論文

菊池 浩明

  • 伊藤 聡志, 菊池 浩明 "履歴データの数理モデルの提案とk-匿名化に必要なダミーレコード数推定への応用", 情報処理学会,研究報告コンピュータセキュリティ(CSEC) , Vol. 2020-CSEC-88, No. 4, pp. 1-7, 2020.
  • 藤田真浩,飯田泰興,服部充洋,山中忠和,松田規, 菊池浩明,"匿名加工実施者の意図に着目した匿名加工手法評価システム", "暗号と情報セキュリティシンポジウム SCIS 2020, 3C4-4, pp. 1-8, 2020.
  • 金子侑紀,小野敦樹,伊藤 聡,服部充洋,飯田泰興,藤田真浩,山中忠和, 菊池浩明 , "匿名加工情報取扱事業者を調査するクローラーシステムの開発", 情報処理学会,第82回全国大会講演論文集,2020, 2ZA-01, 2020.
  • 伊藤 聡志, 菊池 浩明, "履歴データの数理モデルの提案とk-匿名化に必要なダミーレコード数推定への応用", 情報処理学会,研究報告コンピュータセキュリティ(CSEC) , Vol. 2020-CSEC-88, No. 4, pp. 1-7, 2020.
  • Ito, S., Kikuchi, H. & Nakagawa, H. Attacker, "Models with a variety of background knowledge to de-identified data", Journal of Ambient Intelligence and Humanized Computing, pp. 1-11, Springer, 2019.
    DOI:10.1007/s12652-019-01394-z
  • 山田 道洋, 菊池 浩明 , 松山 直樹 , 乾 孝治 , "個人情報漏洩の損害額の新しい数理モデルの提案", 情報処理学会論文誌,Vol. 60, No. 9, pp. 1528-1537, 情報処理学会,2019.
    http://id.nii.ac.jp/1001/00199488 に掲載.
  • Satoshi Ito, Reo Harada and Hiroaki Kikuchi, "De-identification for Transaction Data Secure against Re-identification Risk Based on Payment Records", USB Proceedings of The 15th International Conference on Modeling Decisions for Artificial Intelligence (MDAI 2019), pp. 158-169, 2019.
  • 村上隆夫,荒井ひろみ, 井口誠 , 小栗秀暢, 菊池 浩明, 黒政敦史, 中川裕志, 中村優一, 西山賢志郎, 野島良, 波多野卓磨, 濱田浩気, 山岡裕司, 山口高康, 山田明, 渡辺知恵美, "PWS Cup 2019: ID識別・トレース推定に強い位置情報の匿名加工技術を競う", コンピュータセキュリティシンポジウム2019論文集, pp. 1485-1492, 2019
  • Ryo Nojima, Hidenobu Oguri, Hiroaki Kikuchi, Hiroshi Nakagawa, Koki Hamada, Takao Murakami, Yuji Yamaoka, Chiemi Watanabe, "How to Handle Excessively Anonymized Datasets", Journal of Information Processing,vol 26. pp.477-485,2018.
    DOI:10.2197/ipsjjip.26.477
  • Hiroaki Kikuchi, Chika Hamanag, Hideo Yasunaga, Hiroki Matsui, Hideki Hashimoto, Chun-I Fan , "Privacy-Preserving Multiple Linear Regression of Vertically Partitioned Real Medical Datasets", Journal of Information Processing,vol 26. pp.638-647,2018.
    DOI:10.2197/ipsjjip.26.638
  • 小栗 秀暢 , 黒政 敦史 , 中川 裕志 , 菊池 浩明, 門田 将徳, "個人データの保護と流通を目的とする匿名化と再識別コンテスト:PWSCup", デジタルプラクティス,vol 9. pp.659-684,2018.
  • Hiroaki Kikuchi, Xuping Huang, Shigeta Ikuji, Manami Inoue, "Privacy-Preserving Hypothesis Testing for Reduced Cancer Risk on Daily Physical Activity", Journal of Medical Systems,vol 42, 2018.(2019/01/12)
    DOI:10.1007/s10916-018-0930-9
  • Hiroaki Kikuchi, Takayasu Yamaguchi, Koki Hamada, Yuji Yamaoka, Hidenobu Oguri, Jun Sakuma, "Study on Record Linkage of Anonymizied Data", IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2017 ( 特集号招待論文).
  • Satoshi Ito, Hiroaki Kikuchi, "Risk of Re-identification Based on Euclidean distance in Anonymized Data PWSCUP2015", Advances in Network-Based Information Systems, NBiS 2017, Lecture Notes on Data Engineering and Communications Technologies, vol 7. pp. 901-913, Springer, 2017.
