This web page may contain errors. Please do NOT trust the following list, although the maintainer has tried his best to correct the mistakes. If you find an error, please contact the maintainer via email at “contact [at] ishikawa.cc”.

Highly contributed researchers

Since 2006: Minoru Kuribayashi (3) / Takao Murakami (3)

Statistics

Privacy-Preserving Deep Learning via Additively Homomorphic Encryption

Authors: Le Trieu Phong, Yoshinori Aono, Takuya Hayashi, Lihua Wang, Shiho Moriai

In-Ear EEG Biometrics for Feasible and Readily Collectable Real-World Person Authentication

Authors: Takashi Nakamura, Valentin Goverdovsky, Danilo P. Mandic

Visual Secret Sharing Schemes Encrypting Multiple Images

Authors: Manami Sasaki and Yodai Watanabe

Wiretap Channels With One-Time State Information: Strong Secrecy

Authors: Te Sun Han, Hiroyuki Endo, Masahide Sasaki

Open Set Fingerprint Spoof Detection Across Novel Fabrication Materials

Authors: Ajita Rattani, Walter J. Scheirer, Arun Ross

Double Counting in 2t-ary RSA Precomputation Reveals the Secret Exponent

Authors: Masahiro Kaminaga, Hideki Yoshikawa, Toshinori Suzuki

Guest Editorial: Special issue on intelligent video surveillance for public security and personal privacy

Authors: Noboru Babaguchi, Andrea Cavallaro, Rama Chellappa, Frdric Dufaux, Liang Wang

Monitoring Integrity Using Limited Local Memory

Authors: Yuki Kinebuchi, Shakeel Butt, Vinod Ganapathy, Liviu Iftode, Tatsuo Nakajima

On the Secrecy Degrees of Freedom of the Multiantenna Block Fading Wiretap Channels

Authors: Mari Kobayashi, Pablo Piantanida, Sheng Yang, Shlomo Shamai

Guest Editorial Special Issue on Using the Physical Layer for Securing the Next Generation of Communication Systems

Authors: Wade Trappe, H. Vincent Poor, Hisato Iwai, Aylin Yener, Paul R. Prucnal, Joo Barros

Erratum to "Soft Biometric Traits for Continuous User Authentication"

Authors: Koichiro Niinuma, Unsang Park, Anil K. Jain

Physical-Layer Secret Key Agreement in Two-Way Wireless Relaying Systems

Authors: Takayuki Shimizu, Hisato Iwai, Hideichi Sasaoka

High Dynamic Range Image Watermarking Robust Against Tone-Mapping Operators

Authors: Fabrizio Guerrini, Masahiro Okuda, Nicola Adami, Riccardo Leonardi

Soft Biometric Traits for Continuous User Authentication

Authors: Koichiro Niinuma, Unsang Park, Anil K. Jain

Impact of Rounding Error on Spread Spectrum Fingerprinting Scheme

Authors: Minoru Kuribayashi and Hiroshi Kato

Key extraction from general nondiscrete signals

Authors: Evgeny A. Verbitskiy, Pim Tuyls, Chibuzo Obi, Berry Schoenmakers, Boris Skoric

Network-based traitor-tracing technique using traffic pattern

Authors: Hidehisa Nakayama, Abbas Jamalipour, Nei Kato

A Markov chain Monte Carlo algorithm for bayesian dynamic signature verification

Authors: Daigo Muramatsu, Mitsuru Kondo, Masahiro Sasaki, Satoshi Tachibana, Takashi Matsumoto