空間拡大に関する検討
小田雅洋, 渡邊幸聖, 山本匠, 高橋健太, 尾形わかは, 西垣正勝
暗号と情報セキュリティシンポジウム SCIS 2011, 電子情報通信学会 3E1-5
1-8
2011.1
-
暗号とバイオメトリクス技術の融合
尾形わかは, 西垣正勝
バイオメトリックシステムセキュリティ研究会,電子情報通信学会, BS研
1-8
2011.1
-
秘密分散ベースの秘匿関数計算を用いたプライバシ保護情報推薦方式
多田 美奈子
暗号と情報セキュリティシンポジウム SCIS 2011, 電子情報通信学会,1F1-3
1-4
2011.1
-
Perfect privacy-preserving automated trust negotiation
Reviewed
Tangtisanon Pikulkaew, Hiroaki Kikuchi
Journal of Information Processing
19
451
-
462
2011
-
Apriori-PrefixSpan hybrid approach for automated detection of botnet coordinated attacks
Reviewed
Masayuki Ohrui, Hiroaki Kikuchi, Masato Terada, Nur Rohman Rosyid
Proceedings - 2011 International Conference on Network-Based Information Systems, NBiS 2011
IEEE
92
-
97
2011
-
Improving efficiency in privacy-preserving Automated Trust Negotiation with conjunctive policies
Reviewed
Tangtisanon Pikulkaew, Hiroaki Kikuchi
Proceedings - 2011 International Conference on Network-Based Information Systems, NBiS 2011
IEEE
679
-
684
2011
-
Perfect Privacy Preserving in Automated Trust Negotiation
Reviewed
Hiroaki Kikuchi, Tangtisanon Pikulkaew
25TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA 2011)
19
129
-
134
2011
-
Perfect Privacy Preserving in Automated Trust Negotiation
Reviewed
Hiroaki Kikuchi, Tangtisanon Pikulkaew
25TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA 2011)
IEEE
129
-
134
2011
-
Principal component analysis of botnet takeover
Reviewed
Hiroaki Kikuchi, Shuji Matsuo, Masato Terada
Journal of Information Processing
19
463
-
472
2011
-
Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasets
Reviewed
Hiroaki Kikuchi, Daisuke Kagawa, Anirban Basu, Kazuhiko Ishii, Masayuki Terada, Sadayuki Honga
FUTURE CHALLENGES IN SECURITY AND PRIVACY FOR ACADEMIA AND INDUSTRY
354
(
Springer
)
223
-
+
2011
-
Privacy-preserving collaborative filtering for the cloud
Reviewed
Anirban Basu, Jaideep Vaidya, Hiroaki Kikuchi, Theo Dimitrakos
Proceedings - 2011 3rd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2011
223
-
230
2011
-
Distributed collaborative filtering protocol based on quasi-homomorphic similarity
Reviewed
Hiroaki Kikuchi, Yoshiki Aoki, Masayuki Terada, Kazuhiko Ishii, Kimihiko Sekino
Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011
622
-
627
2011
-
Principal Component Analysis of Botnet Takeover
Kikuchi Hiroaki, Matsuo Shuji, Terada Masato
Information and Media Technologies
6
(
4
)
1241
-
1250
2011
-
第5 回IFIP トラストマネージメント国際会議参加報告
ハオドン
コンピュータセキュリティシンポジウム2011 情報処理学会(3D1)
594-599
2011
-
CCC DATAset における連携するマルウェアの変遷
大類将之, 寺田真敏, Nur Rohman Rosyid
コンピュータセキュリティシンポジウム 2010 (CSS 2010), 3F2-4, 情報処理学会
2010
(
9
)
903-909
2010.10
-
プライバシ保護情報推薦システムにおける中間情報の秘匿について
多田 美奈子
コンピュータセキュリティシンポジウム 2010 (CSS 2010), 2D1, 情報処理学会
291-296
2010.10
-
パスシーケンスに基づくDrive-by-Download 攻撃の分類
桑原和也, 安藤槙悟, 藤原将志, 寺田真敏, 趙晋輝
コンピュータセキュリティシンポジウム 2010 (CSS 2010), 3F1-3, 情報処理学会
2010
(
9
)
771-776
2010.10
-
アイテム間類似度に基づくプライバシ保護協調フィルタリングの提案
多田美奈子
情報処理学会論文誌
51
(
9
)
1554-1562
2010.9
-
曖昧性を含んだ多項式による特徴量関数を利用した非対称生体認証
渡邊 幸聖, 小田 雅洋, 山本匠, 尾形 わかは, 菊池 浩明, 西垣正勝
暗号と情報セキュリティシンポジウム (SCIS 2010), 2F1-3
1-6
2010.3
-
Privacy-preserving similarity evaluation and application to remote biometrics authentication
Reviewed
Hiroaki Kikuchi, Kei Nagai, Wakaha Ogata, Masakatsu Nishigaki
SOFT COMPUTING
14
(
5
)
529
-
536
2010.3
-
Frequent Sequential Attack Patterns of Malware in Botnets
Nur Rohman Rosyid, Masayuki Ohrui, Pitikhate Sooraksa, Masato Terada
情報処理学会,研究報告, Vol. 2010-CSEC-48
(
37
)
1-7
2010.3
-
マルコフチェインによるワードスパムの合成実験とその評価について
鴨志田芳典, 菊池浩明
情報処理学会全国大会, 2G-1
(
3
)
581-582
2010.3
-
組織間プライバシー保護データマイニングの考察
菊池浩明, 香川大介, 石井一彦, 寺田雅之, 本郷節之
暗号と情報セキュリティシンポジウム (SCIS 2010) 予稿集
2010.1
-
A Discovery of Sequential Attack Patterns of Malware in Botnets
Reviewed
Nur Rohman Rosyid, Masayuki Ohrui, Hiroaki Kikuchi, Pitikhate Sooraksa, Masato Terada
IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2010)
2010
-
Principal component analysis of port-scans for reduction of distributed sensors
Hiroaki Kikuchi, Masato Terada
Journal of Information Processing
18
(
18
)
190
-
200
2010
-
Principal Component Analysis of Port-scans for Reduction of Distributed Sensors
Kikuchi Hiroaki, Terada Masato
Information and Media Technologies
5
(
4
)
1338
-
1348
2010
-
Mining association rules consisting of download servers from distributed honeypot observation
Masayuki Ohrui, Hiroaki Kikuchi, Masato Terada
Proceedings - 13th International Conference on Network-Based Information Systems, NBiS 2010
541
-
545
2010
-
Privacy-Preserving Collaborative Filtering Protocol based on Similarity between Items
Reviewed
Minako Tada, Hiroaki Kikuchi, Sutheera Puntheeranurak
2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA)
573
-
578
2010
-
分散ハニーポット観測からのダウンロードサーバ間の相関ルール抽出
大類 将之, 菊池 浩明, 寺田 真敏
コンピュータセキュリティシンポジウム (CSS 2009), マルウェア対策研究人材育成ワークショップ (MWS 2009), A2
(
3
)
1-6
2009.10
-
パケットキャプチャーから感染種類を判定する発見的手法について
桑原 和也, 菊池 浩明, 寺田 真敏, 藤原 将志
コンピュータセキュリティシンポジウム (CSS 2009), マルウェア対策研究人材育成ワークショップ (MWS 2009), A5
(
3
)
1-6
-
402
2009.10
-
ボットネットはいくつあるか?ダウンロードログからの線形独立な基底数
松尾 峻治, 菊池 浩明, 寺田 真敏
コンピュータセキュリティシンポジウム (CSS 2009), マルウェア対策研究人材育成ワークショップ (MWS 2009), A2
(
1
)
1-6
2009.10
-
アイテム間類似度に基づくプライバシ保護協調フィルタリングの提案
多田 美奈子
コンピュータセキュリティシンポジウム (CSS 2009), E6
(
1
)
1-6
2009.10
-
多項式の類似度を利用した非対称生体認証
菊池 浩明, 尾形 わかは, 西垣 正勝
コンピュータセキュリティシンポジウム (CSS 2009), D4
(
2
)
1-6
2009.10
-
ポリシーを秘匿した自動トラスト交渉
菊池 浩明, Tangtisanon Pikulkaew
コンピュータセキュリティシンポジウム (CSS 2009)
(
3
)
1-6
2009.10
-
Orthogonal Expansion of Port-Scan-Estimation from Limited Sensors
Hiroaki Kikuchi, Masato Terada
The Fourth Joint Workshop on Information Security (JWIS 2009), 5A-2
1-14
2009.8
-
プライバシーを保護した評判推薦方式
菊池浩明, 木澤寛厚
日本知能情報ファジィ学会,ファジィシステムシンポジウム
(
25
)
9-12
2009.7
-
Short Sanitizable Signature Scheme Based on RSA-Accumulators
Ryo Nojima, Jin Tamura, Youki Kadobayashi, Hiroaki Kikuchi
暗号と情報セキュリティシンポジウム SCIS 2009, 3B2-3
1-6
2009.1
-
秘匿積集合プロトコルを利用したプライバシ協調フィルタリングの提案
木澤寛厚, 磯崎邦隆, 菊池浩明
暗号と情報セキュリティシンポジウム SCIS 2009, 1B2-5
1-4
2009.1
-
抽出署名の拡張による墨塗・削除署名の構成について
伊豆哲也, 菊池浩明, 武仲正彦
暗号と情報セキュリティシンポジウム SCIS 2009, 3B2-1
1-6
2009.1
-
直交基底指紋への参照度を特徴量とした安全な生体認証プロトコル
菊池浩明, 河野瞬, 畔上洋平, 西垣正勝, 尾形わかは
暗号と情報セキュリティシンポジウム SCIS 2009, 2F4-3
1-6
2009.1
-
Redactable 署名をベースとした墨塗り・削除署名
伊豆哲也, 菊池浩明, 武仲正彦
暗号と情報セキュリティシンポジウム SCIS 2009, 3B2-2
1-6
2009.1
-
Orthogonal expansion of port-scanning packets
Reviewed
Hiroaki Kikuchi, Tomohiro Kobori, Masato Terada
NBiS 2009 - 12th International Conference on Network-Based Information Systems
321
-
326
2009
-
A Storage Efficient Redactable Signature in the Standard Model
Reviewed
Ryo Nojima, Jin Tamura, Youki Kadobayashi, Hiroaki Kikuchi
INFORMATION SECURITY, PROCEEDINGS
5735
326
-
337
2009
-
A Proposal of Efficient Remote Biometric Authentication Protocol
Reviewed
Taiki Sakashita, Yoichi Shibata, Takumi Yamamoto, Kenta Takahashi, Wakaha Ogata, Hiroaki Kikuchi, Masakatsu Nishigaki
ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS
5824
212
-
+
2009
-
Privacy-preserving collaborative filtering schemes
Hiroaki Kikuchi, Hiroyasu Kizawa, Minako Tada
Proceedings - International Conference on Availability, Reliability and Security, ARES 2009
911
-
916
2009
-
Multiparty computation from El Gamal/Paillier conversion
Koji Chida, Hiroaki Kikuchi, Keiichi Hirota, Gembu Morohashi
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
E92-A
(
1
)
137
-
146
2009
-
A study of user-friendly hash comparison schemes
Hsu-Chun Hsiao, Yue-Hsun Lin, Ahren Studer, Cassandra Studer, King-Hang Wang, Hiroaki Kikuchi, Adrian Perrig, Hung-Min Sun, Bo-Yin Yang
Proceedings - Annual Computer Security Applications Conference, ACSAC
105
-
114
2009
-
Protocols for Identifying Size of Intersections without revealing Address sets and its application to network port-scanning packets
2008
(
14
)
109-114
-
114
2008.12
-
Provable Secure Signature Scheme with Partial Sanitization and Disclosure
Hiroaki Kikuchi, Mari Ueyama, Tetsuya Izu, Masahiko Takenaka
Fourth International SKLOIS Conference, Inscrypt 2008, Pre-proceedings
(
2
)
549-563
2008.12
-
プライバシ協調フィルタリングにおける利用者評価行列の次元削減
木澤寛厚, 菊池浩明
コンピュータセキュリティシンポジウム (CSS 2008)
509-514
-
514
2008.10
-
Interrelation between Interactive and Non-interaction Sensors
小堀智弘, 菊池浩明, 寺田真敏
情報処理学会シンポジウム論文集
2008
(
8
)
67-74
2008.10
-
信頼の数学モデルとそのダイナミクスについて
菊池浩明
コンピュータセキュリティシンポジウム (CSS 2008)
397-402
2008.10
-
G3C-ZKIPを用いた非対称生体認証
小田 雅洋, 尾形 わかは, 菊池浩明, 西垣 正勝
コンピュータセキュリティシンポジウム (CSS 2008)
695-700
-
700
2008.10
-
言語情報と和声進行に基づく旋律の自動生成システム
白石,菅, 内田,中西
情報処理学会第70回全国大会,3X-2
(
2
)
443-444
2008.3
-
Automated Port-scan Classification with Decision Tree and Distributed Sensors
Kikuchi Hiroaki, Fukuno Naoya, Kobori Tomohiro, Terada Masato, Pikulkaew Tangtisanon
Information and Media Technologies
3
(
4
)
972
-
982
2008
-
Estimation of Increase of Scanners Based on ISDAS Distributed Sensors
Kikuchi Hiroaki, Terada Masato, Fukuno Naoya, Doi Norihisa
Information and Media Technologies
3
(
4
)
939
-
948
2008
-
Multi-bit embedding in asymmetric digitalwatermarking without exposing secret information
Mitsuo Okada, Hiroaki Kikuchi, Yasuo Okabe
IEICE Transactions on Information and Systems
E91-D
(
5
)
1348
-
1358
2008
-
Automated classification of port-scans from distributed sensors
Hiroaki Kikuchi, Naoya Fukuno, Tomohiro Kobori, Masato Terada, Tangtisanon Pikulkaew
Proceedings - International Conference on Advanced Information Networking and Applications, AINA
771
-
778
2008
-
Automated port-scan classification with decision tree and distributed sensors
Hiroaki Kikuchi, Naoya Fukuno, Tomohiro Kobori, Masato Terada, Tangtisanon Pikulkaew
Journal of Information Processing
16
(
16
)
165
-
175
2008
-
Estimation of increase of scanners based on ISDAS distributed sensors
Hiroaki Kikuchi, Masato Terada, Naoya Fukuno, Norihisa Doi
Journal of Information Processing
16
(
16
)
100
-
109
2008
-
Internet observation with ISDAS: How long does a worm perform scanning?
Reviewed
Tomohiro Kobori, Hiroaki Kikuchi, Masato Terada
ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY
1282
-
+
2008
-
Secure multiparty computation for comparator networks
Gembu Morohashi, Koji Chida, Keiichi Hirota, Hiroaki Kikuchi
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
E91-A
(
9
)
2349
-
2355
2008
-
Principal Components of Port-Address Matrices in Port-Scan Analysis
Reviewed
Hiroaki Kikuchi, Naoya Fukuno, Masato Terada, Norihisa Doi
ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2008, PT II, PROCEEDINGS
5332
956
-
+
2008
-
Privacy-Preserving Similarity Evaluation and Application to Remote Biometrics Authentication
Reviewed
Hiroaki Kikuchi, Kei Nagai, Wakaha Ogata, Masakatsu Nishigaki
MODELING DECISIONS FOR ARTIFICIAL INTELLIGENCE, PROCEEDINGS
5285
3
-
+
2008
-
ZeroBio - Evaluation and development of asymmetric fingerprint authentication system using oblivious neural network evaluation protocol
Reviewed
Kei Nagai, Hiroaki Kikuchi, Wakaha Ogata, Masakatsu Nishigaki
ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS
1155
-
+
2007
-
Evaluation and implement of fuzzy vault scheme using indexed minutiae
Reviewed
Hiroaki Kikuchi, Yasunori Onuki, Kei Nagai
Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics
3709
-
3712
2007
-
Special section on cryptography and information security
Reviewed
Masakatu Morii, Shiho Moriai, Goichiro Hanaoka, Toru Akishita, Tetsuya Izu, Tetsu Iwata, Koji Okada, Toshinobu Kaneko, Hiroaki Kikuchi, Kwangjo Kim, Shinsaku Kiyomoto, Noboru Kunthiro, Hiroki Koga, Kazukuni Kobara, Ryuichi Sakai, Kouichi Sakurai, Kazue Sako, Takashi Satoh, Akira Shiozaki, Hiroki Shizuya, Tsuyoshi Takagi, Mitsuru Tada, Keisuke Tanaka, Hiroshi Doi, Toru Nakanishi, Shoichi Hirose, Eiichiro Fujisaki, Soichi Furuya, Mitsuru Matsui, Natsume Matsuzaki, Tsutomu Matsumoto, Atsuko Miyaji, Maid Yoshida
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
E90-A
(
1
)
1
2007
-
Efficient Multiparty Computation for Comparator Networks
Koji Chida, Hiroaki Kikuchi, Gembu Morohashi, Keiichi Hirota
The Second International Conference on Availability, Reliability and Security (ARES'07)
2007
-
Estimation of behavior of scanners based on ISDAS distributed sensors
Reviewed
Hiroaki Kikuchi, Masato Terada, Naoya Fukuno, Norihisa Doi
ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2007: COOPIS, DOA, ODBASE, GADA, AND IS, PT 2, PROCEEDINGS
4804
1659
-
+
2007
-
Online Certification Status Verification with a Red-Black Hash Tree
Kikuchi Hiroaki, Abe Kensuke, Nakanishi Shohachiro
ipsjdc
2
513
-
523
2006
-
How many malacious scaners are in the Internet?
Reviewed
Hiroaki Kikuchi, Masato Terada
INFORMATION SECURITY APPLICATIONS
4298
381
-
+
2006
-
Secure asymmetric watermark detection without secret of modified pixels
Mitsuo Okada, Hiroaki Kikuchi
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
3786
165
-
178
2005
-
Applications of fuzzy logic functions to knowledge discovery in databases
Reviewed
N Takagi, H Kikuchi, M Mukaidono
TRANSACTIONS ON ROUGH SETS II
3135
107
-
128
2004
-
User authentication with facial images - Human-friendly identification in the Internet
Reviewed
H Kikuchi, T Hattori, S Nakanishi
JOINT 9TH IFSA WORLD CONGRESS AND 20TH NAFIPS INTERNATIONAL CONFERENCE, PROCEEDINGS, VOLS. 1-5
2265
-
2270
2001
-
Distributed auction servers resolving winner and winning bid without revealing privacy of bids
Reviewed
H Kikuchi, S Hotta, K Abe, S Nakanishi
SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS: WORKSHOPS, PROCEEDINGS
307
-
312
2000
-
Performance evaluation of certificate revocation using k-valued hash tree
Reviewed
H Kikuchi, K Abe, S Nakanishi
INFORMATION SECURITY, PROCEEDINGS
1729
103
-
117
1999
-
Fuzzy system identification for composite operation and fuzzy relation by genetic algorithms
Reviewed
S Ohtani, H Kikuchi, RR Yager, S Nakanishi
FIRST INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED INTELLIGENT ELECTRONIC SYSTEMS, PROCEEDINGS 1997 - KES '97, VOLS 1 AND 2
289
-
295
1997
-
Diagnosis of fuzzy system character: System identification of composite operation and fuzzy relation by genetic algorithms
Reviewed
S Ohtani, H Kikuchi, RR Yager, S Nakanishi
PROCEEDINGS OF THE SIXTH IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS I - III
293
-
298
1997
-
Uniqueness of partially specified multiple-valued Kleenean function
Reviewed
H Kikuchi, N Takagi, S Nakanishi, M Mukaidono
1995 25TH INTERNATIONAL SYMPOSIUM ON MULTIPLE-VALUED LOGIC, PROCEEDINGS
242
-
247
1995
Click to view the Scopus page. The data was downloaded from Scopus API in April 09, 2026, via http://api.elsevier.com and http://www.scopus.com .