Highly contributed researchers
In recent 10 years: Takao Murakami (3) / Rei Ueno (3) / Naofumi Homma (3) / Kazuaki Nakamura (3) / Naoko Nitta (3) / Noboru Babaguchi (3) / Norio Shiratori (3)
Since 2006: Norio Shiratori (4) / Minoru Kuribayashi (4) / Naofumi Homma (4) / Noboru Babaguchi (4)
Statistics
DP-Norm: Differential Privacy Primal-Dual Algorithm for Decentralized Federated Learning
Authors: Takumi Fukami, Tomoya Murata, Kenta Niwa, Iifan Tyou
KeystrokeSniffer: An Off-the-Shelf Smartphone Can Eavesdrop on Your Privacy From Anywhere
Authors: Jinyang Huang, Jia-Xuan Bai, Xiang Zhang, Zhi Liu, Yuanhao Feng, Jianchun Liu, Xiao Sun, Mianxiong Dong, Meng Li
Enhancing Sparse Mobile CrowdSensing With Manifold Optimization and Differential Privacy
Authors: Chengxin Li, Saiqin Long, Haolin Liu, Youngjune Choi, Hiroo Sekiya, Zhetao Li
LDS-FL: Loss Differential Strategy Based Federated Learning for Privacy Preserving
Authors: Taiyu Wang, Qinglin Yang, Kaiming Zhu, Junbo Wang, Chunhua Su, Kento Sato
Enhanced Few-Shot Malware Traffic Classification via Integrating Knowledge Transfer With Neural Architecture Search
Authors: Xixi Zhang, Qin Wang, Maoyang Qin, Yu Wang, Tomoaki Ohtsuki, Bamidele Adebisi, Hikmet Sari, Guan Gui
Enhancing the Physical Layer Security of Two-Way Relay Systems With RIS and Beamforming
Authors: Yu Zhang, Shuangrui Zhao, Yulong Shen, Xiaohong Jiang, Norio Shiratori
Interpreting Graph-Based Sybil Detection Methods as Low-Pass Filtering
Authors: Satoshi Furutani, Toshiki Shibahara, Mitsuaki Akiyama, Masaki Aida
Noncoherent Massive MIMO With Embedded One-Way Function Physical Layer Security
Authors: Yuma Katsuki, Giuseppe Thadeu Freitas de Abreu, Koji Ishibashi, Naoki Ishikawa
Generalized Domain Adaptation Framework for Parametric Back-End in Speaker Recognition
Authors: Qiongqiong Wang, Koji Okabe, Kong Aik Lee, Takafumi Koshinaka
Occlusion-Aware Human Mesh Model-Based Gait Recognition
Authors: Chi Xu, Yasushi Makihara, Xiang Li, Yasushi Yagi
Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication Channels
Authors: Vamoua Yachongka, Hideki Yagi, Hideki Ochiai
Experimental Evaluation of e.MMC Data Recovery
Authors: Aya Fukami, Sasha Sheremetov, Francesco Regazzoni, Zeno J. M. H. Geradts, Cees de Laat
Anonymization of Human Gait in Video Based on Silhouette Deformation and Texture Transfer
Authors: Yuki Hirose, Kazuaki Nakamura, Naoko Nitta, Noboru Babaguchi
ELM: A Low-Latency and Scalable Memory Encryption Scheme
Authors: Akiko Inoue, Kazuhiko Minematsu, Maya Oda, Rei Ueno, Naofumi Homma
Model Inversion Attack by Integration of Deep Generative Models: Privacy-Sensitive Face Generation From a Face Recognition System
Authors: Mahdi Khosravy, Kazuaki Nakamura, Yuki Hirose, Naoko Nitta, Noboru Babaguchi
Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security
Authors: Yuanyu Zhang, Yulong Shen, Xiaohong Jiang, Shoji Kasahara
Block-Wise Image Transformation With Secret Key for Adversarially Robust Defense
Authors: MaungMaung AprilPyone and Hitoshi Kiya
APAS: Application-Specific Accelerators for RLWE-Based Homomorphic Linear Transformations
Authors: Song Bian, Dur-e-Shahwar Kundi, Kazuma Hirozawa, Weiqiang Liu, Takashi Sato
Imbalanced Data Problems in Deep Learning-Based Side-Channel Attacks: Analysis and Solution
Authors: Akira Ito, Kotaro Saito, Rei Ueno, Naofumi Homma
Intrapersonal Parameter Optimization for Offline Handwritten Signature Augmentation
Authors: Teruo M. Maruyama, Luiz S. Oliveira, Alceu S. Britto Jr., Robert Sabourin
Finely Tunable Bitcuboid-Based Encryption With Exception-Free Signed Binarization for JPEG Standard
Authors: Kosuke Shimizu and Taizo Suzuki
Dynamic Privacy-Aware Collaborative Schemes for Average Computation: A Multi-Time Reporting Case
Authors: Xin Wang, Hideaki Ishii, Jianping He, Peng Cheng
Diffusional Side-Channel Leakage From Unrolled Lightweight Block Ciphers: A Case Study of Power Analysis on PRINCE
Authors: Ville Yli-Myry, Rei Ueno, Noriyuki Miura, Makoto Nagata, Shivam Bhasin, Yves Mathieu, Tarik Graba, Jean-Luc Danger, Naofumi Homma
Secure and Energy-Efficient Precoding for MIMO Two-Way Untrusted Relay Systems
Authors: Shuangrui Zhao, Jia Liu, Yulong Shen, Xiaohong Jiang, Norio Shiratori
DINA: Detecting Hidden Android Inter-App Communication in Dynamic Loaded Code
Authors: Mohannad Alhanahnah, Qiben Yan, Hamid Bagheri, Hao Zhou, Yutaka Tsutano, Witawas Srisa-an, Xiapu Luo
Physical Layer Security Protocol for Poisson Channels for Passive Man-in-the-Middle Attack
Authors: Masahito Hayashi and ngeles Vzquez-Castro
Atomos: Constant-Size Path Validation Proof
Authors: Anxiao He, Kai Bu, Yucong Li, Eikoh Chida, Qianping Gu, Kui Ren
Link Selection for Security-QoS Tradeoffs in Buffer-Aided Relaying Networks
Authors: Ji He, Jia Liu, Yulong Shen, Xiaohong Jiang, Norio Shiratori
Near-Optimal Detection for Binary Tardos Code by Estimating Collusion Strategy
Authors: Tatsuya Yasui, Minoru Kuribayashi, Nobuo Funabiki, Isao Echizen
Secure Beamforming for Full-Duplex MIMO Two-Way Untrusted Relay Systems
Authors: Shuangrui Zhao, Jia Liu, Yulong Shen, Xiaohong Jiang, Norio Shiratori
Ed-PUF: Event-Driven Physical Unclonable Function for Camera Authentication in Reactive Monitoring System
Authors: Yue Zheng, Xiaojin Zhao, Takashi Sato, Yuan Cao, Chip-Hong Chang
Joint Intensity Transformer Network for Gait Recognition Robust Against Clothing and Carrying Status
Authors: Xiang Li, Yasushi Makihara, Chi Xu, Yasushi Yagi, Mingwu Ren
Secrecy Amplification of Distributed Encrypted Sources With Correlated Keys Using Post-Encryption-Compression
Authors: Bagus Santoso and Yasutada Oohama
Determining the Optimal Random-Padding Size for Rabin Cryptosystems
Authors: Masahiro Kaminaga, Toshinori Suzuki, Masaharu Fukase
Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption for JPEG Images
Authors: Tatsuya Chuman, Warit Sirichotedumrong, Hitoshi Kiya
Encryption-Free Framework of Privacy-Preserving Image Recognition for Photo-Based Information Services
Authors: Kazuaki Nakamura, Naoko Nitta, Noboru Babaguchi
Physical Layer Security for RF Satellite Channels in the Finite-Length Regime
Authors: ngeles Vzquez-Castro and Masahito Hayashi
Physical Layer Security in Buffer-State-Based Max-Ratio Relay Selection Exploiting Broadcasting With Cooperative Beamforming and Jamming
Authors: Ryota Nakai and Shinya Sugiura
Location Privacy in Usage-Based Automotive Insurance: Attacks and Countermeasures
Authors: Lu Zhou, Suguo Du, Haojin Zhu, Cailian Chen, Kaoru Ota, Mianxiong Dong
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption
Authors: Le Trieu Phong, Yoshinori Aono, Takuya Hayashi, Lihua Wang, Shiho Moriai
In-Ear EEG Biometrics for Feasible and Readily Collectable Real-World Person Authentication
Authors: Takashi Nakamura, Valentin Goverdovsky, Danilo P. Mandic
Visual Secret Sharing Schemes Encrypting Multiple Images
Authors: Manami Sasaki and Yodai Watanabe
Wiretap Channels With One-Time State Information: Strong Secrecy
Authors: Te Sun Han, Hiroyuki Endo, Masahide Sasaki
Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage Devices
Authors: Steven Gordon, Xinyi Huang, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin, Komwut Wipusitwarakun
A Theoretical Framework for Estimating False Acceptance Rate of PRNU-Based Camera Identification
Authors: Shota Saito, Yoichi Tomioka, Hitoshi Kitazawa
Bitcoin Block Withholding Attack: Analysis and Mitigation
Authors: Samiran Bag, Sushmita Ruj, Kouichi Sakurai
Randomness Evaluation With the Discrete Fourier Transform Test Based on Exact Analysis of the Reference Distribution
Authors: Hiroki Okada and Ken Umeno
Differential Private Data Collection and Analysis Based on Randomized Multiple Dummies for Untrusted Mobile Crowdsensing
Authors: Yuichi Sei and Akihiko Ohsuga
Group Sparsity Tensor Factorization for Re-Identification of Open Mobility Traces
Authors: Takao Murakami, Atsunori Kanemura, Hideitsu Hino
On the Secrecy Capacity of Wiretap Channels With Side Information at the Transmitter
Author: Hachiro Fujita
Efficient Deniably Authenticated Encryption and Its Application to E-Mail
Authors: Fagen Li, Di Zhong, Tsuyoshi Takagi
ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks
Authors: Yuxin Liu, Mianxiong Dong, Kaoru Ota, Anfeng Liu
Localization Attacks Using Matrix and Tensor Factorization
Authors: Takao Murakami and Hajime Watanabe
Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding
Authors: Chi Cheng, Jemin Lee, Tao Jiang, Tsuyoshi Takagi
Double Counting in 2t-ary RSA Precomputation Reveals the Secret Exponent
Authors: Masahiro Kaminaga, Hideki Yoshikawa, Toshinori Suzuki
Revocable Identity-Based Cryptosystem Revisited: Security Models and Constructions
Authors: Jae Hong Seo and Keita Emura
Simplified MAP Detector for Binary Fingerprinting Code Embedded by Spread Spectrum Watermarking Scheme
Author: Minoru Kuribayashi
Toward Optimal Fusion Algorithms With Security Against Wolves and Lambs in Biometrics
Authors: Takao Murakami, Kenta Takahashi, Kanta Matsuura
Robust Digital Camera Identification Based on Pairwise Magnitude Relations of Clustered Sensor Pattern Noise
Authors: Yoichi Tomioka, Yuya Ito, Hitoshi Kitazawa
Guest Editorial: Special issue on intelligent video surveillance for public security and personal privacy
Authors: Noboru Babaguchi, Andrea Cavallaro, Rama Chellappa, Frdric Dufaux, Liang Wang
A Worst-Case-Aware Design Methodology for Noise-Tolerant Oscillator-Based True Random Number Generator With Stochastic Behavior Modeling
Authors: Takehiko Amaki, Masanori Hashimoto, Yukio Mitsuyama, Takao Onoye
Monitoring Integrity Using Limited Local Memory
Authors: Yuki Kinebuchi, Shakeel Butt, Vinod Ganapathy, Liviu Iftode, Tatsuo Nakajima
The OU-ISIR Gait Database Comprising the Large Population Dataset and Performance Evaluation of Gait Recognition
Authors: Haruyuki Iwama, Mayu Okumura, Yasushi Makihara, Yasushi Yagi
A Weak Security Notion for Visual Secret Sharing Schemes
Author: Mitsugu Iwamoto
Interference Removal Operation for Spread Spectrum Fingerprinting Scheme
Author: Minoru Kuribayashi
A Formal Approach to Designing Cryptographic Processors Based on $GF(2^m)$ Arithmetic Circuits
Authors: Naofumi Homma, Kazuya Saito, Takafumi Aoki
New Fault-Based Side-Channel Attack Using Fault Sensitivity
Authors: Yang Li, Kazuo Ohta, Kazuo Sakiyama
Guest Editorial Integrated Circuit and System Security
Authors: Miodrag Potkonjak, Ramesh Karri, Ingrid Verbauwhede, Kouichi Itoh
Information-Theoretic Approach to Optimal Differential Fault Analysis
Authors: Kazuo Sakiyama, Yang Li, Mitsugu Iwamoto, Kazuo Ohta
Signal Sets for Secret Key Agreement With Public Discussion Based on Gaussian and Fading Channels
Authors: Motohiko Isaka and Seiya Kawata
On the Secrecy Degrees of Freedom of the Multiantenna Block Fading Wiretap Channels
Authors: Mari Kobayashi, Pablo Piantanida, Sheng Yang, Shlomo Shamai
Erratum to "Soft Biometric Traits for Continuous User Authentication"
Authors: Koichiro Niinuma, Unsang Park, Anil K. Jain
Physical-Layer Secret Key Agreement in Two-Way Wireless Relaying Systems
Authors: Takayuki Shimizu, Hisato Iwai, Hideichi Sasaoka
Guest Editorial Special Issue on Using the Physical Layer for Securing the Next Generation of Communication Systems
Authors: Wade Trappe, H. Vincent Poor, Hisato Iwai, Aylin Yener, Paul R. Prucnal, Joo Barros
Secret Key Agreement From Vector Gaussian Sources by Rate Limited Public Communication
Authors: Shun Watanabe and Yasutada Oohama
High Dynamic Range Image Watermarking Robust Against Tone-Mapping Operators
Authors: Fabrizio Guerrini, Masahiro Okuda, Nicola Adami, Riccardo Leonardi
Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions
Authors: Michihiro Kobayashi, Takahiro Okabe, Yoichi Sato
Impact of Rounding Error on Spread Spectrum Fingerprinting Scheme
Authors: Minoru Kuribayashi and Hiroshi Kato
Soft Biometric Traits for Continuous User Authentication
Authors: Koichiro Niinuma, Unsang Park, Anil K. Jain
Network-based traitor-tracing technique using traffic pattern
Authors: Hidehisa Nakayama, Abbas Jamalipour, Nei Kato
A Robust Fingerprint Indexing Scheme Using Minutia Neighborhood Structure and Low-Order Delaunay Triangles
Authors: Xuefeng Liang, Arijit Bishnu, Tetsuo Asano
A Markov chain Monte Carlo algorithm for bayesian dynamic signature verification
Authors: Daigo Muramatsu, Mitsuru Kondo, Masahiro Sasaki, Satoshi Tachibana, Takashi Matsumoto