  • Chun-I Fan, Yi-Fan Tseng, Jheng-Jia Huang, Shih-Fen Chen, Hiroaki Kikuchi, "Multireceiver Predicate Encryption for Online Social Networks", IEEE Trans. Signal and Information Processing over Networks 3(2), pp. 388-403, 2017.
  • Hiroaki Kikuchi, "Study from Data Anonymization Competition of Online Retail Data", Workshop on Design Issues for a data Anonymization Competition (WODIAC), PETS 2017 Workshop, 2017.
  • 菊池浩明, 小栗 秀暢, 中川裕志, 野島 良, 波多野 卓磨, 濱田 浩気, 村上 隆夫, 門田 将徳, 山岡 裕司, 山田 明, 渡辺 知恵美, PWSCUP2017: 長期間の履歴データの再識別リスクを競う, プライバシーワークショップ PWS 2017, 情報処理学会,2017.
  • 伊藤 聡志 , 原田 玲央 , 菊池 浩明, 乗降と物販履歴データの識別リスク分析と匿名加工の検討, 研究報告コンピュータセキュリティ(CSEC),2017-CSEC-76(8), pp. 1-8, IPSJ, 2017.
  • Hiroaki Kikuchi, Katsumi Takahashi, "Zipf Distribution Model for Quantifying Risk of Re-identification from Trajectory Data", Journal of Information Processing, Vol. 24 (2016) No. 5 pp. 816-823. ( 2017年情報処理学会JIP Outstanding Paper)
  • 菊池 浩明, 匿名加工・再識別コンテストIce and Fire:匿名加工方式とその安全性を評価する試み, 情報処理学会論文誌,57(9), pp. 1900-1910, IPSJ, 2016. ( 特集号招待論文 )
  • 新原 功一, 菊池 浩明, "eラーニングをモデルとした内部犯行の予測因子の識別", 情報処理学会論文誌, Vol. 57, No. 9, pp. 2064 - 2076, 2016.
  • 菊池 浩明, 小栗 秀暢 , 野島 良 , 濱田 浩気 , 村上 隆夫, 山岡 裕司 , 山口 高康 , 渡辺 知恵美, "PWSCUP: 履歴データを安全に匿名加工せよ", コンピュータセキュリティシンポジウム2016論文集,2016(2), pp. 271-278, IPSJ, 2016 .
  • H. Kikuchi, H. Yasunaga, H. Matsui and C. I. Fan, Efficient Privacy-Preserving Logistic Regression with Iteratively Re-weighted Least Squares, 2016 11th Asia Joint Conference on Information Security (AsiaJCIS), pp. 48-54, IEEE, 2016.
  • H. Kikuchi, T. Yamaguchi, K. Hamada, Y. Yamaoka, H. Oguri and J. Sakuma, "Ice and Fire: Quantifying the Risk of Re-identification and Utility in Data Anonymization", IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), pp. 1035-1042, IEEE, 2016.
  • Hiroaki Kikuchi, Takayasu Yamaguchi, Koki Hamada, Yuji Yamaoka, Hidenobu Oguri, Jun Sakuma, "A Study from the Data Anonymization Competition Pwscup 2015", Data Privacy Management and Security Assurance (DPM 2016), LNCS, volume 9963, pp. 230-237, Springer, 2016.
  • Hiroaki Kikuchi, Kouichi Itoh, Mebae Ushida, Hiroshi Tsuda, Yuji Yamaoka, "Privacy-Preserving Decision Tree Learning with Boolean Target Class", IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E98.A, No. 11, pp. 2291-2300, 2015.
  • Hiroaki Kikuchi, Hideki Hashimoto, Hideo Yasunaga, "Privacy-Preserving Epidemiological Analysis for a Distributed Database of Hospitals", 2015 10th Asia Joint Conference on Information Security (AsiaJCIS), pp. 85-90, IEEE, 2015.
  • Hiroaki Kikuchi, Jun Sakuma, "Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size of an Intersection", Journal of Information Processing, Vol. 22, No. 2 pp. 388-400, 2014.
  • Michitomo Yamaguchi, Toru Nakata, Hajime Watanabe, Takeshi Okamoto, Hiroaki Kikuchi, Vulnerability of the Conventional Accessible, CAPTCHA used by the White House and an Alternative Approach for Visually Impaired People, 2014 IEEE International Conference on Systems, Man, and Cybernetics, pp. 4004-4009, IEEE, 2014.
