default search action
Takao Murakami
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Jun Narita, Takao Murakami, Hideitsu Hino, Masakatsu Nishigaki, Tetsushi Ohki:
Synthesizing differentially private location traces including co-locations. Int. J. Inf. Sec. 23(1): 389-410 (2024) - [j22]Seira Hidano, Takao Murakami:
Degree-Preserving Randomized Response for Graph Neural Networks under Local Differential Privacy. Trans. Data Priv. 17(2): 89-121 (2024) - [c31]Reo Eriguchi, Kazumasa Shinagawa, Takao Murakami:
Card-Based Cryptography Meets Differential Privacy. FUN 2024: 12:1-12:20 - [c30]Shang Liu, Yang Cao, Takao Murakami, Jinfei Liu, Masatoshi Yoshikawa:
CARGO: Crypto-Assisted Differentially Private Triangle Counting Without Trusted Servers. ICDE 2024: 1671-1684 - [i20]Shang Liu, Yang Cao, Takao Murakami, Weiran Liu, Seng Pei Liew, Tsubasa Takahashi, Jinfei Liu, Masatoshi Yoshikawa:
Federated Graph Analytics with Differential Privacy. CoRR abs/2405.20576 (2024) - 2023
- [j21]Takao Murakami, Yuichi Sei:
Automatic Tuning of Privacy Budgets in Input-Discriminative Local Differential Privacy. IEEE Internet Things J. 10(18): 15990-16005 (2023) - [j20]Takao Murakami, Hiromi Arai, Koki Hamada, Takuma Hatano, Makoto Iguchi, Hiroaki Kikuchi, Atsushi Kuromasa, Hiroshi Nakagawa, Yuichi Nakamura, Kenshiro Nishiyama, Ryo Nojima, Hidenobu Oguri, Chiemi Watanabe, Akira Yamada, Takayasu Yamaguchi, Yuji Yamaoka:
Designing a Location Trace Anonymization Contest. Proc. Priv. Enhancing Technol. 2023(1): 225-243 (2023) - [c29]Nuttapong Attrapadung, Goichiro Hanaoka, Haochen M. Kotoi-Xie, Takahiro Matsuda, Takumi Moriyama, Takao Murakami, Hidenori Nakamura, Jacob C. N. Schuldt, Masaaki Tokuyama, Jing Zhang:
Two-Dimensional Dynamic Fusion for Continuous Authentication. IJCB 2023: 1-9 - [i19]Nuttapong Attrapadung, Goichiro Hanaoka, Haochen M. Kotoi-Xie, Takahiro Matsuda, Takumi Moriyama, Takao Murakami, Hidenori Nakamura, Jacob C. N. Schuldt, Masaaki Tokuyama, Jing Zhang:
Two-Dimensional Dynamic Fusion for Continuous Authentication. CoRR abs/2309.04128 (2023) - [i18]Shang Liu, Yang Cao, Takao Murakami, Jinfei Liu, Masatoshi Yoshikawa:
CARGO: Crypto-Assisted Differentially Private Triangle Counting without Trusted Servers. CoRR abs/2312.12938 (2023) - 2022
- [c28]Shang Liu, Yang Cao, Takao Murakami, Masatoshi Yoshikawa:
A Crypto-Assisted Approach for Publishing Graph Statistics with Node Local Differential Privacy. IEEE Big Data 2022: 5765-5774 - [c27]Jacob Imola, Takao Murakami, Kamalika Chaudhuri:
Differentially Private Triangle and 4-Cycle Counting in the Shuffle Model. CCS 2022: 1505-1519 - [c26]Jacob Imola, Takao Murakami, Kamalika Chaudhuri:
Communication-Efficient Triangle Counting under Local Differential Privacy. USENIX Security Symposium 2022: 537-554 - [i17]Seira Hidano, Takao Murakami:
Degree-Preserving Randomized Response for Graph Neural Networks under Local Differential Privacy. CoRR abs/2202.10209 (2022) - [i16]Jacob Imola, Takao Murakami, Kamalika Chaudhuri:
Differentially Private Subgraph Counting in the Shuffle Model. CoRR abs/2205.01429 (2022) - [i15]Shang Liu, Yang Cao, Takao Murakami, Masatoshi Yoshikawa:
A Crypto-Assisted Approach for Publishing Graph Statistics with Node Local Differential Privacy. CoRR abs/2209.02231 (2022) - 2021
- [j19]Takao Murakami, Koki Hamada, Yusuke Kawamoto, Takuma Hatano:
Privacy-Preserving Multiple Tensor Factorization for Synthesizing Large-Scale Location Traces with Cluster-Specific Features. Proc. Priv. Enhancing Technol. 2021(2): 5-26 (2021) - [j18]Takao Murakami, Kenta Takahashi:
Toward Evaluating Re-identification Risks in the Local Privacy Model. Trans. Data Priv. 14(3): 79-116 (2021) - [c25]Jun Narita, Yayoi Suganuma, Masakatsu Nishigaki, Takao Murakami, Tetsushi Ohki:
Synthesizing Privacy-Preserving Location Traces Including Co-locations. DPM/CBT@ESORICS 2021: 20-36 - [c24]Natasha Fernandes, Yusuke Kawamoto, Takao Murakami:
Locality Sensitive Hashing with Extended Differential Privacy. ESORICS (2) 2021: 563-583 - [c23]Seira Hidano, Takao Murakami, Yusuke Kawamoto:
TransMIA: Membership Inference Attacks Using Transfer Shadow Training. IJCNN 2021: 1-10 - [c22]Jacob Imola, Takao Murakami, Kamalika Chaudhuri:
Locally Differentially Private Analysis of Graph Statistics. USENIX Security Symposium 2021: 983-1000 - [i14]Takao Murakami, Hiromi Arai, Koki Hamada, Takuma Hatano, Makoto Iguchi, Hiroaki Kikuchi, Atsushi Kuromasa, Hiroshi Nakagawa, Yuichi Nakamura, Kenshiro Nishiyama, Ryo Nojima, Hidenobu Oguri, Chiemi Watanabe, Akira Yamada, Takayasu Yamaguchi, Yuji Yamaoka:
Designing a Location Trace Anonymization Contest. CoRR abs/2107.10407 (2021) - [i13]Jacob Imola, Takao Murakami, Kamalika Chaudhuri:
Communication-Efficient Triangle Counting under Local Differential Privacy. CoRR abs/2110.06485 (2021) - 2020
- [j17]Seira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro Hanaoka:
Exposing Private User Behaviors of Collaborative Filtering via Model Inversion Techniques. Proc. Priv. Enhancing Technol. 2020(3): 264-283 (2020) - [i12]Takao Murakami, Kenta Takahashi:
Toward Evaluating Re-identification Risks in the Local Privacy Model. CoRR abs/2010.08238 (2020) - [i11]Jacob Imola, Takao Murakami, Kamalika Chaudhuri:
Locally Differentially Private Analysis of Graph Statistics. CoRR abs/2010.08688 (2020) - [i10]Natasha Fernandes, Yusuke Kawamoto, Takao Murakami:
Locality Sensitive Hashing with Extended Differential Privacy. CoRR abs/2010.09393 (2020) - [i9]Seira Hidano, Yusuke Kawamoto, Takao Murakami:
TransMIA: Membership Inference Attacks Using Transfer Shadow Training. CoRR abs/2011.14661 (2020)
2010 – 2019
- 2019
- [j16]Takao Murakami, Ryo Fujita, Tetsushi Ohki, Yosuke Kaga, Masakazu Fujio, Kenta Takahashi:
Cancelable Permutation-Based Indexing for Secure and Efficient Biometric Identification. IEEE Access 7: 45563-45582 (2019) - [j15]Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki:
Signature schemes with a fuzzy private key. Int. J. Inf. Sec. 18(5): 581-617 (2019) - [j14]Takao Murakami, Tetsushi Ohki, Yosuke Kaga, Masakazu Fujio, Kenta Takahashi:
Cancelable indexing based on low-rank approximation of correlation-invariant random filtering for fast and secure biometric identification. Pattern Recognit. Lett. 126: 11-20 (2019) - [c21]Yusuke Kawamoto, Takao Murakami:
Local Distribution Obfuscation via Probability Coupling*. Allerton 2019: 718-725 - [c20]Yusuke Kawamoto, Takao Murakami:
Local Obfuscation Mechanisms for Hiding Probability Distributions. ESORICS (1) 2019: 128-148 - [c19]Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka:
Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions. Public Key Cryptography (1) 2019: 549-580 - [c18]Takao Murakami, Yusuke Kawamoto:
Utility-Optimized Local Differential Privacy Mechanisms for Distribution Estimation. USENIX Security Symposium 2019: 1877-1894 - [i8]Yusuke Kawamoto, Takao Murakami:
Local Distribution Obfuscation via Probability Coupling. CoRR abs/1907.05991 (2019) - [i7]Takao Murakami, Koki Hamada, Yusuke Kawamoto, Takuma Hatano:
Privacy-Preserving Multiple Tensor Factorization for Synthesizing Large-Scale Location Traces. CoRR abs/1911.04226 (2019) - [i6]Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka:
Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions. IACR Cryptol. ePrint Arch. 2019: 50 (2019) - 2018
- [j13]Seira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro Hanaoka:
Model Inversion Attacks for Online Prediction Systems: Without Knowledge of Non-Sensitive Attributes. IEICE Trans. Inf. Syst. 101-D(11): 2665-2676 (2018) - [j12]Ryo Nojima, Hidenobu Oguri, Hiroaki Kikuchi, Hiroshi Nakagawa, Koki Hamada, Takao Murakami, Yuji Yamaoka, Chiemi Watanabe:
How to Handle Excessively Anonymized Datasets. J. Inf. Process. 26: 477-485 (2018) - [j11]Takao Murakami, Hideitsu Hino, Jun Sakuma:
Toward Distribution Estimation under Local Differential Privacy with Small Samples. Proc. Priv. Enhancing Technol. 2018(3): 84-104 (2018) - [c17]Kenta Takahashi, Takao Murakami:
A Generalization of the Theory of Biometric System Entropy. APSIPA 2018: 1-6 - [c16]Masakazu Fujio, Yosuke Kaga, Takao Murakami, Tetsushi Ohki, Kenta Takahashi:
Face/Fingerphoto Spoof Detection under Noisy Conditions by using Deep Convolutional Neural Network. BIOSIGNALS 2018: 54-62 - [c15]Yusuke Kawamoto, Takao Murakami:
On the Anonymization of Differentially Private Location Obfuscation. ISITA 2018: 159-163 - [c14]Takao Murakami:
A Succinct Model for Re-identification of Mobility Traces Based on Small Training Data. ISITA 2018: 164-168 - [i5]Takao Murakami, Tetsushi Ohki, Yosuke Kaga, Masakazu Fujio, Kenta Takahashi:
Cancelable Indexing Based on Low-rank Approximation of Correlation-invariant Random Filtering for Fast and Secure Biometric Identification. CoRR abs/1804.01670 (2018) - [i4]Yusuke Kawamoto, Takao Murakami:
On the Anonymization of Differentially Private Location Obfuscation. CoRR abs/1807.08456 (2018) - [i3]Takao Murakami, Yusuke Kawamoto:
Restricted Local Differential Privacy for Distribution Estimation with High Data Utility. CoRR abs/1807.11317 (2018) - [i2]Yusuke Kawamoto, Takao Murakami:
Differentially Private Obfuscation Mechanisms for Hiding Probability Distributions. CoRR abs/1812.00939 (2018) - 2017
- [j10]Takao Murakami, Yosuke Kaga, Kenta Takahashi:
Modality Selection Attacks and Modality Restriction in Likelihood-Ratio Based Biometric Score Fusion. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(12): 3023-3037 (2017) - [j9]Takao Murakami:
Expectation-Maximization Tensor Factorization for Practical Location Privacy Attacks. Proc. Priv. Enhancing Technol. 2017(4): 138-155 (2017) - [j8]Takao Murakami, Atsunori Kanemura, Hideitsu Hino:
Group Sparsity Tensor Factorization for Re-Identification of Open Mobility Traces. IEEE Trans. Inf. Forensics Secur. 12(3): 689-704 (2017) - [c13]Yosuke Kaga, Masakazu Fujio, Ken Naganuma, Kenta Takahashi, Takao Murakami, Tetsushi Ohki, Masakatsu Nishigaki:
A Secure and Practical Signature Scheme for Blockchain Based on Biometrics. ISPEC 2017: 877-891 - [c12]Seira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro Hanaoka:
Model Inversion Attacks for Prediction Systems: Without Knowledge of Non-Sensitive Attributes. PST 2017: 115-126 - [i1]Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki:
Signature Schemes with a Fuzzy Private Key. IACR Cryptol. ePrint Arch. 2017: 1188 (2017) - 2016
- [j7]Takao Murakami, Yosuke Kaga, Kenta Takahashi:
Information-Theoretic Performance Evaluation of Multibiometric Fusion under Modality Selection Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(5): 929-942 (2016) - [j6]Takao Murakami, Tetsushi Ohki, Kenta Takahashi:
Optimal sequential fusion for multibiometric cryptosystems. Inf. Fusion 32: 93-108 (2016) - [j5]Takao Murakami, Hajime Watanabe:
Localization Attacks Using Matrix and Tensor Factorization. IEEE Trans. Inf. Forensics Secur. 11(8): 1647-1660 (2016) - [c11]Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka:
Fuzzy Signatures: Relaxing Requirements and a New Construction. ACNS 2016: 97-116 - [c10]Takao Murakami, Yosuke Kaga, Kenta Takahashi:
On restricting modalities in likelihood-ratio based biometric score fusion. ICPR 2016: 3036-3042 - 2015
- [c9]Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki:
A Signature Scheme with a Fuzzy Private Key. ACNS 2015: 105-126 - [c8]Takao Murakami, Kenta Takahashi:
Information-theoretic performance evaluation of likelihood-ratio based biometric score fusion under modality selection attacks. BTAS 2015: 1-8 - [c7]Takao Murakami, Atsunori Kanemura, Hideitsu Hino:
Group Sparsity Tensor Factorization for De-anonymization of Mobility Traces. TrustCom/BigDataSE/ISPA (1) 2015: 621-629 - 2014
- [j4]Takao Murakami, Kenta Takahashi, Kanta Matsuura:
A General Framework and Algorithms for Score Level Indexing and Fusion in Biometric Identification. IEICE Trans. Inf. Syst. 97-D(3): 510-523 (2014) - [j3]Kenta Takahashi, Takao Murakami:
A measure of information gained through biometric systems. Image Vis. Comput. 32(12): 1194-1203 (2014) - [j2]Takao Murakami, Kenta Takahashi, Kanta Matsuura:
Toward Optimal Fusion Algorithms With Security Against Wolves and Lambs in Biometrics. IEEE Trans. Inf. Forensics Secur. 9(2): 259-271 (2014) - [c6]Takao Murakami, Hajime Watanabe:
Location prediction attacks using tensor factorization and optimal defenses. IEEE BigData 2014: 13-21 - 2013
- [j1]Takao Murakami, Kenta Takahashi, Susumu Serita, Yasuhiro Fujii:
Probabilistic enhancement of approximate indexing in metric spaces. Inf. Syst. 38(7): 1007-1018 (2013) - 2012
- [c5]Takao Murakami, Kenta Takahashi, Kanta Matsuura:
Towards optimal countermeasures against wolves and lambs in biometrics. BTAS 2012: 69-76 - 2011
- [c4]Takao Murakami, Kenta Takahashi:
Fast and accurate biometric identification using score level indexing and fusion. IJCB 2011: 1-8 - [c3]Takao Murakami, Kenta Takahashi, Susumu Serita, Yasuhiro Fujii:
Versatile probability-based indexing for approximate similarity search. SISAP 2011: 51-58
2000 – 2009
- 2009
- [c2]Takao Murakami, Kenta Takahashi:
Accuracy improvement with high convenience in biometric identification using multihypothesis sequential probability ratio test. WIFS 2009: 66-70 - 2005
- [c1]Takao Murakami, Kazutaka Maruyama, Nobuaki Minematsu, Keikichi Hirose:
Japanese vowel recognition based on structural representation of speech. INTERSPEECH 2005: 1261-1264
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint