default search action
Hiroaki Kikuchi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c122]Masahiro Shimizu, Hiroaki Kikuchi:
A Poisoning-Resilient LDP Schema Leveraging Oblivious Transfer with the Hadamard Transform. MDAI 2024: 211-223 - [c121]Ryotaro Toma, Hiroaki Kikuchi:
Combinations of AI Models and XAI Metrics Vulnerable to Record Reconstruction Risk. PSD 2024: 329-343 - [c120]Andres Hernandez-Matamoros, Hiroaki Kikuchi:
Meaningful Performance Analysis on Healthcare Data Under Local Differential Privacy. SoMeT 2024: 398-411 - [e4]Vicenç Torra, Yasuo Narukawa, Hiroaki Kikuchi:
Modeling Decisions for Artificial Intelligence - 21st International Conference, MDAI 2024, Tokyo, Japan, August 27-31, 2024, Proceedings. Lecture Notes in Computer Science 14986, Springer 2024, ISBN 978-3-031-68207-0 [contents] - 2023
- [j49]Satoshi Ito, Hiroaki Kikuchi, Hiroshi Nakagawa:
Attacker models with a variety of background knowledge to de-identified data. J. Ambient Intell. Humaniz. Comput. 14(11): 15037-15047 (2023) - [j48]Satoshi Ito, Hiroaki Kikuchi:
Estimation of cost of k-anonymity in the number of dummy records. J. Ambient Intell. Humaniz. Comput. 14(12): 15885-15894 (2023) - [j47]Takao Murakami, Hiromi Arai, Koki Hamada, Takuma Hatano, Makoto Iguchi, Hiroaki Kikuchi, Atsushi Kuromasa, Hiroshi Nakagawa, Yuichi Nakamura, Kenshiro Nishiyama, Ryo Nojima, Hidenobu Oguri, Chiemi Watanabe, Akira Yamada, Takayasu Yamaguchi, Yuji Yamaoka:
Designing a Location Trace Anonymization Contest. Proc. Priv. Enhancing Technol. 2023(1): 225-243 (2023) - [c119]Hikaru Horigome, Hiroaki Kikuchi, Chia-Mu Yu:
Expectation-Maximization Estimation for Key-Value Data Randomized with Local Differential Privacy. AINA (2) 2023: 501-512 - [c118]Hiroaki Kikuchi, Ayaka Aoyama:
Targeted Ads Analysis: What are The most Targeted Personas? IEEE Big Data 2023: 5512-5518 - [c117]Hikaru Horigome, Hiroaki Kikuchi, Chia-Mu Yu:
Local Differential Privacy Protocol for Making Key-Value Data Robust Against Poisoning Attacks. MDAI 2023: 241-252 - [c116]Ryotaro Toma, Terumi Yaguchi, Hiroaki Kikuchi:
Multiple Person Tracking Based on Gait Identification Using Kinect and OpenPose. MSPN 2023: 175-187 - [c115]Daichi Kajima, Hiroaki Kikuchi:
Failure of Privacy Policy for Session Replay Services Used for Monitor Your Keystroke. NBiS 2023: 123-129 - [c114]Andres Hernandez-Matamoros, Hiroaki Kikuchi:
New LDP Approach Using VAE. NSS 2023: 177-191 - [c113]Andres Hernandez-Matamoros, Hiroaki Kikuchi:
An Efficient Local Differential Privacy Scheme Using Bayesian Ridge Regression. PST 2023: 1-7 - [c112]Hiroaki Kikuchi:
Privacy-Preserving Clustering for Multi-dimensional Data Randomization Under LDP. SEC 2023: 15-29 - 2022
- [j46]Masahiro Fujita, Yasuoki Iida, Mitsuhiro Hattori, Tadakazu Yamanaka, Nori Matsuda, Satoshi Ito, Hiroaki Kikuchi:
Proposal of anonymization dictionary using disclosed statements by business operators. Internet Things 18: 100490 (2022) - [c111]Hikaru Horigome, Hiroaki Kikuchi:
Improvement of Estimate Distribution with Local Differential Privacy. MDAI 2022: 68-79 - [c110]Hiroaki Kikuchi, Shun Miyoshi, Takafumi Mori, Andres Hernandez-Matamoros:
A Vulnerability in Video Anonymization - Privacy Disclosure from Face-obfuscated video. PST 2022: 1-10 - [i3]Hiroaki Kikuchi:
Castell: Scalable Joint Probability Estimation of Multi-dimensional Data Randomized with Local Differential Privacy. CoRR abs/2212.01627 (2022) - 2021
- [c109]Hiroaki Kikuchi:
Reidentification Risk from Pseudonymized Customer Payment History. AINA (2) 2021: 634-645 - [c108]Rina Shibayama, Hiroaki Kikuchi:
Vulnerability Exploiting SMS Push Notifications. AsiaJCIS 2021: 23-30 - [c107]Hiroaki Kikuchi, Kazuki Eto, Kazushi Waki, Takafumi Mori:
