Publication
Hiroaki Kikuchi
- Ito, S., Kikuchi, H. & Nakagawa, H. Attacker,
"Models with a variety of background knowledge to de-identified data",
Journal of Ambient Intelligence and Humanized Computing, pp. 1-11, Springer, 2019.
DOI:10.1007/s12652-019-01394-z
- Satoshi Ito, Reo Harada and Hiroaki Kikuchi,
"De-identification for Transaction Data Secure against Re-identification Risk Based on Payment Records",
USB Proceedings of The 15th International Conference on Modeling Decisions for Artificial Intelligence (MDAI 2019), pp. 158-169, 2019.
- Ryo Nojima, Hidenobu Oguri, Hiroaki Kikuchi, Hiroshi Nakagawa, Koki Hamada, Takao Murakami, Yuji Yamaoka, Chiemi Watanabe,
"How to Handle Excessively Anonymized Datasets",
Journal of Information Processing,vol 26. pp.477-485,2018.
DOI:10.2197/ipsjjip.26.477
- Hiroaki Kikuchi, Chika Hamanag, Hideo Yasunaga, Hiroki Matsui, Hideki Hashimoto, Chun-I Fan ,
"Privacy-Preserving Multiple Linear Regression of Vertically Partitioned Real Medical Datasets",
Journal of Information Processing,vol 26. pp.638-647,2018.
DOI:10.2197/ipsjjip.26.638
- Hiroaki Kikuchi, Xuping Huang, Shigeta Ikuji, Manami Inoue,
"Privacy-Preserving Hypothesis Testing for Reduced Cancer Risk on Daily Physical Activity",
Journal of Medical Systems,vol 42, 2018.(2019/01/12)
DOI:10.1007/s10916-018-0930-9
- Hiroaki Kikuchi, Takayasu Yamaguchi, Koki Hamada, Yuji Yamaoka, Hidenobu Oguri, Jun Sakuma,
"Study on Record Linkage of Anonymizied Data",
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2017 (invited paper).
- Satoshi Ito, Hiroaki Kikuchi,
"Risk of Re-identification Based on Euclidean distance in Anonymized Data PWSCUP2015",
Advances in Network-Based Information Systems, NBiS 2017,
Lecture Notes on Data Engineering and Communications Technologies,
vol 7. pp. 901-913, Springer, 2017.
- Chun-I Fan, Yi-Fan Tseng, Jheng-Jia Huang,
Shih-Fen Chen, Hiroaki Kikuchi,
"Multireceiver Predicate Encryption for Online Social Networks",
IEEE Trans. Signal and Information Processing over Networks 3(2),
pp. 388-403, 2017.
- Hiroaki Kikuchi,
"Study from Data Anonymization Competition of Online Retail Data",
Workshop on Design Issues for a data Anonymization Competition (WODIAC),
PETS 2017 Workshop, 2017.
- Hiroaki Kikuchi, Katsumi Takahashi,
"Zipf Distribution Model for Quantifying Risk of Re-identification from Trajectory Data",
Journal of Information Processing, Vol. 24 (2016) No. 5 pp. 816-823. ( 2017 JIP Outstanding Paper)
- H. Kikuchi, H. Yasunaga, H. Matsui and C. I. Fan,
Efficient Privacy-Preserving Logistic Regression with Iteratively Re-weighted Least Squares, 2016 11th Asia Joint Conference on Information Security (AsiaJCIS), pp. 48-54, IEEE, 2016.
- H. Kikuchi, T. Yamaguchi, K. Hamada, Y. Yamaoka, H. Oguri and J. Sakuma,
"Ice and Fire: Quantifying the Risk of Re-identification and Utility in Data Anonymization",
IEEE 30th International Conference on Advanced Information Networking and Applications (AINA),
pp. 1035-1042, IEEE, 2016.
- Hiroaki Kikuchi,
Takayasu Yamaguchi, Koki Hamada, Yuji Yamaoka, Hidenobu Oguri, Jun Sakuma,
"A Study from the Data Anonymization Competition Pwscup 2015",
Data Privacy Management and Security Assurance (DPM 2016),
LNCS, volume 9963, pp. 230-237, Springer, 2016.
- Hiroaki Kikuchi, Kouichi Itoh, Mebae Ushida, Hiroshi Tsuda, Yuji Yamaoka,
"Privacy-Preserving Decision Tree Learning with Boolean Target Class",
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E98.A, No. 11, pp. 2291-2300, 2015.
- Hiroaki Kikuchi, Hideki Hashimoto, Hideo Yasunaga,
"Privacy-Preserving Epidemiological Analysis for a Distributed Database of Hospitals",
2015 10th Asia Joint Conference on Information Security (AsiaJCIS), pp. 85-90, IEEE, 2015.
- Hiroaki Kikuchi, Jun Sakuma,
"Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size of an Intersection",
Journal of Information Processing, Vol. 22, No. 2 pp. 388-400, 2014.
- Michitomo Yamaguchi, Toru Nakata, Hajime Watanabe, Takeshi Okamoto, Hiroaki Kikuchi, Vulnerability of the Conventional Accessible, CAPTCHA used by the White House and an Alternative Approach for Visually Impaired People, 2014 IEEE International Conference on Systems, Man, and Cybernetics, pp. 4004-4009, IEEE, 2014.
- Hiroaki Kikuchi, Tomoki Sato, Jun Sakuma,
"Privacy-Preserving Hypothesis Testing for the Analysis of Epidemiological Medical Data",
2014 IEEE 28th International Conference on the Advanced Information Networking and Applications (AINA) , pp. 359 - 365, IEEE, 2014.
- Hiroaki Kikuchi, Hideki Hashimoto, Hideo Yasunaga, Takamichi Saito, Scalability of Privacy-Preserving Linear Regression in Epidemiological Studies, The 29th IEEE International Conference on the Advanced Information Networking and Applications (AINA), IEEE, 2015.
- Hiroaki Kikuchi , Anna Mochizuki,
"Privacy-preserving Collaborative Filtering Using Randomized Response",
Journal of Information Processing, Vol. 21 (2013) No. 4 pp. 617-623, 2013.
(invited paper)
- Hiroaki Kikuchi, Daisuke Kagawa, Anirban Basu, Kazuhiko Ishii, Masayuki Terada, Sadayuki Hongo, "Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasets", IEICE Trans. on Fundamentals, Vol. E96-A, No. 1, pp. 111-120, 2013.
Hiroshi Nakagawa
- "Personalized Anonymization for Set-Valued Data by Partial Suppression",
Takuma Nakagawa, Hiromi Arai, Hiroshi Nakagawa,
Transactions on Data Privacy,vol 11. pp.219-237,2018.
http://www.tdp.cat/issues16/abs.a322a18.php
- "Personalized Anonymization for Set-Valued Data by Partial Suppression",
Takuma Nakagawa,Hiromi Arai, Hiroshi Nakagawa,
Privacy and Anonymity in the Information Society(PAIS) Worksho of IEEE International Conference on Data Mining(ICDM), 2017, (accepted) .
- "Anonymization and Re-identification for Personal Transaction Data", Hiroshi Nakagawa ,
Workshop on Design Issues for a data Anonymization Competition (WODIAC) on Privacy Enhancing Technologies Symposium (PETS) 2017, Minneaplos, (July 17, 2017).
- "Differential Privacy without Sensitivity",
Kentaro Minami, Issei Sato, Hiromi Arai, Hiroshi Nakagawa,
NIPS2016, Barcelona SPAIN (December 05--10, 2016),
- "Copeland Dueling Bandit Problem: Regret Lower Bound, Optimal Algorithm, and Computationally Efficient Algorithm",
Junpei Komiyama, Junya Honda, Hiroshi Nakagawa,
ICML2016, NewYork, (JUNE 19-24 2016),
- "Regret Lower Bound and Optimal Algorithm in Finite Stochastic Partial Monitoring",
Junpei Komiyama, Junya Honda, Hiroshi Nakagawa,
NIPS 2015, Montréal CANADA. (December 0 -- 12, 2015).
- "Regret Lower Bound and Optimal Algorithm in Dueling Bandit Problem",
Junpei Komiyama, Junya Honda, Hisashi Kashima, Hiroshi Nakagawa,
COLT2015, pp.1141-1154, Paris France. (July 3-6, 2015).
- "Optimal Regret Analysis of Thompson Sampling in Stochastic Multi-armed Bandit Problem with Multiple Plays",
Junpei Komiyama, Junya Honda, Hiroshi Nakagawa,
ICML2015, pp.1152-1161, Lille, France. (July.6-11, 2015).
- "Bayesian Differential Privacy on Correlated Data",
Bing Yang, Issei Sato, Hiroshi Nakagawa,
ACM SIGMOD2015. pp747-762, Melbourne, Australia (May 31 - June 4, 2015).
- "Locally Optimized Hashing for Nearest Neighbor Search",
Seiya Tokui, Issei Sato, Hiroshi Nakagawa,
PAKDD 2015, Ho Chi Minh City, Viet Nam, (May 19-22 2015).
- " Latent Confusion Analysis by Normalized Gamma Construction",
Issei Sato, Hisashi Kashima, Hiroshi Nakagawa,
The 31st International Conference on Machine Learning (ICML 2014), pp.1116-1124, (June 21-26, 2014).
- "Approximation Analysis of Stochastic Gradient Langevin Dynamics by using Fokker-Planck Equation and Ito Process",
Issei Sato, Hiroshi Nakagawa,
The 31st International Conference on Machine Learning (ICML 2014), pp.982-990, (June 21-26, 2014)
Chiemi Watanabe
- Kento Akiyama, Chisato Shinozuka, Chiemi Watanabe, Toshiyuki Amagasa and Hiroyuki Kitagawa,
"An Index-based Secure Query Processing Scheme for Outsourced Databases",
The 19th International Conference on Information Integration and Web-based Applications & Services (iiWAS2017), 2017 (accepted)
- Mateus S. H. Cruz, Toshiyuki Amagasa, Chiemi Watanabe, Wenjie Lu and Hiroyuki Kitagawa,
"Secure Similarity Joins Using Fully Homomorphic Encryption",
The 19th International Conference on Information Integration and Web-based Applications & Services (iiWAS2017), 2017 (accepted)
- Ayano Yoshikuni, Chiemi Watanabe,
"Calculation of account reachability risk for users having multiple SNS accounts from user’s profile and regional information",
International Journal of Web Information Systems, Vol. 11, Issue: 1, pp.120 -138, 2015
- Rina Okada, Chiemi Watanabe and Hiroyuki Kitagawa,
"A k-anonymization Algorithm on Social Network Data that Reduces Distances between Nodes", The 1st International Workshop on Future Technologies for Smart Information Systems (FTSIS 2014),pp. 76 - 81, 2014
- Miho Kakizawa, Chiemi Watanabe, Ryo Furukawa and Tsubasa Takahashi,
"Improvement of Pk-anonymization", The 1st International Workshop on Future Technologies for Smart Information Systems (FTSIS 2014),pp. 82 - 87, 2014
- Ayano Yoshikuni and Chiemi Watanabe,
"Account Reachability : A Measure of Privacy Risk for Exposure the User's Multiple SNS Accounts",
The 15th International Conference on Information Integration and Web-based Applications amp; Services (iiWAS2013), pp. 542 - 549, 2013
Takao Murakami
- Takao Murakami, Yosuke Kaga, Kenta Takahashi,
"Modality Selection Attacks and Modality Restriction in Likelihood-ratio Based Biometric Score Fusion",
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2017 (to appear).
- Seira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro Hanaoka,
"Model Inversion Attacks for Prediction Systems: Without Knowledge of Non-Sensitive Attributes",
Proceedings of the 15th International Conference on Privacy, Security, and Trust (PST 2017), 2017 (to appear).
- Takao Murakami,
"Expectation-Maximization Tensor Factorization for Practical Location Privacy Attacks",
Proceedings on Privacy Enhancing Technologies (PoPETs), Issue 4, pp.58-75, 2017.
- Takao Murakami,
"Quantifying the Risk of Re-identification in Data Anonymization Competition",
Workshop on Design Issues for a data Anonymization Competition (WODIAC), workshop at PETS2017, 2017.
- Takao Murakami, Atsunori Kanemura, Hideitsu Hino,
"Group Sparsity Tensor Factorization for Re-identification of Open Mobility Traces",
IEEE Transactions on Information Forensics and Security, Vol.12, No.3, pp.689-704, 2017.
- Takao Murakami, Yosuke Kaga, Kenta Takahashi,
"On Restricting Modalities in Likelihood-ratio Based Biometric Score Fusion",
Proceedings of the 23rd International Conference on Pattern Recognition (ICPR 2016), pp.3031-3037, 2016.
- Takao Murakami, Tetsushi Ohki, Kenta Takahashi,
"Optimal Sequential Fusion for Multibiometric Cryptosystems",
Elsevier Information Fusion (Special Issue on Information Fusion in Biometrics), Vol.32, pp.93-108, 2016.
- Takao Murakami, Hajime Watanabe,
"Localization Attacks Using Matrix and Tensor Factorization",
IEEE Transactions on Information Forensics and Security, Vol.11, No.8, pp.1647-1660, 2016.
- Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka,
"Fuzzy Signatures: Relaxing Requirements and a New Construction",
Proceedings of the 14th International Conference on Applied Cryptography and Network Security (ACNS 2016), LNCS 9696, pp.97-116, 2016.
- Takao Murakami, Kenta Takahashi,
"Information-theoretic Performance Evaluation of Likelihood-ratio Based Biometric Score Fusion under Modality Selection Attacks",
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E99-A, No.5, pp.929-942, 2016.
- Takao Murakami, Yosuke Kaga, Kenta Takahashi,
"Information-theoretic Performance Evaluation of Multibiometric Fusion under Modality Selection Attacks",
Proceedings of the 7th IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS 2015), pp.1-8, 2015.
- Takao Murakami, Atsunori Kanemura, Hideitsu Hino,
"Group Sparsity Tensor Factorization for De-anonymization of Mobility Traces",
Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2015), pp.621-629, 2015. 【Best Paper Award】
- Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki,
"A Signature Scheme with a Fuzzy Private Key",
Proceedings of the 13th International Conference on Applied Cryptography and Network Security (ACNS 2015), LNCS 9092, pp.105-126, 2015.
- Kenta Takahashi, Takao Murakami,
"Location Prediction Attacks Using Tensor Factorization and Optimal Defenses",
Elsevier Image and Vision Computing, Vol.32, No.12, pp.1194-1203, 2014.
- Takao Murakami, Hajime Watanabe,
"Location Prediction Attacks Using Tensor Factorization and Optimal Defenses",
Proceedings of the 1st IEEE International Workshop on Big Data Security and Privacy (BDSP 2014), workshop at IEEE BigData2014, pp.13-21, 2014.
- Takao Murakami, Kenta Takahashi, Kanta Matsuura,
"A General Framework and Algorithms for Score Level Indexing and Fusion in Biometric Identification",
IEICE Transactions on Information and Systems, Vol.E97-D, No.3, pp.510-523, 2014.
- Takao Murakami, Kenta Takahashi, Kanta Matsuura,
"Toward Optimal Fusion Algorithms with Security against Wolves and Lambs in Biometrics",
IEEE Transactions on Information Forensics and Security, Vol.9, No.2, pp.259-271, 2014.
- Takao Murakami, Kenta Takahashi, Susumu Serita, Yasuhiro Fujii,
"Probabilistic Enhancement of Approximate Indexing in Metric Spaces",
Elsevier Information Systems, Vol.38, No.7, pp.1007-1018, 2013.
Eizen Kimura
- Yukio Kurihara, Haku Ishida, Eizen KIMURA, Akira Gochi, Hiroshi Kondoh, Ken-ichiro SHIMAI, Noriaki Nakajima, Takeshi Tanaka, kiyomu Ishikawa, Michihiro Oohara, Takeharu Sonoda, Kohei Takai,
The inequality of patient profile information in Japanese hospitals, Stud Health Technol Inform,
Vol. 228,
pp. 412-415,
2016 .
- Eizen KIMURA, Koki HAMADA, Ryo KIKUCHI, Koji CHIDA, Kazuya OKAMOTO, Shirou MANABE, Tomohiko KURODA, Yasushi MATSUMURA, Toshihiro TAKEDA, MIHARA, Naoki,
Evaluation of Secure Computation in a Distributed Healthcare Setting, Stud Health Technol Inform,
Vol. 228,
pp. 152-156,
2016.
- Eizen Kimura, Ken Ishihara,
Virtual File System on NoSQL for Processing High Volumes of HL7 Messages, Studies in Health Technology and Informatics,
Vol. 210,
pp. 687-691,
2015 .
- Kurihara, Y., Nakajima, N., Ishida, H., Kimura, E., Kondoh, H., Shimai, K., Tanaka, T., Gochi, A., Ishikawa, K.,
A Framework of Sharing Patient Profile Information among Medical Institutions, Stud Health Technol Inform,
Vol. 205,
pp. 1195,
2014 .
- Tomohiro Kuroda, Eizen Kimura, Yasushi Matsumura, Yoshinori Yamashita, Haruhiko Hiramatsu, Naoto Kume, Sato, Atsushi,
Applying Secret Sharing for HIS Backup Exchange,
pp. 4179-4182,
2013 .
- Shiro Uesugi, Hitoshi Okada, Eizen Kimura,
IT Enabled Services - Smartphones: The Next Generation Medication Administration Tool, Springer,
2013 .
- Kimura Eizen, Chida Koji, Ikarashi Dai, Hamada Koki,
Ishihara Ken,
Netherlands Studies in health technology and informatics, Stud Health Technol Inform., Vol. 180, pp. 1117-1119, 2012 .
Jun Sakuma
- Hiromu Yakura, Youhei Akimoto, Jun Sakuma,
"Generate (non-software) Bugs to Fool Classifiers",
The 34th AAAI Conference on Artificial Intelligence (AAAI) 2020.
- Hiromu Yakura, Jun Sakuma,
Robust Audio Adversarial Example for a Physical Attack
The 28th International Joint Conference on Artificial Intelligence (IJCAI) 2019.
- Thien Q. Tran, Jun Sakuma,
Seasonal-adjustment Based Feature Selection Method for Predicting Epidemic with Large-scale Search Engine Logs,
25th ACM SIGKDD Conference On Knowledge Discovery And Data Mining (SIGKDD) 2019.
- "Using Fully Homomorphic Encryption for Statistical Analysis of Categorical, Ordinal and Numerical Data," L. Wen-jie, K. Shohei, J. Sakuma, Network and Distributed System Security Symposium 2017 (NDSS2017), online 15 pages, 2017 .
- "Privacy-preserving and Optimal Interval Release for Disease Susceptibility," K. Kusano, I. Takeuchi, J. Sakuma, ACM Asia Conference on Computer and Communications Security (ASIACCS2017), 532--545, 2017 .
- "Differentially Private Chi-squared Test by Unit Circle Mechanism," K. Kakizaki, K. Fukuchi, J. Sakuma, The 34th International Conference on Machine Learning (ICML2017), in PMLR 70:1761-1770, 2017 .
- "Towards Privacy-preserving Record Linkage with Record-wise Linkage Policy," T. Kaiho, L. Wen-jie, T. Amagasa, J. Sakuma, 28th International Conference on Database and Expert Systems Applications (DEXA2017)", in Database and Expert Systems Applications, 10438, Part I, 233--248, 2017 .
- "Mis-operation Resistant Searchable Homomorphic Encryption," Keita Emura,Takkuya Hayashi, Noboru Kunihiro, J. Sakuma, ACM Asia Conference on Computer and Communications Security (ASIACCS2017) 2017, 215--229, 2017 .
- "Minimax Optimal Estimators for Additive Scalar Functionals of Discrete Distributions," K. Fukuchi, J. Sakuma, 2017 IEEE International Symposium on Information Theory (ISIT2017), 2103--2107, 2017 .
- "Secure Approximation Guarantee for Cryptographically Private Empirical Risk Minimization", T. Takada, H. Hiroyuki, Y. Yamada, J. Sakuma, I. Takeuchi, The 8th Asian Conference on Machine Learning (ACML2016), in PMLR, 63: 126--141, 2016 .
- "Privacy-preserving genome-wide association studies on cloud environment using fully homomorphic encryption,"L. Wen Jie, Y. Yoshiji, J. Sakuma, BMC Med.\ Inform.\ Decis.\ Mak., Supplement 5, 15, online 10 pages. (Impact Factor 1.830)
- "Differentially private analysis of outliers," J. Sakuma, R. Okada, European Conf.\ Machine Learning and Principles and
Practice of Knowledge Discovery in Databases (ECML-PKDD),
Portogal,
in Lect.\ Notes Artif.\ Intell., 9285: 458--473,
2015 .
- "Privacy-preserving statistical analysis by exact logistic regression,"
D. duVerle, S. Kawasaki, Y. Yamada, J. Sakuma, K. Tsuda, IEEE Symp.\ Security and Privacy Workshops (SPW), 7--16, 2015 .
- "Future directions of fairness-aware data mining: Recommendation, causality, and theoretical aspects," J. Sakuma, T. Kamishima, K. Fukuchi, ICML2015 Workshop: Fairness, Accountability, and Transparency in Machine Learning,
France, Jul.
2015.invited talk
- "Neutralized empirical risk minimization with generalization neutrality bound,"
K. Fukuchi, J. Sakuma, European Conf.\ Machine Learning and Principles and
Practice of Knowledge Discovery in Databases (ECML-PKDD),
Portogal,
in Lect.\ Notes Comput.\ Sci.,
8724: 418--433,
2014 .
- "Oblivious evaluation of non-deterministic finite automata with application to privacy-preserving virus genome detection,"
H. Sasakawa, H. Harada, D. duVerle, H. Arimura, K. Tsuda, J. Sakuma, Workshop on Privacy in the Electronic Society (WPES), 21--30,
2014 .
- "Prediction with model-based neutrality,"
K. Fukuchi, J. Sakuma, T. Kamishima, European Conf.\ Machine Learning and Principles and
Practice of Knowledge Discovery in Databases (ECML-PKDD),
in Lect.\ Notes Artif.\ Intell.,
8189: 499--514,
2013 .
- "The independence of the fairness-aware classifiers,"
{T. Kamishima, S. Akaho, H. Asoh, J. Sakuma, IEEE Int.\ Workshop Privacy Aspects of Data Mining
(PADM), TX,
849--858, 2013 .
- "Fairness-aware classifier with prejudice remover
regularizer,"
{T. Kamishima, S. Akaho, H. Asoh, J. Sakuma, European Conf.\ Machine Learning and Principles and
Practice of Knowledge Discovery in Databases (ECML-PKDD),
UK,
in Lect.\ Notes Comput.\ Sci., 7524: 35--50,
2012 .