  • Hiroaki Kikuchi, Tomoki Sato, Jun Sakuma, "Privacy-Preserving Hypothesis Testing for the Analysis of Epidemiological Medical Data", 2014 IEEE 28th International Conference on the Advanced Information Networking and Applications (AINA) , pp. 359 - 365, IEEE, 2014.
  • Hiroaki Kikuchi, Hideki Hashimoto, Hideo Yasunaga, Takamichi Saito, Scalability of Privacy-Preserving Linear Regression in Epidemiological Studies, The 29th IEEE International Conference on the Advanced Information Networking and Applications (AINA), IEEE, 2015.
  • Hiroaki Kikuchi , Anna Mochizuki, "Privacy-preserving Collaborative Filtering Using Randomized Response", Journal of Information Processing, Vol. 21 (2013) No. 4 pp. 617-623, 2013. (推薦論文)
  • Hiroaki Kikuchi, Daisuke Kagawa, Anirban Basu, Kazuhiko Ishii, Masayuki Terada, Sadayuki Hongo, "Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasets", IEICE Trans. on Fundamentals, Vol. E96-A, No. 1, pp. 111-120, 2013.

中川 裕志

  • "裏側から視るAI 脅威・歴史・倫理", 中川裕志. 近代科学社.2019年9月30日.
  • "人工知能倫理と社会、法律との係わり方を展望する", 中川裕志, enPiT第7回シンポジウム 、基調講演,2019年1月24日 2019
  • "Suppression Algorithms for Personalized Anonymization of Set-Valued Data", Takuma Nakagawa,Hiroshi Nakagawa, Privacy in Statistical Databases 2018 (PSD 2018) , Valencia, Spain. September 26-28 2018
  • "人工知能倫理と法制度、社会", 中川裕志, 情報法制研究所、情報法制学会共催 第5回情報法セミナーin 京都,京都大学,2018年12月2日(2018)
  • "AIネットワーク時代に向けた法・政策の在り方 "AIネットワーク化における倫理とプライバシーシンポジウム", 中川裕志, 基調講演, 主催:大阪大学大学院法学研究科及び高等司法研究科" 2018
  • "Personalized Anonymization for Set-Valued Data by Partial Suppression", Takuma Nakagawa, Hiromi Arai, Hiroshi Nakagawa, Transactions on Data Privacy,vol 11. pp.219-237,2018. http://www.tdp.cat/issues16/abs.a322a18.php に掲載.
  • "Personalized Anonymization for Set-Valued Data by Partial Suppression", Takuma Nakagawa,Hiromi Arai, Hiroshi Nakagawa, Privacy and Anonymity in the Information Society(PAIS) Worksho of IEEE International Conference on Data Mining(ICDM), 2017, (accepted).
  • "集合値データに対する個人適応型匿名化手法", 中川拓麻,荒井ひろみ, 中川裕志 , コンピュータセキュリティシンポジウム(CSS)2017, 情報処理学会, (2017).
  • "Anonymization and Re-identification for Personal Transaction Data", Hiroshi Nakagawa , Workshop on Design Issues for a data Anonymization Competition (WODIAC) on Privacy Enhancing Technologies Symposium (PETS) 2017, Minneaplos, (July 17, 2017)..
  • "Stochastic Gradient MCMCによるスケーラブルなトピックモデルの推定(Scalable Inference of Topic Models by Stochastic Gradient MCMC)", 横井創磨、佐藤一誠,中川裕志, 人工知能学会30周年記念論文特集,第31巻6号, p.AI30-C\_1-9, (2017), J-STAGE https://www.jstage.jst.go.jp/browse/tjsai/-char/ja/ に掲載.
  • "集合値データに対する個人適応型匿名化手法", 中川裕志 ,出町彰啓、中川拓麻, SCIS2017(暗号と情報セキュリティシンポジウム)2D1-4 那覇、2017年1月25日.
  • "プライバシー保護入門 -法制度と技術-", 中川裕志. 勁草書房.2016年2月.
  • "Differential Privacy without Sensitivity", Kentaro Minami, Issei Sato, Hiromi Arai, Hiroshi Nakagawa, NIPS2016, Barcelona SPAIN (December 05--10, 2016),
  • "Copeland Dueling Bandit Problem: Regret Lower Bound, Optimal Algorithm, and Computationally Efficient Algorithm", Junpei Komiyama, Junya Honda, Hiroshi Nakagawa, ICML2016, NewYork, (JUNE 19-24 2016),
  • "東京大学工学教程情報工学「機械学習」", 丸善出版. 2015年11月刊行.
  • "Regret Lower Bound and Optimal Algorithm in Finite Stochastic Partial Monitoring", Junpei Komiyama, Junya Honda, Hiroshi Nakagawa, NIPS 2015, Montréal CANADA. (December 0 -- 12, 2015).
  • "Regret Lower Bound and Optimal Algorithm in Dueling Bandit Problem", Junpei Komiyama, Junya Honda, Hisashi Kashima, Hiroshi Nakagawa, COLT2015, pp.1141-1154, Paris France. (July 3-6, 2015).
  • "Optimal Regret Analysis of Thompson Sampling in Stochastic Multi-armed Bandit Problem with Multiple Plays", Junpei Komiyama, Junya Honda, Hiroshi Nakagawa, ICML2015, pp.1152-1161, Lille, France. (July.6-11, 2015).
  • "Bayesian Differential Privacy on Correlated Data", Bing Yang, Issei Sato, Hiroshi Nakagawa, ACM SIGMOD2015. pp747-762, Melbourne, Australia (May 31 - June 4, 2015).
  • "Locally Optimized Hashing for Nearest Neighbor Search", Seiya Tokui, Issei Sato, Hiroshi Nakagawa, PAKDD 2015, Ho Chi Minh City, Viet Nam, (May 19-22 2015).
  • "データベース分割再構成法によるk-匿名化が誘発する濡れ衣の軽減", 角野為耶,荒井ひろみ,中川裕志, 情報処理学会論文誌, 56(12), pp.2244-2252 (2015).
  • "差分プライベート弱学習器の統合", 南賢太郎,荒井ひろみ,佐藤一誠,中川裕志, 情報処理学会論文誌数理モデル化と応用(TOM),8(2),pp.31-43 (2015).
  • "ビッグデータ利用における個人データ保護における課題", 中川裕志, 情報処理学会.第64電子化知的財産・社会基盤研究発表会(EIP研究会) Vol.2014-EIP-64, No.11.(2014年5月15日).
  • "滞在場所のk-匿名化法", 中川裕志, 第28回人工知能学会全国大会,2B4-OS-15b-1,松山市 ひめぎんホール,(2014年5月13日).
  • " Latent Confusion Analysis by Normalized Gamma Construction", Issei Sato, Hisashi Kashima, Hiroshi Nakagawa, The 31st International Conference on Machine Learning (ICML 2014), pp.1116-1124, (June 21-26, 2014).
  • "Approximation Analysis of Stochastic Gradient Langevin Dynamics by using Fokker-Planck Equation and Ito Process", Issei Sato, Hiroshi Nakagawa, The 31st International Conference on Machine Learning (ICML 2014), pp.982-990, (June 21-26, 2014)

渡辺 知恵美

  • 秋山賢人, 渡辺知恵美, 北川博之, "暗号化データベースシステムにおけるクエリベースのデータ販売スキーム", 情報処理学会論文誌データベース(TOD): テクニカルノート, Vol.10, No.4,2017 (accepted)
  • Kento Akiyama, Chisato Shinozuka, Chiemi Watanabe, Toshiyuki Amagasa and Hiroyuki Kitagawa, "An Index-based Secure Query Processing Scheme for Outsourced Databases", The 19th International Conference on Information Integration and Web-based Applications & Services (iiWAS2017), 2017 (accepted)
  • Mateus S. H. Cruz, Toshiyuki Amagasa, Chiemi Watanabe, Wenjie Lu and Hiroyuki Kitagawa, "Secure Similarity Joins Using Fully Homomorphic Encryption", The 19th International Conference on Information Integration and Web-based Applications & Services (iiWAS2017), 2017 (accepted)
  • Ayano Yoshikuni, Chiemi Watanabe, "Calculation of account reachability risk for users having multiple SNS accounts from user’s profile and regional information", International Journal of Web Information Systems, Vol. 11, Issue: 1, pp.120 -138, 2015
  • Rina Okada, Chiemi Watanabe and Hiroyuki Kitagawa, "A k-anonymization Algorithm on Social Network Data that Reduces Distances between Nodes", The 1st International Workshop on Future Technologies for Smart Information Systems (FTSIS 2014),pp. 76 - 81, 2014
  • Miho Kakizawa, Chiemi Watanabe, Ryo Furukawa and Tsubasa Takahashi, "Improvement of Pk-anonymization", The 1st International Workshop on Future Technologies for Smart Information Systems (FTSIS 2014),pp. 82 - 87, 2014
  • Ayano Yoshikuni and Chiemi Watanabe, "Account Reachability : A Measure of Privacy Risk for Exposure the User's Multiple SNS Accounts", The 15th International Conference on Information Integration and Web-based Applications & Services (iiWAS2013), pp. 542 - 549, 2013
  • 金子 静花, 渡辺 知恵美, 柿澤 美穂, 天笠 俊之, "暗号化データベースにおける多属性索引に対する統計攻撃モデルと攪乱戦略", 日本データベース学会論文誌, Vol.12, No.1, pp. 109 - 114, 2013

村上 隆夫

  • Takao Murakami, Yosuke Kaga, Kenta Takahashi, "Modality Selection Attacks and Modality Restriction in Likelihood-ratio Based Biometric Score Fusion", IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2017 (to appear).
  • Seira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro Hanaoka, "Model Inversion Attacks for Prediction Systems: Without Knowledge of Non-Sensitive Attributes", Proceedings of the 15th International Conference on Privacy, Security, and Trust (PST 2017), 2017 (to appear).
  • Takao Murakami, "Expectation-Maximization Tensor Factorization for Practical Location Privacy Attacks", Proceedings on Privacy Enhancing Technologies (PoPETs), Issue 4, pp.58-75, 2017.
  • Takao Murakami, "Quantifying the Risk of Re-identification in Data Anonymization Competition", Workshop on Design Issues for a data Anonymization Competition (WODIAC), workshop at PETS2017, 2017.
  • Takao Murakami, Atsunori Kanemura, Hideitsu Hino, "Group Sparsity Tensor Factorization for Re-identification of Open Mobility Traces", IEEE Transactions on Information Forensics and Security, Vol.12, No.3, pp.689-704, 2017.
  • Takao Murakami, Yosuke Kaga, Kenta Takahashi, "On Restricting Modalities in Likelihood-ratio Based Biometric Score Fusion", Proceedings of the 23rd International Conference on Pattern Recognition (ICPR 2016), pp.3031-3037, 2016.
  • Takao Murakami, Tetsushi Ohki, Kenta Takahashi, "Optimal Sequential Fusion for Multibiometric Cryptosystems", Elsevier Information Fusion (Special Issue on Information Fusion in Biometrics), Vol.32, pp.93-108, 2016.
  • Takao Murakami, Hajime Watanabe, "Localization Attacks Using Matrix and Tensor Factorization", IEEE Transactions on Information Forensics and Security, Vol.11, No.8, pp.1647-1660, 2016.
  • Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka, "Fuzzy Signatures: Relaxing Requirements and a New Construction", Proceedings of the 14th International Conference on Applied Cryptography and Network Security (ACNS 2016), LNCS 9696, pp.97-116, 2016.
  • Takao Murakami, Kenta Takahashi, "Information-theoretic Performance Evaluation of Likelihood-ratio Based Biometric Score Fusion under Modality Selection Attacks", IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E99-A, No.5, pp.929-942, 2016.
  • Takao Murakami, Yosuke Kaga, Kenta Takahashi, "Information-theoretic Performance Evaluation of Multibiometric Fusion under Modality Selection Attacks", Proceedings of the 7th IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS 2015), pp.1-8, 2015.
  • Takao Murakami, Atsunori Kanemura, Hideitsu Hino, "Group Sparsity Tensor Factorization for De-anonymization of Mobility Traces", Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2015), pp.621-629, 2015. 【Best Paper Award】
  • Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki, "A Signature Scheme with a Fuzzy Private Key", Proceedings of the 13th International Conference on Applied Cryptography and Network Security (ACNS 2015), LNCS 9092, pp.105-126, 2015.
  • Kenta Takahashi, Takao Murakami, "Location Prediction Attacks Using Tensor Factorization and Optimal Defenses", Elsevier Image and Vision Computing, Vol.32, No.12, pp.1194-1203, 2014.
  • 村上隆夫, 高橋健太, 松浦幹太, "IDレス生体認証における最適な逐次融合判定に向けて−ゆう度比判定方式の最適性の証明と実験的評価−", 電子情報通信学会論文誌A(バイオメトリクス小特集), Vol.J97-A, No.12, pp.710-725, 2014.
  • Takao Murakami, Hajime Watanabe, "Location Prediction Attacks Using Tensor Factorization and Optimal Defenses", Proceedings of the 1st IEEE International Workshop on Big Data Security and Privacy (BDSP 2014), workshop at IEEE BigData2014, pp.13-21, 2014.
  • Takao Murakami, Kenta Takahashi, Kanta Matsuura, "A General Framework and Algorithms for Score Level Indexing and Fusion in Biometric Identification", IEICE Transactions on Information and Systems, Vol.E97-D, No.3, pp.510-523, 2014.
  • Takao Murakami, Kenta Takahashi, Kanta Matsuura, "Toward Optimal Fusion Algorithms with Security against Wolves and Lambs in Biometrics", IEEE Transactions on Information Forensics and Security, Vol.9, No.2, pp.259-271, 2014.
  • 村上隆夫, 高橋健太, 松浦幹太, "大規模IDレス生体認証に向けた逐次索引融合判定の提案", 電子情報通信学会論文誌A(バイオメトリクス小特集), Vol.J96-A, No.12, pp.801-814, 2013.
  • 加賀陽介, 高橋健太, 村上隆夫, "GLMMに基づくテンプレートの品質推定と融合判定による生体認証の高精度化", 電子情報通信学会論文誌A(バイオメトリクス小特集), Vol.J96-A, No.12, pp.815-828, 2013.
  • Takao Murakami, Kenta Takahashi, Susumu Serita, Yasuhiro Fujii, "Probabilistic Enhancement of Approximate Indexing in Metric Spaces", Elsevier Information Systems, Vol.38, No.7, pp.1007-1018, 2013.

木村 映善

  • 栗原 幸男, 石田 博, 樫部 公一, 木村 映善, 島井 健一郎, 田中 武志, 丹下 正章, 中島 典明, 患者プロファイル情報管理の課題と改善策, 医療情報学, Vol. 37, No. 3, pp. 125-133, 2017.
  • 入野 了士, 木村 映善, 石田 博, 栗原 幸男, 健診データの利活用と匿名化に対する健診機関の認識についての調査研究, 第21回日本医療情報学会春季学術大会, pp. 126-127, 2017.
  • 濱田 浩気, 木村 映善, 菊池 亮, 千田 浩司, 岡本 和也, 真鍋 史朗, 黒田 知宏, 松村 泰志, 武田 理宏, 三原 直樹, 秘密計算による分散医療統計システムの実装評価 (情報通信マネジメント), 電子情報通信学会技術研究報告, Vol. 116, No. 65, pp. 111-117, 2016.
  • 栗原 幸男, 近藤 博史, 入江 真行, 木村 映善, 合地 明, 高井 康平, 原田 正治, 大原 通宏, SS-MIX2ベースの地域医療連携システムにおける 患者プロファイル情報統合の課題, 医療情報学36(Suppl.), pp. 238-239, 2016.
  • 栗原 幸男, 石田 博, 木村 映善, 近藤 博史, 島井 健一郎, 田中 武志, 中島 典明, 病院情報システムにおける患者プロファイル情報項目の保有状況調査, 医療情報学36(Suppl.), pp. 1086-1088, 2016.
  • 栗原 幸男, 石田 博, 木村 映善, 入野 了士, 匿名化ヘルス情報の再特定化リスク除去の統計量への 影響評価方法の検討, 医療情報学36(Suppl.), pp. 710-712, 2016.
  • 木村 映善, 石原 謙, Arden SyntaxとFHIRを利用した臨床判断支援ロジック記述環境の開発の試み, 医療情報学, Vol. 35, No. 6, pp. 283-296, 2016.
  • 木村 映善, 松村 泰志, 三原 直樹, 黒田 知宏, 山下 芳範, 平松 治彦, 真鍋 史朗, 田中 大介, 佐藤 敦, 山倉 直, 秘密分散技術を利用した医療情報の遠隔保存と参照環境の評価, 電子情報通信学会論文誌 D, J99-D, No. 5, pp. 526-538, 2016.
  • 入野 了士, 木村 映善, 石田 博, 栗原 幸男, 健康診査実施機関における健診データの利活用と匿名化データの外部提供に関する調査研究, 医療情報学36(Suppl.), pp. 1014-1017, 2016.
  • Yukio Kurihara, Haku Ishida, Eizen KIMURA, Akira Gochi, Hiroshi Kondoh, Ken-ichiro SHIMAI, Noriaki Nakajima, Takeshi Tanaka, kiyomu Ishikawa, Michihiro Oohara, Takeharu Sonoda, Kohei Takai, The inequality of patient profile information in Japanese hospitals, Stud Health Technol Inform, Vol. 228, pp. 412-415, 2016.
  • Eizen KIMURA, Koki HAMADA, Ryo KIKUCHI, Koji CHIDA, Kazuya OKAMOTO, Shirou MANABE, Tomohiko KURODA, Yasushi MATSUMURA, Toshihiro TAKEDA, MIHARA, Naoki, Evaluation of Secure Computation in a Distributed Healthcare Setting, Stud Health Technol Inform, Vol. 228, pp. 152-156, 2016.
  • 栗原 幸男, 石田 博, 木村 映善, 合地 明, 近藤 博史, 島井 健一郎, 中島 典昭, 石川 澄, 石黒 満久, 大原 通宏, 大塚 雅彦, 園田 武治, 高井 康平, 患者プロファイル情報の標準項目構成の検討, 第19回日本医療情報学会春季学術大会, pp. 104-105, 2015.
  • 木村 映善, 魔 狸, 笹井 崇司, データ匿名化手法――ヘルスデータ事例に学ぶ個人情報保護, Reilly Japan, Inc., 2015.
  • 木村 映善, 石原 謙, FHIR Terminology Serviceの実装と評価, 医療情報学35(Suppl.), pp. 910-911, 2015.
  • Eizen Kimura, Ken Ishihara, Virtual File System on NoSQL for Processing High Volumes of HL7 Messages, Studies in Health Technology and Informatics, Vol. 210, pp. 687-691, 2015.
  • 岡田 久仁子, 木村 映善, 高地 泰浩, 石原 謙, 秘密分散方式を利用した地域医療連携システムの性能評価, 医療情報学34(Suppl.), pp. 960-963, 2014.
  • 三原 直樹, 松村 泰志, 木村 映善, 黒田 知宏, 粂 直人, 最首 壮一, 佐藤 敦, Secret Share技術を用いた統合文書管理システム(DACS)内文書の秘密分散バックアップ環境開発, 医療情報学34(Suppl.), pp. 656-659, 2014.
  • Kurihara, Y., Nakajima, N., Ishida, H., Kimura, E., Kondoh, H., Shimai, K., Tanaka, T., Gochi, A., Ishikawa, K., A Framework of Sharing Patient Profile Information among Medical Institutions, Stud Health Technol Inform, Vol. 205, pp. 1195, 2014.
  • Tomohiro Kuroda, Eizen Kimura, Yasushi Matsumura, Yoshinori Yamashita, Haruhiko Hiramatsu, Naoto Kume, Sato, Atsushi, Applying Secret Sharing for HIS Backup Exchange, pp. 4179-4182, 2013.
  • Shiro Uesugi, Hitoshi Okada, Eizen Kimura, IT Enabled Services - Smartphones: The Next Generation Medication Administration Tool, Springer, 2013.
  • Kimura Eizen, Chida Koji, Ikarashi Dai, Hamada Koki, Ishihara Ken, Netherlands Studies in health technology and informatics, Stud Health Technol Inform., Vol. 180, pp. 1117-1119, 2012 .

佐久間 淳

  • Hiromu Yakura, Youhei Akimoto, Jun Sakuma, "Generate (non-software) Bugs to Fool Classifiers", The 34th AAAI Conference on Artificial Intelligence (AAAI) 2020.
  • Hiromu Yakura, Jun Sakuma, Robust Audio Adversarial Example for a Physical Attack The 28th International Joint Conference on Artificial Intelligence (IJCAI) 2019.
  • Thien Q. Tran, Jun Sakuma, Seasonal-adjustment Based Feature Selection Method for Predicting Epidemic with Large-scale Search Engine Logs, 25th ACM SIGKDD Conference On Knowledge Discovery And Data Mining (SIGKDD) 2019.
  • "Using Fully Homomorphic Encryption for Statistical Analysis of Categorical, Ordinal and Numerical Data," L. Wen-jie, K. Shohei, J. Sakuma, Network and Distributed System Security Symposium 2017 (NDSS2017), online 15 pages, 2017.
  • "Privacy-preserving and Optimal Interval Release for Disease Susceptibility," K. Kusano, I. Takeuchi, J. Sakuma, ACM Asia Conference on Computer and Communications Security (ASIACCS2017), 532--545, 2017.
  • "Differentially Private Chi-squared Test by Unit Circle Mechanism," K. Kakizaki, K. Fukuchi, J. Sakuma, The 34th International Conference on Machine Learning (ICML2017), in PMLR 70:1761-1770, 2017.
  • "Towards Privacy-preserving Record Linkage with Record-wise Linkage Policy," T. Kaiho, L. Wen-jie, T. Amagasa, J. Sakuma, 28th International Conference on Database and Expert Systems Applications (DEXA2017)", in Database and Expert Systems Applications, 10438, Part I, 233--248, 2017.
  • "Mis-operation Resistant Searchable Homomorphic Encryption," Keita Emura,Takkuya Hayashi, Noboru Kunihiro, J. Sakuma, ACM Asia Conference on Computer and Communications Security (ASIACCS2017) 2017, 215--229, 2017.
  • "Minimax Optimal Estimators for Additive Scalar Functionals of Discrete Distributions," K. Fukuchi, J. Sakuma, 2017 IEEE International Symposium on Information Theory (ISIT2017), 2103--2107, 2017.
  • "まぜるな危険準同型暗号", 江村, 林, 國廣, 佐久間,コンピュータセキュリティシンポジウム(CCS)予稿集,1C3-2,2017.【CSS2016最優秀論文賞】
  • "カイ二乗検定の幾何的解釈に基づく差分プライバシーの実現", 柿崎, 福地, 佐久間,コンピュータセキュリティシンポジウム(CCS)予稿集,3A4-2,2017.【CSS2016優秀論文賞】
  • "Secure Approximation Guarantee for Cryptographically Private Empirical Risk Minimization", T. Takada, H. Hiroyuki, Y. Yamada, J. Sakuma, I. Takeuchi, The 8th Asian Conference on Machine Learning (ACML2016), in PMLR, 63: 126--141, 2016.
  • "Privacy-preserving genome-wide association studies on cloud environment using fully homomorphic encryption,"L. Wen Jie, Y. Yoshiji, J. Sakuma, BMC Med.\ Inform.\ Decis.\ Mak., Supplement 5, 15, online 10 pages. (Impact Factor 1.830)
  • "Differentially private analysis of outliers," J. Sakuma, R. Okada, European Conf.\ Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML-PKDD), Portogal, in Lect.\ Notes Artif.\ Intell., 9285: 458--473, 2015.
  • "Privacy-preserving statistical analysis by exact logistic regression," D. duVerle, S. Kawasaki, Y. Yamada, J. Sakuma, K. Tsuda, IEEE Symp.\ Security and Privacy Workshops (SPW), 7--16, 2015.
  • "Future directions of fairness-aware data mining: Recommendation, causality, and theoretical aspects," J. Sakuma, T. Kamishima, K. Fukuchi, ICML2015 Workshop: Fairness, Accountability, and Transparency in Machine Learning, France, Jul. 2015. 【招待講演】
  • "ゲノム検査結果の開示によるプライバシ侵害の評価", 荒井, 津田, 佐久間, コンピュータセキュリティシンポジウム(CCS)予稿集, 3B4-1,2015. 【CSS2015コンセプト論文賞】
  • "差分プライバシを保証した外れ値検出", 岡田,佐久間, 第7回データ工学と情報マネジメントに関するフォーラム予稿集 (DEIM),G1-3,2015.【最優秀論文賞】
  • "Neutralized empirical risk minimization with generalization neutrality bound," K. Fukuchi, J. Sakuma, European Conf.\ Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML-PKDD), Portogal, in Lect.\ Notes Comput.\ Sci., 8724: 418--433, 2014.
  • "Oblivious evaluation of non-deterministic finite automata with application to privacy-preserving virus genome detection," H. Sasakawa, H. Harada, D. duVerle, H. Arimura, K. Tsuda, J. Sakuma, Workshop on Privacy in the Electronic Society (WPES), 21--30, 2014.
  • “公正配慮型分類器の公正性に関する分析”, 神嶌,赤穂,麻生,佐久間, 信学技報,IBISML 2014-28,2014. 【通信学会IBISML研究会賞】
  • "情報中立推薦システムの高速化", 神嶌,赤穂,麻生,佐久間, 人工知能学会全国大会論文集, 2B5-OS-15b-5,2014. 【2014年度人工知能学会全国大会優秀賞】
  • "Prediction with model-based neutrality," K. Fukuchi, J. Sakuma, T. Kamishima, European Conf.\ Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML-PKDD), in Lect.\ Notes Artif.\ Intell., 8189: 499--514, 2013.
  • "The independence of the fairness-aware classifiers," T. Kamishima, S. Akaho, H. Asoh, J. Sakuma, IEEE Int.\ Workshop Privacy Aspects of Data Mining (PADM), TX, 849--858, 2013.
  • "Fairness-aware classifier with prejudice remover regularizer," T. Kamishima, S. Akaho, H. Asoh, J. Sakuma, European Conf.\ Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML-PKDD), UK, in Lect.\ Notes Comput.\ Sci., 7524: 35--50, 2012.