101 results on '"Kikuchi, Hiroaki"'
Search Results
2. An Efficient Local Differential Privacy Scheme Using Bayesian Ridge Regression
3. Realization of Different Anisotropy Direction for Each Thin-film Magnetoimpedance Element on the Same Substrate
4. Diseases Prediction from Officially Anonymized Medical and Healthcare Big Data
5. A Vulnerability in Video Anonymization – Privacy Disclosure from Face-obfuscated video
6. Vulnerability Exploiting SMS Push Notifications
7. Vulnerability of Privacy Visor Used to Disrupt Unauthorized Face Recognition
8. Robust Person Identification based on DTW Distance of Multiple-Joint Gait Pattern
9. Mathematical Model to Estimate Loss by Cyber Incident in Japan
10. DSC#2
11. Impact Assessment of Password Reset PRMitM Attack with Two-Factor Authentication
12. Risk of Bitcoin Addresses to be Identified from Features of Output Addresses
13. Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks
14. Evaluation and Development of Onomatopoeia CAPTCHAs
15. Development of White List Based Autonomous Evolution of Defense System for RAT Malware
16. Risk of Re-identification from Payment Card Histories in Multiple Domains
17. Privacy Preserved Spectral Analysis Using IoT mHealth Biomedical Data for Stress Estimation
18. Audio-CAPTCHA with distinction between random phoneme sequences and words spoken by multi-speaker
19. Privacy-Preserving Multiple Linear Regression of Vertically Partitioned Real Medical Datasets
20. Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments
21. Flexible Authentication Protocol with Key Reconstruction in WBAN Environments
22. Proposal and Evaluation of Cyber Defense System Using Blacklist Refined Based on Authentication Results
23. Efficient Privacy-Preserving Logistic Regression with Iteratively Re-weighted Least Squares
24. Interactive History Sniffing Attack with Amida Lottery
25. Ice and Fire: Quantifying the Risk of Re-identification and Utility in Data Anonymization
26. Automated Detection of Drive-By Download Attack
27. Zipf distribution model for quantifying risk of re-identification from trajectory data
28. Privacy-Preserving Epidemiological Analysis for a Distributed Database of Hospitals
29. Scalability of Privacy-Preserving Linear Regression in Epidemiological Studies
30. Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments.
31. Vulnerability of the conventional accessible CAPTCHA used by the White House and an alternative approach for visually impaired people
32. Privacy-Preserving Dose-Response Relationship Test
33. Secret Sharing Scheme with Efficient Keyword Search for Cloud Storage
34. On the Vulnerability of Ghost Domain Names
35. Privacy-Preserving Hypothesis Testing for the Analysis of Epidemiological Medical Data
36. Temporal behaviors of Top-10 malware download in 2010–2012
37. Cryptographic Operation Load-Balancing between Cryptographic Module and CPU.
38. Automated Detection of Drive-By Download Attack.
39. Nondestructive evaluation of hardness using AC permeability and impedance analysis
40. Clustering Top-10 malware/bots based on download behavior
41. Location Privacy Vulnerable from Bluetooth Devices
42. Temporal behavior analysis of malware/bot downloads using top-10 processing
43. Privacy-Preserving Protocol for Epidemiology in Effect of Radiation
44. Privacy-Preserving Collaborative Filtering on the Cloud and Practical Implementation Experiences
45. Word Salad CAPTCHA - Application and Evaluation of Synthesized Sentences
46. Accuracy of Privacy-Preserving Collaborative Filtering Based on Quasi-homomorphic Similarity
47. Synthesis of Secure Passwords
48. Privacy-Preserving Collaborative Filtering Using Randomized Response
49. Feasibility of a privacy preserving collaborative filtering scheme on the Google App Engine
50. Privacy-preserving Collaborative Filtering for the Cloud
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.