Vulnerability of Privacy Visor Used to Disrupt Unauthorized Face Recognition. DSC 2021: 1-7 - [c106]Hiroaki Kikuchi, Michihiro Yamada, Kazuki Ikegami, Koji Inui:
Best Security Measures to Reduce Cyber-Incident and Data Breach Risks. DPM/CBT@ESORICS 2021: 3-19 - [c105]Masahiro Fujita, Yasuoki Iida, Mitsuhiro Hattori, Tadakazu Yamanaka, Nori Matsuda, Satoshi Ito, Hiroaki Kikuchi:
Proposal and Development of Anonymization Dictionary Using Public Information Disclosed by Anonymously Processed Information Handling Business Operators. IMIS 2021: 30-39 - [c104]Hiroaki Kikuchi, Atsuki Ono, Satoshi Ito, Masahiro Fujita, Tadakazu Yamanaka:
Web Crawler for an Anonymously Processed Information Database. IMIS 2021: 501-510 - [c103]Annjhih Hsiao, Takao Takenouchi, Hiroaki Kikuchi, Kazuo Sakiyama, Noriyuki Miura:
More Accurate and Robust PRNU-Based Source Camera Identification with 3-Step 3-Class Approach. IWDW 2021: 87-101 - [i2]Takao Murakami, Hiromi Arai, Koki Hamada, Takuma Hatano, Makoto Iguchi, Hiroaki Kikuchi, Atsushi Kuromasa, Hiroshi Nakagawa, Yuichi Nakamura, Kenshiro Nishiyama, Ryo Nojima, Hidenobu Oguri, Chiemi Watanabe, Akira Yamada, Takayasu Yamaguchi, Yuji Yamaoka:
Designing a Location Trace Anonymization Contest. CoRR abs/2107.10407 (2021) - 2020
- [j45]Kuo-Hui Yeh, Robert H. Deng, Hiroaki Kikuchi:
Special Issue on FinTech Security and Privacy. Future Gener. Comput. Syst. 112: 1172-1173 (2020) - [j44]Chun-I Fan, Yi-Fan Tseng, Hui-Po Su, Ruei-Hau Hsu, Hiroaki Kikuchi:
Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks. Int. J. Inf. Sec. 19(3): 245-255 (2020) - [j43]Satoshi Ito, Reo Harada, Hiroaki Kikuchi:
De-identification for Transaction Data Secure against Re-identification Risk Based on Payment Records. J. Inf. Process. 28: 511-519 (2020) - [c102]Hiroaki Kikuchi:
Differentially Private Profiling of Anonymized Customer Purchase Records. DPM/CBT@ESORICS 2020: 19-34 - [c101]Kazuki Ikegami, Hiroaki Kikuchi:
Modeling the Risk of Data Breach Incidents at the Firm Level. IMIS 2020: 135-148 - [c100]Hiroki Matsumoto, Shusei Igaki, Hiroaki Kikuchi:
Address Usage Estimation Based on Bitcoin Traffic Behavior. NBiS 2020: 188-199 - [c99]Akihiro Hanzawa, Hiroaki Kikuchi:
Analysis on Malicious Residential Hosts Activities Exploited by Residential IP Proxy Services. WISA 2020: 349-361
2010 – 2019
- 2019
- [c98]Takafumi Mori, Hiroaki Kikuchi:
Robust Person Identification based on DTW Distance of Multiple-Joint Gait Pattern. ICISSP 2019: 221-229 - [c97]Michihiro Yamada, Hiroaki Kikuchi, Naoki Matsuyama, Koji Inui:
Mathematical Model to Estimate Loss by Cyber Incident in Japan. ICISSP 2019: 353-360 - [c96]Kazuki Ikegami, Michihiro Yamada, Hiroaki Kikuchi, Koji Inui:
Development of a Cyber Incident Information Crawler. IMIS 2019: 447-455 - 2018
- [j42]Hiroaki Kikuchi, Takayasu Yamaguchi, Koki Hamada, Yuji Yamaoka, Hidenobu Oguri, Jun Sakuma:
Study on Record Linkage of Anonymizied Data. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 19-28 (2018) - [j41]Chien-Nan Wu, Chun-I Fan, Jheng-Jia Huang, Yi-Fan Tseng, Hiroaki Kikuchi:
Probably Secure Efficient Anonymous Credential Scheme. Int. J. Softw. Innov. 6(3): 18-35 (2018) - [j40]Ryo Nojima, Hidenobu Oguri, Hiroaki Kikuchi, Hiroshi Nakagawa, Koki Hamada, Takao Murakami, Yuji Yamaoka, Chiemi Watanabe:
How to Handle Excessively Anonymized Datasets. J. Inf. Process. 26: 477-485 (2018) - [j39]Hiroaki Kikuchi, Chika Hamanaga, Hideo Yasunaga, Hiroki Matsui, Hideki Hashimoto, Chun-I Fan:
Privacy-Preserving Multiple Linear Regression of Vertically Partitioned Real Medical Datasets. J. Inf. Process. 26: 638-647 (2018) - [j38]Hiroaki Kikuchi, Xuping Huang, Shigeta Ikuji, Manami Inoue:
Privacy-Preserving Hypothesis Testing for Reduced Cancer Risk on Daily Physical Activity. J. Medical Syst. 42(5): 90:1-90:12 (2018) - [c95]Xuping Huang, Hiroaki Kikuchi, Chun-I Fan:
Privacy Preserved Spectral Analysis Using IoT mHealth Biomedical Data for Stress Estimation. AINA 2018: 793-800 - [c94]Satoshi Ito, Reo Harada, Hiroaki Kikuchi:
Risk of Re-identification from Payment Card Histories in Multiple Domains. AINA 2018: 934-941 - [c93]Tomohiro Shigemoto, Shota Fujii, Ichiro Kuriama, Tetsuro Kito, Hirofumi Nakakoji, Yasuhiro Fujii, Hiroaki Kikuchi:
Development of White List Based Autonomous Evolution of Defense System for RAT Malware. AsiaJCIS 2018: 95-101 - [c92]Chun-I Fan, Yi-Fan Tseng, Hui-Po Su, Ruei-Hau Hsu, Hiroaki Kikuchi:
Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks. DSC 2018: 1-8 - [c91]Kodai Nagata, Hiroaki Kikuchi, Chun-I Fan:
Risk of Bitcoin Addresses to be Identified from Features of Output Addresses. DSC 2018: 1-6 - [c90]Kota Sasa, Hiroaki Kikuchi:
Impact Assessment of Password Reset PRMitM Attack with Two-Factor Authentication. DSC 2018: 1-8 - [c89]Takafumi Mori, Hiroaki Kikuchi:
Person Tracking Based on Gait Features from Depth Sensors. NBiS 2018: 743-751 - [c88]Michihiro Yamada, Riko Shigeno, Hiroaki Kikuchi, Maki Sakamoto:
Evaluation and Development of Onomatopoeia CAPTCHAs. PST 2018: 1-2 - [e3]Chunhua Su, Hiroaki Kikuchi:
Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings. Lecture Notes in Computer Science 11125, Springer 2018, ISBN 978-3-319-99806-0 [contents] - [i1]Hiroaki Kikuchi, Josep Domingo-Ferrer, Sébastien Gambs:
Anonymization methods and inference attacks: theory and practice (NII Shonan Meeting 2018-5). NII Shonan Meet. Rep. 2018 (2018) - 2017
- [j37]Khamphao Sisaat, Surin Kittitornkun, Hiroaki Kikuchi, Chaxiong Yukonhiatou, Masato Terada, Hiroshi Ishii:
A Spatio-Temporal malware and country clustering algorithm: 2012 IIJ MITF case study. Int. J. Inf. Sec. 16(5): 459-473 (2017) - [j36]Chun-I Fan, Yi-Fan Tseng, Jheng-Jia Huang, Shih-Fen Chen, Hiroaki Kikuchi:
Multireceiver Predicate Encryption for Online Social Networks. IEEE Trans. Signal Inf. Process. over Networks 3(2): 388-403 (2017) - [c87]Hiroaki Kikuchi, Chika Hamanaga, Hideo Yasunaga, Hiroki Matsui, Hideki Hashimoto:
Privacy-Preserving Multiple Linear Regression of Vertically Partitioned Real Medical Datasets. AINA 2017: 1042-1049 - [c86]Koichi Niihara, Michihiro Yamada, Hiroaki Kikuchi:
Sharing or Non-sharing Credentials: A Study of What Motivates People to Be Malicious Insiders. HCI (22) 2017: 353-365 - [c85]Michihiro Yamada, Koichi Niihara, Hiroaki Kikuchi:
Decision Tree Analysis on Environmental Factors of Insider Threats. HCI (30) 2017: 658-662 - [c84]Satoshi Ito, Hiroaki Kikuchi:
Risk of Re-Identification Based on Euclidean Distance in Anonymized Data PWSCUP2015. NBiS 2017: 901-913 - [c83]Michitomo Yamaguchi, Hiroaki Kikuchi:
Audio-CAPTCHA with distinction between random phoneme sequences and words spoken by multi-speaker. SMC 2017: 3071-3076 - [c82]Hiroaki Kikuchi, Koichi Niihara, Michihiro Yamada:
How Much is Risk Increased by Sharing Credential in Group? STM 2017: 103-117 - [e2]Dieter Gollmann, Atsuko Miyaji, Hiroaki Kikuchi:
Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. Lecture Notes in Computer Science 10355, Springer 2017, ISBN 978-3-319-61203-4 [contents] - 2016
- [j35]Yoichi Hayashi, Yuki Tanaka, Tomohiro Takagi, Takamichi Saito, Hideaki Iiduka, Hiroaki Kikuchi, Guido Bologna, Sushmita Mitra:
Recursive-Rule Extraction Algorithm With J48graft And Applications To Generating Credit Scores. J. Artif. Intell. Soft Comput. Res. 6(1): 35 (2016) - [j34]Masafumi Kosugi, Tsuyoshi Suzuki, Osamu Uchida, Hiroaki Kikuchi:
SWIPASS: Image-Based User Authentication for Touch Screen Devices. J. Inf. Process. 24(2): 227-236 (2016) - [j33]Hiroaki Kikuchi, Katsumi Takahashi:
Zipf Distribution Model for Quantifying Risk of Re-identification from Trajectory Data. J. Inf. Process. 24(5): 816-823 (2016) - [c81]Hiroaki Kikuchi, Takayasu Yamaguchi, Koki Hamada, Yuji Yamaoka, Hidenobu Oguri, Jun Sakuma:
Ice and Fire: Quantifying the Risk of Re-identification and Utility in Data Anonymization. AINA 2016: 1035-1042 - [c80]Hiroaki Kikuchi, Hideo Yasunaga, Hiroki Matsui, Chun-I Fan:
Efficient Privacy-Preserving Logistic Regression with Iteratively Re-weighted Least Squares. AsiaJCIS 2016: 48-54 - [c79]Hiroaki Kikuchi, Takayasu Yamaguchi, Koki Hamada, Yuji Yamaoka, Hidenobu Oguri, Jun Sakuma:
A Study from the Data Anonymization Competition Pwscup 2015. DPM/QASA@ESORICS 2016: 230-237 - [c78]Koichi Niihara, Hiroaki Kikuchi:
Primary Factors of Malicious Insider in E-learning Model. HCI (26) 2016: 482-487 - [c77]Chun-I Fan, Jian-Sheng Wang, Jheng-Jia Huang, Yi-Fan Tseng, Wen-Shenq Juang, Hiroaki Kikuchi:
Flexible Authentication Protocol with Key Reconstruction in WBAN Environments. ICITCS 2016: 1-5 - [c76]Hiroaki Kikuchi, Kota Sasa, Yuta Shimizu:
Interactive History Sniffing Attack with Amida Lottery. IMIS 2016: 599-602 - [c75]Jheng-Jia Huang, Wen-Shenq Juang, Chun-I Fan, Yi-Fan Tseng, Hiroaki Kikuchi:
Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments. MobiQuitous (Adjunct Proceedings) 2016: 88-93 - [c74]Hirofumi Nakakoji, Yasuhiro Fujii, Yoshiaki Isobe, Tomohiro Shigemoto, Tetsuro Kito, Naoki Hayashi, Nobutaka Kawaguchi, Naoki Shimotsuma, Hiroaki Kikuchi:
Proposal and Evaluation of Cyber Defense System Using Blacklist Refined Based on Authentication Results. NBiS 2016: 135-139 - 2015
- [j32]Hiroaki Kikuchi, Kouichi Itoh, Mebae Ushida, Hiroshi Tsuda, Yuji Yamaoka:
Privacy-Preserving Decision Tree Learning with Boolean Target Class. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(11): 2291-2300 (2015) - [c73]Hiroaki Kikuchi, Hideki Hashimoto, Hideo Yasunaga, Takamichi Saito:
Scalability of Privacy-Preserving Linear Regression in Epidemiological Studies. AINA 2015: 510-514 - [c72]Yohei Kaneko, Takamichi Saito, Hiroaki Kikuchi:
Cryptographic Operation Load-Balancing between Cryptographic Module and CPU. AINA 2015: 698-705 - [c71]Hiroaki Kikuchi, Hideki Hashimoto, Hideo Yasunaga:
Privacy-Preserving Epidemiological Analysis for a Distributed Database of Hospitals. AsiaJCIS 2015: 85-90 - [c70]Hiroaki Kikuchi, Hiroaki Matsumoto, Hiroshi Ishii:
Automated Detection of Drive-By Download Attack. IMIS 2015: 511-515 - [c69]Michitomo Yamaguchi, Takeshi Okamoto, Hiroaki Kikuchi:
CAPTCHA System by Differentiating the Awkwardness of Objects. NBiS 2015: 257-263 - [c68]Hiroaki Kikuchi, Katsumi Takahashi:
Zipf distribution model for quantifying risk of re-identification from trajectory data. PST 2015: 14-21 - 2014
- [j31]Hiroaki Kikuchi, Jun Sakuma:
Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size of an Intersection. J. Inf. Process. 22(2): 388-400 (2014) - [c67]Hiroaki Kikuchi, Tomoki Sato, Jun Sakuma:
Privacy-Preserving Hypothesis Testing for the Analysis of Epidemiological Medical Data. AINA 2014: 359-365 - [c66]Hiroaki Kikuchi, Kouichi Itoh, Mebae Ushida, Yuji Yamaoka, Takanori Oikawa:
Secret Sharing Scheme with Efficient Keyword Search for Cloud Storage. AsiaJCIS 2014: 164-169 - [c65]Michitomo Yamaguchi, Toru Nakata, Takeshi Okamoto, Hiroaki Kikuchi:
An Accessible CAPTCHA System for People with Visual Disability - Generation of Human/Computer Distinguish Test with Documents on the Net. HCI (7) 2014: 119-130 - [c64]Hiroaki Kikuchi, Tomohiro Arimizu:
On the Vulnerability of Ghost Domain Names. IMIS 2014: 584-587 - [c63]Hiroaki Kikuchi, Tomoki Sato, Jun Sakuma:
Privacy-Preserving Dose-Response Relationship Test. NBiS 2014: 506-510 - [c62]Michitomo Yamaguchi, Toru Nakata, Hajime Watanabe, Takeshi Okamoto, Hiroaki Kikuchi:
Vulnerability of the conventional accessible CAPTCHA used by the White House and an alternative approach for visually impaired people. SMC 2014: 3946-3951 - 2013
- [j30]Hiroaki Kikuchi, Daisuke Kagawa, Anirban Basu, Kazuhiko Ishii, Masayuki Terada, Sadayuki Hongo:
Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasets. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 111-120 (2013) - [j29]Khamphao Sisaat, Hiroaki Kikuchi, Shunji Matsuo, Masato Terada, Masashi Fujiwara, Surin Kittitornkun:
Time Zone Correlation Analysis of Malware/Bot Downloads. IEICE Trans. Commun. 96-B(7): 1753-1763 (2013) - [j28]Masayuki Ohrui, Hiroaki Kikuchi, Nur Rohman Rosyid, Masato Terada:
Mining Botnet Coordinated Attacks using Apriori-PrefixSpan Hybrid Algorithm. Inf. Media Technol. 8(4): 1207-1216 (2013) - [j27]Hiroaki Kikuchi, Anna Mochizuki:
Privacy-preserving Collaborative Filtering Using Randomized Response. Inf. Media Technol. 8(4): 1217-1223 (2013) - [j26]Masayuki Ohrui, Hiroaki Kikuchi, Nur Rohman Rosyid, Masato Terada:
Mining Botnet Coordinated Attacks using Apriori-PrefixSpan Hybrid Algorithm. J. Inf. Process. 21(4): 607-616 (2013) - [j25]Hiroaki Kikuchi, Anna Mochizuki:
Privacy-preserving Collaborative Filtering Using Randomized Response. J. Inf. Process. 21(4): 617-623 (2013) - [c61]Anirban Basu, Jaideep Vaidya, Hiroaki Kikuchi, Theo Dimitrakos:
Privacy-Preserving Collaborative Filtering on the Cloud and Practical Implementation Experiences. IEEE CLOUD 2013: 406-413 - [c60]Hiroaki Kikuchi, Kouichi Itoh, Mebae Ushida, Hiroshi Tsuda, Yuji Yamaoka:
Privacy-Preserving Distributed Decision Tree Learning with Boolean Class Attributes. AINA 2013: 538-545 - [c59]Hiroaki Kikuchi, Jun Sakuma:
Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size of an Intersection. DBSec 2013: 145-163 - [c58]Hiroaki Kikuchi, Fumiya Ito, Shogo Daimon:
Nondestructive evaluation of hardness using AC permeability and impedance analysis. ICST 2013: 582-586 - [c57]Hiroaki Kikuchi, Tomoki Sato, Jun Sakuma:
Privacy-Preserving Protocol for Epidemiology in Effect of Radiation. IMIS 2013: 831-836 - [c56]Hiroaki Kikuchi, Takeru Yokomizo:
Location Privacy Vulnerable from Bluetooth Devices. NBiS 2013: 534-538 - 2012
- [j24]Anirban Basu, Jaideep Vaidya, Hiroaki Kikuchi, Theo Dimitrakos, Srijith K. Nair:
Privacy preserving collaborative filtering for SaaS enabling PaaS clouds. J. Cloud Comput. 1: 8 (2012) - [c55]Tomoki Sato, Hiroaki Kikuchi:
Synthesis of Secure Passwords. AsiaJCIS 2012: 35-37 - [c54]N. Hiroguchi, Hiroaki Kikuchi, Khamphao Sisaat, Surin Kittitornkun:
Geographical Visualization of Malware Download for Anomaly Detection. AsiaJCIS 2012: 74-78 - [c53]Anirban Basu, Jaideep Vaidya, Hiroaki Kikuchi:
Perturbation Based Privacy Preserving Slope One Predictors for Collaborative Filtering. IFIPTM 2012: 17-35 - [c52]Hiroaki Kikuchi, Anna Mochizuki:
Privacy-Preserving Collaborative Filtering Using Randomized Response. IMIS 2012: 671-676 - [c51]Yoshifumi Kamoshida, Hiroaki Kikuchi:
Word Salad CAPTCHA - Application and Evaluation of Synthesized Sentences. NBiS 2012: 799-804 - [c50]Anirban Basu, Jaideep Vaidya, Theo Dimitrakos, Hiroaki Kikuchi:
Feasibility of a privacy preserving collaborative filtering scheme on the Google App Engine: a performance case study. SAC 2012: 447-452 - [c49]Hiroaki Kikuchi, Yoshiki Aoki, Masayuki Terada, Kazuhiko Ishii, Kimihiko Sekino:
Accuracy of Privacy-Preserving Collaborative Filtering Based on Quasi-homomorphic Similarity. UIC/ATC 2012: 555-562 - 2011
- [j23]Nur Rohman Rosyid, Masayuki Ohrui, Hiroaki Kikuchi, Pitikhate Sooraksa, Masato Terada:
Analysis on the Sequential Behavior of Malware Attacks. IEICE Trans. Inf. Syst. 94-D(11): 2139-2149 (2011) - [j22]Tangtisanon Pikulkaew, Hiroaki Kikuchi:
Perfect Privacy-preserving Automated Trust Negotiation. Inf. Media Technol. 6(4): 1229-1240 (2011) - [j21]Hiroaki Kikuchi, Shuji Matsuo, Masato Terada:
Principal Component Analysis of Botnet Takeover. Inf. Media Technol. 6(4): 1241-1250 (2011) - [j20]Tangtisanon Pikulkaew, Hiroaki Kikuchi:
Perfect Privacy-preserving Automated Trust Negotiation. J. Inf. Process. 19: 451-462 (2011) - [j19]Hiroaki Kikuchi, Shuji Matsuo, Masato Terada:
Principal Component Analysis of Botnet Takeover. J. Inf. Process. 19: 463-472 (2011) - [j18]Anirban Basu, Jaideep Vaidya, Hiroaki Kikuchi:
Efficient Privacy-Preserving Collaborative Filtering Based on the Weighted Slope One Predictor. J. Internet Serv. Inf. Secur. 1(4): 26-46 (2011) - [c48]Hiroaki Kikuchi, Tangtisanon Pikulkaew:
Perfect Privacy Preserving in Automated Trust Negotiation. AINA 2011: 129-134 - [c47]Anirban Basu, Jaideep Vaidya, Hiroaki Kikuchi, Theo Dimitrakos:
Privacy-preserving Collaborative Filtering for the Cloud. CloudCom 2011: 223-230 - [c46]Hiroaki Kikuchi, Yoshiki Aoki, Masayuki Terada, Kazuhiko Ishii, Kimihiko Sekino:
Distributed Collaborative Filtering Protocol Based on Quasi-homomorphic Similarity. IMIS 2011: 622-627 - [c45]Masayuki Ohrui, Hiroaki Kikuchi, Masato Terada, Nur Rohman Rosyid:
Apriori-PrefixSpan Hybrid Approach for Automated Detection of Botnet Coordinated Attacks. NBiS 2011: 92-97 - [c44]Tangtisanon Pikulkaew, Hiroaki Kikuchi:
Improving Efficiency in Privacy-Preserving Automated Trust Negotiation with Conjunctive Policies. NBiS 2011: 679-684 - [c43]Hiroaki Kikuchi, Daisuke Kagawa, Anirban Basu, Kazuhiko Ishii, Masayuki Terada, Sadayuki Hongo:
Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasets. SEC 2011: 223-234 - 2010
- [j17]Hiroaki Kikuchi:
Foreword. IEICE Trans. Inf. Syst. 93-D(5): 1018-1019 (2010) - [j16]Hiroaki Kikuchi, Masato Terada:
Principal Component Analysis of Port-scans for Reduction of Distributed Sensors. Inf. Media Technol. 5(4): 1338-1348 (2010) - [j15]Hiroaki Kikuchi, Masato Terada:
Principal Component Analysis of Port-scans for Reduction of Distributed Sensors. J. Inf. Process. 18: 190-200 (2010) - [j14]Hiroaki Kikuchi, Kei Nagai, Wakaha Ogata, Masakatsu Nishigaki:
Privacy-preserving similarity evaluation and application to remote biometrics authentication. Soft Comput. 14(5): 529-536 (2010) - [c42]Kazuya Kuwabara, Hiroaki Kikuchi, Masato Terada, Masashi Fujiwara:
Heuristics for Detecting Botnet Coordinated Attacks. ARES 2010: 603-607 - [c41]Minako Tada, Hiroaki Kikuchi, Sutheera Puntheeranurak:
Privacy-Preserving Collaborative Filtering Protocol Based on Similarity between Items. AINA 2010: 573-578 - [c40]Masayuki Ohrui, Hiroaki Kikuchi, Masato Terada:
Mining Association Rules Consisting of Download Servers from Distributed Honeypot Observation. NBiS 2010: 541-545 - [c39]Nur Rohman Rosyid, Masayuki Ohrui, Hiroaki Kikuchi, Pitikhate Sooraksa, Masato Terada:
A discovery of sequential attack patterns of malware in botnets. SMC 2010: 2564-2570
2000 – 2009
- 2009
- [j13]Koji Chida, Hiroaki Kikuchi, Keiichi Hirota, Gembu Morohashi:
Multiparty Computation from El Gamal/Paillier Conversion. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 137-146 (2009) - [c38]Hiroaki Kikuchi, Hiroyasu Kizawa, Minako Tada:
Privacy-Preserving Collaborative Filtering Schemes. ARES 2009: 911-916 - [c37]Hsu-Chun Hsiao, Yue-Hsun Lin, Ahren Studer, Cassandra Studer, King-Hang Wang, Hiroaki Kikuchi, Adrian Perrig, Hung-Min Sun, Bo-Yin Yang:
A Study of User-Friendly Hash Comparison Schemes. ACSAC 2009: 105-114 - [c36]Ryo Nojima, Jin Tamura, Youki Kadobayashi, Hiroaki Kikuchi:
A Storage Efficient Redactable Signature in the Standard Model. ISC 2009: 326-337 - [c35]Taiki Sakashita, Yoichi Shibata, Takumi Yamamoto, Kenta Takahashi, Wakaha Ogata, Hiroaki Kikuchi, Masakatsu Nishigaki:
A Proposal of Efficient Remote Biometric Authentication Protocol. IWSEC 2009: 212-227 - [c34]Hiroaki Kikuchi, Tomohiro Kobori, Masato Terada:
Orthogonal Expansion of Port-scanning Packets. NBiS 2009: 321-326 - 2008
- [j12]Mitsuo Okada, Hiroaki Kikuchi, Yasuo Okabe:
Multi-Bit Embedding in Asymmetric Digital Watermarking without Exposing Secret Information. IEICE Trans. Inf. Syst. 91-D(5): 1348-1358 (2008) - [j11]Gembu Morohashi, Koji Chida, Keiichi Hirota, Hiroaki Kikuchi:
Secure Multiparty Computation for Comparator Networks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(9): 2349-2355 (2008) - [j10]Hiroaki Kikuchi, Masato Terada, Naoya Fukuno, Norihisa Doi:
Estimation of Increase of Scanners Based on ISDAS Distributed Sensors. Inf. Media Technol. 3(4): 939-948 (2008) - [j9]Hiroaki Kikuchi, Naoya Fukuno, Tomohiro Kobori, Masato Terada, Tangtisanon Pikulkaew:
Automated Port-scan Classification with Decision Tree and Distributed Sensors. Inf. Media Technol. 3(4): 972-982 (2008) - [j8]Hiroaki Kikuchi, Masato Terada, Naoya Fukuno, Norihisa Doi:
Estimation of Increase of Scanners Based on ISDAS Distributed Sensors. J. Inf. Process. 16: 100-109 (2008) - [j7]Hiroaki Kikuchi, Naoya Fukuno, Tomohiro Kobori, Masato Terada, Tangtisanon Pikulkaew:
Automated Port-scan Classification with Decision Tree and Distributed Sensors. J. Inf. Process. 16: 165-175 (2008) - [c33]Tomohiro Kobori, Hiroaki Kikuchi, Masato Terada:
Internet Observation with ISDAS: How Long Does a Worm Perform Scanning? ARES 2008: 1282-1286 - [c32]Hiroaki Kikuchi, Naoya Fukuno, Tomohiro Kobori, Masato Terada, Tangtisanon Pikulkaew:
Automated Classification of Port-Scans from Distributed Sensors. AINA 2008: 771-778 - [c31]Hiroaki Kikuchi, Kei Nagai, Wakaha Ogata, Masakatsu Nishigaki:
Privacy-Preserving Similarity Evaluation and Application to Remote Biometrics Authentication. MDAI 2008: 3-14 - [c30]Hiroaki Kikuchi, Naoya Fukuno, Masato Terada, Norihisa Doi:
Principal Components of Port-Address Matrices in Port-Scan Analysis. OTM Conferences (2) 2008: 956-968 - 2007
- [j6]Willy Susilo, Hiroaki Kikuchi:
Cryptanalysis of Modification to Self-Certified Group-Oriented Cryptosystem without A Combiner. Int. J. Netw. Secur. 4(3): 288-291 (2007) - [c29]Kei Nagai, Hiroaki Kikuchi, Wakaha Ogata, Masakatsu Nishigaki:
ZeroBio - Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation Protocol. ARES 2007: 1155-1159 - [c28]Koji Chida, Hiroaki Kikuchi, Gembu Morohashi, Keiichi Hirota:
Efficient Multiparty Computation for Comparator Networks. ARES 2007: 1183-1189 - [c27]Hiroaki Kikuchi, Yuichi Nakamura:
Online and Offline Presence Information Integrated with RFID and Instant Messaging Agent. AINA Workshops (1) 2007: 199-202 - [c26]Hiroaki Kikuchi, Masato Terada, Naoya Fukuno, Norihisa Doi:
Estimation of Behavior of Scanners Based on ISDAS Distributed Sensors. OTM Conferences (2) 2007: 1659-1674 - [c25]Hiroaki Kikuchi, Yasunori Onuki, Kei Nagai:
Evaluation and implement of fuzzy vault scheme using indexed minutiae. SMC 2007: 3709-3712 - [e1]Atsuko Miyaji, Hiroaki Kikuchi, Kai Rannenberg:
Advances in Information and Computer Security, Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings. Lecture Notes in Computer Science 4752, Springer 2007, ISBN 978-3-540-75650-7 [contents] - 2006
- [c24]Hiroaki Kikuchi:
Dual RSA Accumulators and Its Application for Private Revocation Check. AINA (1) 2006: 237-242 - [c23]Hiroaki Kikuchi, Masato Terada:
How Many Malicious Scanners Are in the Internet? WISA 2006: 381-390 - 2005
- [c22]Junji Nakazato, Kenji Fujimoto, Hiroaki Kikuchi:
Privacy Preserving Web-Based Questionnaire. AINA 2005: 285-288 - [c21]Yuichi Nakamura, Hiroaki Kikuchi:
Efficient Key Management Based on the Subset Difference Method for Secure Group Communication. AINA 2005: 707-712 - [c20]Hiroaki Kikuchi:
Webpage clustering - automated classification into jointly classified groups. SMC 2005: 2801-2806 - [c19]Mitsuo Okada, Hiroaki Kikuchi:
Secure Asymmetric Watermark Detection Without Secret of Modified Pixels. WISA 2005: 165-178 - 2004
- [j5]Noboru Takagi, Hiroaki Kikuchi, Masao Mukaidono:
Applications of Fuzzy Logic Functions to Knowledge Discovery in Databases. Trans. Rough Sets 2: 107-128 (2004) - [c18]Hiroaki Kikuchi, Minako Tada, Shohachiro Nakanishi:
Secure Instant Messaging Protocol Preserving Confidentiality against Administrator. AINA (2) 2004: 27-30 - [c17]Hiroaki Kikuchi:
Rabin Tree and Its Application to Group Key Distribution. ATVA 2004: 384-391 - [c16]Hiroaki Kikuchi, Junji Nakazato:
ModInt: Compact Modular Arithmatic Class Library Available on Cellular Phone and its Application to Secure Electronic Voting System. SEC 2004: 177-192 - 2002
- [j4]Hiroaki Kikuchi:
(M+1)st-Price Auction Protocol. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(3): 676-683 (2002) - [j3]Hiroaki Kikuchi, Noboru Takagi:
Hierarchical fuzzy modeling and jointly expandable functions. Int. J. Intell. Syst. 17(5): 515-529 (2002) - [c15]Hiroaki Kikuchi, Noboru Takagi:
de Morgan Bisemilattice of Fuzzy Truth Value. ISMVL 2002: 180-184 - [c14]Hiroaki Kikuchi:
Oblivious Counter and Majority Protocol. ISC 2002: 437-445 - 2001
- [c13]Hiroaki Kikuchi:
(M+1)st-Price Auction Protocol. Financial Cryptography 2001: 341-353 - [c12]Noboru Takagi, Hiroaki Kikuchi, Kyoichi Nakashima:
Multi-Interval Truth Valued Logic. FUZZ-IEEE 2001: 1119-1122 - [c11]Hiroaki Kikuchi:
Closures of Fuzzy Linguitic Trugh Value With Regards to the Extension Principle. FUZZ-IEEE 2001: 1416-1419 - [c10]Hiroaki Kikuchi:
Power Auction Protocol without Revealing Winning Bids. ICOIN 2001: 61-64 - [c9]Hiroaki Kikuchi:
Identification of Incompletely Specified Fuzzy Unate Logic Function. ISMVL 2001: 116-124 - 2000
- [c8]Hiroaki Kikuchi, Shinji Hotta, Kensuke Abe, Shohachiro Nakanishi:
Distributed auction servers resolving winner and winning bid without revealing privacy of bids. ICPADS Workshops 2000: 307-312
1990 – 1999
- 1999
- [c7]Hiroaki Kikuchi, Kensuke Abe, Shohachiro Nakanishi:
Performance Evaluation of Public-Key Certificate Revocation System with Balanced Hash Tree. ICPP Workshops 1999: 204-211 - [c6]Hiroaki Kikuchi, Kensuke Abe, Shohachiro Nakanishi:
Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree. ISW 1999: 103-117 - 1998
- [j2]Hiroaki Kikuchi, Akihiro Ohtake, Shohachiro Nakanishi:
Functional Completeness of Hierarchical Fuzzy Modeling. Inf. Sci. 110(1-2): 51-60 (1998) - [j1]Noboru Takagi, Hiroaki Kikuchi, Kyoichi Nakashima, Masao Mukaidono:
Identification of incompletely specified multiple-valued Kleenean functions. IEEE Trans. Syst. Man Cybern. Part A 28(5): 637-647 (1998) - [c5]Michael Harkavy, J. Doug Tygar, Hiroaki Kikuchi:
Electronic Auctions with Private Bids. USENIX Workshop on Electronic Commerce 1998 - 1997
- [c4]Shinobu Ohtani, Hiroaki Kikuchi, Ronald R. Yager, Shohachiro Nakanishi:
Fuzzy system identification for composite operation and fuzzy relation by genetic algorithms. KES (1) 1997: 289-295 - 1995
- [c3]Noboru Takagi, Hiroaki Kikuchi, Kyoichi Nakashima, Masao Mukaidono:
A Characterization of Kleenean Functions. ISMVL 1995: 236-241 - [c2]Hiroaki Kikuchi, Noboru Takagi, Shohachiro Nakanishi, Masao Mukaidono:
Uniqueness of Partially Specified Multiple-Valued Kleenean Function. ISMVL 1995: 242-247 - [c1]Shohachiro Nakanishi, Akihiro Ohtake, Ronald R. Yager, Shinobu Ohtani, Hiroaki Kikuchi:
Structure Identification of Acquired Knowledge in Fuzzy Inference by Genetic Algorithms. IEEE/Nagoya-University World Wisepersons Workshop 1995: 21-34
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint