KONO, Kazuhiro |
---|
Faculty, Department/Institute
- Faculty of Safety Science Department of Safety Management
Academic status (qualification)
- Associate Professor Apr. 1,2015
Undergraduate Degrees・University
- Osaka University Faculty of EngineeringDivision of Electronic, Information and Energy Engineering 2005 Graduated
Graduate Degrees・University
- Osaka University Master's Degree Program Electrical, Electronic and Infomation Engineering 2007 Completed
- Osaka University Doctor's Degree Program Electrical, Electronic and Infomation Engineering 2010 Completed
Academic Degrees
- Bachelor of Engineering Mar. 2005 Osaka University
- Master of Engineering Mar. 2007 Osaka University
- Doctor of Philosophy in Engineering Mar. 2010 Osaka University
Homepage Address, E-mail Address
- Homepage Address:http://www2.itc.kansai-u.ac.jp/~k-kono/index.html
Research fields
Research fields | keyword |
---|---|
Information and communication engineering | Anonymity;Privacy Protection;Access Control |
Educational technology | Education for Information Security |
Information and communication engineering | Authentication;Secret Sharing |
Image processing | Video Forgery Detection |
Research topics
research topic | Policy generation framework for unifying uanagement of various access control systems |
---|---|
Study theme state | |
research duration | |
Research Programs | |
keyword | |
Research field | |
Research Topics Overview |
research topic | Development of systems with high anonymtiy for protecting personal information |
---|---|
Study theme state | |
research duration | |
Research Programs | |
keyword | |
Research field | |
Research Topics Overview |
research topic | Development of Learning System for Educating Information Security |
---|---|
Study theme state | |
research duration | |
Research Programs | |
keyword | |
Research field | |
Research Topics Overview |
research topic | Birometric Authentication for Smart Devices |
---|---|
Study theme state | |
research duration | |
Research Programs | |
keyword | |
Research field | |
Research Topics Overview |
research topic | Anonymization Considered for the benefits of Users |
---|---|
Study theme state | |
research duration | |
Research Programs | |
keyword | |
Research field | |
Research Topics Overview |
research topic | Video Forgery Detection based on Deep Learning |
---|---|
Study theme state | |
research duration | |
Research Programs | |
keyword | |
Research field | |
Research Topics Overview |
Awards
- Best Paper Award Aug. 20,2009(Proc. 5th International Conference on Information Assurance and Security)
- IEEE Kansai Section Student Paper Award Feb. 22,2010(IEEE Kansai Section)
- IPSJ Digital Courier Funai Young Researcher Encouragement Award Mar. 25,2011
- EMM Best paper award May 2020
Academic Associations
所属学会・団体名 | 役職名 (役職在任期間) |
---|---|
The Institute of Electronics, Information and Communication Engineers | |
Information Processing Society of Japan | |
The Institute of Electrical and Electronics Engineers | |
Association for Computing Machinery | |
Institute of Social Safety Science | |
Japan Society of Public Utility Economics | |
Reliability Engineering Association of Japan |
Research Publications
No. | Type of publication | Date of publication (Date of presentation) | Title | Type of research result | Jointly authored or single authored | Publisher and journal name | Volume number |
---|---|---|---|---|---|---|---|
1 | Academic presentation7 | 2020/3~2020,03,00,,, | Video Forgery Detection Using Generative Adversarial Networks | Co-author | IEICE technical report | EMM2019-122, pp. 107-7112 | |
2 | International academic conference8 | 2020~2020,00,00,,, | Data Anonymization for Service Strategy Development and Information Recommendation to Users Based on TF-IDF Method | Co-author | Proc. of 30th International Symposium on Information Theory and Its Applications (ISITA 2020) | ||
3 | Academic presentation7 | 2019/7~2019,07,00,,, | A Study on Suppression of Inappropriate Use of Illegal Contents Based on Conformity Caused by Normative Influence | Co-author | IEICE technical report | EMM2019-50, pp. 305-310 | |
4 | International academic conference8 | 2019/4~2019,04,00,,, | Passive Video Forgery Detection Considering Spatio-Temporal Consistency | Co-author | Proc. 10th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2018) | pp. 381-391 | |
5 | Academic presentation7 | 2019/3~2019,03,00,,, | A Consideration on Spatio-Temporal Feature Learning for Video Forgery Detection | Co-author | IEICE Technical Report | EMM2018-104, pp. 67-72 | |
6 | Book2 | 2018/12~2018,12,00,,, | Advancement in Science and Technology and Human Societies | Co-authored chapter | Springer | ||
7 | Academic presentation7 | 2018/11~2018,11,00,,, | Video Forgery Detection Using Spatio-Temporal Convolutional Neural Network | Co-author | IEICE Technical Report | EMM2018-71, pp. 49-52 | |
8 | Academic presentation7 | 2018/9~2018,09,00,,, | A Study on Japanese Text Compression Using Morphological Analysis and Grammar Compression | Co-author | Proc. 2018 Forum on Information Technology | A-020, pp. 113-114 | |
9 | Academic presentation7 | 2018/8~2018,08,00,,, | A Study on Measures to Prevent College Students from Viewing Illegally Uploaded Videos -- Focused on The Fraud Triangle Theory and The Situational Crime Prevention Theory -- | Single-Author | IEICE Technical Report | SSS2018-15, pp. 9-12 | |
10 | Academic presentation7 | 2018/3~2018,03,00,,, | Video Forgery Detection Considering Spatio-Temporal Consistency | Co-author | IEICE Technical Report | EMM2017-81, pp. 23-28 | |
11 | Academic presentation7 | 2018/3~2018,03,00,,, | Analysis of the Contents of “Special Subject: Moral Education” and Development of Information Moral Learning Tool for Youth | Co-author | Proc. 2018 IEICE General Conference | D-15-28, p. 160 | |
12 | Academic presentation7 | 2018/3~2018,03,00,,, | A Study on Emotional Impression of Music Arrangement | Co-author | Proc. 2018 IEICE General Conference | H-2-11, p. 187 | |
13 | Academic presentation7 | 2017/3~2017,03,00,,, | User Authentication Using Heart Rate Sequences during Walking toward Continuous Authentication | Co-author | IEICE technical report | EMM2016-90, pp. 25-30 | |
14 | Academic presentation7 | 2017/3~2017,03,00,,, | A Study on Discomfort Factors in In-feed Web Advertising | Co-author | Proc. 2017 IEICE General Conference | A-12-2, p. 139 | |
15 | Academic presentation7 | 2017/3~2017,03,00,,, | A Study on the Impact of "Reach Site" on User's Copyright Infringement | Co-author | Proc. 2017 IEICE General Conference | A-12-3, p. 140 | |
16 | Academic presentation7 | 2017/3~2017,03,00,,, | GIS-based Maps based on Visual Characteristics of the Elderly | Co-author | Proc. 2017 IEICE General Conference | D-9-11, p. 101 | |
17 | Academic presentation7 | 2017/3~2017,03,00,,, | A Study on the Transportation Means in Tourist Destinations From the Viewpoint of "Pilgrimage" | Co-author | Proc. 2017 IEICE General Conference | D-9-13, p. 103 | |
18 | Academic presentation7 | 2017/3~2017,03,00,,, | A Study on Non-verbal Communication on Virtual Reality | Co-author | Proc. 2017 IEICE General Conference | H-2-9, p. 227 | |
19 | Academic presentation7 | 2017/1~2017,01,00,,, | Towards the Development of an Educational Tool for Learning Information Security Incidents through 3D Simulation | Single-Author | 2017 Symposium on Cryptography and Information Security | 8 pages | |
20 | Academic presentation7 | 2016/5~2016,05,00,,, | Multimodal User Authentication Focusing on Long-term Heart Rate Sequences from Wearable Devices | Co-author | IEICE technical report | EMM2016-9, pp. 49-54 | |
21 | Academic presentation7 | 2016/3~2016,03,00,,, | Data Anonymization based on TF-IDF Method Using Hierarchies Built from Attributes of Recommended Targets | Co-author | IEICE technical report | EMM2015-81, pp. 31-36 | |
22 | Academic presentation7 | 2016/3~2016,03,00,,, | Video Forgery Detection Using a Time Series Model in Dynamic Scenes | Co-author | IEICE technical report | EMM2015-80, pp. 25-30 | |
23 | Academic presentation7 | 2016/3~2016,03,00,,, | Owner Authentication Based on Long-term Sequence of Heart Rate | Co-author | Proc. 2016 IEICE General Conference | D-21-6, p. 219 | |
24 | Academic presentation7 | 2016/3~2016,03,00,,, | Analysis of Moral Education for Elementary and Junior High School Students | Co-author | Proc. 2016 IEICE General Conference | D-15-6, p. 185 | |
25 | Academic presentation7 | 2016/3~2016,03,00,,, | Towards the Design of Moral Education Learning Tool for Youth Based on Goal-Based Scenario Theory | Co-author | Proc. 2016 IEICE General Conference | D-15-7, p. 186 | |
26 | Academic presentation7 | 2016/3~2016,03,00,,, | A Study on Accuracy of Biometric Authentication Systems in Daily Situations | Co-author | Proc. 2016 IEICE General Conference | A-13-4, p. 185 | |
27 | Academic presentation7 | 2016/3~2016,03,00,,, | A Study on Management of Sleep State by Wearable Devices Towards Drowsy Driving Prevention | Co-author | Proc. 2016 IEICE General Conference | A-13-3, p. 184 | |
28 | Academic presentation7 | 2016/3~2016,03,00,,, | Analysis of Personal Consciousness for Information Security Based on Classification of News Medias | Co-author | Proc. 2016 IEICE General Conference | A-12-5, p. 177 | |
29 | International academic conference8 | 2015/6~2015,06,00,,, | Owner Authentication for Mobile Devices Using Motion Gestures Based on Multi-Owner Template Update | Co-author | Proc. of 2015 Workshop on User Authentication for Emerging Interfaces (UAEI), in conjunction with IEEE International Conference on Multimedia and Expo (ICME2015) | 6 pages | |
30 | Academic presentation7 | 2015/5~2015,05,00,,, | Data Anonymization for Information Recommendation Based on TF-IDF Method | Co-author | IEICE technical report | EMM2015-10, pp. 51-56 | |
31 | Academic presentation7 | 2015/3~2015,03,00,,, | Analysis of Personal Consciousness for Password Management Based on Classication of Sites | Co-author | Proc. 2015 IEICE General Conference | D-15-7, p. 186 | |
32 | Academic presentation7 | 2015/3~2015,03,00,,, | Development of Learning Tool for Disaster Prevention Through 3D Simulation Based on Goal-Based Scenario Theory | Co-author | Proc. 2015 IEICE General Conference | D-15-4, p. 183 | |
33 | Academic presentation7 | 2015/3~2015,03,00,,, | Development of Education Tool for Information Security Through 3D Virtual Environment | Co-author | Proc. 2015 IEICE General Conference | D-15-1, p. 180 | |
34 | Academic presentation7 | 2015/3~2015,03,00,,, | Usability Evaluation of Multi-Touch Actions Considering the Structure of Hand-Fingers and Its Constraints on Movement | Co-author | IEICE technical report | EMM2014-93, pp. 97-102 | |
35 | Academic presentation7 | 2015/3~2015,03,00,,, | Generation Methods of Secret Sharing QR Codes | Co-author | IEICE technical report | EMM2014-92, pp. 91-96 | |
36 | Academic presentation7 | 2015/2~2015,02,00,,, | A Study on Improvement of User's Consciousness for Security : Extraction of Security Risk in the Future Considered from Present Security Incidents and Iconization of Terms and Conditions of Use | Co-author | IEICE technical report | SSS2014-30, pp. 25-28 | |
37 | Academic presentation7 | 2015/2~2015,02,00,,, | A Study on Information Security from a Viewpoint of International Safety Standards | Single-Author | IEICE technical report | SSS2014-29, pp. 21-24 | |
38 | Academic presentation7 | 2014/9~2014,09,00,,, | A Study on Usability of Multi-Touch Actions Considering the Structure of Hand-Fingers | Co-author | 22-2, 2 pages | ||
39 | Academic presentation7 | 2014/7~2014,07,00,,, | Authentication for Mobile Devices Using Behavioral Biometrics with Adaptive Templates | Co-author | IEICE technical report | EMM2014-21, pp. 133-138 | |
40 | Academic presentation7 | 2014/3~2014,03,00,,, | A Study on Physical Spoofing of Biometric Information for Fingerprint Authentication Systems | Co-author | Proc. 2014 IEICE General Conference | A-7-5, p. 121 | |
41 | Academic presentation7 | 2014/3~2014,03,00,,, | Analysis of Personal Interest for Information Security Through Portal Sites and Microblogs | Co-author | Proc. 2014 IEICE General Conference | A-18-1, p. 232 | |
42 | Academic presentation7 | 2014/3~2014,03,00,,, | Issues on Education of Information Security Through Information Study for Participating Community | Co-author | Proc. 2014 IEICE General Conference | D-15-27, p. 166 | |
43 | Academic presentation7 | 2014/3~2014,03,00,,, | Development of Tools for Education of Information Security with Smartphone Devices | Co-author | Proc. 2014 IEICE General Conference | D-15-28, p. 167 | |
44 | Academic presentation7 | 2014/3~2014,03,00,,, | Safety Confirmation System Using Non-contact type IC cards | Co-author | Proc. 2014 IEICE General Conference | D-19-7, p. 183 | |
45 | Academic presentation7 | 2014/3~2014,03,00,,, | Simple Gesture-based User Authentication with Accelerometer and Gyroscope in Mobile Phones | Co-author | Proc. 2014 IEICE General Conference | D-21-2, p. 193 | |
46 | Academic presentation7 | 2014/3~2014,03,00,,, | Privacy Protection by ID Types Applicable to Subjective Consideration of Users | Co-author | Proc. 2014 IEICE General Conference | D-21-3, p. 194 | |
47 | Academic presentation7 | 2014/1~2014,01,00,,, | A Study on Information Security Education at Higher Education Institutions | Single-Author | The 31st Symposium on Cryptography and Information Security | 6 pages | |
48 | Academic presentation7 | 2013/9~2013,09,00,,, | Secret Sharing Scheme in QR Code Considering the Size of Shares | Co-author | IEICE Technical Report | EMM2013-57, pp. 25-30 | |
49 | Research report21 | 2013/3~2013,03,00,,, | Report on "the Project to Learn from the Field Study on the Aff ected Area of Great East Japan Earthquake" | In-house publication | Co-author | Safety Science Review 2012 | No. 3, pp. 139-146 |
50 | International academic conference8 | 2012/11~2012,11,00,,, | Tablet Owner Authentication Based on Behavioral Characteristics of Multi-Touch Actions | Co-author | Proc. of International Conference on Pattern Recognition(ICPR 2012) | 4 pages | |
51 | Academic presentation7 | 2012/3~2012,03,00,,, | Owner Authentication of Tablet-Type Devices Using Multi-Touch Actions | Co-author | Proc. 2012 IEICE General Conference | D-21-6, p. 230 | |
52 | Research report21 | 2012/3~2012,03,00,,, | The Great East Japan Earthquake and Information Security | In-house publication | Single-Author | Safety Science Review 2011 | No. 2, pp. 42-43 |
53 | Papers1 | 2011/3~2011,03,00,,, | Anonymous Communication System Based on Multiple Loopbacks | Academic Journal | Co-author | Journal of Information Assurance and Security | Vol. 6, No. 2, pp. 124-131 |
54 | Papers1 | 2011/3~2011,03,00,,, | Toward Realization of Anonymous Services on the Internet | In-house publication | Single-Author | Safety Science Review 2010 | No. 1, pp. 13-26 |
55 | Academic presentation7 | 2011/1~2011,01,00,,, | Analysis of Sender/Receiver Anonymity for Anonymous Communication System 3-Mode Net Against Collaborating Nodes | Co-author | The 2011 Symposium on Cryptography and Information Security (SCIS) | 8 pages | |
56 | Academic presentation7 | 2011/1~2011,01,00,,, | Methods for Reducing the Number of Relay Nodes in Anonymous Communication System 3-Mode Net | Co-author | The 2011 Symposium on Cryptography and Information Security (SCIS) | 8 pages | |
57 | International academic conference8 | 2010/8~2010,08,00,,, | Anonymous Communication System Using Probabilistic Choice of Actions and Multiple Loopbacks | Co-author | Proc. 6th International Conference on Information Assurance and Security | pp. 210-215 | |
58 | Papers1 | 2010/7~2010,07,00,,, | Theoretical Analysis of the Performance of Anonymous Communication System 3-Mode Net | Academic Journal | Co-author | IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences | Vol. E93-A, No. 7, pp. 1338-1345 |
59 | Academic presentation7 | 2010/1~2010,01,00,,, | Crowds-Based Anonymous Communication System Using Multiple Loopbacks | Co-author | The 2010 Symposium on Cryptography and Information Security (SCIS) | 6 pages | |
60 | Papers1 | 2010/1~2010,01,00,,, | A Consideration on the Numbers of Relay Nodes and Encryption Required for Anonymous Communication System 3-Mode Net | Academic Journal | Co-author | Journal of Information Assurance and Security | Vol. 5, No. 3, pp. 276-283 |
61 | Papers1 | 2009/12~2009,12,00,,, | Matrix-Based Algorithm for Integrating Inheritance Relations of Access Rights for Policy Generation | Academic Journal | Co-author | Journal of Information Processing | Vol. 17, pp. 318-327 |
62 | International academic conference8 | 2009/10~2009,10,00,,, | Security Analysis of Anonymous Communication System 3-Mode Net Against Collaborating Nodes | Co-author | Proc. 2009 Asia-Pacific Signal and Information Processing Association Annual Summit Conference (APSIPA ASC 2009) | pp. 105-110 | |
63 | International academic conference8 | 2009/8~2009,08,00,,, | Performance Analysis of Anonymous Communication System 3-Mode Net | Co-author | Proc. 5th IEEE International Conference on Information Assurance and Security (IAS 2009) | pp. 593-596 | |
64 | Academic presentation7 | 2009/3~2009,03,00,,, | Reduction of the Number of Relay Nodes in Anonymous Communication System 3-Mode Net | Co-author | Proc. 2009 IEICE Genera Conference | A-7-8, p. 182 | |
65 | Academic presentation7 | 2008/3~2008,03,00,,, | Automated Trust Negotiation among Three Agent based on Service Usage of Client | Co-author | Proc.2008 IEICE General Conference | A-7-10, p. 182 | |
66 | Academic presentation7 | 2007/5~2007,05,00,,, | An Integration Method of Access Control Policies Using Adjacency Matrix | Co-author | The Special Interest Group Notes of IPSJ | 2007-CSEC-37, pp. 45-50 | |
67 | Academic presentation7 | 2007/3~2007,03,00,,, | Fair Automated Trust Negotiation with Credential Disclosure Points | Co-author | Proc. 2007 IEICE General Conference | A-7-10, p. 214 | |
68 | Academic presentation7 | 2007/3~2007,03,00,,, | Access Control Policy Inconsistency Check Using Model Checker | Co-author | The Special Interest Group Notes for IPSJ | 2007-CSEC-36, pp. 441-446 | |
69 | Academic presentation7 | 2005/9~2005,09,00,,, | A Study on RSA Cryptosystem Using Pseudoprimes | Co-author | Proc. 2005 Society Conference of IEICE | A-7-2, p. 175 |
Academic presentationVideo Forgery Detection Using Generative Adversarial NetworksUnrefereedCo-authorS. Oshiro;K. Kono;N. BabaguchiIEICE technical reportEMM2019-122, pp. 107-71122020/3~
International academic conferenceData Anonymization for Service Strategy Development and Information Recommendation to Users Based on TF-IDF MethodIn refereedCo-authorK. Kono;N. BabaguchiProc. of 30th International Symposium on Information Theory and Its Applications (ISITA 2020)2020~to be published in 2020
Academic presentationA Study on Suppression of Inappropriate Use of Illegal Contents Based on Conformity Caused by Normative InfluenceUnrefereedCo-authorH. Yamaguchi;K. KonoIEICE technical reportEMM2019-50, pp. 305-3102019/7~Win EMM Best Paper Award
International academic conferencePassive Video Forgery Detection Considering Spatio-Temporal ConsistencyIn refereedCo-authorK. Kono;T. Yoshida;S. Oshiro;N. BabaguchiProc. 10th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2018)pp. 381-3912019/4~https://doi.org/10.1007/978-3-030-17065-3_38
Academic presentationA Consideration on Spatio-Temporal Feature Learning for Video Forgery DetectionUnrefereedCo-authorS. Oshiro;K. Kono;N. BabaguchiIEICE Technical ReportEMM2018-104, pp. 67-722019/3~
BookAdvancement in Science and Technology and Human SocietiesCo-authored chapterS. Abe, M. Ozawa, Y. Kawata,(eds.)Springer2018/12~
Academic presentationVideo Forgery Detection Using Spatio-Temporal Convolutional Neural NetworkUnrefereedCo-authorS. Oshiro;K. Kono;N. BabaguchiIEICE Technical ReportEMM2018-71, pp. 49-522018/11~
Academic presentationA Study on Japanese Text Compression Using Morphological Analysis and Grammar CompressionUnrefereedCo-authorK. Nakamura;K. Kono;N. BabaguchiProc. 2018 Forum on Information TechnologyA-020, pp. 113-1142018/9~
Academic presentationA Study on Measures to Prevent College Students from Viewing Illegally Uploaded Videos -- Focused on The Fraud Triangle Theory and The Situational Crime Prevention Theory --UnrefereedSingle-AuthorK. KonoIEICE Technical ReportSSS2018-15, pp. 9-122018/8~
BookMonographCo-authored chapter2018/4~
BookMonographCo-authored chapter2018/4~
Academic presentationVideo Forgery Detection Considering Spatio-Temporal ConsistencyUnrefereedCo-authorT. Yoshida;K. Kono;N. BabaguchiIEICE Technical ReportEMM2017-81, pp. 23-282018/3~
Academic presentationAnalysis of the Contents of “Special Subject: Moral Education” and Development of Information Moral Learning Tool for YouthUnrefereedCo-authorT. Katayama;K. KonoProc. 2018 IEICE General ConferenceD-15-28, p. 1602018/3~
Academic presentationA Study on Emotional Impression of Music ArrangementUnrefereedCo-authorM. Asaumi;K. KonoProc. 2018 IEICE General ConferenceH-2-11, p. 1872018/3~
Academic presentationUser Authentication Using Heart Rate Sequences during Walking toward Continuous AuthenticationUnrefereedCo-authorT. Yoshida;K. Kono;N. BabaguchiIEICE technical reportEMM2016-90, pp. 25-302017/3~
Academic presentationA Study on Discomfort Factors in In-feed Web AdvertisingUnrefereedCo-authorY. Hirai;K. KonoProc. 2017 IEICE General ConferenceA-12-2, p. 1392017/3~
Academic presentationA Study on the Impact of "Reach Site" on User's Copyright InfringementUnrefereedCo-authorN. Yamagami;K. KonoProc. 2017 IEICE General ConferenceA-12-3, p. 1402017/3~
Academic presentationGIS-based Maps based on Visual Characteristics of the ElderlyUnrefereedCo-authorR. Kikuchi;K. KonoProc. 2017 IEICE General ConferenceD-9-11, p. 1012017/3~
Academic presentationA Study on the Transportation Means in Tourist Destinations From the Viewpoint of "Pilgrimage"UnrefereedCo-authorN. Terashima;K. KonoProc. 2017 IEICE General ConferenceD-9-13, p. 1032017/3~
Academic presentationA Study on Non-verbal Communication on Virtual RealityUnrefereedCo-authorR. Narumiya;K. KonoProc. 2017 IEICE General ConferenceH-2-9, p. 2272017/3~
Academic presentationTowards the Development of an Educational Tool for Learning Information Security Incidents through 3D SimulationUnrefereedSingle-AuthorK. Kono2017 Symposium on Cryptography and Information Security8 pages2017/1~
Survey reportUnrefereedIn-house publicationCo-author2016/7~
Academic presentationMultimodal User Authentication Focusing on Long-term Heart Rate Sequences from Wearable DevicesUnrefereedCo-authorT. Yoshida;K. Kono;N. BabaguchiIEICE technical reportEMM2016-9, pp. 49-542016/5~
Academic presentationData Anonymization based on TF-IDF Method Using Hierarchies Built from Attributes of Recommended TargetsUnrefereedCo-authorK. Arai;K. Kono;N. BabaguchiIEICE technical reportEMM2015-81, pp. 31-362016/3~
Academic presentationVideo Forgery Detection Using a Time Series Model in Dynamic ScenesUnrefereedCo-authorS. Karita;K. Kono;N. BabaguchiIEICE technical reportEMM2015-80, pp. 25-302016/3~
Academic presentationOwner Authentication Based on Long-term Sequence of Heart RateUnrefereedCo-authorT. Yoshida;K. Kono;N. BabaguchiProc. 2016 IEICE General ConferenceD-21-6, p. 2192016/3~
Academic presentationAnalysis of Moral Education for Elementary and Junior High School StudentsUnrefereedCo-authorY. Murakami;N. Terashima;R. Narumiya;Y. Hirai;T. Katayama;R. Kikuchi;Y. Sanuki;N. Yamagami;K. KonoProc. 2016 IEICE General ConferenceD-15-6, p. 1852016/3~
Academic presentationTowards the Design of Moral Education Learning Tool for Youth Based on Goal-Based Scenario TheoryUnrefereedCo-authorR. Narumiya;N. Terashima;Y. Murakami;Y. Hirai;T. Katayama;R. Kikuchi;Y. Sanuki;N. Yamagami;K. KonoProc. 2016 IEICE General ConferenceD-15-7, p. 1862016/3~
Academic presentationA Study on Accuracy of Biometric Authentication Systems in Daily SituationsUnrefereedCo-authorS. Iida;K. KonoProc. 2016 IEICE General ConferenceA-13-4, p. 1852016/3~
Academic presentationA Study on Management of Sleep State by Wearable Devices Towards Drowsy Driving PreventionUnrefereedCo-authorN. Shimoyama;K. KonoProc. 2016 IEICE General ConferenceA-13-3, p. 1842016/3~
Academic presentationAnalysis of Personal Consciousness for Information Security Based on Classification of News MediasUnrefereedCo-authorD. Sunano;K. KonoProc. 2016 IEICE General ConferenceA-12-5, p. 1772016/3~
Research reportUnrefereedIn-house publicationSingle-Author2015/7~
International academic conferenceOwner Authentication for Mobile Devices Using Motion Gestures Based on Multi-Owner Template UpdateIn refereedCo-authorS. Karita;K. Nakamura;K. Kono;Y. Ito;N. BabaguchiProc. of 2015 Workshop on User Authentication for Emerging Interfaces (UAEI), in conjunction with IEEE International Conference on Multimedia and Expo (ICME2015)6 pages2015/6~
Academic presentationData Anonymization for Information Recommendation Based on TF-IDF MethodUnrefereedCo-authorK. Arai;K. Kono;N. BabaguchiIEICE technical reportEMM2015-10, pp. 51-562015/5~
Academic presentationAnalysis of Personal Consciousness for Password Management Based on Classication of SitesUnrefereedCo-authorS. Iwaki;K. KonoProc. 2015 IEICE General ConferenceD-15-7, p. 1862015/3~
Academic presentationDevelopment of Learning Tool for Disaster Prevention Through 3D Simulation Based on Goal-Based Scenario TheoryUnrefereedCo-authorR. Futagami;K. KonoProc. 2015 IEICE General ConferenceD-15-4, p. 1832015/3~
Academic presentationDevelopment of Education Tool for Information Security Through 3D Virtual EnvironmentUnrefereedCo-authorR. Imai;K. KonoProc. 2015 IEICE General ConferenceD-15-1, p. 1802015/3~
Academic presentationUsability Evaluation of Multi-Touch Actions Considering the Structure of Hand-Fingers and Its Constraints on MovementUnrefereedCo-authorK. Nakamura;K. Kono;Y. Ito;N. BabaguchiIEICE technical reportEMM2014-93, pp. 97-1022015/3~
Academic presentationGeneration Methods of Secret Sharing QR CodesUnrefereedCo-authorM. Kuramoto;K. Kono;Y. Ito;N. BabaguchiIEICE technical reportEMM2014-92, pp. 91-962015/3~
Academic presentationA Study on Improvement of User's Consciousness for Security : Extraction of Security Risk in the Future Considered from Present Security Incidents and Iconization of Terms and Conditions of UseUnrefereedCo-authorS. Matsusaka;N. Nakagawa;K. KonoIEICE technical reportSSS2014-30, pp. 25-282015/2~
Academic presentationA Study on Information Security from a Viewpoint of International Safety StandardsUnrefereedSingle-AuthorK. KonoIEICE technical reportSSS2014-29, pp. 21-242015/2~
Lecture2014/10/20~
Academic presentationA Study on Usability of Multi-Touch Actions Considering the Structure of Hand-FingersUnrefereedCo-authorK. Nakamura;K. Kono;Y. Ito;N. Babaguchi22-2, 2 pages2014/9~
Academic presentationAuthentication for Mobile Devices Using Behavioral Biometrics with Adaptive TemplatesUnrefereedCo-authorS. Karita;K. Nakamura;K. Kono;Y. Ito;N. BabaguchiIEICE technical reportEMM2014-21, pp. 133-1382014/7~
Research reportUnrefereedSingle-Author2014/7~
Academic presentationA Study on Physical Spoofing of Biometric Information for Fingerprint Authentication SystemsUnrefereedCo-authorR. Futagami;F. Nakagawa;R. Imai;S. Iwaki;K. Tagashira;N. Nakagawa;S. Matsusaka;K. KonoProc. 2014 IEICE General ConferenceA-7-5, p. 1212014/3~
Academic presentationAnalysis of Personal Interest for Information Security Through Portal Sites and MicroblogsUnrefereedCo-authorY. Ishimoto;K. KonoProc. 2014 IEICE General ConferenceA-18-1, p. 2322014/3~
Academic presentationIssues on Education of Information Security Through Information Study for Participating CommunityUnrefereedCo-authorT. Yamane;K. KonoProc. 2014 IEICE General ConferenceD-15-27, p. 1662014/3~
Academic presentationDevelopment of Tools for Education of Information Security with Smartphone DevicesUnrefereedCo-authorT. Oono;K. KonoProc. 2014 IEICE General ConferenceD-15-28, p. 1672014/3~
Academic presentationSafety Confirmation System Using Non-contact type IC cardsUnrefereedCo-authorY. Yamauchi;K. KonoProc. 2014 IEICE General ConferenceD-19-7, p. 1832014/3~
Academic presentationSimple Gesture-based User Authentication with Accelerometer and Gyroscope in Mobile PhonesUnrefereedCo-authorS. Karita;K. Nakamura;K. Kono;Y. Ito;N. BabaguchiProc. 2014 IEICE General ConferenceD-21-2, p. 1932014/3~
Academic presentationPrivacy Protection by ID Types Applicable to Subjective Consideration of UsersUnrefereedCo-authorK. Arai;K. Kono;N. BabaguchiProc. 2014 IEICE General ConferenceD-21-3, p. 1942014/3~
Academic presentationA Study on Information Security Education at Higher Education InstitutionsUnrefereedSingle-AuthorK. KonoThe 31st Symposium on Cryptography and Information Security6 pages2014/1~
BookMonographCo-authored chapter2013/9/1~
Academic presentationSecret Sharing Scheme in QR Code Considering the Size of SharesUnrefereedCo-authorM. Kuramoto;K. Kono;Y. Ito;N. BabaguchiIEICE Technical ReportEMM2013-57, pp. 25-302013/9~
BookMonographCo-authored chapter2013/3/25~
Research reportReport on "the Project to Learn from the Field Study on the Aff ected Area of Great East Japan Earthquake"UnrefereedIn-house publicationCo-authorM. Suga;K. Kamei;S. Kaneko;H. Shiroshita;K. Kono;S. Nagamatsu;Y. Hayashi;K. Koshiyama;T. MotoyoshiSafety Science Review 2012No. 3, pp. 139-1462013/3~
International academic conferenceTablet Owner Authentication Based on Behavioral Characteristics of Multi-Touch ActionsIn refereedCo-authorK. Nakamura;K. Kono;Y. Ito;N. BabaguchiProc. of International Conference on Pattern Recognition(ICPR 2012)4 pages2012/11~
Academic presentationOwner Authentication of Tablet-Type Devices Using Multi-Touch ActionsUnrefereedCo-authorK. Nakamura;K. Kono;Y. Ito;N. BabaguchiProc. 2012 IEICE General ConferenceD-21-6, p. 2302012/3~
Research reportThe Great East Japan Earthquake and Information SecurityUnrefereedIn-house publicationSingle-AuthorK. KonoSafety Science Review 2011No. 2, pp. 42-432012/3~
PapersAnonymous Communication System Based on Multiple LoopbacksIn refereedAcademic JournalCo-authorK. Kono;S. Nakano;Y. Ito;N. BabaguchiJournal of Information Assurance and SecurityVol. 6, No. 2, pp. 124-1312011/3~Online published
PapersToward Realization of Anonymous Services on the InternetIn refereedIn-house publicationSingle-AuthorK. KonoSafety Science Review 2010No. 1, pp. 13-262011/3~
Academic presentationAnalysis of Sender/Receiver Anonymity for Anonymous Communication System 3-Mode Net Against Collaborating NodesUnrefereedCo-authorK. Kono;S. Nakano;Y. Ito;N. BabaguchiThe 2011 Symposium on Cryptography and Information Security (SCIS)8 pages2011/1~
Academic presentationMethods for Reducing the Number of Relay Nodes in Anonymous Communication System 3-Mode NetUnrefereedCo-authorS. Nakano;K. Kono;Y. Ito;N. BabaguchiThe 2011 Symposium on Cryptography and Information Security (SCIS)8 pages2011/1~
International academic conferenceAnonymous Communication System Using Probabilistic Choice of Actions and Multiple LoopbacksIn refereedCo-authorK. Kono;Y. Ito;N. BabaguchiProc. 6th International Conference on Information Assurance and Securitypp. 210-2152010/8~
PapersTheoretical Analysis of the Performance of Anonymous Communication System 3-Mode NetIn refereedAcademic JournalCo-authorK. Kono;S. Nakano;Y. Ito;N. BabaguchiIEICE Trans. on Fundamentals of Electronics, Communications and Computer SciencesVol. E93-A, No. 7, pp. 1338-13452010/7~
Academic presentationCrowds-Based Anonymous Communication System Using Multiple LoopbacksUnrefereedCo-authorK. Kono;Y. Ito;N. BabaguchiThe 2010 Symposium on Cryptography and Information Security (SCIS)6 pages2010/1~
PapersA Consideration on the Numbers of Relay Nodes and Encryption Required for Anonymous Communication System 3-Mode NetIn refereedAcademic JournalCo-authorK. Kono;S. Nakano;Y. Ito;N. BabaguchiJournal of Information Assurance and SecurityVol. 5, No. 3, pp. 276-2832010/1~Online Published
PapersMatrix-Based Algorithm for Integrating Inheritance Relations of Access Rights for Policy GenerationIn refereedAcademic JournalCo-authorK. Kono;Y. Ito;A. Aoyama;H. Kamoda;N. BabaguchiJournal of Information ProcessingVol. 17, pp. 318-3272009/12~IPSJ Digital Courier Funai Young Researcher Encouragement Award
International academic conferenceSecurity Analysis of Anonymous Communication System 3-Mode Net Against Collaborating NodesIn refereedCo-authorK. Kono;S. Nakano;Y. Ito;N. BabaguchiProc. 2009 Asia-Pacific Signal and Information Processing Association Annual Summit Conference (APSIPA ASC 2009)pp. 105-1102009/10~
International academic conferencePerformance Analysis of Anonymous Communication System 3-Mode NetIn refereedCo-authorK. Kono;S. Nakano;Y. Ito;N. BabaguchiProc. 5th IEEE International Conference on Information Assurance and Security (IAS 2009)pp. 593-5962009/8~Win Best Paper Award
Academic presentationReduction of the Number of Relay Nodes in Anonymous Communication System 3-Mode NetUnrefereedCo-authorS. Nakano;K. Kono;Y. Ito;N. BabaguchiProc. 2009 IEICE Genera ConferenceA-7-8, p. 1822009/3~
Academic presentationAutomated Trust Negotiation among Three Agent based on Service Usage of ClientUnrefereedCo-authorT. Hanaoka;K. Kono;Y. Ito;N. BabaguchiProc.2008 IEICE General ConferenceA-7-10, p. 1822008/3~
Academic presentationAn Integration Method of Access Control Policies Using Adjacency MatrixUnrefereedCo-authorK. Kono;Y. Ito;A. Aoyama;H. Kamoda;N. BabaguchiThe Special Interest Group Notes of IPSJ2007-CSEC-37, pp. 45-502007/5~
Academic presentationFair Automated Trust Negotiation with Credential Disclosure PointsUnrefereedCo-authorR. Tanihira;K. Kono;Y. Ito;N. BabaguchiProc. 2007 IEICE General ConferenceA-7-10, p. 2142007/3~
Academic presentationAccess Control Policy Inconsistency Check Using Model CheckerUnrefereedCo-authorH. Kamoda;K. Kono;Y. Ito;N. BabaguchiThe Special Interest Group Notes for IPSJ2007-CSEC-36, pp. 441-4462007/3~
Academic presentationA Study on RSA Cryptosystem Using PseudoprimesUnrefereedCo-authorK. Kono;Y. Ito;N. BabaguchiProc. 2005 Society Conference of IEICEA-7-2, p. 1752005/9~
Participation in International Conferences
- 5th International Conference on Information Assurance and Security (IAS2009) Aug.18,2009-Aug. 20,2009
- 2009 Asia-Pacific Signal and Information Processing Association Annual Summit Conference (APSIPA ASC 2009) Oct.4,2009-Oct. 7,2009
- 6th International Conference on Information Assurance and Security (IAS2010) Aug.23,2010-Aug. 25,2010
- Proc. of 2015 Workshop on User Authentication for Emerging Interfaces (UAEI), in conjunction with IEEE International Conference on Multimedia and Expo (ICME2015) Jun.29,2015-Jul. 3,2015
- Proc. of 14th International Conference on Information Assurance and Security (IAS 2018) Dec.13,2018-Dec. 15,2018
Courses Taught
- Information Processing Studies
- AI and Data Science - Current Topics -
- Introduction to Safety Science II
- Introductory Seminar
- Information Security
- Practicum in Artificial Intelligence
- Advanced Seminar I
- Advanced Seminar II
- Graduation Thesis I
- Graduation Thesis II
- Advanced Information Security
- Academic Writing
- Assistant supervisors' seminar 2
- Assistant supervisors' seminar 1A
- Assistant supervisors' seminar 1B
- Graduation Thesis
- Advanced Seminar
- Personal Information
- Research Activities
- Research Activities
- Community Service
- Courses Taught